Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754003Ab3JBL6q (ORCPT ); Wed, 2 Oct 2013 07:58:46 -0400 Received: from merlin.infradead.org ([205.233.59.134]:43763 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753457Ab3JBL6p (ORCPT ); Wed, 2 Oct 2013 07:58:45 -0400 Date: Wed, 2 Oct 2013 13:58:26 +0200 From: Peter Zijlstra To: Stephane Eranian Cc: LKML , "mingo@elte.hu" , "ak@linux.intel.com" , Arnaldo Carvalho de Melo , David Ahern , Jiri Olsa , Hugh Dickins , Kees Cook Subject: Re: [RFC] perf: mmap2 not covering VM_CLONE regions Message-ID: <20131002115826.GM26785@twins.programming.kicks-ass.net> References: <20130930161546.GG3081@twins.programming.kicks-ass.net> <20130930165420.GI3081@twins.programming.kicks-ass.net> <20131002112316.GP3081@twins.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20131002112316.GP3081@twins.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2012-12-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 644 Lines: 14 On Wed, Oct 02, 2013 at 01:23:16PM +0200, Peter Zijlstra wrote: > So the only thing I can come up with is something like the below; > supposedly the sha hash mixing a boot time random seed and the mm > pointer is enough to avoid it being a data leak. That is, right until it becomes feasible to run 2^64 SHA1 computations. I've actually no idea how hard that is given todays GPU assisted efforts. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/