Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1762304AbXEQVvW (ORCPT ); Thu, 17 May 2007 17:51:22 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755450AbXEQVvP (ORCPT ); Thu, 17 May 2007 17:51:15 -0400 Received: from twin.jikos.cz ([213.151.79.26]:40064 "EHLO twin.jikos.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755889AbXEQVvO (ORCPT ); Thu, 17 May 2007 17:51:14 -0400 Date: Thu, 17 May 2007 23:50:19 +0200 (CEST) From: Jiri Kosina To: Andrew Morton , Ingo Molnar cc: Jan Kratochvil , linux-kernel@vger.kernel.org Subject: Re: [PATCH][RESEND] PIE randomization In-Reply-To: Message-ID: References: <20070511125629.3df919cf.akpm@linux-foundation.org> <20070511133651.63f8a14d.akpm@linux-foundation.org> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 923 Lines: 28 On Thu, 17 May 2007, Jan Kratochvil wrote: > This patch is using mmap()'s randomization functionality in such a way > that it maps the main executable of (specially compiled/linked > -pie/-fpie) ET_DYN binaries onto a random address (in cases in which > mmap() is allowed to perform a randomization). Origin of this patch is > in exec-shield (http://people.redhat.com/mingo/exec-shield/) > Signed-off-by: Jan Kratochvil Andrew, if you are going to merge this, you could add Signed-off-by: Jiri Kosina to this patch, if it makes any difference. Ingo, do you have any opinion on merging this upstream please? Thanks, -- Jiri Kosina - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/