Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap.
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
- To: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Subject: Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap.
- From: Ilya Smith <blackzert@xxxxxxxxx>
- Date: Wed, 28 Mar 2018 21:48:22 +0300
- Cc: Michal Hocko <mhocko@xxxxxxxxxx>, Matthew Wilcox <willy@xxxxxxxxxxxxx>, rth@xxxxxxxxxxx, ink@xxxxxxxxxxxxxxxxxxxx, mattst88@xxxxxxxxx, vgupta@xxxxxxxxxxxx, linux@xxxxxxxxxxxxxxx, tony.luck@xxxxxxxxx, fenghua.yu@xxxxxxxxx, ralf@xxxxxxxxxxxxxx, jejb@xxxxxxxxxxxxxxxx, Helge Deller <deller@xxxxxx>, benh@xxxxxxxxxxxxxxxxxxx, paulus@xxxxxxxxx, mpe@xxxxxxxxxxxxxx, schwidefsky@xxxxxxxxxx, heiko.carstens@xxxxxxxxxx, ysato@xxxxxxxxxxxxxxxxxxxx, dalias@xxxxxxxx, davem@xxxxxxxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxxxxx, hpa@xxxxxxxxx, x86@xxxxxxxxxx, nyc@xxxxxxxxxxxxxx, viro@xxxxxxxxxxxxxxxxxx, arnd@xxxxxxxx, gregkh@xxxxxxxxxxxxxxxxxxx, deepa.kernel@xxxxxxxxx, Hugh Dickins <hughd@xxxxxxxxxx>, kstewart@xxxxxxxxxxxxxxxxxxx, pombredanne@xxxxxxxx, Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>, steve.capper@xxxxxxx, punit.agrawal@xxxxxxx, aneesh.kumar@xxxxxxxxxxxxxxxxxx, npiggin@xxxxxxxxx, Kees Cook <keescook@xxxxxxxxxxxx>, bhsharma@xxxxxxxxxx, riel@xxxxxxxxxx, nitin.m.gupta@xxxxxxxxxx, "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>, Dan Williams <dan.j.williams@xxxxxxxxx>, Jan Kara <jack@xxxxxxx>, ross.zwisler@xxxxxxxxxxxxxxx, Jerome Glisse <jglisse@xxxxxxxxxx>, Andrea Arcangeli <aarcange@xxxxxxxxxx>, Oleg Nesterov <oleg@xxxxxxxxxx>, linux-alpha@xxxxxxxxxxxxxxx, LKML <linux-kernel@xxxxxxxxxxxxxxx>, linux-snps-arc@xxxxxxxxxxxxxxxxxxx, linux-ia64@xxxxxxxxxxxxxxx, linux-metag@xxxxxxxxxxxxxxx, linux-mips@xxxxxxxxxxxxxx, linux-parisc@xxxxxxxxxxxxxxx, linuxppc-dev@xxxxxxxxxxxxxxxx, linux-s390@xxxxxxxxxxxxxxx, linux-sh@xxxxxxxxxxxxxxx, sparclinux@xxxxxxxxxxxxxxx, Linux-MM <linux-mm@xxxxxxxxx>
- In-reply-to: <20180327221635.GA3790@thunk.org>
- References: <1521736598-12812-1-git-send-email-blackzert@gmail.com> <20180323124806.GA5624@bombadil.infradead.org> <651E0DB6-4507-4DA1-AD46-9C26ED9792A8@gmail.com> <20180326084650.GC5652@dhcp22.suse.cz> <01A133F4-27DF-4AE2-80D6-B0368BF758CD@gmail.com> <20180327072432.GY5652@dhcp22.suse.cz> <0549F29C-12FC-4401-9E85-A430BC11DA78@gmail.com> <20180327221635.GA3790@thunk.org>
> On 28 Mar 2018, at 01:16, Theodore Y. Ts'o <tytso@xxxxxxx> wrote:
>
> On Tue, Mar 27, 2018 at 04:51:08PM +0300, Ilya Smith wrote:
>>> /dev/[u]random is not sufficient?
>>
>> Using /dev/[u]random makes 3 syscalls - open, read, close. This is a performance
>> issue.
>
> You may want to take a look at the getrandom(2) system call, which is
> the recommended way getting secure random numbers from the kernel.
>
>>> Well, I am pretty sure userspace can implement proper free ranges
>>> tracking…
>>
>> I think we need to know what libc developers will say on implementing ASLR in
>> user-mode. I am pretty sure they will say ‘nether’ or ‘some-day’. And problem
>> of ASLR will stay forever.
>
> Why can't you send patches to the libc developers?
>
> Regards,
>
> - Ted
I still believe the issue is on kernel side, not in library.
Best regards,
Ilya
--
To unsubscribe from this list: send the line "unsubscribe linux-ia64" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
[Index of Archives]
[Linux Kernel]
[Sparc Linux]
[DCCP]
[Linux ARM]
[Yosemite News]
[Linux SCSI]
[Linux x86_64]
[Linux for Ham Radio]