[PATCH v3 0/10] split ET_DYN ASLR from mmap ASLR
keescook at chromium.org
Mon Mar 9 11:06:00 PDT 2015
On Mon, Mar 9, 2015 at 9:19 AM, Russell King - ARM Linux
<linux at arm.linux.org.uk> wrote:
> On Tue, Mar 03, 2015 at 06:10:15PM -0800, Kees Cook wrote:
>> To address the "offset2lib" ASLR weakness, this separates ET_DYN
>> ASLR from mmap ASLR, as already done on s390. The architectures
>> that are already randomizing mmap (arm, arm64, mips, powerpc, s390,
>> and x86), have their various forms of arch_mmap_rnd() made available
>> via the new CONFIG_ARCH_HAS_ELF_RANDOMIZE. For these architectures,
>> arch_randomize_brk() is collapsed as well.
>> This is an alternative to the solutions in:
>> I've been able to test x86 and arm, and the buildbot (so far) seems
>> happy with building the rest.
> Hmm, do you want to wrap my acks up to your previous one into this set?
> What about my tested-by?
> I'd rather not waste time testing this version if my previous test is
> still valid (or if there's yet another version of this patch set which
> is later than this set.)
> Unless I hear anything, I'll assume that it's broadly the same as the
> previous patch set and requires no action.
Yeah, it's broadly the same. I tweaked a few minor things, so I'm
comfortable retaining the acks and tested-bys. Thank you for the
reviews and tests!
Chrome OS Security
More information about the linux-arm-kernel