[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Patch 0/6 virtual address space randomisation
On Thu, 2005-01-27 at 12:45 +0100, Julien TINNES wrote:
> Arjan van de Ven wrote:
> > The randomisation patch series introduces infrastructure and functionality
> > that causes certain parts of a process' virtual address space to be
> > different for each invocation of the process. The purpose of this is to
> > raise the bar on buffer overflow exploits; full randomisation makes it not
> > possible to use absolute addresses in the exploit.
> I think it is worth mentioning that this is part of PaX ASLR, but with
> some changes and simplification.
it actually came from Exec-Shield not PaX
> I have some questions about the changes:
> for RANDMMAP why doing randomization in mmap_base() and not in
> arch_pick_mmap_layout? You miss a whole case here where legacy layout is
legacy layout will want a different randomisation; it'll come in a
separate, incremental patch.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/