Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 2 Apr 2012 15:23:36 -0400
From:      Richard Yao <ryao@cs.stonybrook.edu>
To:        Peter Wemm <peter@wemm.org>
Cc:        Tom Evans <tevans.uk@googlemail.com>, freebsd-stable@freebsd.org
Subject:   Re: Text relocations in kernel modules
Message-ID:  <4F79FCB8.1090003@cs.stonybrook.edu>
In-Reply-To: <CAGE5yCrwLosuTT2yq0DEx%2Bz8ztKpkrB=tORmURcuh_SCz=L7qg@mail.gmail.com>
References:  <4F75E404.8000104@cs.stonybrook.edu> <4F75EF86.6090909@cs.stonybrook.edu> <20120330190713.GG2358@deviant.kiev.zoral.com.ua> <4F760C9E.6060405@cs.stonybrook.edu> <20120330194649.GH2358@deviant.kiev.zoral.com.ua> <4F761371.7020606@cs.stonybrook.edu> <20120330203605.GI2358@deviant.kiev.zoral.com.ua> <4F76350F.8000708@cs.stonybrook.edu> <20120330224631.GJ2358@deviant.kiev.zoral.com.ua> <4F7637F3.2060502@cs.stonybrook.edu> <CAGE5yCpuvsVrc-%2BDTVas-W4fjuP2s%2B6PQONMOTyEbGnj2CY3ig@mail.gmail.com> <4F766F29.2030803@cs.stonybrook.edu> <CAFHbX1KiZx68MP4bCAvPc0Zui3fA4O35_z3kP781zoJqLYp7Bw@mail.gmail.com> <4F79D88B.3040102@cs.stonybrook.edu> <CAFHbX1KE15G9gx7Duw2R8zC5jL1jiEir0yMB0-s5%2B4xx517WtQ@mail.gmail.com> <4F79E27E.3000509@cs.stonybrook.edu> <CAGE5yCrwLosuTT2yq0DEx%2Bz8ztKpkrB=tORmURcuh_SCz=L7qg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--------------enigD2B11ADE89A5E704533C71CB
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

On 04/02/12 14:46, Peter Wemm wrote:
> Remember.. ASLR is a userland thing.  .ko files, which is what this
> thread is about, already use random address layout.  When you do a
> "kldload virtio.ko", you have no way to predict what address it will
> be loaded at.  And you don't even have access to the addresses.
>=20
> Of course if you want to talk about ASLR and userland .so files then
> that's an entirely different thing.  But this thread is about your
> tools finding DT_TEXTREL in a .ko kernel file, not userland .so files.
>=20

The PaX project's patches to the Linux kernel include kernel stack
randomization. The Gentoo Hardened project makes use of this in their
fork of the Linux kernel.


--------------enigD2B11ADE89A5E704533C71CB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=LdKQ
-----END PGP SIGNATURE-----

--------------enigD2B11ADE89A5E704533C71CB--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4F79FCB8.1090003>