Hi!
> Inter-mmap randomization will decrease the predictability of later
> mmap() allocations, which should help make data structures harder to
> find in memory. In addition, this patch will also introduce unmapped
> gaps between pages, preventing linear overruns from one mapping to
> another
Hi!
> Inter-mmap randomization will decrease the predictability of later
> mmap() allocations, which should help make data structures harder to
> find in memory. In addition, this patch will also introduce unmapped
> gaps between pages, preventing linear overruns from one mapping to
> another
On Tue 2016-07-26 11:22:26, william.c.robe...@intel.com wrote:
> From: William Roberts
>
> This patch introduces the ability randomize mmap locations where the
> address is not requested, for instance when ld is allocating pages for
> shared libraries. It chooses to
On Tue 2016-07-26 11:22:26, william.c.robe...@intel.com wrote:
> From: William Roberts
>
> This patch introduces the ability randomize mmap locations where the
> address is not requested, for instance when ld is allocating pages for
> shared libraries. It chooses to randomize based on the
>
> >
> > I would highly recommend studying those prior use cases and answering
> > those concerns before progressing too much further. As I've mentioned
> > elsewhere, you'll need to quantify the increased difficulty to the
> > attacker that your patch imposes. Personally, I would assess that
>
> >
> > I would highly recommend studying those prior use cases and answering
> > those concerns before progressing too much further. As I've mentioned
> > elsewhere, you'll need to quantify the increased difficulty to the
> > attacker that your patch imposes. Personally, I would assess that
> >
> > No, I mean changes to mm/mmap.o.
>
>From UML build:
NEW:
1610 :
1610: 55 push %rbp
1611: 48 89 e5mov%rsp,%rbp
1614: 41 54 push %r12
1616: 48 8d 45 e8 lea
> >
> > No, I mean changes to mm/mmap.o.
>
>From UML build:
NEW:
1610 :
1610: 55 push %rbp
1611: 48 89 e5mov%rsp,%rbp
1614: 41 54 push %r12
1616: 48 8d 45 e8 lea
...@linux-foundation.org;
> keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> On Tue, Jul 26, 2016 at 09:06:30PM +, Roberts, William C wrot
...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> On Tue, Jul 26, 2016 at 09:06:30PM +, Roberts, William C wrote:
> > > From: ow
On Tue, Aug 2, 2016 at 9:57 AM, Roberts, William C
wrote:
> @nnk, disabling ASLR via set_arch() on Android, is that only for 32 bit
> address spaces where
> you had that problem?
Yes. Only 32 bit address spaces had the fragmentation problem.
--
Nick Kralevich |
On Tue, Aug 2, 2016 at 9:57 AM, Roberts, William C
wrote:
> @nnk, disabling ASLR via set_arch() on Android, is that only for 32 bit
> address spaces where
> you had that problem?
Yes. Only 32 bit address spaces had the fragmentation problem.
--
Nick Kralevich | Android Security |
vger.kernel.org; kernel-harden...@lists.openwall.com;
> a...@linux-foundation.org; keesc...@chromium.org;
> gre...@linuxfoundation.org; je...@google.com; saly...@android.com;
> dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> On Tue, Jul 26, 2016 at 1:
foundation.org; keesc...@chromium.org;
> gre...@linuxfoundation.org; je...@google.com; saly...@android.com;
> dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> On Tue, Jul 26, 2016 at 1:59 PM, Jason Cooper wrote:
> >> > One thing
> > It's very hard to quantify the benefits of fine-grained
> > randomization,
>
> ? N = # of possible addresses. The bigger N is, the more chances the
> attacker will trip up before finding what they were looking for.
If the attacker is forcing the creation of many objects with a function
> > It's very hard to quantify the benefits of fine-grained
> > randomization,
>
> ? N = # of possible addresses. The bigger N is, the more chances the
> attacker will trip up before finding what they were looking for.
If the attacker is forcing the creation of many objects with a function
Hi Daniel,
On Fri, Jul 29, 2016 at 06:10:02AM -0400, Daniel Micay wrote:
> > > In the Project Zero Stagefright post
> > > (http://googleprojectzero.blogspot.com/2015/09/stagefrightened.html)
> > > , we see that the linear allocation of memory combined with the
> > > low number of bits in the
Hi Daniel,
On Fri, Jul 29, 2016 at 06:10:02AM -0400, Daniel Micay wrote:
> > > In the Project Zero Stagefright post
> > > (http://googleprojectzero.blogspot.com/2015/09/stagefrightened.html)
> > > , we see that the linear allocation of memory combined with the
> > > low number of bits in the
> > In the Project Zero Stagefright post
> > (http://googleprojectzero.blogspot.com/2015/09/stagefrightened.html)
> > ,
> > we see that the linear allocation of memory combined with the low
> > number of bits in the initial mmap offset resulted in a much more
> > predictable layout which aided the
> > In the Project Zero Stagefright post
> > (http://googleprojectzero.blogspot.com/2015/09/stagefrightened.html)
> > ,
> > we see that the linear allocation of memory combined with the low
> > number of bits in the initial mmap offset resulted in a much more
> > predictable layout which aided the
On Wed, Jul 27, 2016 at 09:59:35AM -0700, Nick Kralevich wrote:
> On Tue, Jul 26, 2016 at 1:59 PM, Jason Cooper wrote:
> >> > One thing I didn't make clear in my commit message is why this is good.
> >> > Right
> >> > now, if you know An address within in a process, you
On Wed, Jul 27, 2016 at 09:59:35AM -0700, Nick Kralevich wrote:
> On Tue, Jul 26, 2016 at 1:59 PM, Jason Cooper wrote:
> >> > One thing I didn't make clear in my commit message is why this is good.
> >> > Right
> >> > now, if you know An address within in a process, you know all offsets
> >> >
On Tue, Jul 26, 2016 at 1:59 PM, Jason Cooper wrote:
>> > One thing I didn't make clear in my commit message is why this is good.
>> > Right
>> > now, if you know An address within in a process, you know all offsets done
>> > with
>> > mmap(). For instance, an offset To
On Tue, Jul 26, 2016 at 1:59 PM, Jason Cooper wrote:
>> > One thing I didn't make clear in my commit message is why this is good.
>> > Right
>> > now, if you know An address within in a process, you know all offsets done
>> > with
>> > mmap(). For instance, an offset To libX can yield libY by
On 07/26/2016 02:44 PM, Jason Cooper wrote:
>> > I'd likely need to take a small sample of programs and examine them,
>> > especially considering That as gaps are harder to find, it forces the
>> > randomization down and randomization can Be directly altered with
>> > length on mmap(), versus
On 07/26/2016 02:44 PM, Jason Cooper wrote:
>> > I'd likely need to take a small sample of programs and examine them,
>> > especially considering That as gaps are harder to find, it forces the
>> > randomization down and randomization can Be directly altered with
>> > length on mmap(), versus
On Tue, Jul 26, 2016 at 09:06:30PM +, Roberts, William C wrote:
> > From: owner-linux...@kvack.org [mailto:owner-linux...@kvack.org] On
> > Behalf Of Jason Cooper
> > On Tue, Jul 26, 2016 at 08:13:23PM +, Roberts, William C wrote:
> > > > > From: Jason Cooper [mailto:ja...@lakedaemon.net]
On Tue, Jul 26, 2016 at 09:06:30PM +, Roberts, William C wrote:
> > From: owner-linux...@kvack.org [mailto:owner-linux...@kvack.org] On
> > Behalf Of Jason Cooper
> > On Tue, Jul 26, 2016 at 08:13:23PM +, Roberts, William C wrote:
> > > > > From: Jason Cooper [mailto:ja...@lakedaemon.net]
gt;; Jeffrey Vander Stoep
>> <je...@google.com>; saly...@android.com; Daniel Cashman
>> <dcash...@android.com>
>> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>>
>> My apologies in advance if I misunderstand the purposes of this patch.
>>
l.org; lkml > ker...@vger.kernel.org>; kernel-harden...@lists.openwall.com; Andrew
>> Morton ; Kees Cook ;
>> Greg KH ; Jeffrey Vander Stoep
>> ; saly...@android.com; Daniel Cashman
>>
>> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>>
>&g
el.org; kernel-
> harden...@lists.openwall.com; a...@linux-foundation.org;
> keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> Hi William,
>
nwall.com; a...@linux-foundation.org;
> keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> Hi William,
>
> On Tue, Jul 26, 2016 at
en...@lists.openwall.com; Andrew
> Morton <a...@linux-foundation.org>; Kees Cook <keesc...@chromium.org>;
> Greg KH <gre...@linuxfoundation.org>; Jeffrey Vander Stoep
> <je...@google.com>; saly...@android.com; Daniel Cashman
> <dcash...@android.com>
> Subj
t; Morton ; Kees Cook ;
> Greg KH ; Jeffrey Vander Stoep
> ; saly...@android.com; Daniel Cashman
>
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> My apologies in advance if I misunderstand the purposes of this patch.
>
> IIUC, this patch adds a random gap bet
Hi William,
On Tue, Jul 26, 2016 at 08:13:23PM +, Roberts, William C wrote:
> > > From: Jason Cooper [mailto:ja...@lakedaemon.net]
> > > On Tue, Jul 26, 2016 at 11:22:26AM -0700, william.c.robe...@intel.com
> > > wrote:
> > > > Performance Measurements:
> > > > Using strace with -T option
Hi William,
On Tue, Jul 26, 2016 at 08:13:23PM +, Roberts, William C wrote:
> > > From: Jason Cooper [mailto:ja...@lakedaemon.net]
> > > On Tue, Jul 26, 2016 at 11:22:26AM -0700, william.c.robe...@intel.com
> > > wrote:
> > > > Performance Measurements:
> > > > Using strace with -T option
My apologies in advance if I misunderstand the purposes of this patch.
IIUC, this patch adds a random gap between various mmap() mappings,
with the goal of ensuring that both the mmap base address and gaps
between pages are randomized.
If that's the goal, please note that this behavior has
My apologies in advance if I misunderstand the purposes of this patch.
IIUC, this patch adds a random gap between various mmap() mappings,
with the goal of ensuring that both the mmap base address and gaps
between pages are randomized.
If that's the goal, please note that this behavior has
linux-kernel@vger.kernel.org; kernel-
> > harden...@lists.openwall.com; a...@linux-foundation.org;
> > keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> > je...@google.com; saly...@android.com; dcash...@android.com
> > Subject: Re: [PATCH] [RFC] Introduce mmap ra
t; > harden...@lists.openwall.com; a...@linux-foundation.org;
> > keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> > je...@google.com; saly...@android.com; dcash...@android.com
> > Subject: Re: [PATCH] [RFC] Introduce mmap randomization
> >
>
openwall.com; a...@linux-foundation.org;
> keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> Hi William!
>
> On Tue, Jul 26, 2016 at 11:22:
ation.org;
> keesc...@chromium.org; gre...@linuxfoundation.org; n...@google.com;
> je...@google.com; saly...@android.com; dcash...@android.com
> Subject: Re: [PATCH] [RFC] Introduce mmap randomization
>
> Hi William!
>
> On Tue, Jul 26, 2016 at 11:22:26AM -0700, william.c.robe...@int
Hi William!
On Tue, Jul 26, 2016 at 11:22:26AM -0700, william.c.robe...@intel.com wrote:
> From: William Roberts
>
> This patch introduces the ability randomize mmap locations where the
> address is not requested, for instance when ld is allocating pages for
>
Hi William!
On Tue, Jul 26, 2016 at 11:22:26AM -0700, william.c.robe...@intel.com wrote:
> From: William Roberts
>
> This patch introduces the ability randomize mmap locations where the
> address is not requested, for instance when ld is allocating pages for
> shared libraries. It chooses to
44 matches
Mail list logo