On Thu, Apr 04, 2013 at 01:07:35PM -0700, Kees Cook wrote: > This creates CONFIG_RANDOMIZE_BASE, so that the base offset of the kernel > can be randomized at boot.
Right, if I'm reading this whole deal correctly, I have an issue with this in the sense that if this thing is enabled by default and people are running stripped kernels, an oops which is being reported is worth sh*t since all the addresses there are random and one simply can't map them back to which functions the callstack frames are pointing to. Which will majorly hinder debuggability, IMHO... [ … ] > When built into the kernel, the "noaslr" kernel command line option > will disable the feature. ... so the saner thing to do, IMHO, would be to flip the meaning of this option to "kaslr" or whatever and let people and distros enable randomization on kernels which are bug free and don't oops (good luck finding those :-)). Generally make the thing opt-in instead of opt-out. Thanks. -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/