From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752620AbcFVP7w (ORCPT ); Wed, 22 Jun 2016 11:59:52 -0400 Received: from mail-yw0-f177.google.com ([209.85.161.177]:35069 "EHLO mail-yw0-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751146AbcFVP7u (ORCPT ); Wed, 22 Jun 2016 11:59:50 -0400 MIME-Version: 1.0 In-Reply-To: <20160622124707.GC9922@io.lakedaemon.net> References: <1466556426-32664-1-git-send-email-keescook@chromium.org> <20160622124707.GC9922@io.lakedaemon.net> From: Thomas Garnier Date: Wed, 22 Jun 2016 08:59:48 -0700 Message-ID: Subject: Re: [kernel-hardening] [PATCH v7 0/9] x86/mm: memory area address KASLR To: Jason Cooper Cc: kernel-hardening@lists.openwall.com, Ingo Molnar , Kees Cook , Andy Lutomirski , x86@kernel.org, Borislav Petkov , Baoquan He , Yinghai Lu , Juergen Gross , Matt Fleming , Toshi Kani , Andrew Morton , Dan Williams , "Kirill A. Shutemov" , Dave Hansen , Xiao Guangrong , Martin Schwidefsky , "Aneesh Kumar K.V" , Alexander Kuleshov , Alexander Popov , Dave Young , Joerg Roedel , Lv Zheng , Mark Salter , Dmitry Vyukov , Stephen Smalley , Boris Ostrovsky , Christian Borntraeger , Jan Beulich , LKML , Jonathan Corbet , linux-doc@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote: > Hey Kees, > > On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote: >> Notable problems that needed solving: > ... >> - Reasonable entropy is needed early at boot before get_random_bytes() >> is available. > > This series is targetting x86, which typically has RDRAND/RDSEED > instructions. Are you referring to other arches? Older x86? Also, > isn't this the same requirement for base address KASLR? > > Don't get me wrong, I want more diverse entropy sources available > earlier in the boot process as well. :-) I'm just wondering what's > different about this series vs base address KASLR wrt early entropy > sources. > I think Kees was referring to the refactor I did to get the similar entropy generation than KASLR module randomization. Our approach was to provide best entropy possible even if you have an older processor or under virtualization without support for these instructions. Unfortunately common on companies with a large number of older machines. > thx, > > Jason. Thanks, Thomas