From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jiri Kosina Subject: Re: [PATCH] [RFC] Deter exploit bruteforcing Date: Fri, 2 Jan 2015 23:53:55 +0100 (CET) Message-ID: References: <1419457167-15042-1-git-send-email-richard@nod.at> <20150102051142.GF4873@amd> <54A67A38.3000207@nod.at> <20150102194616.GA27538@amd> <54A7103E.6020500@nod.at> <20150102222936.GA29018@amd> <20150102224646.GB29018@amd> Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Cc: Richard Weinberger , Kees Cook , LKML , "linux-fsdevel@vger.kernel.org" , David Rientjes , Aaron Tomlin , DaeSeok Youn , Thomas Gleixner , vdavydov@parallels.com, Rik van Riel , Oleg Nesterov , Andrew Morton , Peter Zijlstra , Ingo Molnar , Al Viro , Andy Lutomirski , Brad Spengler To: Pavel Machek Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Fri, 2 Jan 2015, Jiri Kosina wrote: > > > You also want to protect against binaries that are evil on purpose, > > > right? > > > > Umm. No. Not by default. We don't want to break crashme or trinity by > > default. > > I thought trinity is issuing syscalls directly (would make more sense than > going through glibc, wouldn't it?) ... haven't checked the source though. Okay, I checked, it is. Now I get your point. Seems like "too much pain for little gain" though. So it really should be optional, so that potentially exposed systems (such as hosting servers, where things like trinity are not expected to be run) could turn it on voluntarily. -- Jiri Kosina SUSE Labs