Re: [PATCH 1/3] x86: routines to choose random kernel base offset

From: H. Peter Anvin
Date: Fri Apr 05 2013 - 14:16:02 EST


On 04/05/2013 12:36 AM, Ingo Molnar wrote:
>
> * Ingo Molnar <mingo@xxxxxxxxxx> wrote:
>
>>
>> * Kees Cook <keescook@xxxxxxxxxxxx> wrote:
>>
>>> This provides routines for selecting a randomized kernel base offset,
>>> bounded by e820 details. It tries to use RDRAND and falls back to RDTSC.
>>> If "noaslr" is on the kernel command line, no offset will be used.
>>
>> Would it make sense to also add three other sources of entropy:
>
> In any case, would it be possible to also mix these bootup sources of
> entropy into our regular random pool?
>
> That would improve random pool entropy on all Linux systems, not just
> those that choose to enable kernel-base-address randomization.
>

I think we already do at least some of these, but at this point, for any
non-RDRAND-capable hardware we could almost certainly do better for any
definition of anything at all.

RDRAND is obviously the ultimate solution here.

-hpa


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/