From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758876Ab1ELWH2 (ORCPT ); Thu, 12 May 2011 18:07:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41588 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758842Ab1ELWH1 (ORCPT ); Thu, 12 May 2011 18:07:27 -0400 Date: Thu, 12 May 2011 18:07:16 -0400 From: Dave Jones To: Ingo Molnar Cc: Stephane Eranian , Linus Torvalds , Arnaldo Carvalho de Melo , LKML Subject: Re: [BUG] perf: bogus correlation of kernel symbols Message-ID: <20110512220715.GA7451@redhat.com> Mail-Followup-To: Dave Jones , Ingo Molnar , Stephane Eranian , Linus Torvalds , Arnaldo Carvalho de Melo , LKML References: <20110512213542.GB17596@elte.hu> <20110512215023.GA20939@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20110512215023.GA20939@elte.hu> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 12, 2011 at 11:50:23PM +0200, Ingo Molnar wrote: > Dunno, i would not couple them necessarily - certain users might still have > access to kernel symbols via some other channel - for example the System.map. That always made this security by obscurity feature seem pointless for the bulk of users to me. Given the majority are going to be running distro kernels, anyone can find those addresses easily no matter how hard we hide them on the running system. Unless we were somehow introduced randomness into where we unpack the kernel each boot, and using System.map as a table of offsets instead of absolute addresses. Dave