public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* why is text address constant with full randomization?
@ 2015-09-15  8:36 慕冬亮
  2015-09-15  9:05 ` yalin wang
  0 siblings, 1 reply; 4+ messages in thread
From: 慕冬亮 @ 2015-09-15  8:36 UTC (permalink / raw)
  To: linux-kernel

First, my linux kernel is Linux 114-212-83-136 4.1.0-2-amd64.
Second, I copy /bin/cat in system to mycat , and see the address space
layout below.

mdl@114-212-83-136:~$ ./mycat /proc/self/maps
00400000-0040c000 r-xp 00000000 08:03 1046776
 /home/mdl/mycat
0060b000-0060c000 r--p 0000b000 08:03 1046776
 /home/mdl/mycat
0060c000-0060d000 rw-p 0000c000 08:03 1046776
 /home/mdl/mycat
01da7000-01dc8000 rw-p 00000000 00:00 0
 [heap]
......

The starting address of executable image is constant with my aslr
configuration 2 (full randomization).
I think text segment should be inconstant to defeat the attack like
reusing text code!
Is it related to fixing offset2lib attack?
Thanks for any help!
    - mudongliang

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2015-09-21 18:59 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-09-15  8:36 why is text address constant with full randomization? 慕冬亮
2015-09-15  9:05 ` yalin wang
2015-09-21 14:31   ` 慕冬亮
2015-09-21 18:59     ` Austin S Hemmelgarn

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox