Closed cq674350529 closed 5 years ago
Try to fix https://github.com/nccgroup/asafw/issues/8
For the latest images, the original method to disable ASLR doesn't work, for the file /proc/sys/kernel/randomize_va_space is read-only.
ASLR
/proc/sys/kernel/randomize_va_space
So use the kernel parameter norandmaps to disable ASLR instead.
norandmaps
refer: https://www.kernel.org/doc/html/v4.19/admin-guide/kernel-parameters.html norandmaps Don't use address space randomization. Equivalent to echo 0 > /proc/sys/kernel/randomize_va_space
The drawback is that it has conflict with option --root.
--root
I have tested it with image asav9-12-1.qcow2, which seems work well.
asav9-12-1.qcow2
# ls -l /proc/sys/kernel/randomize_va_space ls -l /proc/sys/kernel/randomize_va_space -r--r--r-- 1 root root 0 Mar 22 09:18 /proc/sys/kernel/randomize_va_space # cat /proc/sys/kernel/randomize_va_space cat /proc/sys/kernel/randomize_va_space 0
Your PR is really sane. Thanks for this, much appreciated. I'll add 2 minor changes to it in a minute.
Try to fix https://github.com/nccgroup/asafw/issues/8
For the latest images, the original method to disable
ASLR
doesn't work, for the file/proc/sys/kernel/randomize_va_space
is read-only.So use the kernel parameter
norandmaps
to disableASLR
instead.The drawback is that it has conflict with option
--root
.I have tested it with image
asav9-12-1.qcow2
, which seems work well.