|
|
Subscribe / Log in / New account

Kernel base address randomization

From:  Kees Cook <keescook@chromium.org>
To:  linux-kernel@vger.kernel.org
Subject:  [PATCH v8 0/6] Kernel base address randomization
Date:  Thu, 10 Oct 2013 17:18:12 -0700
Message-ID:  <1381450698-28710-1-git-send-email-keescook@chromium.org>
Cc:  x86@kernel.org, kernel-hardening@lists.openwall.com, adurbin@google.com, Eric Northup <digitaleric@google.com>, jln@google.com, wad@google.com, Mathias Krause <minipli@googlemail.com>, Zhang Yanfei <zhangyanfei@cn.fujitsu.com>, "H. Peter Anvin" <hpa@zytor.com>, keescook@chromium.org
Archive‑link:  Article

Update to the kASLR series. The improved e820 walking code from v7 has been
reorganized, and now explicitly avoids unsafe memory regions instead of
raising the minimum load address.

-Kees

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds