Kernel base address randomization
From: | Kees Cook <keescook@chromium.org> | |
To: | linux-kernel@vger.kernel.org | |
Subject: | [PATCH v8 0/6] Kernel base address randomization | |
Date: | Thu, 10 Oct 2013 17:18:12 -0700 | |
Message-ID: | <1381450698-28710-1-git-send-email-keescook@chromium.org> | |
Cc: | x86@kernel.org, kernel-hardening@lists.openwall.com, adurbin@google.com, Eric Northup <digitaleric@google.com>, jln@google.com, wad@google.com, Mathias Krause <minipli@googlemail.com>, Zhang Yanfei <zhangyanfei@cn.fujitsu.com>, "H. Peter Anvin" <hpa@zytor.com>, keescook@chromium.org | |
Archive‑link: | Article |
Update to the kASLR series. The improved e820 walking code from v7 has been reorganized, and now explicitly avoids unsafe memory regions instead of raising the minimum load address. -Kees -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/