Re: How to disable address randomization ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Aruna,

Thanks for your help.

Of cause it's in kernel space. I've tried
/proc/sys/kernel/randomize_va_space which does nothing.

Finally I found this in kernel document:

Pointer Types
=============

Pointers printed without a specifier extension (i.e unadorned %p) are
hashed to give a unique identifier without leaking kernel addresses to user
space. On 64 bit machines the first 32 bits are zeroed. If you _really_
want the address see %px below.

On Jan 14, 2022, at 00:54, Aruna Hewapathirane <aruna.hewapathirane@xxxxxxxxx> wrote:
<snip>
> When I search randomization the only thing I found is KASLR which I don't think is the same thing.
<snip>

Think about this carefully. When you insmod that kernel module which address space is it using ? Kernel or Userspace ? :-)


Good luck -Aruna









 
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]

  Powered by Linux