diff options
author | Thomas Garnier <[email protected]> | 2016-07-27 08:59:56 -0700 |
---|---|---|
committer | Ingo Molnar <[email protected]> | 2016-08-10 16:10:06 +0200 |
commit | 25dfe4785332723f09311dcb7fd91015a60c022f (patch) | |
tree | e0ad0069ea8ea332883b8d96f5998cd966a9eb39 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | 404f6aac9b3ef595735feca99979db084ea48315 (diff) |
x86/mm/64: Enable KASLR for vmemmap memory region
Add vmemmap in the list of randomized memory regions.
The vmemmap region holds a representation of the physical memory (through
a struct page array). An attacker could use this region to disclose the
kernel memory layout (walking the page linked list).
Signed-off-by: Thomas Garnier <[email protected]>
Signed-off-by: Kees Cook <[email protected]>
Cc: Andy Lutomirski <[email protected]>
Cc: Borislav Petkov <[email protected]>
Cc: Brian Gerst <[email protected]>
Cc: Denys Vlasenko <[email protected]>
Cc: H. Peter Anvin <[email protected]>
Cc: Josh Poimboeuf <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: [email protected]
Link: http://lkml.kernel.org/r/[email protected]
[ Minor edits. ]
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions