From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Thu, 11 Apr 2024 19:27:07 +0300 From: Vitaly Chikunov To: ALT Linux kernel packages development Message-ID: <20240411162707.tm5d35rzu7mm6ds2@altlinux.org> References: <20240411110353.191929-1-dutyrok@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20240411110353.191929-1-dutyrok@altlinux.org> Subject: Re: [d-kernel] [PATCH 5.10.y] config: CONFIG_RANDOMIZE_BASE=y X-BeenThere: devel-kernel@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux kernel packages development List-Id: ALT Linux kernel packages development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Apr 2024 16:27:08 -0000 Archived-At: List-Archive: List-Post: On Thu, Apr 11, 2024 at 02:03:53PM +0300, dutyrok@altlinux.org wrote: > From: Alexandr Shashkin > > Enable kernel address space layout randomization to prevent guest > security exploits based on the location of kernel objects. Полагаю, это для std-def/p10. Applied, thanks. > > Signed-off-by: Alexandr Shashkin > --- > config | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/config b/config > index 9bd005564e56..e5917be74550 100644 > --- a/config > +++ b/config > @@ -473,7 +473,7 @@ CONFIG_CRASH_DUMP=y > # CONFIG_KEXEC_JUMP is not set > CONFIG_PHYSICAL_START=0x1000000 > CONFIG_RELOCATABLE=y > -# CONFIG_RANDOMIZE_BASE is not set > +CONFIG_RANDOMIZE_BASE=y > CONFIG_PHYSICAL_ALIGN=0x1000000 > CONFIG_HOTPLUG_CPU=y > # CONFIG_BOOTPARAM_HOTPLUG_CPU0 is not set > -- > 2.33.8 > > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel