From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Fri, 6 May 2022 17:30:51 +0300 From: Vitaly Chikunov To: ALT Linux kernel packages development Message-ID: <20220506143051.3vjg75ppmlmpflqg@altlinux.org> References: <20220506141901.3bxplk33ngfrodvv@altlinux.org> <20220506142613.GA24153@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20220506142613.GA24153@altlinux.org> Subject: Re: [d-kernel] config: CONFIG_RANDOMIZE_BASE is not set X-BeenThere: devel-kernel@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux kernel packages development List-Id: ALT Linux kernel packages development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 May 2022 14:30:52 -0000 Archived-At: List-Archive: List-Post: On Fri, May 06, 2022 at 05:26:13PM +0300, Dmitry V. Levin wrote: > On Fri, May 06, 2022 at 05:19:01PM +0300, Vitaly Chikunov wrote: > > On Fri, Mar 25, 2022 at 02:57:40PM +0300, Andrew A. Vasilyev wrote: > > > Hi! > > > > > > Возможно ли включение CONFIG_RANDOMIZE_BASE в наших ядрах? > > > > Думаю, это возможно, если никто не против. Так как в Ubuntu и Fedora > > это включено. > > $ grep -A3 'config RANDOMIZE_BASE' arch/x86/Kconfig > config RANDOMIZE_BASE > bool "Randomize the address of the kernel image (KASLR)" > depends on RELOCATABLE > default y > > Непонятно, почему оно оказалось не включено. Другой вопрос - есть ли хоть 1 CVE от которого защитила эта опция. > > > -- > ldv > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel