On Tue, May 10, 2016 at 11:53 AM, Kees Cook wrote:
> On Tue, May 3, 2016 at 12:31 PM, Thomas Garnier wrote:
>> Randomizes the virtual address space of kernel memory sections (physical
>> memory mapping, vmalloc & vmemmap) for x86_64. This security
On Tue, May 10, 2016 at 11:53 AM, Kees Cook wrote:
> On Tue, May 3, 2016 at 12:31 PM, Thomas Garnier wrote:
>> Randomizes the virtual address space of kernel memory sections (physical
>> memory mapping, vmalloc & vmemmap) for x86_64. This security feature
>> mitigates exploits relying on
On Tue, May 3, 2016 at 12:31 PM, Thomas Garnier wrote:
> Randomizes the virtual address space of kernel memory sections (physical
> memory mapping, vmalloc & vmemmap) for x86_64. This security feature
> mitigates exploits relying on predictable kernel addresses. These
>
On Tue, May 3, 2016 at 12:31 PM, Thomas Garnier wrote:
> Randomizes the virtual address space of kernel memory sections (physical
> memory mapping, vmalloc & vmemmap) for x86_64. This security feature
> mitigates exploits relying on predictable kernel addresses. These
> addresses can be used to
4 matches
Mail list logo