correctly.
>
>Chan
>
>
>
>From: admin LI
>Sent: Friday, January 14, 2022 6:02 AM
>To: kernelnewbies@kernelnewbies.org
>Subject: How to disable address randomization ?
>
>
>
>Hi,
>
>I'm developing a kernel module for an ARM machine, while debugging I
>fou
Hi Jeff,
Thanks for your help, finally I found this in kernel document.
Pointer Types
=
Pointers printed without a specifier extension (i.e unadorned %p) are hashed to
give a unique identifier without leaking kernel addresses to user space. On 64
bit machines the first 32 bits are
Hi,
To print kernel virtual address, you should use %px instead of %p in the printk.
Probably that’s why you couldn’t see the pointer values correctly.
Chan
From: admin LI
Sent: Friday, January 14, 2022 6:02 AM
To: kernelnewbies@kernelnewbies.org
Subject: How to disable address
> > When I search randomization the only thing I found is KASLR which I
> don't think is the same thing.
>
Think about this carefully. When you insmod that kernel module which
address space is it using ? Kernel or Userspace ? :-)
This will help:
On Thu, Jan 13, 2022 at 4:04 PM admin LI wrote:
>
> I'm developing a kernel module for an ARM machine, while debugging I found
> addresses
> printed are all randomized and useless for debugging.
>
> To prove I was not crazy I wrote this small program:
>
> -
>
Hi,
I'm developing a kernel module for an ARM machine, while debugging I found
addresses
printed are all randomized and useless for debugging.
To prove I was not crazy I wrote this small program:
-
#include
#include
#include
#include
MODULE_LICENSE("GPL");