RE: How to disable address randomization ?

2022-01-13 Thread admin LI
correctly. > >Chan > > > >From: admin LI >Sent: Friday, January 14, 2022 6:02 AM >To: kernelnewbies@kernelnewbies.org >Subject: How to disable address randomization ? > > > >Hi, > >I'm developing a kernel module for an ARM machine, while debugging I >fou

Re: How to disable address randomization ?

2022-01-13 Thread admin LI
Hi Jeff, Thanks for your help, finally I found this in kernel document. Pointer Types = Pointers printed without a specifier extension (i.e unadorned %p) are hashed to give a unique identifier without leaking kernel addresses to user space. On 64 bit machines the first 32 bits are

RE: How to disable address randomization ?

2022-01-13 Thread Chan Kim
Hi, To print kernel virtual address, you should use %px instead of %p in the printk. Probably that’s why you couldn’t see the pointer values correctly. Chan From: admin LI Sent: Friday, January 14, 2022 6:02 AM To: kernelnewbies@kernelnewbies.org Subject: How to disable address

Re: How to disable address randomization ?

2022-01-13 Thread Aruna Hewapathirane
> > When I search randomization the only thing I found is KASLR which I > don't think is the same thing. > Think about this carefully. When you insmod that kernel module which address space is it using ? Kernel or Userspace ? :-) This will help:

Re: How to disable address randomization ?

2022-01-13 Thread Jeffrey Walton
On Thu, Jan 13, 2022 at 4:04 PM admin LI wrote: > > I'm developing a kernel module for an ARM machine, while debugging I found > addresses > printed are all randomized and useless for debugging. > > To prove I was not crazy I wrote this small program: > > - >

How to disable address randomization ?

2022-01-13 Thread admin LI
Hi, I'm developing a kernel module for an ARM machine, while debugging I found addresses printed are all randomized and useless for debugging. To prove I was not crazy I wrote this small program: - #include #include #include #include MODULE_LICENSE("GPL");