I think it can disabled in kernel config, but with less security :
CONFIG_RANDOMIZE_MEMORY: │
│ │
│ Randomizes the base virtual address of kernel memory sections │
│ (physical memory mapping, vmalloc & vmemmap). This security feature │
│ makes exploits relying on predictable memory locations less reliable. │
│ │
│ The order of allocations remains unchanged. Entropy is generated in │
│ the same way as RANDOMIZE_BASE. Current implementation in the optimal │
│ configuration have in average 30,000 different possible virtual │
│ addresses for each memory section. │
│ │
│ If unsure, say N.
CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING
CONFIG_RANDOMIZE_MEMORY: │
│ │
│ Randomizes the base virtual address of kernel memory sections │
│ (physical memory mapping, vmalloc & vmemmap). This security feature │
│ makes exploits relying on predictable memory locations less reliable. │
│ │
│ The order of allocations remains unchanged. Entropy is generated in │
│ the same way as RANDOMIZE_BASE. Current implementation in the optimal │
│ configuration have in average 30,000 different possible virtual │
│ addresses for each memory section. │
│ │
│ If unsure, say N.
CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING
Comment