RISC-V KASLR Support For Linux Revised Again
![RISC-V](/assets/categories/risc-v.webp)
Kernel Address Space Layout Randomization (KASLR) is important for helping to prevent memory corruption vulnerabilities from being exploited. KASLR is very useful for fending off attacks relying upon an attacker knowing known memory address locations of the kernel by randomizing the kernel code at boot time.
KASLR on x86/x86_64 has been in mainline for about a decade and there's also been efforts to further enhance the randomization with the yet-to-be-finished FGKASLR. On the RISC-V side, KASLR support is still pending but this past week saw the third revision of the patches. The patches randomize the kernel mapping and relies on VMs having the bootloader provide a seed in the device tree or for physical RISC-V systems to have the firmware provide a randomized seed using the EFI RNG protocol.
With the v3 patches, the RISC-V KASLR code has been re-based against a newer Linux 6.4 state, there is a warning fix for RISC-V 32-bit, and other fixes. We'll see if this RISC-V KASLR support manages to be mainlined soon.
Add A Comment