Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 581

KASLR

What is KASLR?

KASLRKernel Address Space Layout Randomization (KASLR) randomizes the kernel base and module load addresses each boot so attackers cannot hardcode kernel symbols for local privilege escalation.


KASLR extends ASLR into the kernel: the kernel image, modules, vmalloc area, physmap, and stacks are loaded at randomized offsets on every boot. Linux added basic KASLR in 2014, hardened by KAISER/KPTI to mitigate Meltdown, while Windows added it in Vista and refined it through Windows 10. Because the kernel typically runs in a single shared address space, leaking even one kernel pointer often breaks KASLR; researchers have demonstrated cache, TLB, prefetch, and speculative-execution side channels that recover offsets. KASLR is most useful combined with SMEP/SMAP, KPTI, kCFI, and strict /proc and dmesg restrictions to prevent address leaks.

Examples

  1. 01

    Linux kASLR shifting the kernel base by a random 1 GiB-aligned offset at boot.

  2. 02

    Windows 10 randomizing ntoskrnl.exe load address per boot.

Frequently asked questions

What is KASLR?

Kernel Address Space Layout Randomization (KASLR) randomizes the kernel base and module load addresses each boot so attackers cannot hardcode kernel symbols for local privilege escalation. It belongs to the Application Security category of cybersecurity.

What does KASLR mean?

Kernel Address Space Layout Randomization (KASLR) randomizes the kernel base and module load addresses each boot so attackers cannot hardcode kernel symbols for local privilege escalation.

How does KASLR work?

KASLR extends ASLR into the kernel: the kernel image, modules, vmalloc area, physmap, and stacks are loaded at randomized offsets on every boot. Linux added basic KASLR in 2014, hardened by KAISER/KPTI to mitigate Meltdown, while Windows added it in Vista and refined it through Windows 10. Because the kernel typically runs in a single shared address space, leaking even one kernel pointer often breaks KASLR; researchers have demonstrated cache, TLB, prefetch, and speculative-execution side channels that recover offsets. KASLR is most useful combined with SMEP/SMAP, KPTI, kCFI, and strict /proc and dmesg restrictions to prevent address leaks.

How do you defend against KASLR?

Defences for KASLR typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for KASLR?

Common alternative names include: Kernel ASLR.

Related terms