kernel_optimize_test/Documentation/x86
Borislav Petkov 78cac48c04 x86/mm/KASLR: Propagate KASLR status to kernel proper
Commit:

  e2b32e6785 ("x86, kaslr: randomize module base load address")

made module base address randomization unconditional and didn't regard
disabled KKASLR due to CONFIG_HIBERNATION and command line option
"nokaslr". For more info see (now reverted) commit:

  f47233c2d3 ("x86/mm/ASLR: Propagate base load address calculation")

In order to propagate KASLR status to kernel proper, we need a single bit
in boot_params.hdr.loadflags and we've chosen bit 1 thus leaving the
top-down allocated bits for bits supposed to be used by the bootloader.

Originally-From: Jiri Kosina <jkosina@suse.cz>
Suggested-by: H. Peter Anvin <hpa@zytor.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Cc: Kees Cook <keescook@chromium.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2015-04-03 15:26:15 +02:00
..
i386
x86_64 x86_64: add KASan support 2015-02-13 21:21:41 -08:00
00-INDEX
boot.txt x86/mm/KASLR: Propagate KASLR status to kernel proper 2015-04-03 15:26:15 +02:00
early-microcode.txt
earlyprintk.txt
entry_64.txt x86, entry: Switch stacks on a paranoid entry from userspace 2015-01-02 10:22:45 -08:00
exception-tables.txt
intel_mpx.txt
mtrr.txt
pat.txt
tlb.txt
usb-legacy-support.txt
zero-page.txt Documentation/x86: Fix path in zero-page.txt 2015-02-18 23:04:00 +01:00