|
Message-Id: <1462900755-20005-1-git-send-email-keescook@chromium.org> Date: Tue, 10 May 2016 10:19:11 -0700 From: Kees Cook <keescook@...omium.org> To: Ingo Molnar <mingo@...nel.org> Cc: Kees Cook <keescook@...omium.org>, Borislav Petkov <bp@...e.de>, Yinghai Lu <yinghai@...nel.org>, Baoquan He <bhe@...hat.com>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, Borislav Petkov <bp@...en8.de>, Vivek Goyal <vgoyal@...hat.com>, Andy Lutomirski <luto@...nel.org>, lasse.collin@...aani.org, Andrew Morton <akpm@...ux-foundation.org>, Dave Young <dyoung@...hat.com>, kernel-hardening@...ts.openwall.com, LKML <linux-kernel@...r.kernel.org> Subject: [PATCH v8 0/4] x86/KASLR: Randomize virtual address separately This is v8 of the last 3 patches from v7, with an additional clean-up for the pagetable.c code. The rest of the series has landed in -tip. The patches are: - 1: Further clean up on pagetable.c. - 2: Last part of Baoquan's decoupling the physical address and virtual address randomization of kernel text. - 3: Remove upper bound on physical address range. - 4: Remove lower bound on physical address range. Thanks for putting up with my attempts at this, and for all the review! Things really do look much cleaner. :) -Kees v7->v8: - extracted identity map initialization function to be part of the called interface, renamed appropriately to initialize_identity_maps(). - added copyright to pagetable.c for clarity. - shuffled initialization of mapping_info around again for good measure. - refactored remaining patches to include call to initialize_identity_maps().
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.