|
Message-ID: <20160929074324.GD14497@verge.net.au> Date: Thu, 29 Sep 2016 09:43:24 +0200 From: Simon Horman <horms@...ge.net.au> To: Baoquan He <bhe@...hat.com> Cc: tonli@...hat.com, kexec@...ts.infradead.org, Thomas Garnier <thgarnie@...gle.com>, keescook@...omium.org, kernel-hardening@...ts.openwall.com Subject: Re: [PATCH v1] kexec/arch/i386: Add support for KASLR memory randomization On Tue, Sep 13, 2016 at 03:10:05PM +0800, Baoquan He wrote: > From: Thomas Garnier <thgarnie@...gle.com> > > Multiple changes were made on KASLR (right now in linux-next). One of > them is randomizing the virtual address of the physical mapping, vmalloc > and vmemmap memory sections. It breaks kdump ability to read physical > memory. > > This change identifies if KASLR memories randomization is used by > checking if the page_offset_base variable exists. It search for the > correct PAGE_OFFSET value by looking at the loaded memory section and > find the lowest aligned on PUD (the randomization level). > > Related commits on linux-next: > - 0483e1fa6e09d4948272680f691dccb1edb9677f: Base for randomization > - 021182e52fe01c1f7b126f97fd6ba048dc4234fd: Enable for PAGE_OFFSET > > Signed-off-by: Thomas Garnier <thgarnie@...gle.com> Thanks, applied.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.