kernel-ark/Documentation/x86
Borislav Petkov 78cac48c04 x86/mm/KASLR: Propagate KASLR status to kernel proper
Commit:

  e2b32e6785 ("x86, kaslr: randomize module base load address")

made module base address randomization unconditional and didn't regard
disabled KKASLR due to CONFIG_HIBERNATION and command line option
"nokaslr". For more info see (now reverted) commit:

  f47233c2d3 ("x86/mm/ASLR: Propagate base load address calculation")

In order to propagate KASLR status to kernel proper, we need a single bit
in boot_params.hdr.loadflags and we've chosen bit 1 thus leaving the
top-down allocated bits for bits supposed to be used by the bootloader.

Originally-From: Jiri Kosina <jkosina@suse.cz>
Suggested-by: H. Peter Anvin <hpa@zytor.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Cc: Kees Cook <keescook@chromium.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2015-04-03 15:26:15 +02:00
..
i386 doc: spelling error changes 2014-05-05 15:32:05 +02:00
x86_64 x86_64: add KASan support 2015-02-13 21:21:41 -08:00
00-INDEX
boot.txt x86/mm/KASLR: Propagate KASLR status to kernel proper 2015-04-03 15:26:15 +02:00
early-microcode.txt
earlyprintk.txt doc: spelling error changes 2014-05-05 15:32:05 +02:00
entry_64.txt x86, entry: Switch stacks on a paranoid entry from userspace 2015-01-02 10:22:45 -08:00
exception-tables.txt
intel_mpx.txt x86, mpx: Give MPX a real config option prompt 2014-12-15 15:58:57 +01:00
mtrr.txt
pat.txt
tlb.txt x86/doc: Fix the 'tlb_single_page_flush_ceiling' sysconfig path 2014-08-10 09:09:26 +02:00
usb-legacy-support.txt
zero-page.txt Documentation/x86: Fix path in zero-page.txt 2015-02-18 23:04:00 +01:00