| From: |
| Kees Cook <keescook@chromium.org> |
| To: |
| linux-kernel@vger.kernel.org |
| Subject: |
| [PATCH v8 0/6] Kernel base address randomization |
| Date: |
| Thu, 10 Oct 2013 17:18:12 -0700 |
| Message-ID: |
| <1381450698-28710-1-git-send-email-keescook@chromium.org> |
| Cc: |
| x86@kernel.org, kernel-hardening@lists.openwall.com, adurbin@google.com, Eric Northup <digitaleric@google.com>, jln@google.com, wad@google.com, Mathias Krause <minipli@googlemail.com>, Zhang Yanfei <zhangyanfei@cn.fujitsu.com>, "H. Peter Anvin" <hpa@zytor.com>, keescook@chromium.org |
| Archive‑link: | |
Article |
Update to the kASLR series. The improved e820 walking code from v7 has been
reorganized, and now explicitly avoids unsafe memory regions instead of
raising the minimum load address.
-Kees
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/