Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755458Ab3JCUxy (ORCPT ); Thu, 3 Oct 2013 16:53:54 -0400 Received: from smtp.outflux.net ([198.145.64.163]:47061 "EHLO smtp.outflux.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754909Ab3JCUxu (ORCPT ); Thu, 3 Oct 2013 16:53:50 -0400 From: Kees Cook To: linux-kernel@vger.kernel.org Cc: x86@kernel.org, kernel-hardening@lists.openwall.com, adurbin@google.com, Eric Northup , jln@google.com, wad@google.com, Mathias Krause , Zhang Yanfei , "H. Peter Anvin" , keescook@chromium.org Subject: [PATCH v7 0/7] Kernel base address randomization on x86 Date: Thu, 3 Oct 2013 13:53:18 -0700 Message-Id: <1380833605-26313-1-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 1.7.9.5 X-HELO: www.outflux.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 518 Lines: 15 Updated from v6 with some suggestions from HPA. As before, this detects and uses various available randomness sources to choose an available slot from the e820 regions for kernel base address relocation. This is rolled out on Chrome OS devices, and working well. -Kees -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/