All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v8 0/4] x86/KASLR: Randomize virtual address separately
@ 2016-05-10 17:19 ` Kees Cook
  0 siblings, 0 replies; 20+ messages in thread
From: Kees Cook @ 2016-05-10 17:19 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Kees Cook, Borislav Petkov, Yinghai Lu, Baoquan He, Ingo Molnar,
	H. Peter Anvin, Borislav Petkov, Vivek Goyal, Andy Lutomirski,
	lasse.collin, Andrew Morton, Dave Young, kernel-hardening, LKML

This is v8 of the last 3 patches from v7, with an additional clean-up for
the pagetable.c code. The rest of the series has landed in -tip.

The patches are:
- 1: Further clean up on pagetable.c.
- 2: Last part of Baoquan's decoupling the physical address and virtual
     address randomization of kernel text.
- 3: Remove upper bound on physical address range.
- 4: Remove lower bound on physical address range.

Thanks for putting up with my attempts at this, and for all the review!
Things really do look much cleaner. :)

-Kees

v7->v8:
- extracted identity map initialization function to be part of the
  called interface, renamed appropriately to initialize_identity_maps().
- added copyright to pagetable.c for clarity.
- shuffled initialization of mapping_info around again for good measure.
- refactored remaining patches to include call to initialize_identity_maps().

^ permalink raw reply	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2016-05-12  8:31 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-05-10 17:19 [PATCH v8 0/4] x86/KASLR: Randomize virtual address separately Kees Cook
2016-05-10 17:19 ` [kernel-hardening] " Kees Cook
2016-05-10 17:19 ` [PATCH v8 1/4] x86/KASLR: Clarify identity map interface Kees Cook
2016-05-10 17:19   ` [kernel-hardening] " Kees Cook
2016-05-10 17:44   ` Borislav Petkov
2016-05-10 17:44     ` [kernel-hardening] " Borislav Petkov
2016-05-11  6:24   ` Ingo Molnar
2016-05-11  6:24     ` [kernel-hardening] " Ingo Molnar
2016-05-11 15:23     ` Kees Cook
2016-05-11 15:23       ` [kernel-hardening] " Kees Cook
2016-05-12  8:30       ` Ingo Molnar
2016-05-12  8:30         ` [kernel-hardening] " Ingo Molnar
2016-05-12  8:31       ` Ingo Molnar
2016-05-12  8:31         ` [kernel-hardening] " Ingo Molnar
2016-05-10 17:19 ` [PATCH v8 2/4] x86/KASLR: Randomize virtual address separately Kees Cook
2016-05-10 17:19   ` [kernel-hardening] " Kees Cook
2016-05-10 17:19 ` [PATCH v8 3/4] x86/KASLR: Add physical address randomization >4G Kees Cook
2016-05-10 17:19   ` [kernel-hardening] " Kees Cook
2016-05-10 17:19 ` [PATCH v8 4/4] x86/KASLR: Allow randomization below load address Kees Cook
2016-05-10 17:19   ` [kernel-hardening] " Kees Cook

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.