Re: [PATCH v6 RESEND] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions
From: Ingo Molnar
Date: Fri Jul 21 2017 - 06:33:56 EST
* Baoquan He <bhe@xxxxxxxxxx> wrote:
> Kernel text may be located in non-mirror regions (movable zone) when both
> address range mirroring feature and KASLR are enabled.
>
> The address range mirroring feature arranges such mirror region into
> normal zone and other region into movable zone in order to locate
> kernel code and data in mirror region. The physical memory region
> whose descriptors in EFI memory map has EFI_MEMORY_MORE_RELIABLE
> attribute (bit: 16) are mirrored.
>
> If efi is detected, iterate efi memory map and pick the mirror region to
> process for adding candidate of randomization slot. If efi is disabled
> or no mirror region found, still process e820 memory map.
Please read your own changelogs and capitalize 'EFI' consistently!
Also, what is unclear to me after reading this changelog, what does this patch
actually achieve, relative to existing behavior?
It would be helpful if it was structured like this:
Previous behavior was that the kernel would ...
This patch changes the old behavior so that the kernel now ...
Thanks,
Ingo