lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <tip-2d580c160ada91049fc24b244ed74d8775bd1c96@git.kernel.org>
Date:   Tue, 2 Oct 2018 03:19:12 -0700
From:   tip-bot for Masayoshi Mizuma <tipbot@...or.com>
To:     linux-tip-commits@...r.kernel.org
Cc:     msys.mizuma@...il.com, corbet@....net, mingo@...nel.org,
        bp@...en8.de, tglx@...utronix.de, torvalds@...ux-foundation.org,
        hpa@...or.com, bhe@...hat.com, m.mizuma@...fujitsu.com,
        peterz@...radead.org, linux-kernel@...r.kernel.org
Subject: [tip:x86/boot] Documentation/kernel-parameters.txt: Document
 rand_mem_physical_padding=

Commit-ID:  2d580c160ada91049fc24b244ed74d8775bd1c96
Gitweb:     https://git.kernel.org/tip/2d580c160ada91049fc24b244ed74d8775bd1c96
Author:     Masayoshi Mizuma <m.mizuma@...fujitsu.com>
AuthorDate: Mon, 1 Oct 2018 10:08:43 -0400
Committer:  Ingo Molnar <mingo@...nel.org>
CommitDate: Tue, 2 Oct 2018 11:47:22 +0200

Documentation/kernel-parameters.txt: Document rand_mem_physical_padding=

This kernel parameter allows the modification of the padding used
for the physical memory mapping section when KASLR memory is enabled.

For memory hotplug capable systems, the default padding size,
CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING, may not be enough.

The option is useful to adjust the padding size.

Signed-off-by: Masayoshi Mizuma <m.mizuma@...fujitsu.com>
Cc: Baoquan He <bhe@...hat.com>
Cc: Borislav Petkov <bp@...en8.de>
Cc: Jonathan Corbet <corbet@....net>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Masayoshi Mizuma <msys.mizuma@...il.com>
Cc: Peter Zijlstra <peterz@...radead.org>
Cc: Thomas Gleixner <tglx@...utronix.de>
Link: http://lkml.kernel.org/r/20181001140843.26137-4-msys.mizuma@gmail.com
Signed-off-by: Ingo Molnar <mingo@...nel.org>
---
 Documentation/admin-guide/kernel-parameters.txt | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)

diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index 64a3bf54b974..45f614cd2a61 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -3529,6 +3529,24 @@
 			fully seed the kernel's CRNG. Default is controlled
 			by CONFIG_RANDOM_TRUST_CPU.
 
+	rand_mem_physical_padding=
+			[KNL] Define the padding size in terabytes
+			used for the physical memory mapping section
+			when KASLR is enabled.
+			If the padding size is not enough, you can see
+			'Set rand_mem_physical_padding=XX ...' in system
+			boot message, so set the parameter as the message suggests.
+
+			This parameter is useful for memory hot-add capable
+			systems. Such systems may have more space than
+			actual memory size to hot-add memory. If the
+			padding size is not enough and memory is hot-added,
+			the hot-adding will fail because it destroys the
+			system memory map. So, the padding size needs to be
+			adjusted in such a system.
+			The default value is the value of
+			CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING.
+
 	ras=option[,option,...]	[KNL] RAS-specific options
 
 		cec_disable	[X86]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ