[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <159593423897.3960510.2442620106516348363.b4-ty@kernel.org>
Date: Tue, 28 Jul 2020 12:04:31 +0100
From: Marc Zyngier <maz@...nel.org>
To: Will Deacon <will@...nel.org>,
Julien Thierry <julien.thierry.kdev@...il.com>,
Suzuki K Poulose <suzuki.poulose@....com>,
James Morse <james.morse@....com>,
David Brazdil <dbrazdil@...gle.com>,
Catalin Marinas <catalin.marinas@....com>
Cc: android-kvm@...gle.com, linux-kernel@...r.kernel.org,
kvmarm@...ts.cs.columbia.edu, kernel-team@...roid.com,
linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH 0/2] Unify non-VHE ASLR features behind CONFIG_RANDOMIZE_BASE
On Tue, 21 Jul 2020 10:44:43 +0100, David Brazdil wrote:
> There is currently no way to disable nVHE ASLR, e.g. for debugging, so the
> first patch in this series makes it conditional on RANDOMIZE_BASE, same as
> KASLR. Note that the 'nokaslr' command line flag has no effect here.
>
> Second patch unifies the HARDEN_EL2_VECTORS errate for A57 and A72 behind
> the same Kconfig for simplicity. Happy to make it just depend on
> RANDOMIZE_BASE if having an option to keep randomization on but hardenning
> off is preferred.
>
> [...]
Applied to kvm-arm64/misc-5.9, thanks!
[1/2] KVM: arm64: Make nVHE ASLR conditional on RANDOMIZE_BASE
commit: 24f69c0fa4e252f706884114b7d6353aa07678b5
[2/2] KVM: arm64: Substitute RANDOMIZE_BASE for HARDEN_EL2_VECTORS
commit: a59a2edbbba7397fede86e40a3da17e5beebf98b
Cheers,
M.
--
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists