On Fri, 1 Jun 2018 12:31:44 +0200
Pavel Machek <pa...@ucw.cz> wrote:

> Hi!
> 
> v4.17 on n900:
> 
> [    0.000000] Virtual kernel memory layout:
> [    0.000000]     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
> [    0.000000]     fixmap  : 0xffc00000 - 0xfff00000   (3072 kB)
> [    0.000000]     vmalloc : 0xd0000000 - 0xff800000   ( 760 MB)
> [    0.000000]     lowmem  : 0xc0000000 - 0xcff00000   ( 255 MB)
> [    0.000000]     pkmap   : 0xbfe00000 - 0xc0000000   (   2 MB)
> [    0.000000]     modules : 0xbf000000 - 0xbfe00000   (  14 MB)

Looks like the above is pointer values. Grant it, they are dynamic, but
still.


> [    0.000000]       .text : 0x(ptrval) - 0x(ptrval)   (8160 kB)
> [    0.000000]       .init : 0x(ptrval) - 0x(ptrval)   (1024 kB)
> [    0.000000]       .data : 0x(ptrval) - 0x(ptrval)   ( 309 kB)
> [    0.000000]        .bss : 0x(ptrval) - 0x(ptrval)   ( 333 kB)
> [    0.000000] NR_IRQS: 16, nr_irqs: 16, preallocated irqs: 16
> 
> I mean -- security is nice, but perhaps we should adjust the messages
> so this does not look like we are making fun of the user?

Hmm, do we hash even when the kernel isn't relocatable? Seems rather
pointless if a kernel will always load in the same memory locations to
hash the pointer values that address them.

-- Steve

Reply via email to