On 03/04/15 at 04:12pm, Yinghai Lu wrote: > On Wed, Mar 4, 2015 at 1:35 PM, Yinghai Lu <ying...@kernel.org> wrote: > > On Wed, Mar 4, 2015 at 7:39 AM, Baoquan He <b...@redhat.com> wrote: > >> > >> I got the reason and made a debug patch to fix it. Could you please > >> apply it on top of this patchset and try again? Then it will behave well > >> and just return 0x13c000000 since no random is got. > > > > random_base can not be move down? > > > > Modify the min_addr will allow move down, and it is safe as we put all > related into mem_avoid now.
I am considering this random_base issue, but planned to do it after the main work is done. I am wondering why not set it as 16M since all related has been avoided and safe? > > > https://git.kernel.org/cgit/linux/kernel/git/yinghai/linux-yinghai.git/log/?h=for-x86-4.0-rc2-aslr > > for updated patches. > > Your patches still have some format warning, Please use > ./scripts/checkpatch.pl > to find them and fix them before next post. > > Also patch should have "x86,kasl" in the title. Yes, will do. Thanks Baoquan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/