Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
On Thu, May 12, 2016 at 3:28 PM, Thomas Garnier wrote: > This is PATCH v5 for KASLR memory implementation for x86_64. The effects of this on the kernel_page_table addresses is impressive! This is working well for me, and I think everything looks clean now. I've got the

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
On Thu, May 12, 2016 at 3:28 PM, Thomas Garnier wrote: > This is PATCH v5 for KASLR memory implementation for x86_64. The effects of this on the kernel_page_table addresses is impressive! This is working well for me, and I think everything looks clean now. I've got the series up in my tree with

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
On Tue, May 17, 2016 at 4:15 AM, Kees Cook wrote: > I'm travelling this week, but I'll try to spend some time on it. > > -Kees > > On Mon, May 16, 2016 at 11:25 AM, Thomas Garnier wrote: >> Any feedback on the patch? Ingo? Kees? >> >> Kees mentioned he

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
On Tue, May 17, 2016 at 4:15 AM, Kees Cook wrote: > I'm travelling this week, but I'll try to spend some time on it. > > -Kees > > On Mon, May 16, 2016 at 11:25 AM, Thomas Garnier wrote: >> Any feedback on the patch? Ingo? Kees? >> >> Kees mentioned he will take care of the build warning on the

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
I'm travelling this week, but I'll try to spend some time on it. -Kees On Mon, May 16, 2016 at 11:25 AM, Thomas Garnier wrote: > Any feedback on the patch? Ingo? Kees? > > Kees mentioned he will take care of the build warning on the KASLR > refactor (the function is not

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-17 Thread Kees Cook
I'm travelling this week, but I'll try to spend some time on it. -Kees On Mon, May 16, 2016 at 11:25 AM, Thomas Garnier wrote: > Any feedback on the patch? Ingo? Kees? > > Kees mentioned he will take care of the build warning on the KASLR > refactor (the function is not used right now). > >

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-16 Thread Thomas Garnier
Any feedback on the patch? Ingo? Kees? Kees mentioned he will take care of the build warning on the KASLR refactor (the function is not used right now). Thanks, Thomas On Thu, May 12, 2016 at 12:28 PM, Thomas Garnier wrote: > This is PATCH v5 for KASLR memory

Re: [PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-16 Thread Thomas Garnier
Any feedback on the patch? Ingo? Kees? Kees mentioned he will take care of the build warning on the KASLR refactor (the function is not used right now). Thanks, Thomas On Thu, May 12, 2016 at 12:28 PM, Thomas Garnier wrote: > This is PATCH v5 for KASLR memory implementation for x86_64. > >

[PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-12 Thread Thomas Garnier
This is PATCH v5 for KASLR memory implementation for x86_64. Recent changes: Add performance information on commit. Add details on PUD alignment. Add information on testing against the KASLR bypass exploit. Rebase on next-20160511 and merge recent KASLR changes. Integrate

[PATCH v5 0/4] x86, boot: KASLR memory randomization

2016-05-12 Thread Thomas Garnier
This is PATCH v5 for KASLR memory implementation for x86_64. Recent changes: Add performance information on commit. Add details on PUD alignment. Add information on testing against the KASLR bypass exploit. Rebase on next-20160511 and merge recent KASLR changes. Integrate