On Fri, Mar 06, 2015 at 11:53:22AM -0800, Yinghai Lu wrote: > That will get wrong value back for kaslr_enabled in kernel stage. > 1. When kaslr is not enabled at boot/choose_kernel_location, if kaslr_enabled > get set wrongly in setup.c, late in module.c::get_module_load_offset > will return not wanted random module load offset. > That change behavior when HIBERNATION is defined or nokaslr is passed. > > 2. When kaslr is enabled at boot/choose_kernel_location, if kaslr_enabled > get cleared wrongly in setup.c, late in module.c::get_module_load_offset > will not return wanted random module load offset. Now you went from the one extreme to the other. Initially it was "trivial and obvious" now it is too much unreadable detail which no one needs. How about this: --- Commit f47233c2d34f ("x86/mm/ASLR: Propagate base load address calculation") started passing KASLR status to kernel proper, but it uses a physical address as the vaule, leading to parsing bogus KASLR status in kernel proper. The setup_data linked list and thus the element which contains kaslr_enabled is chained together using physical addresses. At the time when we access it in the kernel proper, we're already running with paging enabled and therefore must access it through its virtual address. This patch changes the code to use early_memmap() and access the value. --- Complaints? -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. -- -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html