On Monday, August 01, 2016 10:07:58 AM Thomas Garnier wrote:
> ***Background:
> KASLR memory randomization for x86_64 was added when KASLR did not support 
> hibernation. Now that it does, some changes are needed.
> 
> ***Problems that needed solving:
> Hibernation was failing on reboot with a GP fault when 
> CONFIG_RANDOMIZE_MEMORY was enabled. Two issues were identified.
> 
> The original fault was due to a wrong physical address assigned to cr3. The 
> problem was introduced with __PAGE_OFFSET becoming a global variable when 
> randomized. The fix uses a define to use the glbobal or immediate value based 
> on config settings.
> 
> The second isssue was that the temporary page table mapping did not support 
> virtual addresses not aligned on PGD level. KASLR memory randomization will 
> generated a random address aligned on PUD level. The fix correctly calculates 
> the offset on all levels of the temporary page table.
> 
> ***Parts:
>  - 01/02: Support unaligned addresses (second issue)
>  - 02/02: Fix __PAGE_OFFSET usage on assembly (first issue)

Thanks a lot for taking care of this!

Patch [2/2] looks good to me, but I'd to the [1/2] differently (more details
will follow).

Thanks,
Rafael

Reply via email to