From: Kees Cook keesc...@chromium.org
commit e2b32e6785138d92d2a40e0d0473575c8c7310a2 upstream
Randomize the load address of modules in the kernel to make kASLR
effective for modules. Modules can only be loaded within a particular
range of virtual address space. This patch adds 10 bits of
From: Kees Cook keesc...@chromium.org
commit 24f2e0273f80ec262a772059e140a0adef35296d upstream
Changes kASLR from being compile-time selectable (blocked by
CONFIG_HIBERNATION), to being boot-time selectable (with hibernation
available by default) via the kaslr kernel command line.