summaryrefslogtreecommitdiffstats
path: root/arch/arm64/kernel/kaslr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* arm64: kaslr: Use feature override instead of parsing the cmdline againArd Biesheuvel2024-02-161-3/+1
* arm64/kernel: Move 'nokaslr' parsing out of early idreg codeArd Biesheuvel2023-12-121-0/+7
* Merge branch for-next/module-alloc into kvmarm/nextOliver Upton2023-06-151-69/+14
|\
| * arm64: module: move module randomization to module.cMark Rutland2023-06-061-58/+2
| * arm64: kaslr: split kaslr/module initializationMark Rutland2023-06-061-14/+25
| * arm64: module: remove old !KASAN_VMALLOC logicMark Rutland2023-06-061-10/+0
* | arm64: Turn kaslr_feature_override into a generic SW feature overrideMarc Zyngier2023-06-131-3/+3
|/
* arm64: kaslr: don't pretend KASLR is enabled if offset < MIN_KIMG_ALIGNArd Biesheuvel2023-02-281-1/+1
* arm64: head: avoid relocating the kernel twice for KASLRArd Biesheuvel2022-06-241-87/+0
* arm64: kaslr: defer initialization to initcall where permittedArd Biesheuvel2022-06-241-55/+40
* arm64: kernel: drop unnecessary PoC cache clean+invalidateArd Biesheuvel2022-06-241-11/+0
* arm64: fix the doc of RANDOMIZE_MODULE_REGION_FULLBarry Song2021-08-031-1/+3
* arm64: Rename arm64-internal cache maintenance functionsFuad Tabba2021-05-251-3/+3
* arm64: __flush_dcache_area to take end parameter instead of sizeFuad Tabba2021-05-251-3/+9
* arm64: kaslr: support randomized module area with KASAN_VMALLOCLecopzer Chen2021-03-291-8/+10
* arm64: Move "nokaslr" over to the early cpufeature infrastructureMarc Zyngier2021-02-091-34/+2
* arm64: Extract early FDT mapping from kaslr_early_init()Marc Zyngier2021-02-091-4/+3
* kasan, arm64: expand CONFIG_KASAN checksAndrey Konovalov2020-12-221-1/+2
* arm64: Extend the kernel command line from the bootloaderTyler Hicks2020-11-271-1/+8
* arm64: kaslr: Refactor early init command line parsingTyler Hicks2020-11-271-8/+11
* arm64: kaslr: Use standard early random functionGuenter Roeck2020-08-071-7/+5
* random: random.h should include archrandom.h, not the other way aroundLinus Torvalds2020-08-051-1/+1
* mm: reorder includes after introduction of linux/pgtable.hMike Rapoport2020-06-091-1/+1
* mm: introduce include/linux/pgtable.hMike Rapoport2020-06-091-1/+1
* arm64: Fix CONFIG_ARCH_RANDOM=n buildRobin Murphy2020-02-111-0/+1
* arm64: Use v8.5-RNG entropy for KASLR seedMark Brown2020-01-221-0/+11
* arm64: kaslr: Check command line before looking for a seedMark Brown2019-11-081-5/+6
* arm64: kaslr: Announce KASLR status on bootMark Brown2019-11-081-3/+38
*-. Merge branches 'for-next/52-bit-kva', 'for-next/cpu-topology', 'for-next/erro...Will Deacon2019-08-301-7/+4
|\ \
| | * arm64: map FDT as RW for early_init_dt_scan()Hsin-Yi Wang2019-08-231-4/+1
| |/ |/|
| * arm64: mm: Introduce VA_BITS_MINSteve Capper2019-08-091-3/+3
|/
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500Thomas Gleixner2019-06-191-4/+1
* arm64/kernel: kaslr: reduce module randomization range to 2 GBArd Biesheuvel2019-05-231-3/+3
* arm64: kaslr: ensure randomized quantities are clean also when kaslr is offArd Biesheuvel2019-02-011-0/+1
* arm64: kaslr: ensure randomized quantities are clean to the PoCArd Biesheuvel2019-01-161-2/+6
* arm64/kernel: kaslr: reduce module randomization range to 4 GBArd Biesheuvel2018-03-081-8/+12
* arm64/kernel: kaslr: drop special Image placement logicArd Biesheuvel2018-03-051-15/+0
* arm64: kaslr: Adjust the offset to avoid Image across alignment boundaryCatalin Marinas2017-08-221-7/+3
* arm64: kaslr: ignore modulo offset when validating virtual displacementArd Biesheuvel2017-08-221-3/+9
* arm64: fix endianness annotation in get_kaslr_seed()Luc Van Oostenryck2017-06-291-1/+1
* arm64: kaslr: Fix up the kernel image alignmentNeeraj Upadhyay2017-03-221-3/+7
* arm64: apply __ro_after_init to some objectsJisheng Zhang2016-08-221-1/+2
* arm64: relocatable: deal with physically misaligned kernel imagesArd Biesheuvel2016-04-261-3/+3
* arm64: kaslr: randomize the linear regionArd Biesheuvel2016-02-241-0/+4
* arm64: add support for kernel ASLRArd Biesheuvel2016-02-241-0/+173