aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@woody.linux-foundation.org>2008-02-10 02:29:57 -0500
committerLinus Torvalds <torvalds@woody.linux-foundation.org>2008-02-10 02:29:57 -0500
commit0b6ca82af83a79f3d1001c8a0701ed34ac38126e (patch)
treedef8eb112c513b21e826e370f2f34249e97914eb /Documentation
parentbfc1de0c40a26c6daa46c297e28138aecb4c5664 (diff)
parentfac84939609a683503947f41eb93e1917d026263 (diff)
Merge git://git.kernel.org/pub/scm/linux/kernel/git/x86/linux-2.6-x86
* git://git.kernel.org/pub/scm/linux/kernel/git/x86/linux-2.6-x86: (32 commits) x86: cpa, strict range check in try_preserve_large_page() x86: cpa, enable CONFIG_DEBUG_PAGEALLOC on 64-bit x86: cpa, use page pool x86: introduce page pool in cpa x86: DEBUG_PAGEALLOC: enable after mem_init() brk: help text typo fix lguest: accept guest _PAGE_PWT page table entries x86 PM: update stale comments x86 PM: consolidate suspend and hibernation code x86 PM: rename 32-bit files in arch/x86/power x86 PM: move 64-bit hibernation files to arch/x86/power x86: trivial printk optimizations x86: fix early_ioremap pagetable ops x86: construct 32-bit boot time page tables in native format. x86, core: remove CONFIG_FORCED_INLINING x86: avoid unused variable warning in mm/init_64.c x86: fixup more paravirt fallout brk: document randomize_va_space and CONFIG_COMPAT_BRK (was Re: x86: fix sparse warnings in acpi/bus.c x86: fix sparse warning in topology.c ...
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/feature-removal-schedule.txt9
-rw-r--r--Documentation/sysctl/kernel.txt29
2 files changed, 29 insertions, 9 deletions
diff --git a/Documentation/feature-removal-schedule.txt b/Documentation/feature-removal-schedule.txt
index 2039f47f2e65..4d3aa519eadf 100644
--- a/Documentation/feature-removal-schedule.txt
+++ b/Documentation/feature-removal-schedule.txt
@@ -111,15 +111,6 @@ Who: Christoph Hellwig <hch@lst.de>
111 111
112--------------------------- 112---------------------------
113 113
114What: CONFIG_FORCED_INLINING
115When: June 2006
116Why: Config option is there to see if gcc is good enough. (in january
117 2006). If it is, the behavior should just be the default. If it's not,
118 the option should just go away entirely.
119Who: Arjan van de Ven
120
121---------------------------
122
123What: eepro100 network driver 114What: eepro100 network driver
124When: January 2007 115When: January 2007
125Why: replaced by the e100 driver 116Why: replaced by the e100 driver
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt
index 8984a5396271..dc8801d4e944 100644
--- a/Documentation/sysctl/kernel.txt
+++ b/Documentation/sysctl/kernel.txt
@@ -41,6 +41,7 @@ show up in /proc/sys/kernel:
41- pid_max 41- pid_max
42- powersave-nap [ PPC only ] 42- powersave-nap [ PPC only ]
43- printk 43- printk
44- randomize_va_space
44- real-root-dev ==> Documentation/initrd.txt 45- real-root-dev ==> Documentation/initrd.txt
45- reboot-cmd [ SPARC only ] 46- reboot-cmd [ SPARC only ]
46- rtsig-max 47- rtsig-max
@@ -280,6 +281,34 @@ send before ratelimiting kicks in.
280 281
281============================================================== 282==============================================================
282 283
284randomize-va-space:
285
286This option can be used to select the type of process address
287space randomization that is used in the system, for architectures
288that support this feature.
289
2900 - Turn the process address space randomization off by default.
291
2921 - Make the addresses of mmap base, stack and VDSO page randomized.
293 This, among other things, implies that shared libraries will be
294 loaded to random addresses. Also for PIE-linked binaries, the location
295 of code start is randomized.
296
297 With heap randomization, the situation is a little bit more
298 complicated.
299 There a few legacy applications out there (such as some ancient
300 versions of libc.so.5 from 1996) that assume that brk area starts
301 just after the end of the code+bss. These applications break when
302 start of the brk area is randomized. There are however no known
303 non-legacy applications that would be broken this way, so for most
304 systems it is safe to choose full randomization. However there is
305 a CONFIG_COMPAT_BRK option for systems with ancient and/or broken
306 binaries, that makes heap non-randomized, but keeps all other
307 parts of process address space randomized if randomize_va_space
308 sysctl is turned on.
309
310==============================================================
311
283reboot-cmd: (Sparc only) 312reboot-cmd: (Sparc only)
284 313
285??? This seems to be a way to give an argument to the Sparc 314??? This seems to be a way to give an argument to the Sparc