aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation
diff options
context:
space:
mode:
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/feature-removal-schedule.txt9
-rw-r--r--Documentation/sysctl/kernel.txt29
2 files changed, 29 insertions, 9 deletions
diff --git a/Documentation/feature-removal-schedule.txt b/Documentation/feature-removal-schedule.txt
index 2039f47f2e65..4d3aa519eadf 100644
--- a/Documentation/feature-removal-schedule.txt
+++ b/Documentation/feature-removal-schedule.txt
@@ -111,15 +111,6 @@ Who: Christoph Hellwig <hch@lst.de>
111 111
112--------------------------- 112---------------------------
113 113
114What: CONFIG_FORCED_INLINING
115When: June 2006
116Why: Config option is there to see if gcc is good enough. (in january
117 2006). If it is, the behavior should just be the default. If it's not,
118 the option should just go away entirely.
119Who: Arjan van de Ven
120
121---------------------------
122
123What: eepro100 network driver 114What: eepro100 network driver
124When: January 2007 115When: January 2007
125Why: replaced by the e100 driver 116Why: replaced by the e100 driver
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt
index 8984a5396271..dc8801d4e944 100644
--- a/Documentation/sysctl/kernel.txt
+++ b/Documentation/sysctl/kernel.txt
@@ -41,6 +41,7 @@ show up in /proc/sys/kernel:
41- pid_max 41- pid_max
42- powersave-nap [ PPC only ] 42- powersave-nap [ PPC only ]
43- printk 43- printk
44- randomize_va_space
44- real-root-dev ==> Documentation/initrd.txt 45- real-root-dev ==> Documentation/initrd.txt
45- reboot-cmd [ SPARC only ] 46- reboot-cmd [ SPARC only ]
46- rtsig-max 47- rtsig-max
@@ -280,6 +281,34 @@ send before ratelimiting kicks in.
280 281
281============================================================== 282==============================================================
282 283
284randomize-va-space:
285
286This option can be used to select the type of process address
287space randomization that is used in the system, for architectures
288that support this feature.
289
2900 - Turn the process address space randomization off by default.
291
2921 - Make the addresses of mmap base, stack and VDSO page randomized.
293 This, among other things, implies that shared libraries will be
294 loaded to random addresses. Also for PIE-linked binaries, the location
295 of code start is randomized.
296
297 With heap randomization, the situation is a little bit more
298 complicated.
299 There a few legacy applications out there (such as some ancient
300 versions of libc.so.5 from 1996) that assume that brk area starts
301 just after the end of the code+bss. These applications break when
302 start of the brk area is randomized. There are however no known
303 non-legacy applications that would be broken this way, so for most
304 systems it is safe to choose full randomization. However there is
305 a CONFIG_COMPAT_BRK option for systems with ancient and/or broken
306 binaries, that makes heap non-randomized, but keeps all other
307 parts of process address space randomized if randomize_va_space
308 sysctl is turned on.
309
310==============================================================
311
283reboot-cmd: (Sparc only) 312reboot-cmd: (Sparc only)
284 313
285??? This seems to be a way to give an argument to the Sparc 314??? This seems to be a way to give an argument to the Sparc