lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7533e359-2024-b69a-2bcf-1906c1a8dbca@amd.com>
Date: Thu, 12 Oct 2023 10:45:03 +0530
From: Vasant Hegde <vasant.hegde@....com>
To: Lukas Bulwahn <lukas.bulwahn@...il.com>, iommu@...ts.linux.dev,
 Joerg Roedel <jroedel@...e.de>,
 Suravee Suthikulpanit <suravee.suthikulpanit@....com>
Cc: Kees Cook <keescook@...omium.org>,
 "Gustavo A . R . Silva" <gustavoars@...nel.org>,
 linux-hardening@...r.kernel.org, kernel-janitors@...r.kernel.org,
 linux-kernel@...r.kernel.org
Subject: Re: [PATCH] hardening: x86: drop reference to removed config
 AMD_IOMMU_V2



On 10/12/2023 10:20 AM, Lukas Bulwahn wrote:
> Commit 5a0b11a180a9 ("iommu/amd: Remove iommu_v2 module") removes the
> config AMD_IOMMU_V2.
> 
> Remove the reference to this config in the x86 architecture-specific
> hardening config fragment as well.
> 
> Signed-off-by: Lukas Bulwahn <lukas.bulwahn@...il.com>
> ---
> Joerg, please pick this patch on top of the commit above. Thanks.
> 
>  arch/x86/configs/hardening.config | 1 -

Thanks for the fix Lukas. But I don't see this file in upstream linux tree. Am I
missing something?

-Vasant


>  1 file changed, 1 deletion(-)
> 
> diff --git a/arch/x86/configs/hardening.config b/arch/x86/configs/hardening.config
> index 19bb0c7a7669..7b497f3b7bc3 100644
> --- a/arch/x86/configs/hardening.config
> +++ b/arch/x86/configs/hardening.config
> @@ -9,7 +9,6 @@ CONFIG_INTEL_IOMMU=y
>  CONFIG_INTEL_IOMMU_DEFAULT_ON=y
>  CONFIG_INTEL_IOMMU_SVM=y
>  CONFIG_AMD_IOMMU=y
> -CONFIG_AMD_IOMMU_V2=y
>  
>  # Enable CET Shadow Stack for userspace.
>  CONFIG_X86_USER_SHADOW_STACK=y

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ