lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1207593513.5864.25.camel@promb-2n-dhcp158.eng.vmware.com>
Date:	Mon, 07 Apr 2008 11:38:33 -0700
From:	Alok Kataria <akataria@...are.com>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	mingo@...hat.com, tglx@...utronix.de, hpa@...or.com,
	linux-kernel@...r.kernel.org, Daniel Arai <arai@...are.com>,
	Zachary Amsden <zach@...are.com>
Subject: Re: [PATCH] Fix paranoia about using BIOS quickboot mechanism.

On Mon, 2008-04-07 at 10:22 +0200, Ingo Molnar wrote:
> * Alok Kataria <akataria@...are.com> wrote:
> 
> > Make sure that we clear the "shutdown status flag" in the CMOS 
> > register after each CPU is brought up.  This fixes a problem where the 
> > "shutdown status flag" may remain set when a CPU is brought up after 
> > booting.
> 
> btw., what problem does this result in, exactly?

The shutdown status flag set to "0xA", corresponds to "JMP double word
request without INT init".

This JMP at reboot time is at an unintended location. And results in
Triple faults in our case.
Though this error at reboot can be safely ignored in a VM environment,
am not sure what the effect would be on a physical system. May be it
will result in a triple fault and an eventual hardware reset thus
masking this BUG in the kernel.

This fix just makes sure that we reset that status flag after
initialization is done.

> 
> > Tested on the X86 tree.
> 
> > + * Cleanup possible dangling ends...
> > + */
> > + smpboot_restore_warm_reset_vector();
> > +
> > return boot_error;
> > }
> 
> patch got whitespace damaged - have a look at 
> Documentation/email-clients.txt for details about how to send patches as 
> in-line text. (or send the patch as an attachment - we accept x86 
> patches as attachments too)

Ah...I think i followed the instructions there, will have to look what
went wrong, anyways, will go for the easier solution, here is the patch
attached.  

Thanks & Regards,
Alok

> 
> 	Ingo

View attachment "fix-reboot-after-cpu-hotplug.patch" of type "text/x-patch" (1190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ