lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200809081226.37283.linux@sandersweb.net>
Date:	Mon, 8 Sep 2008 12:26:35 -0400
From:	David Sanders <linux@...dersweb.net>
To:	linux-kernel@...r.kernel.org
Cc:	"H. Peter Anvin" <hpa@...nel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Andi Kleen <andi@...stfloor.org>,
	the arch/x86 maintainers <x86@...nel.org>,
	Andi Kleen <andi-suse@...stfloor.org>
Subject: Re: [BUG] x86 kenel won't boot under Virtual PC

On Monday 08 September 2008 12:15, H. Peter Anvin wrote:
> H. Peter Anvin wrote:
> > The issue at hand is that at least with the current toolchain, we need
> > to pass -march=generic in order for these instructions to be generated.
> >  We have an option for this, CONFIG_X86_GENERIC, which distributions
> > really *should* be using anyway.
>
> That should have been "-mtune=generic".  Sorry.
>
> > And yes, it should be the default.  The patch I have makes it
> > "default y" as well as change the help text.
> >
> > Would it make you happier if this option was forced enabled unless
> > CONFIG_EMBEDDED was on?
>
> I guess the other option is to create a new option for selecting the
> dangerous -mtune= variants, and possibly lock *that* option to
> CONFIG_EMBEDDED.
>
> 	-hpa

The option that works best for users is for the kernel to not use NOPLs on 
32-bit cpu's.  That is what Linus's patch accomplishes.  I am not having any 
issues with gcc or gas generating NOPLs.  The kernel should work out of the 
box for PentiumPro or later cpu's running in 32-bit mode.  I think you are 
trying to over-engineer the issue.  Just apply the patch and move on.
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ