lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 02 Jun 2009 12:53:11 +0200
From:	Heiko Carstens <heiko.carstens@...ibm.com>
To:	linux-kernel@...r.kernel.org
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	Ingo Molnar <mingo@...e.hu>,
	Steven Rostedt <rostedt@...dmis.org>,
	Frederic Weisbecker <fweisbec@...il.com>,
	Martin Schwidefsky <schwidefsky@...ibm.com>
Subject: [PATCH/RFC 0/4] Dynamic ftrace support for s390

This patch series adds dynamic ftrace support for s390.
The first three patches are actually just preparation and cleanup.
However the first patch touches common code, because I want to be able to
have an arch specific version of probe_kernel_write().
The reason for that is that s390 enables page write protection for the
kernel text segment in order to catch random (broken) writes to kernel
text. Since write proctection is enabled any probe_kernel_write() call
would fail.
Now to solve this, we could disable write protection before writing
to the segment and afterwards enable it again (like the x86 specific
ftrace code does). Alternatively we could use some s390 special
instructions in order to bypass virtual addresses and their protection
and directly access the physical page that belongs to the virtual address.
That's my preferred solution and why I'd like to be able an arch
specific version of probe_kernel_write().

If there are no objections, these patches should go upstream via git-s390
I would guess?

Thanks,
Heiko
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ