lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20091012171328.159a480a@lxorguk.ukuu.org.uk>
Date:	Mon, 12 Oct 2009 17:13:28 +0100
From:	Alan Cox <alan@...rguk.ukuu.org.uk>
To:	David Woodhouse <david.woodhouse@...el.com>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	"Rafael J. Wysocki" <rjw@...k.pl>,
	Greg Kroah-Hartman <gregkh@...e.de>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Adrian Bunk <bunk@...nel.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Natalie Protasevich <protasnb@...il.com>
Subject: Re: 2.6.32-rc4: Reported regressions from 2.6.31

> That involves allocating a _shitload_ of page tables for a 1:1 mapping
> of all of physical memory. We used to do that to pander to broken
> graphics drivers, and the AMD guys asked me to stop because it was
> actually quite painful for them to do the same.

SMM isn't going to be touching high pages. In fact I wouldn't be the
least suprised if simply mapping the low 1MB including EBDA/ISA space and
the ACPI reserved areas worked simply because if it touches any other RAM
in SMM mode its going to be peeing over our memory spaces.

And if I remember rightly the magic SMM remapped memory area is quite
small (64K) and low down too plus not DMAable (because otherwise DMA in
the real OS to the pages SMM aliases over will go kersplat if an SMM
occurs)

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ