lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <04EAB7311EE43145B2D3536183D1A844549BAEA9@GSjpTKYDCembx31.service.hitachi.net> Date: Wed, 14 Oct 2015 03:39:59 +0000 From: 河合英宏 / KAWAI,HIDEHIRO <hidehiro.kawai.ez@...achi.com> To: "'Thomas Gleixner'" <tglx@...utronix.de> CC: Jonathan Corbet <corbet@....net>, Peter Zijlstra <peterz@...radead.org>, Ingo Molnar <mingo@...nel.org>, "Eric W. Biederman" <ebiederm@...ssion.com>, "H. Peter Anvin" <hpa@...or.com>, Andrew Morton <akpm@...ux-foundation.org>, Vivek Goyal <vgoyal@...hat.com>, "linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>, "x86@...nel.org" <x86@...nel.org>, "kexec@...ts.infradead.org" <kexec@...ts.infradead.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Michal Hocko <mhocko@...nel.org>, Ingo Molnar <mingo@...hat.com>, 平松雅巳 / HIRAMATU,MASAMI <masami.hiramatsu.pt@...achi.com> Subject: RE: [V4 PATCH 4/4] x86/apic: Introduce noextnmi boot option > On Fri, 25 Sep 2015, Hidehiro Kawai wrote: > > > This patch introduces new boot option "noextnmi" which disables > > external NMI. This option is useful for the dump capture kernel > > so that an HA application or administrator wouldn't mistakenly > > shoot down the kernel by NMI. > > > > Currently, only x86 supports this option. > > You might add that is can be used for debugging purposes as > well. External NMIs can be their own source of trouble. :) Thanks for your comments! I'll do that. By the way, I have a pending patch which expands this option like this: apic_extnmi={ bsp | all | none } If apic_extnmi=all is specified, external NMIs are broadcast to all CPUs. This raises the successful rate of kernel panic in the case where an external NMI to CPU 0 is swallowed by other NMI handlers or blocked due to hang-up in NMI context. The patch works without any problems, but I'm going to drop the feature if it will cause long discussion. I'd like to settle this patch set down once. At least, I'm going to change this option to apic_extnmi={bsp|none} style for the future expansion. How do you think about this? > > Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@...achi.com> > > Cc: Thomas Gleixner <tglx@...utronix.de> > > Cc: Ingo Molnar <mingo@...hat.com> > > Cc: "H. Peter Anvin" <hpa@...or.com> > > Cc: Jonathan Corbet <corbet@....net> > > --- > > Documentation/kernel-parameters.txt | 4 ++++ > > arch/x86/kernel/apic/apic.c | 17 ++++++++++++++++- > > 2 files changed, 20 insertions(+), 1 deletion(-) > > > > diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt > > index 22a4b68..8bcaccd 100644 > > --- a/Documentation/kernel-parameters.txt > > +++ b/Documentation/kernel-parameters.txt > > @@ -2379,6 +2379,10 @@ bytes respectively. Such letter suffixes can also be entirely omitted. > > noexec=on: enable non-executable mappings (default) > > noexec=off: disable non-executable mappings > > > > + noextnmi [X86] > > + Mask external NMI. This option is useful for a > > + dump capture kernel to be shot down by NMI. > > That should read: "...not to be shot down", right? Yes, you are right. I'll fix it. > Other than that. > > Acked-by: Thomas Gleixner <tglx@...utronix.de> Regards, Hidehiro Kawai Hitachi, Ltd. Research & Development Group
Powered by blists - more mailing lists