lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1456212255-23959-1-git-send-email-mcgrof@kernel.org>
Date:	Mon, 22 Feb 2016 23:24:04 -0800
From:	"Luis R. Rodriguez" <mcgrof@...nel.org>
To:	bp@...en8.de, hpa@...or.com, tglx@...utronix.de, mingo@...hat.com,
	rusty@...tcorp.com.au
Cc:	x86@...nel.org, linux-kernel@...r.kernel.org, luto@...capital.net,
	boris.ostrovsky@...cle.com, david.vrabel@...rix.com,
	konrad.wilk@...cle.com, xen-devel@...ts.xensource.com,
	lguest@...ts.ozlabs.org, "Luis R. Rodriguez" <mcgrof@...nel.org>
Subject: [PATCH v3 00/11] x86/init: replace paravirt_enabled() were possible

Boris,

this v3 series addresses a feedback from my last series in trying to
replace or remove paravirt_enabled() as we have been discussing. Some
patches are being spinned once, some others by now 3 times, hence the
v3. Changes per iteration are documented in the commit log on each patch.
I've documented progress on a wiki so far [0] on the crusade to remove
paravirt_enabled(). Seems we just have one more item to go.

Since we're using BIT() for the platform flags I've folded into this
series the patch that adds BIT() for early boot code.

This series has been tested with no issues by 0-day bot.

Any followup on the linker table work or its use through the proof of
concept ports and the new proposed x86 proposed use will depend on this
series, I'll follow through these series using the x86/init prefix unless
told otherwise.

Rusty, a few patches touch touch lguest, although they're trivial it'd still
be good to get your Acked-by or Reviewed-by.

In case anyone needs it these patches are also up on my linux-next
tree on the 20160222-remove-pv-enabled-test-02 branch. They're all
based on linux-next tag next-20160222.

[0] http://kernelnewbies.org/KernelProjects/remove-paravirt-enabled
[1] https://git.kernel.org/cgit/linux/kernel/git/mcgrof/linux-next.git/log/?h=20160222-remove-pv-enabled-test-02

Luis R. Rodriguez (11):
  x86/boot: enumerate documentation for the x86 hardware_subarch
  tools/lguest: make lguest launcher use X86_SUBARCH_LGUEST explicitly
  x86/xen: use X86_SUBARCH_XEN for PV guest boots
  x86/init: make ebda depend on PC subarch
  tools/lguest: force disable tboot and apm
  apm32: remove paravirt_enabled() use
  x86/tboot: remove paravirt_enabled()
  x86/cpu/intel: replace paravirt_enabled() for f00f work around
  x86/boot: add BIT() to boot/bitops.h
  x86/rtc: replace paravirt rtc check with x86 specific solution
  pnpbios: replace paravirt_enabled() check with subarch checks

 arch/x86/boot/bitops.h                  |  2 ++
 arch/x86/boot/boot.h                    |  2 +-
 arch/x86/include/asm/paravirt.h         |  6 ------
 arch/x86/include/asm/paravirt_types.h   |  5 -----
 arch/x86/include/asm/processor.h        |  1 -
 arch/x86/include/asm/x86_init.h         | 12 ++++++++++++
 arch/x86/include/uapi/asm/bootparam.h   | 31 ++++++++++++++++++++++++++++++-
 arch/x86/kernel/acpi/boot.c             |  4 ++++
 arch/x86/kernel/apm_32.c                |  2 +-
 arch/x86/kernel/cpu/intel.c             |  5 ++++-
 arch/x86/kernel/head.c                  |  2 +-
 arch/x86/kernel/rtc.c                   | 15 ++-------------
 arch/x86/kernel/tboot.c                 |  6 ------
 arch/x86/lguest/boot.c                  |  2 +-
 arch/x86/platform/intel-mid/intel-mid.c |  3 +++
 arch/x86/xen/enlighten.c                |  4 +---
 arch/x86/xen/time.c                     |  4 +++-
 drivers/pnp/pnpbios/core.c              |  4 +++-
 tools/lguest/lguest.c                   | 10 ++++++++--
 19 files changed, 76 insertions(+), 44 deletions(-)

-- 
2.7.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ