lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1456190999-12685-1-git-send-email-pure.logic@nexus-software.ie>
Date:	Tue, 23 Feb 2016 01:29:57 +0000
From:	Bryan O'Donoghue <pure.logic@...us-software.ie>
To:	linux-kernel@...r.kernel.org
Cc:	tglx@...utronix.de, mingo@...hat.com, hpa@...or.com,
	x86@...nel.org, andriy.shevchenko@...ux.intel.com,
	boon.leong.ong@...el.com, paul.gortmaker@...driver.com,
	Bryan O'Donoghue <pure.logic@...us-software.ie>
Subject: [PATCH v3 0/2] x86/intel/imr: Fix IMR lock logic

This patchset changes the lock logic for Isolated Memory Regions. As a
result of a conversation with Andriy we determined that the IMR associated
with the kernel .text section should be unlocked so that kernels executed
by kexec could tear-down the old kernel IMR and setup a new one. On
subsequent discussions with Ingo we discussed removing lock bit support in
totality to simplify the IMR interface. This patchset implements both of
those changes.

V1:
Set the kernel IMR lock bit to false - Bryan

V2:
Make a parameter of the kernel IMR lock logic - Andriy

V3:
Revert to setting the kernel IMR lock bit to false - Ingo
Drop IMR lock bit support - Ingo

Bryan O'Donoghue (2):
  x86/intel/imr: Change the kernel's IMR lock bit to false
  x86/intel/imr: Drop IMR lock bit support

 arch/x86/include/asm/imr.h                   |  2 +-
 arch/x86/platform/intel-quark/imr.c          | 26 +++++++-------------------
 arch/x86/platform/intel-quark/imr_selftest.c | 15 +++++++--------
 3 files changed, 15 insertions(+), 28 deletions(-)

-- 
2.5.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ