lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160617205719.GB285943@stormcage.americas.sgi.com>
Date:	Fri, 17 Jun 2016 15:57:19 -0500
From:	Joseph Thelen <jthelen@....com>
To:	Matt Fleming <matt@...eblueprint.co.uk>
Cc:	linux-kernel@...r.kernel.org, Alex Thorlton <athorlton@....com>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>, x86@...nel.org,
	linux-efi@...r.kernel.org, Linn Crosetto <linn@....com>,
	Peter Jones <pjones@...hat.com>,
	Matthew Garrett <mjg59@...f.ucam.org>,
	Joseph Thelen <jthelen@....com>
Subject: Re: [PATCH] x86/efi: Auto enable EFI memmap on SGI UV systems

On Tue, Jun 14, 2016 at 05:34:49PM -0500, Joseph Thelen wrote:
> We're still reasonably confident we'll need something like this. Although,
> after looking into the stuff you mention, it seems that it should perhaps
> be a bit more sophisticated than just checking if we're on a UV system.
> 
> We'll get back to you after digging into this a bit more and coming
> up with some more specific reasons for the change.
> 
> Thanks,
> 
> Joseph Thelen
>

After investigating a bit more, it seems that this is really only
an issue where people are using older bootloaders/managers and kernels, some
of which are still supported / used by big distros like redhat.

Given that this is, as you've pointed out, either a non-issue or easily
remedied without kernel changes now and in the future, we'll try
talking about it directly with any distro where it's still an issue.

Thanks,

Joseph Thelen

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ