lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 6 Jun 2017 13:36:48 +0000
From:   "Ghannam, Yazen" <Yazen.Ghannam@....com>
To:     Borislav Petkov <bp@...en8.de>, Tony Luck <tony.luck@...el.com>
CC:     linux-edac <linux-edac@...r.kernel.org>,
        LKML <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH 0/4] RAS: Merge mce_amd_inj into mce-inject

> -----Original Message-----
> From: Borislav Petkov [mailto:bp@...en8.de]
> Sent: Tuesday, June 06, 2017 5:33 AM
> To: Tony Luck <tony.luck@...el.com>; Ghannam, Yazen
> <Yazen.Ghannam@....com>
> Cc: linux-edac <linux-edac@...r.kernel.org>; LKML <linux-
> kernel@...r.kernel.org>
> Subject: [PATCH 0/4] RAS: Merge mce_amd_inj into mce-inject
> 
> From: Borislav Petkov <bp@...e.de>
> 
> Hi,
> 
> so there's no need to have two different injectors. Also, the mce_amd_inj
> interface is much more user-friendly because you can simply write full u64
> registers directly.
> 
> So merge that functionality into mce-inject. The old /dev/mcelog functionality
> is still there, behind X86_MCELOG_LEGACY.
> 
> Also, the second patch removes register_mce_write_callback() and adds an
> MCE injector notifier which allows us to have mce-inject be a module and thus
> be able to modprobe it and remove it on a production system in case we want
> to do some injecting there.
> 
> Later, we might reuse that injector notifier for other stuff if it is deemed
> interesting.
> 

Built module and tested the mce_amd_inj interface with no problems.

Acked-by: Yazen Ghannam <yazen.ghannam@....com>

Thanks,
Yazen

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ