lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 29 Nov 2017 13:03:46 -0800
To:     Andi Kleen <>,
        "Kirill A. Shutemov" <>
CC:     Thomas Gleixner <>, Borislav Petkov <>,
        "Kirill A. Shutemov" <>,
        Ingo Molnar <>,,
        Linus Torvalds <>,
        Andy Lutomirski <>,
        Cyrill Gorcunov <>,,
Subject: Re: [PATCHv2 0/4] x86: 5-level related changes into decompression code

On November 29, 2017 12:58:15 PM PST, Andi Kleen <> wrote:
>> We're really early in the boot -- startup_64 in decompression code --
>> I don't know a way print a message there. Is there a way?
>> no_longmode handled by just hanging the machine. Is it enough for
>> case too?
>The way to handle it is to check it early in the real mode boot code
>when you 
>can still print messages. That is how missing long mode is handled.

Yes, and that test should be done automatically.  However, we also check at several later points in case that code is bypassed by the bootloader.
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Powered by blists - more mailing lists