lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201007195351.776555-1-nivedita@alum.mit.edu>
Date:   Wed,  7 Oct 2020 15:53:46 -0400
From:   Arvind Sankar <nivedita@...m.mit.edu>
To:     x86@...nel.org, Joerg Roedel <jroedel@...e.de>
Cc:     linux-kernel@...r.kernel.org
Subject: [PATCH 0/5] Couple of bugfixes to sev-es series

With the SEV-ES series, the kernel command line is no longer guaranteed
to be mapped on entry into the main kernel. This fixes that, and a
stackprotector issue that cropped up on head64.c.

The first three patches are preparatory cleanups. Patch 4 fixes the
mapping issue and patch 5 disables stack protector for head code.

Arvind Sankar (5):
  x86/boot: Initialize boot_params in startup code
  x86/boot: Move get_cmd_line_ptr() and COMMAND_LINE_SIZE into misc.h
  x86/boot/64: Change add_identity_map() to take size for ease of use
  x86/boot/64: Explicitly map boot_params and command line
  x86/head/64: Disable stack protection for head$(BITS).o

 arch/x86/boot/compressed/cmdline.c      |  8 ------
 arch/x86/boot/compressed/head_32.S      | 11 ++++----
 arch/x86/boot/compressed/head_64.S      | 34 ++++++++-----------------
 arch/x86/boot/compressed/ident_map_64.c | 18 ++++++-------
 arch/x86/boot/compressed/kaslr.c        |  6 -----
 arch/x86/boot/compressed/misc.c         | 10 +-------
 arch/x86/boot/compressed/misc.h         | 13 ++++++++++
 arch/x86/boot/compressed/pgtable_64.c   |  5 +---
 arch/x86/kernel/Makefile                |  2 ++
 9 files changed, 43 insertions(+), 64 deletions(-)

-- 
2.26.2

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ