lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu,  8 Oct 2020 15:16:18 -0400
From:   Arvind Sankar <nivedita@...m.mit.edu>
To:     x86@...nel.org, Joerg Roedel <jroedel@...e.de>,
        Borislav Petkov <bp@...en8.de>
Cc:     linux-kernel@...r.kernel.org
Subject: [PATCH v2 0/5] Couple of bugfixes to sev-es series

With the SEV-ES series, the kernel command line is no longer guaranteed
to be mapped on entry into the main kernel. This fixes that, and a
stackprotector issue that cropped up on head64.c.

The first three patches are preparatory cleanups. Patch 4 fixes the
mapping issue and patch 5 disables stack protector for head code.

Changes from v1:
- Add comments suggested by Joerg
- Split out cmdline into cmdline.h and use it
- Leave add_identity_map() as [start,end)

v1: https://lore.kernel.org/lkml/20201007195351.776555-1-nivedita@alum.mit.edu/

Arvind Sankar (5):
  x86/boot: Initialize boot_params in startup code
  x86/boot: Split out command-line related declarations
  x86/boot/64: Show original faulting address in case of error
  x86/boot/64: Explicitly map boot_params and command line
  x86/head/64: Disable stack protection for head$(BITS).o

 arch/x86/boot/compressed/acpi.c               |  1 +
 arch/x86/boot/compressed/cmdline.c            |  1 +
 arch/x86/boot/compressed/cmdline.h            | 13 +++++++
 .../boot/compressed/early_serial_console.c    |  1 +
 arch/x86/boot/compressed/head_32.S            | 12 ++++---
 arch/x86/boot/compressed/head_64.S            | 35 +++++++------------
 arch/x86/boot/compressed/ident_map_64.c       | 22 +++++++++---
 arch/x86/boot/compressed/kaslr.c              |  7 +---
 arch/x86/boot/compressed/misc.c               | 10 +-----
 arch/x86/boot/compressed/misc.h               |  4 ---
 arch/x86/boot/compressed/pgtable_64.c         |  7 ++--
 arch/x86/kernel/Makefile                      |  2 ++
 12 files changed, 58 insertions(+), 57 deletions(-)
 create mode 100644 arch/x86/boot/compressed/cmdline.h

-- 
2.26.2

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ