lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <202109222050.18MKoNUh007272@valdese.nms.ulrich-teichert.org>
Date:   Wed, 22 Sep 2021 22:50:23 +0200 (CEST)
From:   Ulrich Teichert <krypton@...ich-teichert.org>
To:     torvalds@...ux-foundation.org (Linus Torvalds)
Cc:     krypton@...ich-teichert.org (Ulrich Teichert),
        mcree@...on.net.nz (Michael Cree),
        linux@...ck-us.net (Guenter Roeck),
        rth@...ddle.net (Richard Henderson),
        ink@...assic.park.msu.ru (Ivan Kokshaysky),
        mattst88@...il.com (Matt Turner),
        James.Bottomley@...senpartnership.com (James E . J . Bottomley),
        deller@....de (Helge Deller),
        davem@...emloft.net (David S . Miller),
        kuba@...nel.org (Jakub Kicinski),
        linux-alpha@...r.kernel.org (alpha),
        geert@...ux-m68k.org (Geert Uytterhoeven),
        linux-kernel@...r.kernel.org (Linux Kernel Mailing List),
        linux-parisc@...r.kernel.org (linux-parisc),
        netdev@...r.kernel.org (Netdev),
        linux-sparse@...r.kernel.org (Sparse Mailing-list)
Subject: Re: [PATCH v2 0/4] Introduce and use absolute_pointer macro

Hi,

> > I would try the SRM bootimage (make bootimage), but the build is broken:
> 
> The attached patch is too ugly for words, and there's no way I will
> commit anything like this.
> 
> But it at least builds for and seems to successfully make an alpha
> bootimage even when cross-compiling on x86-64.
> 
> So something to test, perhaps..

Sure, I burned it to a CDROM and booted from that per SRM. The screen
went black for a second, then the SRM console came back with:

?05 HLT INSTR
PC=00000000.20000014 PSL= 00000000.00000007

I wonder if we would be able to see more on a serial line - I can try
that perhaps tomorrow or at the weekend. To find out to what code the
PC is pointing to, I would need to understand to what point in memory SRM
loads the image into.... But this way, the process of loading the kernel
definitely worked - I still don't understand why aboot can load the
old kernel but not the new one. I'll have a look at the aboot sources,
perhaps there's a certain limit on kernel size?

I'm not sure if we can call this progress,
CU,
Uli
-- 
Dipl. Inf. Ulrich Teichert|e-mail: Ulrich.Teichert@....de | Listening to:
Stormweg 24               |Eat Lipstick: Dirty Little Secret, The Baboon Show:
24539 Neumuenster, Germany|Work Work Work, The Bellrays: Bad Reaction

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ