lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 12 Dec 2022 11:15:24 -0800
From:   Dave Hansen <dave.hansen@...ux.intel.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, x86@...nel.org
Subject: [GIT PULL] x86/splitlock for 6.2

Hi Linus,

Please pull some x86/splitlock changes for v6.2.

This includes a single change which enables users to reduce the
penalty inflicted on split lock users.  There are some
proprietary, binary-only games which because entirely unplayable
with the old penalty.

Anyone opting into the new mode is, of course, more exposed to
the DoS nasitness inherent with split locks, but they can play
their games again.

--

The following changes since commit f0c4d9fc9cc9462659728d168387191387e903cc:

  Linux 6.1-rc4 (2022-11-06 15:07:11 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_splitlock_for_6.2

for you to fetch changes up to 727209376f4998bc84db1d5d8af15afea846a92b:

  x86/split_lock: Add sysctl to control the misery mode (2022-11-10 10:14:22 -0800)

----------------------------------------------------------------
Add a sysctl to control the split lock misery mode

----------------------------------------------------------------
Guilherme G. Piccoli (1):
      x86/split_lock: Add sysctl to control the misery mode

 Documentation/admin-guide/sysctl/kernel.rst | 23 +++++++++++
 arch/x86/kernel/cpu/intel.c                 | 63 ++++++++++++++++++++++++-----
 2 files changed, 76 insertions(+), 10 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ