lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACRpkda2T2gxfjmHYqMNk-De7phRzeMFvenH84XJMK7BXbdv0Q@mail.gmail.com>
Date:   Tue, 18 Jul 2023 16:29:23 +0200
From:   Linus Walleij <linus.walleij@...aro.org>
To:     Thomas Gleixner <tglx@...utronix.de>,
        William Breathitt Gray <vilhelm.gray@...il.com>
Cc:     LKML <linux-kernel@...r.kernel.org>, x86@...nel.org,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Andrew Cooper <andrew.cooper3@...rix.com>,
        Tom Lendacky <thomas.lendacky@....com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Wei Liu <wei.liu@...nel.org>,
        Arjan van de Ven <arjan@...ux.intel.com>,
        Juergen Gross <jgross@...e.com>
Subject: Re: [patch 00/58] x86/apic: Decrapification and static calls

On Tue, Jul 18, 2023 at 1:14 AM Thomas Gleixner <tglx@...utronix.de> wrote:

> This builds and boots on 32bit and 64bit, but obviously needs a larger test
> base especially on those old 32bit systems which are just museum pieces.

These things are indeed museum pieces if you think servers, desktops
and laptops. They will at max be glorified terminals.

What we noticed on ARM32 is that it used for:
1. Running 32-bit kernels as guests in virtual machines (I don't know if
  x86 has this problem, sorry I'm ignorant there)
2. Embedded systems with very long support cycles

For x86 there is PC104, I think William Breathitt Gray knows more about
those, scope and usage etc. The typical usecase is industrial embedded
(I've seen quite a few e.g biochemical lab equipment set-ups) which are
running on a "it works don't fix it"-basis but they are network connected
so they may need new kernels for security reasons, or to fix bugs.
https://en.wikipedia.org/wiki/PC/104

These things have lifecycles that easily outspans any server, desktop or
laptop. 30+ years easily. They are just sitting there, making whatever
blood cleaning agent or medical.

I think the automation people have mostly switched over to using
ARM things such as RaspberryXYZ for new plants, but there is some
poor guy with the job of keeping all the PC104 plants running on recent
kernels for the next 20 years or so.

Yours,
Linus Walleij

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ