lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <126822f3-6f11-d02d-43f8-1b5e6bcc910a@gmail.com>
Date: Tue, 18 Nov 2025 06:41:08 +1300
From: Michael Schmitz <schmitzmic@...il.com>
To: Daniel Palmer <daniel@...ngy.jp>, Greg Ungerer <gerg@...nel.org>
Cc: geert@...ux-m68k.org, linux-m68k@...ts.linux-m68k.org,
 linux-kernel@...r.kernel.org
Subject: Re: [PATCH] m68k: Implement kernel memory protection

Daniel,

take a look at arch/m68k/kernel/head.S - 030 MMU setup uses early 
termination descriptors for kernel memory, _not_ regular page tables.

Cheers,

	Michael


Am 17.11.2025 um 22:42 schrieb Daniel Palmer:
> Hi Greg,
>
> On Mon, 17 Nov 2025 at 12:04, Greg Ungerer <gerg@...nel.org> wrote:
>> Seems to work fine on real ColdFire hardware (tested on an M5475 -
>> that is one that has an MMU):
>
> Thanks for testing. I just tried on my MVME147 (030) and the marking
> RO seems to work but it locks up starting init:
>
> [    6.520000] devtmpfs: mounted
> [    6.540000] Freeing unused kernel image (initmem) memory: 120K
> [    6.550000] Write protecting kernel text: 0x2000 - 0x3676f0
> [    6.560000] Write protecting kernel read-only data: 0x36a000 - 0x3be000
> [    6.580000] rodata_test: all tests were successful
> [    6.590000] Run /sbin/init as init process
> <dead>
>
> My 060 Amiga 4000 seems ok. So I guess some 030 mmu issue. I'll debug
> and send again..
>
> Thanks!
>
> Daniel
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ