Re: Curious crash with secure variables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2013-03-18 at 15:16 +0000, Matt Fleming wrote:
> 
> See,
> 
>   commit 53b87cf0 ("x86, mm: Include the entire kernel memory map in trampoline_pgd"),
>   commit 185034e7 ("x86, efi: 1:1 pagetable mapping for virtual EFI calls"),
>   commit da5a108d05b4 ("x86/kernel: remove tboot 1:1 page table creation code") and 
>   commit bd52276fa1d4 ("x86-64/efi: Use EFI to deal with platform wall clock (again)")
> 
>  and the two revert commits from Linus, be354f40 and 11520e5e.

Thanks. That seems like a rather scary approach. I was thinking of just
setting up a dedicated kernel thread for making runtime services calls,
and giving it some "userspace" page tables with a 1:1 mapping. No
messing around with %cr3 directly.

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux