Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAMj1kXHaOh=GH3cyAwJEWBQ6OOQboTt5Sc3vBvOaZQ9ugcHPgg@mail.gmail.com>
Date: Fri, 3 Jul 2020 20:29:32 +0200
From: Ard Biesheuvel <ardb@...nel.org>
To: Will Deacon <will@...nel.org>
Cc: Lorenzo Pieralisi <lorenzo.pieralisi@....com>, 
	Linux ARM <linux-arm-kernel@...ts.infradead.org>, 
	ACPI Devel Maling List <linux-acpi@...r.kernel.org>, Catalin Marinas <catalin.marinas@....com>, 
	Sudeep Holla <sudeep.holla@....com>, 
	Kernel Hardening <kernel-hardening@...ts.openwall.com>, 
	"Jason A . Donenfeld" <Jason@...c4.com>
Subject: Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to
 access kernel memory

On Fri, 3 Jul 2020 at 18:16, Will Deacon <will@...nel.org> wrote:
>
> On Fri, Jul 03, 2020 at 05:14:29PM +0100, Will Deacon wrote:
> > Is this 5.9 material, or do you want it to go in as a fix?
>
> Sorry, just spotted the v3, but the same question applies there!
>

This needs a bit more test coverage than we have been able to provide
so far, especially regarding kexec/kdump etc. So even though I think
this ultimately belongs in -stable, that does not necessarily mean it
should go into the next -rc right away.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.