|
|
Message-Id: <159475635407.4337.14038873676675267041.b4-ty@arm.com>
Date: Tue, 14 Jul 2020 20:52:41 +0100
From: Catalin Marinas <catalin.marinas@....com>
To: Ard Biesheuvel <ardb@...nel.org>,
linux-arm-kernel@...ts.infradead.org
Cc: Will Deacon <will@...nel.org>,
sudeep.holla@....com,
kernel-hardening@...ts.openwall.com,
linux-acpi@...r.kernel.org,
lorenzo.pieralisi@....com
Subject: Re: [PATCH v3 0/2] arm64/acpi: restrict AML opregion memory access
On Fri, 26 Jun 2020 17:58:30 +0200, Ard Biesheuvel wrote:
> v2:
> - do a more elaborate check on the region, against the EFI memory map
>
> v3:
> - split into two patches
> - fallback to __ioremap() for ACPI reclaim memory, in case it is not covered
> by the linear mapping (e.g., when booting a kdump kernel)
>
> [...]
Applied to arm64 (for-next/acpi), thanks!
[1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
https://git.kernel.org/arm64/c/1583052d111f
[2/2] arm64/acpi: disallow writeable AML opregion mapping for EFI code regions
https://git.kernel.org/arm64/c/325f5585ec36
--
Catalin
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.