lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 29 May 2016 19:30:38 +0200 From: Sam Ravnborg <sam@...nborg.org> To: David Miller <davem@...emloft.net> Cc: nix@...eri.org.uk, linux-kernel@...r.kernel.org, sparclinux@...r.kernel.org, fweimer@...hat.com Subject: Re: [4.1.x -- 4.6.x and probably HEAD] Reproducible unprivileged panic/TLB BUG on sparc via a stack-protected rt_sigaction() ka_restorer, courtesy of the glibc testsuite Hi Dave. > Ok, mystery solved. Super good explanation... > > ==================== > >From d645a0376b0010cd60ae5651b3b84a56f5b0e5a4 Mon Sep 17 00:00:00 2001 > From: "David S. Miller" <davem@...emloft.net> > Date: Sat, 28 May 2016 20:41:12 -0700 > Subject: [PATCH 2/2] sparc64: Fix return from trap window fill crashes. > > We must handle data access exception as well as memory address unaligned > exceptions from return from trap window fill faults, not just normal > TLB misses. It would be nice to include the explanation from the mail in the changelog. It gives a good background information and it is more accessible in the commit log rather than mails only. Sam
Powered by blists - more mailing lists