lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200802272059.40567.tomasz@grobelny.oswiecenia.net>
Date:	Wed, 27 Feb 2008 20:59:40 +0100
From:	Tomasz Grobelny <tomasz@...belny.oswiecenia.net>
To:	Roland McGrath <roland@...hat.com>
Cc:	Ingo Molnar <mingo@...e.hu>, Thomas Gleixner <tglx@...utronix.de>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] x86 tls prevent_tail_call

Dnia Wednesday 27 of February 2008, Roland McGrath napisaƂ:
> > i'm wondering, have you seen this happen in practice? We use
> > sys_set_thread_area() for every new task started up. I guess we havent
> > seen problems in the field yet because this early during startup tasks
> > do not normally receive signals? (or if they do they are fatal and no
> > user signal context is used.)
>
> Tomasz saw it.  I don't know what compiler or exact options to it he used.
>
VMware image from http://student.agh.edu.pl/~grobelny/linux/BUG.tar 
demonstrates the problem. I didn't play with compiler options myself but used
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/SPECS/kernel-vanilla.spec (rev. 
1.129) as basis for my build.
-- 
Regards,
Tomasz Grobelny
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ