lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <B7F28152-6756-4530-B884-79AF36B4244E@gmail.com>
Date:	Sat, 15 Mar 2008 20:20:50 +0100
From:	David Martin <taldmd@...il.com>
To:	linux-kernel@...r.kernel.org
Subject: Re: x86: not showing f00f bug correctly in /proc/cpuinfo

Hi,

This also could be interesting:

Executing a test program taken from

http://lwn.net/2001/0329/a/ltp-f00f.php3

  $ ./f00f.o
Testing for proper f00f instruction handling.
Segmentation fault
  $ dmesg
......
BUG: unable to handle kernel paging request at virtual address ffffb030
printing eip: 08049678 *pde = 00296067 *pte = 00271061
Oops: 0003 [#1]

Pid: 1838, comm: f00f.o Not tainted (2.6.24 #5)
EIP: 0073:[<08049678>] EFLAGS: 00010246 CPU: 0
EAX: 08049678 EBX: b7f36ff4 ECX: 0000002e EDX: b7f380d0
ESI: 00000000 EDI: 08048350 EBP: bfbcf608 ESP: bfbcf5dc
  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
Process f00f.o (pid: 1838, ti=c46b0000 task=c12299a0 task.ti=c46b0000)
EIP: [<08049678>]  SS:ESP 007b:bfbcf5dc
---[ end trace 52e28d53c342d03a ]---
....

Is that patch working correctly?

Cheers,

David.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ