lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20091226182519.GA9494@in.ibm.com>
Date:	Sat, 26 Dec 2009 23:55:19 +0530
From:	"K.Prasad" <prasad@...ux.vnet.ibm.com>
To:	LKML <linux-kernel@...r.kernel.org>
Cc:	Ingo Molnar <mingo@...e.hu>,
	Frederic Weisbecker <fweisbec@...il.com>,
	Roland McGrath <roland@...hat.com>,
	Alan Stern <stern@...land.harvard.edu>,
	Ananth N Mavinakayanahalli <ananth@...ibm.com>,
	Pekka Enberg <penberg@...helsinki.fi>,
	Vegard Nossum <vegardno@....uio.no>,
	Oleg Nesterov <oleg@...hat.com>
Subject: [RFC Patch 0/2][Bugfix][x86][hw-breakpoint] Bugfixes for
	hw_breakpoint_handler

Hi All,
	Please find a patchset of two patches that

Patch 1/2: Clears the arch-reserved bits from debug status register. This
helps easy bitwise operations - such as the check for non-trap bits in
hw_breakpoint_handler. A check for the same using
"if (dr6 & (~DR_TRAP_BITS))" throws incorrect results due to the 
presence of preset reserved bits.

This patch is copied to maintainers of code (such as kmemcheck, kprobe,
ptrace, etc) who make use of local dr6 value in do_debug() that verify
and handle exceptions.

Patch 2/2: Return NOTIFY_DONE from hw_breakpoint_handler() for user-space
breakpoints only (and not for kernel-space) since this could lead to
further processing in do_debug() with undesirable consequences.

Let me know if there are any concerns about the patch.

Thanks,
K.Prasad

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ