lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 18 Oct 2014 13:59:07 -0400 (EDT) From: David Miller <davem@...emloft.net> To: mroos@...ux.ee Cc: iamjoonsoo.kim@....com, linux-kernel@...r.kernel.org, cl@...ux.com, penberg@...nel.org, rientjes@...gle.com, akpm@...ux-foundation.org, linux-mm@...ck.org, sparclinux@...r.kernel.org Subject: Re: unaligned accesses in SLAB etc. From: Meelis Roos <mroos@...ux.ee> Date: Fri, 17 Oct 2014 14:12:09 +0300 (EEST) > However, on top of mainline HEAD 3.17.0-09670-g0429fbc it explodes with > scheduler BUG - just reported to LKML + sched maintainers. task_stack_end_corrupted() cannot work properly on sparc64. It stores the magic value at "task_thread_info(p) + 1", but on sparc64 that's where we store the nested array of FPU register saves. In fact this facility could be corrupting FPU register state in certain circumstances. The current sparc64 design is intentional, the CPU stack grows down toward the thread_info, and the FPU stack saving area grows up from the end of thread_info. I don't want to define the array size of the fpregs save area explicitly and thereby placing an artificial limit there. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists