lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 10 Nov 2015 19:11:12 -0800 From: Z Lim <zlim.lnx@...il.com> To: "Shi, Yang" <yang.shi@...aro.org> Cc: Alexei Starovoitov <alexei.starovoitov@...il.com>, Catalin Marinas <catalin.marinas@....com>, Will Deacon <will.deacon@....com>, Alexei Starovoitov <ast@...nel.org>, daniel@...earbox.net, Xi Wang <xi.wang@...il.com>, LKML <linux-kernel@...r.kernel.org>, Network Development <netdev@...r.kernel.org>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, linaro-kernel@...ts.linaro.org Subject: Re: [PATCH] arm64: bpf: fix JIT stack setup On Tue, Nov 10, 2015 at 11:46 AM, Shi, Yang <yang.shi@...aro.org> wrote: > On 11/9/2015 12:00 PM, Z Lim wrote: >> >> How about splitting this into two patches? One for the BPF-related >> bug, and another for A64 FP-handling. > > I'm not sure if this is a good approach or not. IMHO, they are kind of > atomic. Without A64 FP-handling, that fix looks incomplete and introduces > another problem (stack backtrace). > The first, even on its own, doesn't make things worse, only better. The second, which we agree needs to be fixed also, addresses a different issue. Either way, please also note that these patches fix the original implementation. We do want -stable to pick these up. Suggestions for the diagram: - As an enhancement, would you mind showing the A64_FP also? - Please revisit "+64:" -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists