lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 6 Jul 2019 15:41:10 -0700 From: Linus Torvalds <torvalds@...ux-foundation.org> To: Steven Rostedt <rostedt@...dmis.org> Cc: Peter Zijlstra <peterz@...radead.org>, Thomas Gleixner <tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>, Ingo Molnar <mingo@...nel.org>, Andrew Lutomirski <luto@...nel.org>, Peter Anvin <hpa@...or.com>, Dave Hansen <dave.hansen@...ux.intel.com>, Juergen Gross <jgross@...e.com>, Linux List Kernel Mailing <linux-kernel@...r.kernel.org>, He Zhe <zhe.he@...driver.com>, Joel Fernandes <joel@...lfernandes.org>, devel@...ukata.com Subject: Re: [PATCH v2 5/7] x86/mm, tracing: Fix CR2 corruption On Sat, Jul 6, 2019 at 3:27 PM Steven Rostedt <rostedt@...dmis.org> wrote: > > We also have to deal with reading vmalloc'd data as that can fault too. Ahh, that may be a better reason for PeterZ's patches and reading cr2 very early from asm code than the stack trace case. It's why the page fault handler delayed enabling interrupts, after all (which is one big reason NMI was special). Linus
Powered by blists - more mailing lists