lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <174483177857.740549.4788353430727368438.b4-ty@kernel.org>
Date: Wed, 16 Apr 2025 12:29:48 -0700
From: Kees Cook <kees@...nel.org>
To: "Gustavo A. R. Silva" <gustavoars@...nel.org>,
	Thomas Weißschuh <thomas.weissschuh@...utronix.de>
Cc: Kees Cook <kees@...nel.org>,
	linux-hardening@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	David Gow <davidgow@...gle.com>,
	"David S. Miller" <davem@...emloft.net>,
	Andreas Larsson <andreas@...sler.com>,
	sparclinux@...r.kernel.org
Subject: Re: [PATCH] kunit/usercopy: Disable u64 test on 32-bit SPARC

On Wed, 16 Apr 2025 14:44:19 +0200, Thomas Weißschuh wrote:
> usercopy of 64 bit values does not work on 32-bit SPARC:
> 
>     # usercopy_test_valid: EXPECTATION FAILED at lib/tests/usercopy_kunit.c:209
>     Expected val_u64 == 0x5a5b5c5d6a6b6c6d, but
>         val_u64 == 1515936861 (0x5a5b5c5d)
>         0x5a5b5c5d6a6b6c6d == 6510899242581322861 (0x5a5b5c5d6a6b6c6d)
> 
> [...]

Applied to for-next/hardening, thanks!

[1/1] kunit/usercopy: Disable u64 test on 32-bit SPARC
      https://git.kernel.org/kees/c/b2044b94a6a9

Take care,

-- 
Kees Cook


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ