lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a5950b61a63677c789bc91d44357ff8226d3ef77.camel@physik.fu-berlin.de>
Date: Tue, 20 Jan 2026 08:57:16 +0100
From: John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
To: Ludwig Rydberg <ludwig.rydberg@...sler.com>, 
	kernel@...rcher.dialup.fu-berlin.de
Cc: sparclinux@...r.kernel.org, linux-kselftest@...r.kernel.org, 
	linux-kernel@...r.kernel.org, arnd@...db.de, geert@...ux-m68k.org, 
	schuster.simon@...mens-energy.com, davem@...emloft.net,
 andreas@...sler.com, 	brauner@...nel.org, shuah@...nel.org
Subject: Re: [PATCH 1/3] sparc: Synchronize user stack on fork and clone

Hi Ludwig,

On Mon, 2026-01-19 at 14:05 +0100, Ludwig Rydberg wrote:
> > > 
> > > I can therefore confirm that this patch fixes the bug.
> > > 
> > > Tested-by: John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
> > 
> 
> Thank you for testing the patches. Appreciate it!
> 
> The test program from Michael was of great help when
> I analyzed the root cause. Thanks for sharing it on the list.

Credits go to Michael for digging the problem up during our last FOSDEM trip ;-).

> I'll send a new version of the series (this patch will however
> remain unchanged, so I'll pick up your test tag).
> If you have the possibility to re-run the clone3-tests on it
> would be great. Thanks!

Absolutely. Will report back later today!

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ