Philipp Kohlbecher wrote: > > I don't know of any problems this causes. The kernel needs to be aware > of the fact that the xss and esp fields of the pt_regs struct may > contain wrong values anyway, as hardware interrupts arriving while the > CPU is in kernel mode would also lead to this condition. > The file include/asm-i386/processor.h contains a comment to that effect > (lines 483-492). > With kernel_execve we can predict this, however, and account for it. > (This may be superfluous, but I don't think it hurts and it might > prevent future errors.) >
... and it may *cause* future errors by making it harder to find bugs, too. In other words, your patch doesn't actually fix anything, it *masks* potential bugs which would also be triggered by interrupts in kernel mode. This is bad. You realize you just make a distinction between synchronous and asynchronous events, such that your patch means that only asynchronous events would catch the bugs you mask. This makes bug hunting much harder. If anything it would be better to poison those fields so that we can smoke out anything that trusts them. -hpa - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/