Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754603AbcKUWZi (ORCPT ); Mon, 21 Nov 2016 17:25:38 -0500 Received: from mail-oi0-f67.google.com ([209.85.218.67]:32862 "EHLO mail-oi0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753271AbcKUWZg (ORCPT ); Mon, 21 Nov 2016 17:25:36 -0500 MIME-Version: 1.0 In-Reply-To: References: <20161121071342.GA16999@gmail.com> <5bc7c7b2-875e-6366-9244-7dc6e2fae5c1@zytor.com> From: Linus Torvalds Date: Mon, 21 Nov 2016 14:25:34 -0800 X-Google-Sender-Auth: bxN8FpBeoH29XHSKJFaQhkrNzD8 Message-ID: Subject: Re: What exactly do 32-bit x86 exceptions push on the stack in the CS slot? To: Peter Anvin Cc: Ingo Molnar , Andy Lutomirski , Brian Gerst , Andy Lutomirski , tedheadster@gmail.com, George Spelvin , "linux-kernel@vger.kernel.org" , X86 ML Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 354 Lines: 9 On Mon, Nov 21, 2016 at 2:17 PM, wrote: > > Now, segment loads have always ignored the top 32 bits; it's an issue when examined by other kinds of code. Yes. Particularly ptrace and signal information copying. Need to make sure those things don't look at (or expose) high bits that may be stale stack contents etc. Linus