As part of Codethink’s interest in RISC-V I have been following the RISC-V kernel list. Whilst looking through the postings the following bug (more information here) came up, titled:

[syzbot] BUG: unable to handle kernel access to user memory in schedule_tail

It contained a kernel Oops (see below) that looked interesting, so I decided to look at the bug and check out the kernel source and config file supplied in the bug. The bug was intriguing because there is a lot of interest in RISC-V, and I had previously worked on checking the Linux kernel’s user access protection.

Read the full article.

Stay Connected With RISC-V

We send occasional news about RISC-V technical progress, news, and events.