lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAKwvOdk8R9HS_aJfFPKyuka8TM9jPpnT21TTvQ8ffv_p+RcGUw@mail.gmail.com> Date: Tue, 6 Sep 2022 23:02:50 -0700 From: Nick Desaulniers <ndesaulniers@...gle.com> To: kernel test robot <yujie.liu@...el.com> Cc: lkp@...ts.01.org, 0day robot <lkp@...el.com>, linux-hardening@...r.kernel.org, Kees Cook <keescook@...omium.org>, Nathan Chancellor <nathan@...nel.org>, Tom Rix <trix@...hat.com>, linux-kernel@...r.kernel.org, llvm@...ts.linux.dev, Jiri Kosina <jikos@...nel.org>, Benjamin Tissoires <benjamin.tissoires@...hat.com>, linux-input@...r.kernel.org, Masahiro Yamada <masahiroy@...nel.org> Subject: Re: [fortify] ab66e7d1d8: BUG:kernel_failed_in_early-boot_stage,last_printk:Booting_the_kernel On Tue, Sep 6, 2022 at 10:54 PM kernel test robot <yujie.liu@...el.com> wrote: > > Greeting, > > FYI, we noticed the following commit (built with gcc-11): > > commit: ab66e7d1d8a90f6addac0da9b3ae13d77f095f76 ("[PATCH 2/3] fortify: cosmetic cleanups to __compiletime_strlen") > url: https://github.com/intel-lab-lkp/linux/commits/Nick-Desaulniers/Fix-FORTIFY-y-UBSAN_LOCAL_BOUNDS-y/20220831-045536 > base: https://git.kernel.org/cgit/linux/kernel/git/kees/linux.git for-next/hardening > patch link: https://lore.kernel.org/linux-hardening/20220830205309.312864-3-ndesaulniers@google.com Thanks for the report! Series dropped! Kees sent a v2. -- Thanks, ~Nick Desaulniers
Powered by blists - more mailing lists