lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160322111222.GC3688@pd.tnic>
Date:	Tue, 22 Mar 2016 12:12:22 +0100
From:	Borislav Petkov <bp@...en8.de>
To:	Chris Bainbridge <chris.bainbridge@...il.com>
Cc:	linux-edac@...r.kernel.org, linux-kernel@...r.kernel.org,
	mchehab@...radead.org, markus@...ppelsdorf.de, tony.luck@...el.com
Subject: Re: [BUG] packet loss with PROVE_LOCKING, bisected to EDAC fix

On Tue, Mar 22, 2016 at 09:16:56AM +0000, Chris Bainbridge wrote:
> Good question. The patch looks pretty innocuous but it is for a lockdep
> issue and the bug only appears when lockdep config options are enabled.
> Could it somehow have broken a lock used to synchronise packet rx?

How? EDAC and net don't have anything in common...

> Reverting over 4.5 does fix the packet loss issue.

Peter makes sense to me. If he's right, if you build a kernel with
CONFIG_EDAC=n and PROVE_LOCKING=y and do your test again, you should
be seeing that packet loss again... because EDAC with the fix won't be
there to disable lockdep.

-- 
Regards/Gruss,
    Boris.

ECO tip #101: Trim your mails when you reply.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ