lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20170620144407.2wbyxrzmkwsz4mxe@codemonkey.org.uk>
Date:   Tue, 20 Jun 2017 10:44:07 -0400
From:   Dave Jones <davej@...emonkey.org.uk>
To:     Hugh Dickins <hughd@...gle.com>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Oleg Nesterov <oleg@...hat.com>, Michal Hocko <mhocko@...e.com>
Subject: Re: Linux 4.12-rc6

On Tue, Jun 20, 2017 at 02:05:53AM -0700, Hugh Dickins wrote:
 > On Mon, 19 Jun 2017, Dave Jones wrote:
 > > 
 > > I hacked up this harness to try and narrow it down more..
 > > 
 > > #!/bin/bash
 > > 
 > > . scripts/taint.sh
 > > 
 > > while [ 1 ];
 > > do
 > >   ./trinity -a64 -C1 -c mmap -N1 --enable-fds=testfile
 > >   check_tainted
 > > done
 > 
 > Very helpful reproducer, thank you Dave: I tried a couple of times,
 > and it crashed in about 3 minutes each time.  And good news is that
 > the check that Linus suggested does indeed fix it.  I'm anxious to
 > send the patch in now, so have only tested about half an hour on
 > x86_64 and half an hour x86_32 so far, just to make sure that at
 > least there isn't something too embarrassing just around this first
 > corner (some of the time with ulimit -s at default 8192, some of
 > the time unlimited, since that affects layout decisions).  I'll
 > send in the patch now - many thanks for catching this so quickly.

Confirming that the patch seems to be doing the job for me too.
I'll leave it run for the morning, but initial results look good.

thanks,

	Dave

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ