lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1504149176.23109.9.camel@gmx.de> Date: Thu, 31 Aug 2017 05:12:56 +0200 From: Mike Galbraith <efault@....de> To: Kees Cook <keescook@...omium.org> Cc: LKML <linux-kernel@...r.kernel.org>, Ingo Molnar <mingo@...e.hu>, "Reshetova, Elena" <elena.reshetova@...el.com> Subject: Re: tip -ENOBOOT - bisected to locking/refcounts, x86/asm: Implement fast refcount overflow protection On Wed, 2017-08-30 at 19:27 -0700, Kees Cook wrote: > Interesting! Can you try with 633547973ffc3 ("net: convert > sk_buff.users from atomic_t to refcount_t") reverted? I'll see if > running haveged will help me trigger this on my system... With that (plus 230cd1279d001 fix to it) reverted, vbox boots. -Mike
Powered by blists - more mailing lists