lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAK2bqVLitGjXfrfT7WseTgawi_uDozpVj4JddgdAwfLkG7gv6w@mail.gmail.com> Date: Tue, 26 Dec 2017 09:54:04 +0000 From: Chris Rankin <rankincj@...il.com> To: linux-kernel@...r.kernel.org, stable@...r.kernel.org Subject: Re: BUG warnings in 4.14.9 Hi, Reverting this patch seems to have fixed things. Thanks, Chris On 26 December 2017 at 06:21, Willy Tarreau <w@....eu> wrote: > Hi Chris, > > On Tue, Dec 26, 2017 at 01:49:59AM +0000, Chris Rankin wrote: > (...) >> [ 35.100181] Call Trace: >> [ 35.102709] dump_stack+0x46/0x59 >> [ 35.106095] check_preemption_disabled+0xca/0xda >> [ 35.110786] ip6_pol_route+0x46b/0x509 [ipv6] > (...) > > One patch touched this area between 4.14.8 and 4.14.9, you may try > to revert it to see if it fixes the issue : > > 9704f81 ("ipv6: grab rt->rt6i_ref before allocating pcpu rt") > > Willy
Powered by blists - more mailing lists