lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <158801696068.26039.9162549222309574579@beryllium>
Date:   Mon, 27 Apr 2020 19:49:20 -0000
From:   Daniel Wagner <dwagner@...e.de>
To:     LKML <linux-kernel@...r.kernel.org>,
        linux-rt-users <linux-rt-users@...r.kernel.org>,
        Steven Rostedt <rostedt@...dmis.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Carsten Emde <C.Emde@...dl.org>,
        John Kacur <jkacur@...hat.com>,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>,
        Tom Zanussi <tom.zanussi@...ux.intel.com>,
        Clark Williams <williams@...hat.com>,
        Pavel Machek <pavel@...x.de>
Subject: [ANNOUNCE] 4.4.220-rt196

Hello RT-list!

I'm pleased to announce the 4.4.220-rt196 stable release.

This release is just an update to the new stable 4.4.215 version
and no RT specific changes have been made.

Known issues:

  I've updated my test setup and during all rt-tests there is now a
  background workload running. sigwaittest with hackbench as workload is
  able to trigger a crash on x86_64 but not on ARMv7. It's not clear if
  this existed for a longer period already or if it's new.

  [   41.148863] BUG: unable to handle kernel paging request at 00000000ffffffff
  [   41.148871] IP: [<ffffffff8118fce3>] kmem_cache_alloc_node+0xc3/0x1e0
  [   41.148873] PGD 0 
  [   41.148874] Oops: 0000 [#1] PREEMPT SMP 
  [   41.148877] Modules linked in:
  [   41.148879] CPU: 1 PID: 4394 Comm: hackbench Not tainted 4.4.220-rt195+ #9
  [   41.148880] Hardware name: wortmann G31M-ES2L/G31M-S2L, BIOS F10 09/29/2009
  [   41.148881] task: ffff8800ca89a7c0 ti: ffff8800cb39c000 task.ti: ffff8800cb39c000
  [   41.148884] RIP: 0010:[<ffffffff8118fce3>]  [<ffffffff8118fce3>] kmem_cache_alloc_node+0xc3/0x1e0
  [   41.148885] RSP: 0018:ffff8800cb39fbd8  EFLAGS: 00010246
  [   41.148886] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000005021c81
  [   41.148886] RDX: 0000000005021c41 RSI: 0000000005021c41 RDI: 00000000000186e0
  [   41.148887] RBP: ffff8800cb39fc18 R08: ffffffff8172abcb R09: 0000000000000003
  [   41.148888] R10: 0000000000000000 R11: 0000000000000246 R12: ffff88012b001700
  [   41.148888] R13: 00000000ffffffff R14: 00000000ffffffff R15: 00000000024004c0
  [   41.148889] FS:  00007fe50befd740(0000) GS:ffff88012fc80000(0000) knlGS:0000000000000000
  [   41.148890] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [   41.148891] CR2: 00000000ffffffff CR3: 00000000c8562000 CR4: 0000000000040670
  [   41.148891] Stack:
  [   41.148893]  ffffea0003137ec0 ffffea00031b62c0 ffffffff8172abcb 0000000000000001
  [   41.148895]  ffff8800cb39fd00 ffff88012b001700 0000000000000000 00000000024004c0
  [   41.148896]  ffff8800cb39fc60 ffffffff8172abcb ffffffff024200ca ffff8800cb3a0000
  [   41.148897] Call Trace:
  [   41.148901]  [<ffffffff8172abcb>] ? __alloc_skb+0x4b/0x1c0
  [   41.148903]  [<ffffffff8172abcb>] __alloc_skb+0x4b/0x1c0
  [   41.148904]  [<ffffffff8172ad9e>] alloc_skb_with_frags+0x5e/0x1d0
  [   41.148906]  [<ffffffff8172682d>] sock_alloc_send_pskb+0x1bd/0x1e0
  [   41.148909]  [<ffffffff81805a84>] unix_stream_sendmsg+0x244/0x390
  [   41.148912]  [<ffffffff81722530>] sock_sendmsg+0x40/0x50
  [   41.148914]  [<ffffffff817225bf>] sock_write_iter+0x7f/0xd0
  [   41.148917]  [<ffffffff81199eb8>] __vfs_write+0xb8/0xf0
  [   41.148918]  [<ffffffff8119a98a>] vfs_write+0xba/0x1d0
  [   41.148920]  [<ffffffff8119b61f>] SyS_write+0x4f/0xd0
  [   41.148923]  [<ffffffff8192f1ca>] entry_SYSCALL_64_fastpath+0x1e/0x93
  [   41.148939] Code: 00 00 74 51 48 85 c0 0f 84 2c 01 00 00 49 63 54 24 1c 31 f6 4c 89 ef e8 9c c7 1e 00 eb 37 49 63 44 24 20 49 8b 3c 24 48 8d 4a 40 <49> 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 64 
  [   41.148940] RIP  [<ffffffff8118fce3>] kmem_cache_alloc_node+0xc3/0x1e0
  [   41.148941]  RSP <ffff8800cb39fbd8>
  [   41.148941] CR2: 00000000ffffffff
  [   41.384003] ---[ end trace 0000000000000002 ]---


You can get this release via the git tree at:

  git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git

  branch: v4.4-rt
  Head SHA1: 2a1573bd8805c11aa1cce2998bc55396633e596b

Or to build 4.4.220-rt196 directly, the following patches should be applied:

  https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz

  https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.220.xz

  https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.220-rt196.patch.xz


You can also build from 4.4.215-rt192 by applying the incremental patch:

  https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/incr/patch-4.4.215-rt192-rt196.patch.xz

Enjoy!
Daniel

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ