lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <159108266692.10828.13848245676748143171@beryllium>
Date:   Tue, 02 Jun 2020 07:24:26 -0000
From:   Daniel Wagner <dwagner@...e.de>
To:     LKML <linux-kernel@...r.kernel.org>,
        linux-rt-users <linux-rt-users@...r.kernel.org>,
        Steven Rostedt <rostedt@...dmis.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Carsten Emde <C.Emde@...dl.org>,
        John Kacur <jkacur@...hat.com>,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>,
        Tom Zanussi <tom.zanussi@...ux.intel.com>,
        Clark Williams <williams@...hat.com>,
        Pavel Machek <pavel@...x.de>
Subject: [ANNOUNCE] 4.4.225-rt198

Hello RT-list!

I'm pleased to announce the 4.4.225-rt198 stable release.

This release is just an update to the new stable 4.4.215 version
and no RT specific changes have been made.

Known issues:

  sigwaittest with hackbench as workload is able to trigger a crash on x86_64,
  the same as reported for the v4.4.220-rt196 release.

  BUG: unable to handle kernel paging request at 00000000ffffffff
  IP: [<ffffffff81190003>] kmem_cache_alloc_node+0xc3/0x1e0
  PGD 0 
  Oops: 0000 [#1] PREEMPT SMP 
  Modules linked in:
  CPU: 0 PID: 5215 Comm: hackbench Not tainted 4.4.225-rt197+ #6
  Hardware name: wortmann G31M-ES2L/G31M-S2L, BIOS F10 09/29/2009
  task: ffff8800c2fb4f80 ti: ffff8800c2a04000 task.ti: ffff8800c2a04000
  RIP: 0010:[<ffffffff81190003>]  [<ffffffff81190003>] kmem_cache_alloc_node+0xc3/0x1e0
  RSP: 0018:ffff8800c2a07bd8  EFLAGS: 00010246
  RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000006551900
  RDX: 00000000065518c0 RSI: 00000000065518c0 RDI: 00000000000186e0
  RBP: ffff8800c2a07c18 R08: ffffffff8172b71b R09: 0000000000000003
  R10: 0000000000000000 R11: 0000000000000246 R12: ffff88012b001700
  R13: 00000000ffffffff R14: 00000000ffffffff R15: 00000000024004c0
  FS:  00007f94bc703740(0000) GS:ffff88012fc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000ffffffff CR3: 00000000c2f90000 CR4: 0000000000040670
  Stack:
   ffffea0004a24a80 ffffea000323f940 ffffffff8172b71b 0000000000000001
   ffff8800c2a07d00 ffff88012b001700 0000000000000000 00000000024004c0
   ffff8800c2a07c60 ffffffff8172b71b ffffffff024200ca ffff8800c2a08000
  Call Trace:
   [<ffffffff8172b71b>] ? __alloc_skb+0x4b/0x1c0
   [<ffffffff8172b71b>] __alloc_skb+0x4b/0x1c0
   [<ffffffff8172b8ee>] alloc_skb_with_frags+0x5e/0x1d0
   [<ffffffff8172738d>] sock_alloc_send_pskb+0x1bd/0x1e0
   [<ffffffff81806804>] unix_stream_sendmsg+0x244/0x390
   [<ffffffff81723090>] sock_sendmsg+0x40/0x50
   [<ffffffff8172311f>] sock_write_iter+0x7f/0xd0
   [<ffffffff8119a1d8>] __vfs_write+0xb8/0xf0
   [<ffffffff8119acaa>] vfs_write+0xba/0x1d0
   [<ffffffff8119b93f>] SyS_write+0x4f/0xd0
   [<ffffffff8193024a>] entry_SYSCALL_64_fastpath+0x1e/0x93
  Code: 00 00 74 51 48 85 c0 0f 84 2c 01 00 00 49 63 54 24 1c 31 f6 4c 89 ef e8 cc d0 1e 00 eb 37 49 63 44 24 20 49 8b 3c 24 48 8d 4a 40 <49> 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 64 


You can get this release via the git tree at:
  
    git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git
  
    branch: v4.4-rt
    Head SHA1: fa195796a1c5385a6e6b41c343b861067770f9c7
  
  Or to build 4.4.225-rt198 directly, the following patches should be applied:
  
    https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz
  
    https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.225.xz
  
    https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.225-rt198.patch.xz
  
  
  You can also build from 4.4.220-rt197 by applying the incremental patch:
  
    https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/incr/patch-4.4.220-rt197-rt198.patch.xz
  
  Enjoy!
  Daniel
  

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ