lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <937de9e7174f444bb4adae075213c92e@huawei.com>
Date:   Thu, 9 Jul 2020 11:59:57 +0000
From:   Salil Mehta <salil.mehta@...wei.com>
To:     yuzenghui <yuzenghui@...wei.com>
CC:     Marc Zyngier <maz@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        "linux-arm-kernel@...ts.infradead.org" 
        <linux-arm-kernel@...ts.infradead.org>,
        "Zhuangyuzeng (Yisen)" <yisen.zhuang@...wei.com>,
        "Wanghaibin (D)" <wanghaibin.wang@...wei.com>
Subject: RE: [REPORT] possible circular locking dependency when booting a VM
 on arm64 host

> From: yuzenghui
> Sent: Thursday, July 9, 2020 12:50 PM
> To: Salil Mehta <salil.mehta@...wei.com>
> Cc: Marc Zyngier <maz@...nel.org>; Thomas Gleixner <tglx@...utronix.de>; Linux
> Kernel Mailing List <linux-kernel@...r.kernel.org>;
> linux-arm-kernel@...ts.infradead.org; Zhuangyuzeng (Yisen)
> <yisen.zhuang@...wei.com>; Wanghaibin (D) <wanghaibin.wang@...wei.com>
> Subject: Re: [REPORT] possible circular locking dependency when booting a VM
> on arm64 host
> 
> On 2020/7/9 18:54, Salil Mehta wrote:
> > Hi Yuzenghui,
> > I will try to reproduce it today at our platform. Just one question is it easily
> > reproducible or is a rare occurrence?
> 
> Salil, it's 100% reproducible once you start a guest. You don't even
> need to assign hostdev to the VM.

Thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ