lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c97451ad-b8de-76cc-0849-47f9b3b32693@gmail.com>
Date:   Tue, 24 Nov 2020 21:41:00 +0300
From:   Dmitry Osipenko <digetx@...il.com>
To:     Gabriel Krisman Bertazi <krisman@...labora.com>
Cc:     tglx@...utronix.de, hch@...radead.org, mingo@...hat.com,
        keescook@...omium.org, arnd@...db.de, luto@...capital.net,
        wad@...omium.org, rostedt@...dmis.org, paul@...l-moore.com,
        eparis@...hat.com, oleg@...hat.com, linux-arch@...r.kernel.org,
        linux-kernel@...r.kernel.org, x86@...nel.org, kernel@...labora.com,
        "linux-arm-kernel@...ts.infradead.org" 
        <linux-arm-kernel@...ts.infradead.org>,
        Russell King - ARM Linux <linux@...linux.org.uk>
Subject: Re: [PATCH v2 04/10] seccomp: Migrate to use SYSCALL_WORK flag

24.11.2020 20:55, Gabriel Krisman Bertazi пишет:
> Dmitry Osipenko <digetx@...il.com> writes:
> 
>> Hi,
>>
>> This patch broke seccomp on arm32 using linux-next, chromium browser
>> doesn't work anymore and there are these errors in KMSG:
>>
>> Unhandled prefetch abort: breakpoint debug exception (0x002) at ...
>>
>> Note that arm doesn't use CONFIG_GENERIC_ENTRY. Please fix, thanks in
>> advance.
> 
> Hi Dmitry,
> 
> I believe this is the same problem reported yesterday on this thread
> 
>   https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2390444.html
> 
> can you please try the patch I shared on that thread?
> 
>   https://lore.kernel.org/patchwork/patch/1344098/

It works, thank you.

Tested-by: Dmitry Osipenko <digetx@...il.com>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ