lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YwCGoRt6ifOC6mCD@kroah.com>
Date:   Sat, 20 Aug 2022 09:00:49 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     RAJESH DASARI <raajeshdasari@...il.com>
Cc:     Jean-Philippe Brucker <jean-philippe@...aro.org>,
        stable@...r.kernel.org, linux-kernel@...r.kernel.org, df@...gle.com
Subject: Re: bpf selftest failed in 5.4.210 kernel

On Fri, Aug 19, 2022 at 07:20:11PM +0300, RAJESH DASARI wrote:
> Hi ,
> 
> I did some more tests ,  Please find the observation below.
> 
> step 1:  On v5.4.210 kernel , I reverted  only commit  bpf: Verifer,
> adjust_scalar_min_max_vals to always call update_reg_bounds()
> 7c1134c7da997523e2834dd516e2ddc51920699a , compiled the kernel and
> booted the system with the new kernel.
> step 2:  On system with newly compiled kernel , I clone the  v54.4.210
> source code  and  reverted  commit  selftests/bpf: Fix test_align
> verifier log patterns  and selftests/bpf: Fix "dubious pointer
> arithmetic" test , then ran the selftests, test_align test cases
> execution was successful.
> step 3: If i revert only selftests/bpf: Fix "dubious pointer
> arithmetic" test , test cases are still failing.
> 
> 
> 
> Please find the attached PDF for the other scenarios which I have executed.

For obvious reasons, we can't read random .pdf files sent to us.  Please
put it all in text.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ