lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190405100850.tojfhy3ob5gprwo7@breakpoint.cc>
Date:   Fri, 5 Apr 2019 12:08:50 +0200
From:   Florian Westphal <fw@...len.de>
To:     Krzysztof Kozlowski <krzk@...nel.org>
Cc:     alexander.h.duyck@...el.com, amritha.nambiar@...el.com,
        ast@...nel.org, bpf@...r.kernel.org, daniel@...earbox.net,
        davem@...emloft.net, ecree@...arflare.com, idosch@...lanox.com,
        jiri@...lanox.com, kafai@...com, kuznet@....inr.ac.ru,
        linux-kernel@...r.kernel.org, lirongqing@...du.com,
        netdev@...r.kernel.org, petrm@...lanox.com, sd@...asysnail.net,
        songliubraving@...com, syzkaller-bugs@...glegroups.com, yhs@...com,
        yoshfuji@...ux-ipv6.org
Subject: Re: BUG: using __this_cpu_read() in preemptible code in
 ip6_finish_output

Krzysztof Kozlowski <krzk@...nel.org> wrote:
> On Wed, 3 Apr 2019 at 03:14, syzbot
> <syzbot+51471b4aae195285a4a3@...kaller.appspotmail.com> wrote:
> >
> > syzbot has bisected this bug to:
> >
> > commit 97cdcf37b57e3f204be3000b9eab9686f38b4356
> > Author: Florian Westphal <fw@...len.de>
> > Date:   Mon Apr 1 14:42:13 2019 +0000
> >
> >      net: place xmit recursion in softnet data
> 
> I am seeing this as well on ARMv7 board booted from NFS root (exynos_defconfig):

Sorry about this, the fix is now in net-next though:
28b05b92886871bdd ("net: use correct this_cpu primitive in dev_recursion_level")

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ