lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20251001133037.0ab6952c@kernel.org>
Date: Wed, 1 Oct 2025 13:30:37 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: Willem de Bruijn <willemb@...gle.com>
Cc: Kuniyuki Iwashima <kuniyu@...gle.com>, edumazet@...gle.com,
 fw@...len.de, netdev@...r.kernel.org, pabeni@...hat.com
Subject: Re: deadlocks on pernet_ops_rwsem

On Wed, 1 Oct 2025 15:33:56 -0400 Willem de Bruijn wrote:
> > > Was there any update on packages (especially qemu?) used by
> > > CI around 2025-09-18 ?  
> >
> > No updates according to the logs. First hit was on Thursday so I thought
> > maybe it came from Linus. But looking at the branches we fast forwarded
> > 2025-09-18--21-00 and there were 2 hits earlier that day (2025-09-18--03-00,
> > 2025-09-18--15-00)  
> 
> Is there a good SHA1 around the time of the earliest report?
> 
> There do not seem to be any recent changes to rwsem, let alone
> specifically to pernet_ops_rwsem.

The first time it triggered when net-next was at 152ba35c04ad
and net at 09847108971a, CI branch contents:
https://netdev.bots.linux.dev/static/nipa/branch_deltas/net-next-2025-09-18--03-00.html

The previous one (so the branch before the first time it triggered)
had base commits of 6b957c0a36f5 09847108971a.

If you click on the link above you can go back / forward in the branch
contents.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ