lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 16 Aug 2007 08:32:01 +0200
From:	Frans Pop <elendil@...net.nl>
To:	ebiederm@...ssion.com
Cc:	linux-kernel@...r.kernel.org
Subject: Regression in 'tty layer struct pid conversions' (2.6.21)?

Hello Eric,

Since 2.6.21, the KDE 'fish' protocol (basically remote file system access 
using ssh) has started showing problems, mostly on systems running x86_64 
kernels. The process crashes with a signal 29.

The bug log indicated a relation with the kernel. A git-bisect has shown the 
cause to be the activation patch in the 'tty layer struct pid conversions' 
patch set:
commit ab521dc0f8e117fd808d3e425216864d60390500 
Author: Eric W. Biederman <ebiederm@...ssion.com> 
Date:   Mon Feb 12 00:53:00 2007 -0800 
     [PATCH] tty: update the tty layer to work with struct pid 
 
It looks from the description of the patch set that it should cause no 
changes in behavior. It may of course be that the change in the kernel has 
exposed a latent issue in the KDE code.

Details about the issue are available in the KDE BTS:
http://bugs.kde.org/show_bug.cgi?id=145123

The comments in that report indicate that the issue is almost certainly
more related to the (relative?) speed of systems than to x86_64 as an 
architecture.

Cheers,
Frans Pop
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ