lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sat, 13 May 2017 08:56:36 +0200
From:   "PaX Team" <pageexec@...email.hu>
To:     "Theodore Ts'o" <tytso@....edu>, Emese Revfy <re.emese@...il.com>,
        Shawn C <citypw@...il.com>
CC:     linux-ext4@...r.kernel.org, Brad Spengler <spender@...ecurity.net>
Subject: Re: PAX: size overflow detected in function ext4_llseek fs/ext4/file.c:670

On 13 May 2017 at 12:23, Shawn C wrote:
> On 05/12/2017 05:58 PM, PaX Team wrote:
> > Shawn, can you do the printk instrumentation i suggested to print out
> > the value of offset (and isize too while at it)?
> >
> I inserted the printk info in fs/ext4/file.c:677
> 
> 00------------------
>         printk(KERN_DEBUG"offset: %lld, isize: %lld, blkbits: %d\n",
> offset, isize, blkbits);
> 11------------------
> 
> result:
> 
> offset: 105, isize: 19595264, blkbits: 12

are you sure this is the last message before the size overflow report?
can you perhaps post the relevant portion of dmesg too?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ