lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 19 Oct 2010 21:41:28 -0500
From:	Robin Holt <holt@....com>
To:	"J.H." <warthog9@...nel.org>
Cc:	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: More issues found on kernel.org

On Mon, Oct 18, 2010 at 12:15:19PM -0700, J.H. wrote:
> Not that the current discussion on IMA, and the recent problems found
> with XFS were enough, I've started seeing, rather regularly, what I've
> reported in bugzilla
> 
> https://bugzilla.kernel.org/show_bug.cgi?id=20702
> 
> It looks like a double free is happening somewhere, and the issue
> *SEEMS* to be limited to the dynamic web boxes (bugzilla, wiki's, etc)
> and those are the only boxes I have running drbd and ocfs2.
> 
> Once the initial problem hits, the box more or less grinds to a halt and
> will eventually kernel panic and reboot.  Explicitly trying to reboot
> the box results in a solidly hung box requiring a hard reset.
> 
> Anyone have any thoughts, any extra debugging if/when this should happen
> again that would be useful?

If you are building your own kernel, I would turn on slab debugging.
Nearly all the double frees I have come across in the last years have
been tracked down using slab debug which traps double frees.  It does
not always point at the culprit, but at least narrows the field.

Robin
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ