lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.LNX.2.00.1107182358331.2056@iabervon.org>
Date:	Tue, 19 Jul 2011 00:16:59 -0400 (EDT)
From:	Daniel Barkalow <barkalow@...ervon.org>
To:	Seth Forshee <seth.forshee@...onical.com>
cc:	Christoph Hellwig <hch@...era.com>, linux-kernel@...r.kernel.org
Subject: Re: Problems with hfsplus on ipods in 2.6.38+

On Mon, 18 Jul 2011, Daniel Barkalow wrote:

> On Mon, 18 Jul 2011, Seth Forshee wrote:
> 
> > On Fri, Jul 15, 2011 at 09:39:00AM -0500, Seth Forshee wrote:
> > > What I also see are GPFs in memory allocation code, which is what I
> > > believe others have seen with my patch, and so far I haven't seen those
> > > with the reversions. So I'm suspecting memory corruption, but I don't
> > > yet see where the corruption is coming form. I found one problem, but I
> > > don't suspect it's responsible for the GPFs.
> > 
> > I had some torture tests running over the weekend with the "one
> > problem" mentioned above fixed, which was a couple of kfrees that were
> > still using the old vhdr pointers. There were no oopses over a couple of
> > days of testing. I've posted a new build on the bug in launchpad in
> > hopes of getting some testing from those who were getting oopses quite
> > readily. The updated patch follows.
> 
> I should be able to try it this evening.

It seems to work. I connected and disconnected it a bunch of times (due to 
a somewhat flaky connector) and mounted it, wrote to it, had it disconnect 
itself, and mounted it and ejected it, and generated some memory load, and 
got no oopses. (Just to be clear, I was testing the 0001 and 0003 of the 
first attempt with the formerly-attached patch as 0002, replacing the 
original 0002.)

Tested-by: Daniel Barkalow <barkalow@...ervon.org>

	-Daniel
*This .sig left intentionally blank*
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ