lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAD2nsn3+AWwz1=h9mXR1S5S5ioydHTBzeoWd7wrgh9jnp_hQTA@mail.gmail.com>
Date:	Fri, 6 Jan 2012 20:11:59 +0530
From:	Mohammed Shafi <shafi.wireless@...il.com>
To:	MR <g7af0ec1e3ea1e7b1@...tmail.ru>
Cc:	linux-kernel@...r.kernel.org, linux-wireless@...r.kernel.org
Subject: Re: ath9k crash 3.2-rc7

On Fri, Jan 6, 2012 at 8:05 PM, Mohammed Shafi <shafi.wireless@...il.com> wrote:
> 2012/1/6 MR <g7af0ec1e3ea1e7b1@...tmail.ru>:
>>  >:(  i had put those warnings to prevent the crash itself and what's causing
>>  >it.
>>  > may be i had missed that pos can be < 0 in addition to (pos > 37).
>>  > i am just looking at those areas of code for some other issue. hope i
>>  > can a find a fix
>>  > for both of them
>>
>> I am building kernel with pos<0 check added...
>
> thanks!  if it does not works, i have only one more idea(a patch
> which removes some suspicious code which abuses a pointer any way that
> has to be fixed properly ). otherwise i need to recreate the issue and
> capture the stack trace completely, put debug prints. i ran an
> overnight test but was unable to recreate the issue. later today AN  i
> got a crash accidentally but only once, after that never.

attaching the patch for your reference, but this is not the fix. it
has to be fixed properly.
if it does not helps, then the issue itself is something else i had assumed.

>
>>
>> I hoped for some ad-hoc stress-test recommendation, but I guess this will have
>> to wait.

any test if we can recreate the panic ASAP will be highly helpful. it
will help us narrow down the issue quickly and put more debug
prints/ideas

>>
>>
>
>
>
> --
> shafi



-- 
shafi

View attachment "remove-suspicious-code.patch" of type "text/x-diff" (1510 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ