lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 16 Sep 2014 08:55:05 +0000 (GMT)
From:	Shivnandan Kumar <shivnandan.k@...sung.com>
To:	Shivnandan Kumar <shivnandan.k@...sung.com>,
	Stephen Smalley <sds@...ho.nsa.gov>,
	"eparis@...isplace.org" <eparis@...isplace.org>,
	"viro@...iv.linux.org.uk" <viro@...iv.linux.org.uk>,
	"james.l.morris@...cle.com" <james.l.morris@...cle.com>,
	"selinux@...ho.nsa.gov" <selinux@...ho.nsa.gov>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Cc:	"cpgs ." <cpgs@...sung.com>,
	Ashish Kalra <ashish.kalra@...sung.com>,
	Mohammad Irfan Ansari <mohammad.a2@...sung.com>,
	Rajat Suri <rajat.suri@...sung.com>
Subject: [PATCH] Security: List corruption occured during file system
 automation test



Hi  Stephen Smalley,

Reproduction path :- 
We do random  file system operation ( e.g. - Saving, Open, Play, Delete ) of files and during this some time we  abruptly power off the device.

Thanks,
Shivnandan

------- Original Message -------
Sender : Stephen Smalley<sds@...ho.nsa.gov>
Date : Aug 26, 2014 23:46 (GMT+09:00)
Title : Re: [PATCH] Security: List corruption occured during file system automation test

Do you have a reproducer test case to trigger the bug?

On 08/21/2014 06:29 AM, Shivnandan Kumar wrote:
> Dear Eric Paris,
> 
> Sorry for the late reply.
> Yes I have back trace and I am attaching it.
> 
> First time the issue is reproduced then I have added some debug statement in the 
> file kernel/security/selinux/hooks.c to narrow down the problem  and then we 
> reproduce the issue again.
> I am attaching  complete back trace as well as my additional debug patch for 
> your reference.
> 
> Thanks,
> 
> Shivnandan
> 
> ------- *Original Message* -------
> 
> *Sender* : Eric Paris
> 
> *Date* : Aug 14, 2014 05:27 (GMT+09:00)
> 
> *Title* : Re: [PATCH] Security: List corruption occured during file system 
> automation test
> 
> Do you have a backtrace?
> 
> On Wed, Aug 13, 2014 at 8:30 AM, Al Viro wrote:
>  > On Wed, Aug 13, 2014 at 05:04:13PM +0530, shivnandan.k@...sung.com wrote:
>  >> From: Shivnandan Kumar
>  >>
>  >> List element was freed by  inode_free_security and then it uses rcu
>  >> element to point inode_free_rcu, since it inside a union so it
>  >> shares memory, sb_finish_set_opts now also try to free list element,
>  >
>  > How in hell does it find that element?
> 
> Thanks and Regards,
> 
> Shivnandan Kumar
> 
> 
> 
> _______________________________________________
> Selinux mailing list
> Selinux@...ho.nsa.gov
> To unsubscribe, send email to Selinux-leave@...ho.nsa.gov.
> To get help, send an email containing "help" to Selinux-request@...ho.nsa.gov.
> 





Thanks and Regards,
Shivnandan Kumar

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ