lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 26 Oct 2015 00:00:14 -0600
From:	Jeffrey Merkey <jeffmerkey@...il.com>
To:	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Linux 4.2.4 b43 busted and buggy when hostapd loaded

loading hostapd on 4.2.4 results in the driver crashing and failing to
load the firmware correctly into the device driver.

jeff

WARNING: CPU: 0 PID: 1703 at drivers/net/wireless/b43/main.c:2708
b43_upload_microcode+0x492/0x4e0 [b43]()
Modules linked in: target_core_iblock target_core_file
target_core_pscsi target_core_mod configfs bnx2fc cnic uio fcoe
libfcoe libfc scsi_transport_fc 8021q garp p4_clockmod bridge stp llc
ip_tables ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6
xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ext2 dm_mirror
dm_region_hash dm_log uinput ppdev parport_pc parport floppy b43 bcma
iTCO_wdt iTCO_vendor_support sg arc4 rt61pci rt2x00mmio crc_itu_t
rt2x00pci rt2x00lib mac80211 cfg80211 rfkill eeprom_93cx6 tg3 ptp
pps_core ssb mmc_core microcode pcspkr snd_intel8x0 snd_ac97_codec
ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd soundcore
i2c_i801 lpc_ich mfd_core dm_mod(E) ext3(E) jbd(E) mbcache(E)
sr_mod(E) cdrom(E) sd_mod(E) pata_acpi(E) ata_generic(E) ata_piix(E)
i915(E) drm_kms_helper(E) drm(E) i2c_algo_bit(E) i2c_core(E) video(E)
[last unloaded: acpi_cpufreq]
CPU: 0 PID: 1703 Comm: NetworkManager Tainted: G            E   4.2.4 #1
Hardware name: Hewlett-Packard HP d530 CMT(DC577AV)/085Ch, BIOS 786B2
v1.10 05/05/2003
 00000000 c0900387 f85a5804 c044e2c5 c0a7eef8 00000000 000006a7 f85a5804
 00000a94 f8587712 f8587712 0000019a f5babc00 00007c0a 0000ffff c044e31b
 00000009 00000000 f8587712 00000000 00000001 018ea000 18001000 f38ea000
Call Trace:
 [<c0900387>] ? dump_stack+0x3e/0x4f
 [<c044e2c5>] ? warn_slowpath_common+0x95/0xd0
 [<f8587712>] ? b43_upload_microcode+0x492/0x4e0 [b43]
 [<f8587712>] ? b43_upload_microcode+0x492/0x4e0 [b43]
 [<c044e31b>] ? warn_slowpath_null+0x1b/0x20
 [<f8587712>] ? b43_upload_microcode+0x492/0x4e0 [b43]
 [<f9470b32>] ? ssb_pci_switch_core+0x42/0x60 [ssb]
 [<f8587796>] ? b43_chip_init+0x36/0x2c0 [b43]
 [<f85893fb>] ? b43_bus_ssb_read32+0xb/0x10 [b43]
 [<f8590066>] ? b43_gphy_op_prepare_hardware+0x86/0x270 [b43]
 [<f8588643>] ? b43_wireless_core_init+0x143/0x600 [b43]
 [<f8588fbf>] ? b43_op_start+0x19f/0x1c0 [b43]
 [<fa88d3d6>] ? ieee80211_do_open+0x316/0x950 [mac80211]
 [<fa88b634>] ? ieee80211_check_concurrent_iface+0xe4/0x1e0 [mac80211]
 [<c0847efb>] ? __dev_open+0xab/0x120
 [<c0847d2f>] ? __dev_change_flags+0x8f/0x150
 [<c0847e16>] ? dev_change_flags+0x26/0x60
 [<c08582a1>] ? do_setlink+0x201/0x6a0
 [<c065f5e1>] ? nla_parse+0x21/0xf0
 [<c085a414>] ? rtnl_setlink+0xf4/0x130
 [<c0455b22>] ? ns_capable+0x22/0x50
 [<c0858c16>] ? rtnetlink_rcv_msg+0x176/0x1e0
 [<c087455f>] ? __netlink_lookup+0x5f/0xa0
 [<c0858aa0>] ? __rtnl_unlock+0x10/0x10
 [<c0874e7e>] ? netlink_rcv_skb+0x7e/0xa0
 [<c0858cb4>] ? rtnetlink_rcv+0x14/0x20
 [<c0874c43>] ? netlink_unicast+0x163/0x1e0
 [<c087556d>] ? netlink_sendmsg+0x2dd/0x360
 [<c083225d>] ? sock_sendmsg+0x3d/0x50
 [<c083406b>] ? ___sys_sendmsg+0x20b/0x220
 [<c0831d90>] ? brioctl_set+0x20/0x20
 [<c083225d>] ? sock_sendmsg+0x3d/0x50
 [<c08334db>] ? SYSC_sendto+0x10b/0x150
 [<c0479637>] ? update_curr+0x237/0x2f0
 [<c08341dc>] ? __sys_sendmsg+0x3c/0x80
 [<c0834231>] ? SyS_sendmsg+0x11/0x20
 [<c083442e>] ? SyS_socketcall+0x12e/0x300
 [<c04da94c>] ? __audit_syscall_entry+0x9c/0x100
 [<c0903b48>] ? sysenter_do_call+0x12/0x12
---[ end trace 183779cb8915969d ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ