lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1449176346.2187.19.camel@HansenPartnership.com>
Date:	Thu, 03 Dec 2015 12:59:06 -0800
From:	James Bottomley <James.Bottomley@...senPartnership.com>
To:	Andrea Gelmini <andrea.gelmini@...ma.net>
Cc:	linux-kernel@...r.kernel.org, linux-scsi@...r.kernel.org
Subject: Re: BUG: KASAN: slab-out-of-bounds in
 ses_enclosure_data_process+0x900/0xe50

On Thu, 2015-12-03 at 21:36 +0100, Andrea Gelmini wrote:
> On Wed, Dec 02, 2015 at 02:58:21PM -0800, James Bottomley wrote:
> > On Tue, 2015-12-01 at 21:20 +0100, Andrea Gelmini wrote:
> > OK, this looks like some type of problem with a USB enclosure.  It's
> > probably misreporting something in the mode pages.  can you run sg_ses
> > on whatever /dev/sg<n> the enclosure turns up as?
> 
> 
> root@...n:/tmp/report# cat sg_ses_usb_hd.txt 
>   WD        My Passport 0820  1007
>     disk device (not an enclosure)
> Supported diagnostic pages:
>   Supported Diagnostic Pages [sdp] [0x0]
>   Short Enclosure Status (SES) [ses] [0x8]
>   <unknown> [0x80]
>   <unknown> [0x83]
>   <unknown> [0x84]
>   <unknown> [0x85]

Actually, I'm afraid that's the wrong device; it's the disk not the
enclosure (that's why sg_ses says not an enclosure)

If you do

sg_map -i

in your system, you should see something with an inquiry string like
enclosure.  It's the /dev/sg<n> of that you need to run sg_ses on.

Thanks,

James


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ