lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYtnk2hsSM0iRfWJmt6=pUmEpaA7hd=4thbAqvgXu7Tc2w@mail.gmail.com>
Date:   Wed, 19 Jul 2017 21:46:17 +0530
From:   Naresh Kamboju <naresh.kamboju@...aro.org>
To:     Al Viro <viro@...iv.linux.org.uk>
Cc:     linux-fsdevel@...r.kernel.org,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        Kees Cook <keescook@...omium.org>
Subject: Re: Kernel BUG at fs/namei.c:248

On 19 July 2017 at 19:24, Al Viro <viro@...iv.linux.org.uk> wrote:
> On Wed, Jul 19, 2017 at 03:54:54PM +0530, Naresh Kamboju wrote:
>> Linux version:
>> Linux version 4.13.0-rc1-00059-g74cbd96 (buildslave@...-64-07) (gcc
>> version 6.2.1 20161016 (Linaro GCC 6.2-2016.11)) #1 SMP PREEMPT Tue
>> Jul 18 19:09:37 UTC 2017
>>
>> [ 1245.412625] kernel BUG at
>> /srv/oe/build/tmp-rpb-glibc/work-shared/hikey/kernel-source/fs/namei.c:248!
>
> Interesting... Looks like double-put or memory corruptor of some sort.
> Nothing obvious jumps out at the first glance; I'll look into that when
> I get back to better connectivity tonight.

I am able to reproduce this BUG by running zram test cases multiple
times in a row.
http://people.linaro.org/~naresh.kamboju/zram.tar.gz

Ref:
LKFT: linux-mainline: Kernel BUG at fs/namei.c:248
https://bugs.linaro.org/show_bug.cgi?id=3140

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ