lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 26 Mar 2019 10:56:08 +0100
From:   Dmitry Vyukov <dvyukov@...gle.com>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     syzbot <syzbot+b358909d8d01556b790b@...kaller.appspotmail.com>,
        Alexander Duyck <alexander.h.duyck@...el.com>,
        amritha.nambiar@...el.com, andrew@...n.ch, avagin@...il.com,
        danielj@...lanox.com, David Miller <davem@...emloft.net>,
        Doug Ledford <dledford@...hat.com>,
        Dmitry Torokhov <dmitry.torokhov@...il.com>,
        gregory.clement@...tlin.com, jason@...edaemon.net,
        jeffrey.t.kirsher@...el.com, Jason Gunthorpe <jgg@...pe.ca>,
        Joe Perches <joe@...ches.com>,
        Leon Romanovsky <leon@...nel.org>,
        Linux ARM <linux-arm-kernel@...ts.infradead.org>,
        LKML <linux-kernel@...r.kernel.org>, linux-rdma@...r.kernel.org,
        Marc Zyngier <marc.zyngier@....com>, miquel.raynal@...tlin.com,
        netdev <netdev@...r.kernel.org>, parav@...lanox.com,
        sebastian.hesselbarth@...il.com, swise@...ngridcomputing.com,
        syzkaller-bugs <syzkaller-bugs@...glegroups.com>,
        tyhicks@...onical.com
Subject: Re: KASAN: use-after-free Read in addr_handler

On Sun, Mar 24, 2019 at 2:21 PM Thomas Gleixner <tglx@...utronix.de> wrote:
>
> On Sun, 24 Mar 2019, syzbot wrote:
>
> > syzbot has bisected this bug to:
> >
> > commit 4f4c867c91e644fc9d461c8c5cf2f09d6d5bcac2
> > Author: Miquel Raynal <miquel.raynal@...tlin.com>
> > Date:   Tue Oct 2 08:54:16 2018 +0000
> >
> >    irqchip/irq-mvebu-icu: Support ICU subnodes
>
> Yet another bogus bisect result. Why? That code is ARM only and cannot
> influence x86 by any means.

>From the bisection log it seems the process diverged to a different
bug mid way ("WARNING: ODEBUG bug in netdev_freemem").

Powered by blists - more mailing lists