lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sun, 23 Feb 2020 18:17:09 -0800
From:   Bart Van Assche <bvanassche@....org>
To:     Ondrej Zary <linux@...y.sk>
Cc:     qla2xxx-upstream@...gic.com, linux-scsi@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: NULL pointer dereference in qla24xx_abort_command, kernel 4.19.98
 (Debian)

On 2020-02-23 11:57, Ondrej Zary wrote:
> On Sunday 23 February 2020 20:26:39 Bart Van Assche wrote:
>> On 2020-02-23 10:29, Ondrej Zary wrote:
>>> a couple of days after upgrading a server from Debian 9 (kernel 4.9.210-1)
>>> to 10 (kernel 4.19.98), qla2xxx crashed, along with mysql.
>>>
>>> There is an EMC CX3 array connected through the fibre-channel adapter.
>>> No errors are present in EMC event log.
>>>
>>> This server was running without any problems since Debian 4.
>>> Is this a known bug?
>>
>> Please report issues encountered with Debian kernels in the Debian bug
>> tracker. If you want the upstream community to assist please retest with
>> an upstream kernel.
> 
> Debian kernel does not have any patches related to qla2xxx driver:
> https://salsa.debian.org/kernel-team/linux/raw/debian/4.19.98-1/debian/patches/series
> 
> It crashed after running for 11 days. Not a quick&easy test.

It would help a lot if the crash address would be translated into a
source code line number. Something like the following commands should do
the trick:
$ gdb drivers/scsi/qla2xxx/qla2xxx.ko
(gdb) list *(qla24xx_async_abort_cmd+0x1b)

Thanks,

Bart.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ