lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzZ3fRMjKh5fCLStfJSexsP=rNxE50Mg3CFUo1uhe6B9ew@mail.gmail.com>
Date:   Fri, 8 Jan 2021 10:11:47 -0800
From:   Andrii Nakryiko <andrii.nakryiko@...il.com>
To:     Christopher William Snowhill <chris@...e54.net>
Cc:     open list <linux-kernel@...r.kernel.org>
Subject: Re: Linux 5.11-rc2

On Fri, Jan 8, 2021 at 3:12 AM Christopher William Snowhill
<chris@...e54.net> wrote:
>
> There appears to be a regression with the filesystem NLS modules. I cannot load any of them. They all produce:
>
> modprobe: ERROR: could not insert 'nls_cp437': Invalid argument
>
> The system journal reports:
>
> Jan 08 02:04:56 mrgency kernel: BPF:No data
> Jan 08 02:04:56 mrgency kernel: failed to validate module [nls_cp437] BTF: -22
>

Seems like you are getting module BTF with absolutely no types and
strings, and BTF verification fails for such case (currently). Can you
please share your .config, and also let me know what version of pahole
do you have (pahole --version)? Thanks!

The fix is to allow such "empty" BTF, most probably, but I'd like to
double-check nothing fishy is going on before that.

> As a result, I cannot mount vfat filesystems with the usual CP437 default. Or any other code page, for that matter.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ