lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 23 Jul 2021 09:08:32 -0400 From: jim.cromie@...il.com To: Jens Axboe <axboe@...nel.dk> Cc: Oleksandr Natalenko <oleksandr@...alenko.name>, LKML <linux-kernel@...r.kernel.org>, Paolo Valente <paolo.valente@...aro.org>, linux-block@...r.kernel.org Subject: Re: 5.14.0-rc1 KASAN use after free On Sun, Jul 18, 2021 at 5:58 PM Jens Axboe <axboe@...nel.dk> wrote: > > On 7/18/21 3:08 PM, Oleksandr Natalenko wrote: > > + Paolo, Jens et al. > > > > On čtvrtek 15. července 2021 16:32:29 CEST jim.cromie@...il.com wrote: > >> hi all, > >> > >> I noticed this report this morning, from 3 days ago, > >> about 10 minutes after boot. > >> Its easiest to ignore it, and I dont want to make a fuss, > >> but it looks useful to someone > >> > >> > >> [ 33.663464] Bluetooth: RFCOMM ver 1.11 > >> [ 646.343628] > >> ================================================================== [ > >> 646.343649] BUG: KASAN: use-after-free in bfq_get_queue+0x47d/0x900 [ > >> 646.343680] Read of size 8 at addr ffff88810d864a00 by task > >> journal-offline/1639 > > There are only a few commits between 5.13 and master in this area, see > attached. I'd just start reverting from the top, one by one, and see > which one is causing the issue. Jim, would that be feasible? > oops, didn't see this earlier. It hasnt happened since, I can try to recreate mid-next-week > -- > Jens Axboe >
Powered by blists - more mailing lists