lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20070330082015.GC20739@2ka.mipt.ru>
Date:	Fri, 30 Mar 2007 12:20:16 +0400
From:	Evgeniy Polyakov <johnpol@....mipt.ru>
To:	Philipp Reisner <philipp.reisner@...bit.com>
Cc:	netdev@...r.kernel.org
Subject: Re: Issue with connector/netlink

On Thu, Mar 29, 2007 at 08:47:18PM +0200, Philipp Reisner (philipp.reisner@...bit.com) wrote:
> RIP: 0010:[<ffffffff8024f904>]  [<ffffffff8024f904>] netlink_broadcast+0x123/0x2de
> RSP: 0018:ffff8100379bddc0  EFLAGS: 00010297
> RAX: 656b736968772d31 RBX: ffff810079d7f800 RCX: 0000000000000004
> RDX: ffff81007e113000 RSI: ffff810079d68280 RDI: ffffffff804c6a80
> RBP: ffff810079d68280 R08: 00000000000000d0 R09: ffff810079d68280
> R10: 0000000000000002 R11: ffff81007fd6fac0 R12: 0000000000000020
> R13: 0000000000000000 R14: ffff810079d7f818 R15: 0000000000000003
> FS:  0000000000000000(0000) GS:ffffffff804d6000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
> CR2: 00002b2acc1ecb40 CR3: 0000000079ac1000 CR4: 00000000000026e0
> Process cqueue/0 (pid: 1948, threadinfo ffff8100379bc000, task ffff810037fd8040)
> Stack:  ffff810079d7f400 00000000000000d0 ffff81007e113000 000000007e069a24
>  0000000000000000 0000000000000100 ffff810079d7f400 ffff81007e069a10
>  ffff81007e069a24 ffffffff881e9d00 ffff81007cf07800 ffffffff881d5c23

...

> Code;  ffffffff8024f904 <netlink_broadcast+123/2de>   <=====
>    0:   44 0f a3 38               bt     %r15d,(%rax)   <=====

%rax contains 0x656b736968772d31
In my x86_64 it is obtained from %rbx, which seems to be correct, so I'm
a bit stuck, something has rewritten internals of the socket structure,
and it does not look like free poisoning.

0xffffffff8024ea14 <netlink_broadcast+289>:     mov    0x268(%rbx),%rax
0xffffffff8024ea1b <netlink_broadcast+296>:     bt     %r15d,(%rax)

Can you describe your load? Is it too high to put a debug printk there?
Can you enable as much debug options as possible?

-- 
	Evgeniy Polyakov
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ