lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANn89i+djJT_o8kqzqRacNs6ma3m-_xG40uttzAn2EfZAqD8Jw@mail.gmail.com>
Date:   Mon, 10 Jan 2022 05:17:21 -0800
From:   Eric Dumazet <edumazet@...gle.com>
To:     Maxim Mikityanskiy <maximmi@...dia.com>
Cc:     Eric Dumazet <eric.dumazet@...il.com>,
        "David S . Miller" <davem@...emloft.net>,
        Jakub Kicinski <kuba@...nel.org>,
        netdev <netdev@...r.kernel.org>,
        Tariq Toukan <tariqt@...dia.com>,
        Jamal Hadi Salim <jhs@...atatu.com>,
        Cong Wang <xiyou.wangcong@...il.com>,
        Jiri Pirko <jiri@...nulli.us>
Subject: Re: [BUG HTB offload] syzbot: C repro for b/213075475

On Mon, Jan 10, 2022 at 5:14 AM Eric Dumazet <edumazet@...gle.com> wrote:
>
> On Mon, Jan 10, 2022 at 3:10 AM Maxim Mikityanskiy <maximmi@...dia.com> wrote:

> > Is this the right program, by the way?
>
> Yes it is.
>
> If you look at it, you find htb string embedded in
>
>     memcpy((void*)0x20000398,
> +           "\x00\x00\x04\x00\xf1\xff\xff\xff\x00\x00\x00\x00\x08\x00\x01\x00"
> +           "\x68\x74\x62\x00\x1c\x00\x02\x00\x18\x00\x02\x00\x03",
> +           29);
>

Also embedded in this memcpy. you can find 0xFFFFFFF1 which is TC_H_INGRESS

#define TC_H_INGRESS  (0xFFFFFFF1U)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ