Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Mar 2001 16:58:30 -0800 (PST)
From:      John Baldwin <jhb@FreeBSD.org>
To:        Mark Murray <mark@grondar.za>
Cc:        Andrew Gallatin <gallatin@cs.duke.edu>, alpha@FreeBSD.org, obrien@FreeBSD.org
Subject:   Re: dump(8) (vfs_object_create() panics: found the problem)
Message-ID:  <XFMail.010327165830.jhb@FreeBSD.org>
In-Reply-To: <200103272026.f2RKQTf80723@gratis.grondar.za>

next in thread | previous in thread | raw e-mail | index | archive | help

On 27-Mar-01 Mark Murray wrote:
>> Ok, as I said earlier, only the pointer to the vnop function table is
>> spammed, the rest of the vnode is ok.  I tracked this down to the big
>> /dev/random overhaul commits of March 11.  Removing 'device random'
>> from my kernel gets rid of the panic but breaks ssh. :( A kernel just
>> before the Mar 11 /dev/random commits boots fine, and one just after
>> panics. :( Hopefully Mark can trace down where the data corruption is
>> coming from.  I'm willing to test any patches.
> 
> Very weird.
> 
> Please comment out all the *rijndael* function calls in hash.c and
> see if that fixes anything? (I'm suspecting a stack-smash in the
> rijndael encryption routines).

I've narrowed it down to the rijndael_blockEncrypt() in yarrow_encrypt(). 
Probably it is a buffer overflow of the d_out buffer passed in to that
function.   Now I'm off to check all the callers of yarrow_encrypt().

-- 

John Baldwin <jhb@FreeBSD.org> -- http://www.FreeBSD.org/~jhb/
PGP Key: http://www.baldwin.cx/~john/pgpkey.asc
"Power Users Use the Power to Serve!"  -  http://www.FreeBSD.org/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-alpha" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?XFMail.010327165830.jhb>