Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
06-25-2014, 06:31 AM
|
#1
|
LQ Newbie
Registered: Jun 2014
Posts: 9
Rep:
|
Bug in Kernel's LZ4-HC in 64bit
Hi
I am using kernel's LZ4-HC for lossless compression for optimization of packets in TrafficSqueezer. So far LZ4-HC is working fine with 32bit kernel mode. But in 64bit machine, it is creating trouble. I did lot of debugging and finally pointed the source of the problem lies purely within LZ4-HC kernel crypto library.
I am also facing buffer overrun issues with LZ4-HC 64bit mode.
I reported to the guy who ported LZ4-HC within kernel, so far I didnt got any reply. Is there someone who are facing similar issue ?
Awaiting your help.
Thank you.
|
|
|
06-27-2014, 03:50 AM
|
#2
|
LQ Guru
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,954
|
File it as a kernel bug within the kernel system, if it exists there.
|
|
|
06-27-2014, 06:08 AM
|
#3
|
LQ Newbie
Registered: Jun 2014
Posts: 9
Original Poster
Rep:
|
Hi,
Can you please let know the process of filing kernel bug please ?
|
|
|
06-27-2014, 06:50 AM
|
#4
|
LQ Guru
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,954
|
https://bugzilla.kernel.org/
Register and fill in an entry. They will want a reproducible way to get the bug.
If you want to partake in correspondence about it, join the Linux Kernel Mailing List and get 500-600 mails per day on kernel matters.
|
|
|
06-27-2014, 07:02 AM
|
#5
|
LQ Newbie
Registered: Jun 2014
Posts: 9
Original Poster
Rep:
|
Sure I do that
Thank you.
|
|
|
06-29-2014, 03:38 AM
|
#7
|
LQ Guru
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,954
|
I had a quick look. It's your bug. The rules of this are: He writes the patch, based on the information you have to supply to him; you have to test it.
Download the source and get ready for the patch, because when the patch comes they'll want you to try it. If you're on an RHEL clone(Fedora, Centos, Sciantific Linux, RHEL, etc), do one other thing: Download the source from the distro (which will include a bundle of patches they stick onto the kernel) and make sure _they_ are not patching the same module.
I would also upload, if you can, a test packet and it's corrupted and correct output.
|
|
|
06-29-2014, 09:42 AM
|
#9
|
LQ Newbie
Registered: Jun 2014
Posts: 1
Rep:
|
This is an attempt by a security company to grab some undue fame by blowing out of proportion an already known vulnerability.
They are basically surfing on the "heartbleed" wave.
Not only was the vulnerability known way before the security firm "disclosed" it, but it was also known to be inaccessible, hence impossible to trigger an attack with it with currently known implementations.
Nonetheless, it was tracked as an issue to solve, and patched, "just in case" future implementations get outside of the secured specification format.
---------- Post added 06-29-14 at 09:42 AM ----------
For more info on it :
http://fastcompression.blogspot.fr/2...s-move-on.html
|
|
|
06-29-2014, 10:06 AM
|
#10
|
LQ Newbie
Registered: Jun 2014
Posts: 9
Original Poster
Rep:
|
Serticall,
I 100% agree your point
Since even I am wondering how on earth a compression issue could relate to security issue ?
Kernel guys although classified these compression libraries/modules under cryto category. But there is nothing about security in it.
Good that you pointed out. May be sometimes they think people lack some commen sense -> and project as security vulnerability !
|
|
|
All times are GMT -5. The time now is 10:06 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|