lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 12 Jun 2008 14:18:30 +0900
From:	FUJITA Tomonori <fujita.tomonori@....ntt.co.jp>
To:	miles.lane@...il.com
Cc:	Larry.Finger@...inger.net, mb@...sch.de, vegard.nossum@...il.com,
	akpm@...ux-foundation.org, linux-kernel@...r.kernel.org,
	linux-wireless@...r.kernel.org, fujita.tomonori@....ntt.co.jp
Subject: Re: BUG: NULL pointer dereference at 00000000 -- IP: [<f8e783d5>]
 :b43:b43_dma_mapping_error+0x16/0x155

On Wed, 11 Jun 2008 01:57:30 -0400
"Miles Lane" <miles.lane@...il.com> wrote:

> > The line that fails is
> >
> > if (unlikely(dma_mapping_error(ring->dev->dev->dma_dev, addr)))
> >
> > The value at 0x58(%eax) is zero, which corresponds to the "struct b43_wldev
> > *dev" line in struct b43_dmaring. In other words, ring->dev is NULL, which
> > causes the error. I'll leave it to FUJITA Tomonori to figure out why.
> 
> Thanks all,
> 
> I might have time in the morning to test one more patch, otherwise I
> will be back in about three weeks.

I think that Michael's patch should fix this bug, which is already in mmotm:

http://userweb.kernel.org/~akpm/mmotm/broken-out/dma-mapping-add-the-device-argument-to-dma_mapping_error-b34-fix.patch

Miles, are you sure that you use a kernel including the patch?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ