lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 15 Dec 2016 18:18:23 -0700 From: Mark Greer <mgreer@...malcreek.com> To: Geoff Lansberry <geoff@...ee.com> Cc: linux-wireless@...r.kernel.org, lauro.venancio@...nbossa.org, aloisio.almeida@...nbossa.org, sameo@...ux.intel.com, robh+dt@...nel.org, mark.rutland@....com, netdev@...r.kernel.org, devicetree@...r.kernel.org, linux-kernel@...r.kernel.org, justin@...ee.com, Jaret Cantu <jaret.cantu@...esys.com> Subject: Re: [PATCH 3/3] nfc: trf7970a: Prevent repeated polling from crashing the kernel On Thu, Dec 15, 2016 at 05:30:44PM -0500, Geoff Lansberry wrote: > From: Jaret Cantu <jaret.cantu@...esys.com> > > Repeated polling attempts cause a NULL dereference error to occur. > This is because the curent state of the trf7970a is reading but > a request has been made to send a command. > > The solution is to properly kill the waiting reading (workqueue) > before failing on the send. Maybe its just me but I find this description a little hard to grok. Mind reworking it? The patch itself looks fine. Thanks, Mark --
Powered by blists - more mailing lists