lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 23 Dec 2016 23:01:41 -0700 From: Mark Greer <mgreer@...malcreek.com> To: Geoff Lansberry <geoff@...ee.com> Cc: linux-wireless@...r.kernel.org, lauro.venancio@...nbossa.org, aloisio.almeida@...nbossa.org, sameo@...ux.intel.com, robh+dt@...nel.org, mark.rutland@....com, netdev@...r.kernel.org, devicetree@...r.kernel.org, linux-kernel@...r.kernel.org, justin@...ee.com, Jaret Cantu <jaret.cantu@...esys.com> Subject: Re: [PATCH v3 3/3] nfc: trf7970a: Prevent repeated polling from crashing the kernel On Wed, Dec 21, 2016 at 11:18:34PM -0500, Geoff Lansberry wrote: > From: Jaret Cantu <jaret.cantu@...esys.com> > > Repeated polling attempts cause a NULL dereference error to occur. > This is because the state of the trf7970a is currently reading but > another request has been made to send a command before it has finished. > > The solution is to properly kill the waiting reading (workqueue) > before failing on the send. > > Signed-off-by: Geoff Lansberry <geoff@...ee.com> > --- You've still provided virtually no information on the actual problem(s) nor justified why you think this is the best solution. You're adding code to a section of code that should _never_ be executed so the only reasonable things I can infer is that there are, at least, two problems: 1) There is a bug causing execution to get into this block of code. 2) Once in this block of code, there is another bug. You seem to be attempting to fix 2) and completely ignoring 1). 1) is the first bug that needs to be root-caused and fixed. Also, what exactly is the "NULL dereference error" you mention? Is this the neard crash you talked about in another thread or is this a kernel crash? If it is the kernel crash, please post the relevant information. If this is the neard crash - which seems unlikely - then how can changing a section of kernel code that shouldn't be executed in the first place fix that? Mark --
Powered by blists - more mailing lists