lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 1 Mar 2007 19:48:48 +1100
From:	Stephen Rothwell <sfr@...b.auug.org.au>
To:	Andrew Morton <akpm@...ux-foundation.org>
Cc:	tony@...eyournoodle.com (Tony Breeds),
	Linux Kernel ML <linux-kernel@...r.kernel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [PATCH] Fix soft lockup with iSeries viocd driver

On Thu, 1 Mar 2007 00:37:48 -0800 Andrew Morton <akpm@...ux-foundation.org> wrote:
>
> On Thu, 1 Mar 2007 14:56:40 +1100 tony@...eyournoodle.com (Tony Breeds) wrote:
>
> > From: Tony Breeds <tony@...eyournoodle.com>
> >
> > Fix soft lockup with iSeries viocd driver, caused by eventually calling
> > end_that_request_first() with nr_bytes 0.
> >
> > The lockup is triggered by hald, interrogating the device.
> >
>
> What causes the lockup, and how does this patch fix it?

Some versions of hald do an SG_IO ioctl on the viocd device which becomes
a request with hard_nr_sectors and hard_cur_sectors set to zero.  Passing
zero as the number of sectors to end_request() (which calls
end_that_request_first()) causes an infinite loop when the bio is being
freed.  This patch makes sure that the zero is never passed. It only
requires some number larger the the request size the terminate the loop.

--
Cheers,
Stephen Rothwell                    sfr@...b.auug.org.au
http://www.canb.auug.org.au/~sfr/

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ