lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 4 Jan 2010 17:18:53 +0100
From:	Zdenek Kabelac <zdenek.kabelac@...il.com>
To:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Cc:	dsaxena@...top.org, alan@...ux.intel.com, gregkh@...e.de
Subject: Re: Oops in uart_resume_port() on resume 2.6.32/33-rc

2010/1/4 Zdenek Kabelac <zdenek.kabelac@...il.com>:
> Hi
>
> I wanted to trace some oops from i915 module via serial console log
> and instead I'm getting this oops from resume:
>
> BUG: unable to handle kernel NULL pointer dereference at 0000000000000198
> IP: [<ffffffff812eee55>] uart_resume_port+0x1f5/0x270
> PGD 1396b6067 PUD 13baf4067 PMD 0
> Oops: 0000 [#1] PREEMPT SMP
> last sysfs file: /sys/power/state

> So I assume it is related to commit:
>
> ba15ab0e8de0d4439a91342ad52d55ca9e313f3d
>
> which adds access through  *state->port.tty->termios  without checking for NULL.
>

Small update - I've compiled current vanilla kernel
45d28b097280a78893ce25a5d0db41e6a2717853
(2.6.33-rc2-00268) just with reverted patch ba15ab0e8de0d and it works
and doesn't produce uart oops on resume - thought it's not probably
the right  fix - it is usable workaround for me...

Zdenek
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ