lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTimEp8rorHxtOQji-xtXZoDkcYrGGWCBQg3ypKf4@mail.gmail.com>
Date:	Tue, 5 Oct 2010 08:43:15 -0700
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	Evgeny Kuznetsov <EXT-Eugeny.Kuznetsov@...ia.com>
Cc:	akpm@...ux-foundation.org, m.nazarewicz@...sung.com, mingo@...e.hu,
	gregkh@...e.de, a.p.zijlstra@...llo.nl, xiaosuo@...il.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/1] wait: using uninitialized member of wait queue

On Tue, Oct 5, 2010 at 1:47 AM, Evgeny Kuznetsov
<EXT-Eugeny.Kuznetsov@...ia.com> wrote:
>
> Here is patch which fixes bug in /include/linux/wait.h file.
> Member "flags" of "wait_queue_t" struct  is used in several places in
> kernel code without beeing initialized. "flags" is used in bitwise
> operations. If it contain dummy data then incorrect flags may be
> used later in code.

The patch looks fine, but do you have any case of this actually
causing problems? Afaik, we do end up initializing the part of the
flags field we care about (WQ_FLAG_EXCLUSIVE) in prepare_to_wait()
(and add_wait_queue()), so it looks - from an admittedly very cursory
read - as if this is a good cleanup but shouldn't actually be the
cause of any actual bugs.

So I'll apply it, but I just wondered if you had actually seen any
semantic changes from it?

               Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ