lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20130314210038.GD3725@linux.vnet.ibm.com>
Date:	Thu, 14 Mar 2013 14:00:38 -0700
From:	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
To:	Dave Jones <davej@...hat.com>, Li Zefan <lizefan@...wei.com>,
	Sasha Levin <sasha.levin@...cle.com>, ebiederm@...ssion.com,
	Eric Dumazet <eric.dumazet@...il.com>,
	CAI Qian <caiqian@...hat.com>,
	linux-kernel <linux-kernel@...r.kernel.org>,
	Containers <containers@...ts.linux-foundation.org>
Subject: Re: 3.9-rc1 NULL pointer crash at find_pid_ns

On Thu, Mar 14, 2013 at 04:00:54PM -0400, Dave Jones wrote:
> On Sat, Mar 09, 2013 at 07:51:46AM -0800, Paul E. McKenney wrote:
>  > On Sat, Mar 09, 2013 at 04:01:41PM +0800, Li Zefan wrote:
>  > 
>  > [ . . . ]
>  > 
>  > > > This way, "ptr" is executed exactly once, and the check and the
>  > > > hlist_entry() are both using the same value.
>  > > 
>  > > I just played with trinity, and triggered this bug in just a few mins,
>  > > and I tried Paul's proposed fix and it works.
>  > 
>  > Thank you for testing this!  Please see below for the patch.
>  > 
>  > Sasha, will you be pushing this or would you like me to do so?
> 
> [crickets]
> 
> Given this has been hanging for the better part of another week,
> Paul why not send it Linus so hopefully rc3 doesn't have this bug ?

Good point!  I sent a pull request.

							Thanx, Paul

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ