lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <574931b8edea4d60014d5e9b31daa4a1@ttyhoney.com>
Date:	Fri, 31 Oct 2014 16:41:02 +0100
From:	Peter Weber <peter.weber@...honey.com>
To:	<stable@...r.kernel.org>
Cc:	<linux-kernel@...r.kernel.org>
Subject: [drm/i915: Do not store the error pointer for a failed userptr  registration] Candidate for stable tree?

Hello!

Is the patch[0] mentioned in the subject a possible candidate for the next
release of the stable kernel, at time of writing "3.17.3"? It looks like,
this is
causing serious problems and we are currently discussing this on the
bugtracker of
Archlinux[1].

I'm not sure if I'm personally affected. I suffered unexpected freezes
since 3.17-rc4 on my machine, at least STDIO and STDOUT are frozen. Maybe
the
reaction differs based on the kernel options (see changed behaviour
through
CONFIG_PREEMPT_VOLUNTARY=y). In my case, I don't see a null pointer in my
log
files.

I hope this doesn't offend against the stable kernel rules.

[0]
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9681366ea9e76ab8f75e84351f2f3ca63ee542c
# commit id is: e9681366ea9e76ab8f75e84351f2f3ca63ee542c
# already send to stable@...r.kernel.org, but not included in current
stable "3.17.2"
[1] https://bugs.archlinux.org/task/42353

Thank you
Peter
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ