[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d9676b1355e84820aeeda18a1c77297a@honor.com>
Date: Wed, 19 Feb 2025 06:23:42 +0000
From: gaoxu <gaoxu2@...or.com>
To: Andrew Morton <akpm@...ux-foundation.org>, Barry Song <21cnbao@...il.com>
CC: "linux-mm@...ck.org" <linux-mm@...ck.org>, "linux-kernel@...r.kernel.org"
<linux-kernel@...r.kernel.org>, Suren Baghdasaryan <surenb@...gle.com>, Yosry
Ahmed <yosry.ahmed@...ux.dev>
Subject: 回复: [PATCH v4] mm: Fix possible NULL pointer dereference in __swap_duplicate
>
> On Wed, 19 Feb 2025 15:28:26 +1300 Barry Song <21cnbao@...il.com>
> wrote:
>
> > > The patch seems to only provide a workaround, but there are no more
> > > effective software solutions to handle the bit flips problem. This
> > > path will change the issue from a system crash to a process
> > > exception, thereby reducing the impact on the entire machine.
> > >
> > > Signed-off-by: gao xu <gaoxu2@...or.com>
> >
> > Regardless of whether the above statement is 100% accurate or whether
> > a bit-flip actually exists, providing this check still seems useful,
> > at least for defensive programming.
>
> I'm doubtful as well.
>
> How often has this crash been observed?
The probability of this issue occurring is approximately 1 in 500,000 per week.
Powered by blists - more mailing lists