| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <4EE5CD26.40806@profihost.ag> Date: Mon, 12 Dec 2011 10:45:10 +0100 From: Stefan Priebe - Profihost AG <s.priebe@...fihost.ag> To: Eric Dumazet <eric.dumazet@...il.com> CC: Josh Boyer <jwboyer@...il.com>, Christoph Hellwig <hch@...radead.org>, netdev@...r.kernel.org, Dave Chinner <david@...morbit.com>, stable@...r.kernel.org Subject: Re: BUG: unable to handle kernel NULL pointer dereference at 000000000000002c Hi, > Am 01.12.2011 22:05, schrieb Eric Dumazet: >> Le jeudi 01 décembre 2011 à 15:37 -0500, Josh Boyer a écrit : >> >>> Did you mean f2c31e32bf2c31e32b378a665 ? >> >> Oh well, yes ;) >> >>>> But this patch needs some followup patches (some of them in David net >>>> tree, not yet in Linus tree) >>> >>> 9de79c127cccecb11ae6a21ab1499e87aa222880 (net: fix potential neighbour >>> race in dst_ifdown()) is in Linus' tree. Which others are missing? >> >> Hmm >> >> Linus tree : >> >> commit 580da35a31f91a594f3090b7a2c39b85cb051a12 >> IB: Fix RCU lockdep splats >> >> David tree : >> >> commit 218fa90f072e4aeff9003d57e390857f4f35513e >> ipv4: fix lockdep splat in rt_cache_seq_show >> >> commit f7e57044eeb1841847c24aa06766c8290c202583 >> sch_teql: fix lockdep splat main problem seems to me that all these patches make intensive use of the "new" helper functions from 69cce1d1404968f78b177a0314f5822d5afdbbfb So must 69cce1d1404968f78b177a0314f5822d5afdbbfb be backported too? Stefan -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists