lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <db3adce5-31a4-bcfd-352c-b343aa5ed37a@6wind.com>
Date:   Fri, 26 Jan 2018 00:10:13 +0100
From:   Nicolas Dichtel <nicolas.dichtel@...nd.com>
To:     David Miller <davem@...emloft.net>
Cc:     netdev@...r.kernel.org, code@...pl.cz, lucien.xin@...il.com,
        jbenc@...hat.com, pablo@...filter.org, edumazet@...gle.com,
        dsahern@...il.com, tgraf@...g.ch
Subject: Re: [PATCH net] net: don't call update_pmtu unconditionally

Le 25/01/2018 à 22:28, David Miller a écrit :
> From: Nicolas Dichtel <nicolas.dichtel@...nd.com>
> Date: Thu, 25 Jan 2018 19:03:03 +0100
> 
>> Some dst_ops (e.g. md_dst_ops)) doesn't set this handler. It may result to:
>> "BUG: unable to handle kernel NULL pointer dereference at           (null)"
>>
>> Let's add a helper to check if update_pmtu is available before calling it.
>>
>> Fixes: 52a589d51f10 ("geneve: update skb dst pmtu on tx path")
>> Fixes: a93bf0ff4490 ("vxlan: update skb dst pmtu on tx path")
>> CC: Roman Kapl <code@...pl.cz>
>> CC: Xin Long <lucien.xin@...il.com>
>> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@...nd.com>
> 
> Applied with the fixup suggested by David Ahern and queued up for -stable,
Thank you for taking care of that.


Regards,
Nicolas

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ