Re: [net: sock] BUG: unable to handle kernel NULL pointer dereference at 0000000000000007
From: Alexei Starovoitov
Date: Wed Dec 10 2014 - 18:51:39 EST
On Wed, Dec 10, 2014 at 3:29 PM, Fengguang Wu <fengguang.wu@xxxxxxxxx> wrote:
> 0day kernel testing robot got the below dmesg and the first bad commit is
> net: sock: allow eBPF programs to be attached to sockets
> [init] Kernel was tainted on startup. Will ignore flags that are already set.
> [init] Started watchdog process, PID is 9354
> [main] Main thread is alive.
> [ 21.233581] BUG: unable to handle kernel NULL pointer dereference at 0000000000000007
> [ 21.234709] IP: [<ffffffff8156ebda>] sk_attach_bpf+0x39/0xc2
thanks for the report! syscall fuzzer is great.
I missed an extra check. Working on a fix.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/