Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sun, 16 Feb 2003 20:55:23 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sun, 16 Feb 2003 20:55:23 -0500 Received: from franka.aracnet.com ([216.99.193.44]:12429 "EHLO franka.aracnet.com") by vger.kernel.org with ESMTP id ; Sun, 16 Feb 2003 20:55:21 -0500 Date: Sun, 16 Feb 2003 18:05:01 -0800 From: "Martin J. Bligh" To: Linus Torvalds , Manfred Spraul cc: Anton Blanchard , Andrew Morton , Kernel Mailing List , Zwane Mwaikambo Subject: Re: more signal locking bugs? Message-ID: <68480000.1045447501@[10.10.2.4]> In-Reply-To: References: X-Mailer: Mulberry/2.2.1 (Linux/x86) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1739 Lines: 43 > Ok, I committed this alternative change, which isn't quite as minimal, but > looks a lot cleaner to me. > > Also, looking at execve() and other paths, we do seem to have sufficient > protection from the tasklist_lock that signal delivery should be fine. So > despite a long and confused thread, I think in the end the only real bug > was the one Martin found which should be thus fixed.. Ran your patch ... but I get plenty of these now: Unable to handle kernel NULL pointer dereference at virtual address 00000004 printing eip: c016d5a8 *pde = 2e10f001 *pte = 00000000 Oops: 0000 CPU: 2 EIP: 0060:[] Not tainted EFLAGS: 00010202 EIP is at collect_sigign_sigcatch+0x1c/0x44 eax: ed6d72c0 ebx: ed403f50 ecx: 00000004 edx: 00000001 esi: ed403f48 edi: ed6d72c0 ebp: 00000000 esp: ed403eec ds: 007b es: 007b ss: 0068 Process ps (pid: 19988, threadinfo=ed402000 task=ed9352a0) Stack: c011d115 c02af820 c016dab8 ed6d72c0 ed403f48 ed403f50 ed6d72c0 edb99a50 ed6d72c0 eebf33c0 ee225000 c034e400 ed403f50 ed403f48 00000000 52000000 00008800 00000125 eebf33c0 eebf33e0 00000000 00000000 00000000 000000d0 Call Trace: [] do_exit+0x30d/0x31c [] proc_pid_stat+0x110/0x324 [] __get_free_pages+0x4e/0x54 [] proc_info_read+0x53/0x130 [] vfs_read+0xa5/0x128 [] sys_read+0x2a/0x3c [] syscall_call+0x7/0xb Code: 8b 01 83 f8 01 75 08 8d 42 ff 0f ab 06 eb 0a 85 c0 74 06 8d - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/