Hello,
The following program crashes kernel:
// autogenerated by syzkaller (http://github.com/google/syzkaller)
#include
#include
#include
int main()
{
long r0 = syscall(SYS_mmap, 0x20001000ul, 0x1000ul, 0x3ul,
0x32ul, 0xul, 0x0ul);
long r1 = syscall(SYS_mmap,
__list_splice_init_rcu() can be used to splice lists forming both stack and
queue structures, depending on its arguments. It is based on the initial
list_splice_init_rcu() with a few minor modifications to help abstrancting it.
Signed-off-by: Petko Manolov
---
On Friday, October 09, 2015 08:50:01 PM Tony Jones wrote:
> Hi.
>
> What is the expected handling of AUDIT_SECCOMP if audit_enabled == 0?
> Opera browser makes use of a sandbox and if audit_enabled == 0 (and no
> auditd is running) there is a lot of messages dumped to the klog. The fix
> to
My apologies for the resend, I had the wrong email for Kees.
On Monday, October 12, 2015 11:29:43 AM Paul Moore wrote:
> On Friday, October 09, 2015 08:50:01 PM Tony Jones wrote:
> > Hi.
> >
> > What is the expected handling of AUDIT_SECCOMP if audit_enabled == 0?
> > Opera browser makes use of
On Mon, Oct 12, 2015 at 06:23:51PM +0300, Petko Manolov wrote:
> Content preview: __list_splice_init_rcu() can be used to splice lists
> forming
> both stack and queue structures, depending on its arguments. It is based
>on the initial list_splice_init_rcu() with a few minor
On 10/12/2015 08:40 AM, Paul Moore wrote:
> My apologies for the resend, I had the wrong email for Kees.
>
> On Monday, October 12, 2015 11:29:43 AM Paul Moore wrote:
>> On Friday, October 09, 2015 08:50:01 PM Tony Jones wrote:
>>> Hi.
>>>
>>> What is the expected handling of AUDIT_SECCOMP if
On Mon, Oct 12, 2015 at 10:53 AM, Tony Jones wrote:
> On 10/12/2015 08:40 AM, Paul Moore wrote:
>> My apologies for the resend, I had the wrong email for Kees.
(I keep asking for that alias, but no luck...)
>> On Monday, October 12, 2015 11:29:43 AM Paul Moore wrote:
>>> On