Date: Tue, 16 Dec 1997 17:34:04 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: dg@root.com Cc: cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG, cvs-sys@FreeBSD.ORG Subject: Re: cvs commit: src/sys/kern kern_exec.c Message-ID: <4070.882290044@critter.freebsd.dk> In-Reply-To: Your message of "Tue, 16 Dec 1997 08:22:17 PST." <199712161622.IAA08136@implode.root.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Well, considering that you say it came in around march this year I'd say something has protected us pretty well from it... Poul-Henning In message <199712161622.IAA08136@implode.root.com>, David Greenman writes: >>davidg 1997/12/16 07:40:31 PST >> >> Modified files: >> sys/kern kern_exec.c >> Log: >> Fix bug where a struct buf was free()'d back to the system malloc pool. >> Quite amazing that the system runs at all with this bug. Also present in >> 2.2.5. The bug appears to have come in with changes in rev 1.53. >> >> PR: might fix PR#5313 >> Submitted by: bde >> >> Revision Changes Path >> 1.70 +3 -4 src/sys/kern/kern_exec.c > > This log message is somewhat wrong. It's not the struct buf that was >being free()'d, but rather the buffer mapping/target of the struct buf (the >filesystem data). A serious bug nonetheless, and I can hardly imagine what >this might do to the system. > >-DG > >David Greenman >Core-team/Principal Architect, The FreeBSD Project > -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4070.882290044>