summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: d6a4980)
raw | patch | inline | side by side (parent: d6a4980)
author | Cathy Avery <cathy.avery@oracle.com> | |
Fri, 2 Oct 2015 13:35:01 +0000 (09:35 -0400) | ||
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | |
Mon, 9 Nov 2015 20:50:25 +0000 (12:50 -0800) |
commit a54c8f0f2d7df525ff997e2afe71866a1a013064 upstream.
xen-blkfront will crash if the check to talk_to_blkback()
in blkback_changed()(XenbusStateInitWait) returns an error.
The driver data is freed and info is set to NULL. Later during
the close process via talk_to_blkback's call to xenbus_dev_fatal()
the null pointer is passed to and dereference in blkfront_closing.
Signed-off-by: Cathy Avery <cathy.avery@oracle.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
xen-blkfront will crash if the check to talk_to_blkback()
in blkback_changed()(XenbusStateInitWait) returns an error.
The driver data is freed and info is set to NULL. Later during
the close process via talk_to_blkback's call to xenbus_dev_fatal()
the null pointer is passed to and dereference in blkfront_closing.
Signed-off-by: Cathy Avery <cathy.avery@oracle.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/block/xen-blkfront.c | patch | blob | history |
index e88556ac8318f7b43695de3b93e3dc6bedca6b61..d4285270f20c33e30d469e7db282f843ef8d9ab6 100644 (file)
break;
/* Missed the backend's Closing state -- fallthrough */
case XenbusStateClosing:
- blkfront_closing(info);
+ if (info)
+ blkfront_closing(info);
break;
}
}