* [PATCH] tpm: Check the bios_dir entry for NULL before accessing it
@ 2016-11-16 13:56 Stefan Berger
[not found] ` <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
0 siblings, 1 reply; 10+ messages in thread
From: Stefan Berger @ 2016-11-16 13:56 UTC (permalink / raw)
To: jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA,
tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f,
nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8
Check the bios_dir entry for NULL before accessing it. Currently
this crashes the driver when a TPM 2 is attached and the entries
are NULL.
Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
---
drivers/char/tpm/tpm_eventlog.c | 12 +++++++-----
1 file changed, 7 insertions(+), 5 deletions(-)
diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c
index ebec4ac..fb603a7 100644
--- a/drivers/char/tpm/tpm_eventlog.c
+++ b/drivers/char/tpm/tpm_eventlog.c
@@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip)
* This design ensures that open() either safely gets kref or fails.
*/
for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
- inode = d_inode(chip->bios_dir[i]);
- inode_lock(inode);
- inode->i_private = NULL;
- inode_unlock(inode);
- securityfs_remove(chip->bios_dir[i]);
+ if (chip->bios_dir[i]) {
+ inode = d_inode(chip->bios_dir[i]);
+ inode_lock(inode);
+ inode->i_private = NULL;
+ inode_unlock(inode);
+ securityfs_remove(chip->bios_dir[i]);
+ }
}
}
--
2.4.3
------------------------------------------------------------------------------
^ permalink raw reply related [flat|nested] 10+ messages in thread[parent not found: <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> @ 2016-11-16 14:58 ` Nayna [not found] ` <582C7416.7090105-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> 2016-11-16 15:38 ` Jarkko Sakkinen 2016-11-16 20:38 ` Jason Gunthorpe 2 siblings, 1 reply; 10+ messages in thread From: Nayna @ 2016-11-16 14:58 UTC (permalink / raw) To: Stefan Berger, jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA, tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On 11/16/2016 07:26 PM, Stefan Berger wrote: > Check the bios_dir entry for NULL before accessing it. Currently > this crashes the driver when a TPM 2 is attached and the entries > are NULL. Thanks Stefan !! I think it would be good to also add Fixes in commit description here. Fixes: d660a91a1b9d (tpm: adds NULL check for securityfs pseudo files) Thanks & Regards, - Nayna > > Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> > --- > drivers/char/tpm/tpm_eventlog.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c > index ebec4ac..fb603a7 100644 > --- a/drivers/char/tpm/tpm_eventlog.c > +++ b/drivers/char/tpm/tpm_eventlog.c > @@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip) > * This design ensures that open() either safely gets kref or fails. > */ > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > - inode = d_inode(chip->bios_dir[i]); > - inode_lock(inode); > - inode->i_private = NULL; > - inode_unlock(inode); > - securityfs_remove(chip->bios_dir[i]); > + if (chip->bios_dir[i]) { > + inode = d_inode(chip->bios_dir[i]); > + inode_lock(inode); > + inode->i_private = NULL; > + inode_unlock(inode); > + securityfs_remove(chip->bios_dir[i]); > + } > } > } > ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <582C7416.7090105-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <582C7416.7090105-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> @ 2016-11-16 15:40 ` Jarkko Sakkinen [not found] ` <20161116154027.i6rtsl2mendbb4ce-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Jarkko Sakkinen @ 2016-11-16 15:40 UTC (permalink / raw) To: Nayna; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 08:28:30PM +0530, Nayna wrote: > > > On 11/16/2016 07:26 PM, Stefan Berger wrote: > > Check the bios_dir entry for NULL before accessing it. Currently > > this crashes the driver when a TPM 2 is attached and the entries > > are NULL. > > Thanks Stefan !! I think it would be good to also add Fixes in commit > description here. > > Fixes: d660a91a1b9d (tpm: adds NULL check for securityfs pseudo files) Not mandatory as this is not in the mainline tree but doesn't hurt either. /Jarkko > > Thanks & Regards, > - Nayna > > > > > Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> > > --- > > drivers/char/tpm/tpm_eventlog.c | 12 +++++++----- > > 1 file changed, 7 insertions(+), 5 deletions(-) > > > > diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c > > index ebec4ac..fb603a7 100644 > > --- a/drivers/char/tpm/tpm_eventlog.c > > +++ b/drivers/char/tpm/tpm_eventlog.c > > @@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip) > > * This design ensures that open() either safely gets kref or fails. > > */ > > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > > - inode = d_inode(chip->bios_dir[i]); > > - inode_lock(inode); > > - inode->i_private = NULL; > > - inode_unlock(inode); > > - securityfs_remove(chip->bios_dir[i]); > > + if (chip->bios_dir[i]) { > > + inode = d_inode(chip->bios_dir[i]); > > + inode_lock(inode); > > + inode->i_private = NULL; > > + inode_unlock(inode); > > + securityfs_remove(chip->bios_dir[i]); > > + } > > } > > } > > > ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20161116154027.i6rtsl2mendbb4ce-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <20161116154027.i6rtsl2mendbb4ce-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2016-11-16 15:49 ` Stefan Berger [not found] ` <f4a7d9a4-c832-fd06-6a62-7b800f42585f-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Stefan Berger @ 2016-11-16 15:49 UTC (permalink / raw) To: Jarkko Sakkinen, Nayna; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On 11/16/2016 10:40 AM, Jarkko Sakkinen wrote: > On Wed, Nov 16, 2016 at 08:28:30PM +0530, Nayna wrote: >> >> On 11/16/2016 07:26 PM, Stefan Berger wrote: >>> Check the bios_dir entry for NULL before accessing it. Currently >>> this crashes the driver when a TPM 2 is attached and the entries >>> are NULL. >> Thanks Stefan !! I think it would be good to also add Fixes in commit >> description here. >> >> Fixes: d660a91a1b9d (tpm: adds NULL check for securityfs pseudo files) > Not mandatory as this is not in the mainline tree but doesn't hurt > either. I wished you could just merge this fix patch into Nayna's original patch -- makes bisecting the code a lot easier. Stefan > > /Jarkko > >> Thanks & Regards, >> - Nayna >> >>> Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> >>> --- >>> drivers/char/tpm/tpm_eventlog.c | 12 +++++++----- >>> 1 file changed, 7 insertions(+), 5 deletions(-) >>> >>> diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c >>> index ebec4ac..fb603a7 100644 >>> --- a/drivers/char/tpm/tpm_eventlog.c >>> +++ b/drivers/char/tpm/tpm_eventlog.c >>> @@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip) >>> * This design ensures that open() either safely gets kref or fails. >>> */ >>> for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { >>> - inode = d_inode(chip->bios_dir[i]); >>> - inode_lock(inode); >>> - inode->i_private = NULL; >>> - inode_unlock(inode); >>> - securityfs_remove(chip->bios_dir[i]); >>> + if (chip->bios_dir[i]) { >>> + inode = d_inode(chip->bios_dir[i]); >>> + inode_lock(inode); >>> + inode->i_private = NULL; >>> + inode_unlock(inode); >>> + securityfs_remove(chip->bios_dir[i]); >>> + } >>> } >>> } >>> ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <f4a7d9a4-c832-fd06-6a62-7b800f42585f-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <f4a7d9a4-c832-fd06-6a62-7b800f42585f-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> @ 2016-11-16 17:57 ` Jarkko Sakkinen 0 siblings, 0 replies; 10+ messages in thread From: Jarkko Sakkinen @ 2016-11-16 17:57 UTC (permalink / raw) To: Stefan Berger; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 10:49:39AM -0500, Stefan Berger wrote: > On 11/16/2016 10:40 AM, Jarkko Sakkinen wrote: > > On Wed, Nov 16, 2016 at 08:28:30PM +0530, Nayna wrote: > > > > > > On 11/16/2016 07:26 PM, Stefan Berger wrote: > > > > Check the bios_dir entry for NULL before accessing it. Currently > > > > this crashes the driver when a TPM 2 is attached and the entries > > > > are NULL. > > > Thanks Stefan !! I think it would be good to also add Fixes in commit > > > description here. > > > > > > Fixes: d660a91a1b9d (tpm: adds NULL check for securityfs pseudo files) > > Not mandatory as this is not in the mainline tree but doesn't hurt > > either. > I wished you could just merge this fix patch into Nayna's original patch -- > makes bisecting the code a lot easier. > > Stefan Works for me. /Jarkko > > > > > /Jarkko > > > > > Thanks & Regards, > > > - Nayna > > > > > > > Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> > > > > --- > > > > drivers/char/tpm/tpm_eventlog.c | 12 +++++++----- > > > > 1 file changed, 7 insertions(+), 5 deletions(-) > > > > > > > > diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c > > > > index ebec4ac..fb603a7 100644 > > > > --- a/drivers/char/tpm/tpm_eventlog.c > > > > +++ b/drivers/char/tpm/tpm_eventlog.c > > > > @@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip) > > > > * This design ensures that open() either safely gets kref or fails. > > > > */ > > > > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > > > > - inode = d_inode(chip->bios_dir[i]); > > > > - inode_lock(inode); > > > > - inode->i_private = NULL; > > > > - inode_unlock(inode); > > > > - securityfs_remove(chip->bios_dir[i]); > > > > + if (chip->bios_dir[i]) { > > > > + inode = d_inode(chip->bios_dir[i]); > > > > + inode_lock(inode); > > > > + inode->i_private = NULL; > > > > + inode_unlock(inode); > > > > + securityfs_remove(chip->bios_dir[i]); > > > > + } > > > > } > > > > } > > > > > ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> 2016-11-16 14:58 ` Nayna @ 2016-11-16 15:38 ` Jarkko Sakkinen 2016-11-16 20:38 ` Jason Gunthorpe 2 siblings, 0 replies; 10+ messages in thread From: Jarkko Sakkinen @ 2016-11-16 15:38 UTC (permalink / raw) To: Stefan Berger; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 08:56:13AM -0500, Stefan Berger wrote: > Check the bios_dir entry for NULL before accessing it. Currently > this crashes the driver when a TPM 2 is attached and the entries > are NULL. > > Signed-off-by: Stefan Berger <stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > --- > drivers/char/tpm/tpm_eventlog.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/drivers/char/tpm/tpm_eventlog.c b/drivers/char/tpm/tpm_eventlog.c > index ebec4ac..fb603a7 100644 > --- a/drivers/char/tpm/tpm_eventlog.c > +++ b/drivers/char/tpm/tpm_eventlog.c > @@ -455,10 +455,12 @@ void tpm_bios_log_teardown(struct tpm_chip *chip) > * This design ensures that open() either safely gets kref or fails. > */ > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > - inode = d_inode(chip->bios_dir[i]); > - inode_lock(inode); > - inode->i_private = NULL; > - inode_unlock(inode); > - securityfs_remove(chip->bios_dir[i]); > + if (chip->bios_dir[i]) { > + inode = d_inode(chip->bios_dir[i]); > + inode_lock(inode); > + inode->i_private = NULL; > + inode_unlock(inode); > + securityfs_remove(chip->bios_dir[i]); > + } > } > } > -- > 2.4.3 /Jarkko ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> 2016-11-16 14:58 ` Nayna 2016-11-16 15:38 ` Jarkko Sakkinen @ 2016-11-16 20:38 ` Jason Gunthorpe [not found] ` <20161116203853.GA22708-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 2 siblings, 1 reply; 10+ messages in thread From: Jason Gunthorpe @ 2016-11-16 20:38 UTC (permalink / raw) To: Stefan Berger; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 08:56:13AM -0500, Stefan Berger wrote: > Check the bios_dir entry for NULL before accessing it. Currently > this crashes the driver when a TPM 2 is attached and the entries > are NULL. Yep > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > - inode = d_inode(chip->bios_dir[i]); > - inode_lock(inode); > - inode->i_private = NULL; > - inode_unlock(inode); > - securityfs_remove(chip->bios_dir[i]); > + if (chip->bios_dir[i]) { Nope, this must be is_err_or_null, we store err ptrs in this array. Jason ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20161116203853.GA22708-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <20161116203853.GA22708-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> @ 2016-11-16 22:06 ` Jarkko Sakkinen [not found] ` <20161116220633.yfvpnvps3e222527-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Jarkko Sakkinen @ 2016-11-16 22:06 UTC (permalink / raw) To: Jason Gunthorpe; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 01:38:53PM -0700, Jason Gunthorpe wrote: > On Wed, Nov 16, 2016 at 08:56:13AM -0500, Stefan Berger wrote: > > Check the bios_dir entry for NULL before accessing it. Currently > > this crashes the driver when a TPM 2 is attached and the entries > > are NULL. > > Yep > > > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > > - inode = d_inode(chip->bios_dir[i]); > > - inode_lock(inode); > > - inode->i_private = NULL; > > - inode_unlock(inode); > > - securityfs_remove(chip->bios_dir[i]); > > + if (chip->bios_dir[i]) { > > Nope, this must be is_err_or_null, we store err ptrs in this array. " err: chip->bios_dir[cnt] = NULL; " There is assignment to NULL so this should be fine. /JArko ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20161116220633.yfvpnvps3e222527-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <20161116220633.yfvpnvps3e222527-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2016-11-16 22:08 ` Jarkko Sakkinen 2016-11-16 23:56 ` Jason Gunthorpe 1 sibling, 0 replies; 10+ messages in thread From: Jarkko Sakkinen @ 2016-11-16 22:08 UTC (permalink / raw) To: Jason Gunthorpe; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 02:06:33PM -0800, Jarkko Sakkinen wrote: > On Wed, Nov 16, 2016 at 01:38:53PM -0700, Jason Gunthorpe wrote: > > On Wed, Nov 16, 2016 at 08:56:13AM -0500, Stefan Berger wrote: > > > Check the bios_dir entry for NULL before accessing it. Currently > > > this crashes the driver when a TPM 2 is attached and the entries > > > are NULL. > > > > Yep > > > > > for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) { > > > - inode = d_inode(chip->bios_dir[i]); > > > - inode_lock(inode); > > > - inode->i_private = NULL; > > > - inode_unlock(inode); > > > - securityfs_remove(chip->bios_dir[i]); > > > + if (chip->bios_dir[i]) { > > > > Nope, this must be is_err_or_null, we store err ptrs in this array. > > " > err: > chip->bios_dir[cnt] = NULL; > " > > There is assignment to NULL so this should be fine. Applied. Not yet squashed. I'll save that for the next week and possible other squashes to the point when I prepare the pull request. /Jarkko ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] tpm: Check the bios_dir entry for NULL before accessing it [not found] ` <20161116220633.yfvpnvps3e222527-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2016-11-16 22:08 ` Jarkko Sakkinen @ 2016-11-16 23:56 ` Jason Gunthorpe 1 sibling, 0 replies; 10+ messages in thread From: Jason Gunthorpe @ 2016-11-16 23:56 UTC (permalink / raw) To: Jarkko Sakkinen; +Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Wed, Nov 16, 2016 at 02:06:33PM -0800, Jarkko Sakkinen wrote: > > > > Nope, this must be is_err_or_null, we store err ptrs in this array. > > " > err: > chip->bios_dir[cnt] = NULL; > " > > There is assignment to NULL so this should be fine. Oh good, I'm glad that made it in Jason ------------------------------------------------------------------------------ ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2016-11-16 23:56 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-16 13:56 [PATCH] tpm: Check the bios_dir entry for NULL before accessing it Stefan Berger
[not found] ` <1479304573-13601-1-git-send-email-stefanb-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-11-16 14:58 ` Nayna
[not found] ` <582C7416.7090105-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-11-16 15:40 ` Jarkko Sakkinen
[not found] ` <20161116154027.i6rtsl2mendbb4ce-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-11-16 15:49 ` Stefan Berger
[not found] ` <f4a7d9a4-c832-fd06-6a62-7b800f42585f-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-11-16 17:57 ` Jarkko Sakkinen
2016-11-16 15:38 ` Jarkko Sakkinen
2016-11-16 20:38 ` Jason Gunthorpe
[not found] ` <20161116203853.GA22708-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2016-11-16 22:06 ` Jarkko Sakkinen
[not found] ` <20161116220633.yfvpnvps3e222527-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-11-16 22:08 ` Jarkko Sakkinen
2016-11-16 23:56 ` Jason Gunthorpe
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).