lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201001201811.o0KIBHBk013799@demeter.kernel.org>
Date:	Wed, 20 Jan 2010 18:11:17 GMT
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 14256] kernel BUG at fs/ext3/super.c:435

http://bugzilla.kernel.org/show_bug.cgi?id=14256





--- Comment #31 from Darren Hart <dvhltc@...ibm.com>  2010-01-20 18:11:16 ---
Jan, I apologize, I missed the shared mapping. I wouldn't expect Kosaki's patch
to fix this. Have you experimented with the SHARED, RECURSIVE, and PRIO_INHERIT
flags of the mutexattr to see if this is the only configuration in which you
see the problem? Understanding which of these flags are required to reproduce
would help point at where to look in the code. Right now I suspect a futex key
reference imbalance in the futex_lock_pi() code path. 2.6.29 includes changes
from me on fault handling as well as key reference imbalance fixes in this
area.

Mikael, please let me know what your git bisection reveals.

I'm trying to make time to do some testing/analysis myself, but I'm being kept
very busy on other pressing issues right now, so I may not be able to respond
as quickly as I'd like.

-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ