lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 8 Aug 2006 09:41:27 -0700
From:	"Luck, Tony" <tony.luck@...el.com>
To:	Alan Cox <alan@...rguk.ukuu.org.uk>
Cc:	Arjan van de Ven <arjan@...ux.intel.com>,
	linux-kernel@...r.kernel.org, davem@...hat.com, sds@...ho.nsa.gov,
	jack@...e.cz, dwmw2@...radead.org, jdike@...aya.com,
	James.Bottomley@...senPartnership.com
Subject: Re: How to lock current->signal->tty

On Tue, Aug 08, 2006 at 04:44:36PM +0100, Alan Cox wrote:
> Ar Maw, 2006-08-08 am 08:10 -0700, ysgrifennodd Arjan van de Ven:
> > > Unfortunately:
> > > 	Dquot passes the tty to tty_write_message without locking
> > > 	arch/ia64/kernel/unanligned seems to write to it without locking
> > 
> > these two have absolutely no business at all using anything tty.... they should
> > just use printk with KERN_EMERG or whatever
> 
> Dquot does - it writes to the controlling tty of the process exceeding
> quota . That is standard Unix behaviour

IA-64 is also trying to be helpful by putting the message where
the user may actually see it (following the dquot precedent).  But
the whole subject of whether we should print any messages for
unaligned accesses at all is rather controversial.  So its a 50-50
shot whether I'll fix it by adding the mutex_lock/mutex_unlock
around the use of current->signal->tty, or just rip this out and
just leave the printk().

-Tony
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ