lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 06 Nov 2007 16:18:21 +0900 From: Toshiharu Harada <haradats@...data.co.jp> To: Arjan van de Ven <arjan@...radead.org> CC: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>, linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, crispin@...spincowan.com Subject: Re: Problem with accessing namespace_sem from LSM. On 11/6/2007 1:11 PM, Arjan van de Ven wrote: > On Tue, 06 Nov 2007 13:00:41 +0900 > Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp> wrote: > >> Hello. >> >> I found that accessing namespace_sem from security_inode_create() >> causes lockdep warning when compiled with CONFIG_PROVE_LOCKING=y . > > sounds like you have an AB-BA deadlock... sed /you/AppArmor shipped with OpenSuSE 10.1 and 10.2/ :) Though I don't think this deadlock should occur quite often, it occurs when it occurs. Care should be taken promptly. There should be no way around for this problem as its nature. Passing vfsmount parameter to VFS helper functions and LSM hooks seems to be a good choice to me. Cheers, Toshiharu Harada - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists