lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <48A35A99.1080300@tlinx.org>
Date:	Wed, 13 Aug 2008 15:05:13 -0700
From:	Linda Walsh <xfs@...nx.org>
To:	Dave Chinner <david@...morbit.com>, xfs-oss <xfs@....sgi.com>
CC:	LKML <linux-kernel@...r.kernel.org>,
	Eric Sandeen <sandeen@...deen.net>
Subject: Re: XFS Lock debugging noise or real problem?

Dave Chinner wrote:
> Once again,
> "a problem with the generic code inverting the normal lock order".
>
> This one cannot deadlock, though, because by definition
> any inode on the unused list is, well, unused and hence we can't be
> holding a reference to it...
----

	This is great, maybe...but what do you mean by "generic"?

	Is this generic in the FS layer such that we'd see
this with all FS types?  Or is it generic "XFS" code that only
happens with various, "application", (user) coded applications that
use locking in a correct, but non-standard order?  Some of these
messages come out of utilities that I wouldn't think would be using
kernel-locking, 'explicitly', at all (gnu-sort).

	If the generic code didn't invert lock orders from the "norm",
could these errors be deleted?  Is it code that all resides in the
kernel and could be made consistent or is it also user-level (or glibc)
apps that are using locks in strange, but correct ways?

I'd *like* to keep lock provability 'on' -- but I don't want
to waste people's time chasing after non-problems and so far I've
seen at least 3 different locking sequences that all appear to be
harmless.

	The problem with false positives is that it will either force
the user to ignore (or turn off) the validation code, or generate
periodic noise when these things arise...

	Isn't it generally considered pretty 'bad' to generate so many
false positives -- or is lock-proving only for for "lock debugging" --
and not to be used except on development or test systems?

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ