lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 14 Dec 2010 10:10:07 +0100 From: Peter Zijlstra <peterz@...radead.org> To: Hugh Dickins <hughd@...gle.com> Cc: Andrew Morton <akpm@...ux-foundation.org>, Miklos Szeredi <miklos@...redi.hu>, Michael Leun <lkml20101129@...ton.leun.net>, linux-kernel@...r.kernel.org, linux-mm@...ck.org Subject: Re: kernel BUG at mm/truncate.c:475! On Mon, 2010-12-13 at 23:31 -0800, Hugh Dickins wrote: > > then I suspect all the vm_truncate_count/restart_addr stuff can go away? > > That would be lovely, but in fact no: it's guarding against operations on > vmas, things like munmap and mprotect, which can shuffle the prio_tree > when i_mmap_lock is dropped, without i_mutex ever being taken. > > However, if we adopt Peter's preemptible mmu_gather patches, i_mmap_lock > becomes a mutex, so there's then no need for any of this (I think Peter > just did a straight conversion here, leaving it in, but it becomes > pointless and would gladly be removed). I'm still trying to sell that series, so if you see any value in it, please reply with positive feedback ;-) Also, the whole vm_truncate_count/restart_addr isn't entirely useless, its still a lock break which might help with long held locks. Imagine someone trying to unmap several TB worth of pages at once (not entirely beyond the realm of possibility today, and we all know tomorrow will be huge). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists