lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AE90C24D6B3A694183C094C60CF0A2F6D8ADFF@saturn3.aculab.com>
Date:	Tue, 19 Jul 2011 09:26:35 +0100
From:	"David Laight" <David.Laight@...LAB.COM>
To:	"Shan Hai" <haishan.bai@...il.com>,
	"Benjamin Herrenschmidt" <benh@...nel.crashing.org>
Cc:	<tony.luck@...el.com>, "Peter Zijlstra" <a.p.zijlstra@...llo.nl>,
	"Peter Zijlstra" <peterz@...radead.org>,
	<linux-kernel@...r.kernel.org>, <cmetcalf@...era.com>,
	<dhowells@...hat.com>, <paulus@...ba.org>, <tglx@...utronix.de>,
	<walken@...gle.com>, <linuxppc-dev@...ts.ozlabs.org>,
	<akpm@...ux-foundation.org>
Subject: RE: [RFC/PATCH] mm/futex: Fix futex writes on archs with SW trackingof dirty & young

 
> Got it, if the fault_in_user_writeable() is designed to catch the
> exact same write permission fault problem we discuss here, so
> your patch fixed that very nicely, we should fixup it by directly
> calling handle_mm_fault like what you did because we are for sure
> to know what just happened(permission violation), its not necessary
> to check what's happened by calling gup-->follow_page, and
> further the follow_page failed to report the fault :-)

One thought I've had - and I don't know enough about the data
area in use to know if it is a problem - is what happens if
a different cpu faults on the same user page and has already
marked it 'valid' between the fault happening and the fault
handler looking at the page tables to find out why.
If any of the memory areas are shared, it might be that the
PTE (etc) might already show the page a writable by the
time the fault handler is looking at them - this might confuse it!

	David


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ