lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 25 Feb 2015 09:39:08 -0800
From:	Davidlohr Bueso <dave.bueso@...il.com>
To:	Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
Cc:	jmorris@...ei.org, akpm@...ux-foundation.org, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org, takedakn@...data.co.jp,
	linux-security-module@...r.kernel.org,
	tomoyo-dev-en@...ts.sourceforge.jp
Subject: Re: [PATCH v3 3/3] tomoyo: reduce mmap_sem hold for mm->exe_file

On Wed, 2015-02-25 at 20:40 +0900, Tetsuo Handa wrote:
> Davidlohr Bueso wrote:
> > The mm->exe_file is currently serialized with mmap_sem (shared) in order
> > to both safely (1) read the file and (2) compute the realpath by calling
> > tomoyo_realpath_from_path, making it an absolute overkill. Good users will,
> > on the other hand, make use of the more standard get_mm_exe_file(), requiring
> > only holding the mmap_sem to read the value, and relying on reference
> > 
> > Signed-off-by: Davidlohr Bueso <dbueso@...e.de>
> 
> Acked-by: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
> 
> James, will you apply to linux-security.git#next ?
> I'm not using publicly accessible git tree for sending pull requests.

I'm actually trying to route these through Andrew. Because there will be
lock conversions, I'm afraid that if such patches are merged in
different order to Linus' tree, it will break bisectibility as you'd
have races.

Thanks,
Davidlohr



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ