lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 29 Nov 2017 16:41:45 +0100
From:   Daniel Vetter <>
To:     LKML <>,
        Peter Zijlstra <>,
        Ingo Molnar <>,
        Thomas Gleixner <>
Cc:     Intel Graphics Development <>,
        Tejun Heo <>, Kees Cook <>,
        Daniel Vetter <>,
        Tvrtko Ursulin <>,
        Marta Lofstedt <>,
        Daniel Vetter <>
Subject: [PATCH 2/2] lockdep: Up MAX_LOCKDEP_CHAINS

cross-release ftl

>From Chris:

"Fwiw, this isn't cross-release but us reloading the module many times,
creating a whole host of new lockclasses. Even more fun is when the
module gets a slightly different address and the new lock address hashes
into an old lock...

"I did think about a module-hook to revoke the stale lockclasses, but
that still leaves all the hashed chains.

"This particular nuisance was temporarily pushed back by teaching igt not
to reload i915.ko on a whim."

Cc: Tvrtko Ursulin <>
Cc: Marta Lofstedt <>
Signed-off-by: Daniel Vetter <>
 kernel/locking/lockdep_internals.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel/locking/lockdep_internals.h b/kernel/locking/lockdep_internals.h
index d459d624ba2a..41630a5385c6 100644
--- a/kernel/locking/lockdep_internals.h
+++ b/kernel/locking/lockdep_internals.h
@@ -69,7 +69,7 @@ enum {
  * Stack-trace: tightly packed array of stack backtrace

Powered by blists - more mailing lists