Re: [patch 0/5] lightweight robust futexes: -V1

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Daniel Walker wrote:

On Thu, 16 Feb 2006, Ingo Molnar wrote:


that's memory corruption - which robust futexes do not (and cannot)
solve. Robustness is mostly about handling sudden death (e.g. which is
due to oom, or is due to a user killing the task, or due to the
application crashing in some non-memory-corrupting way), but it cannot
handle all possible failure modes.


I don't think this is a weakness in Dave or Inaky's versions. Dave at least maintained the bulk of the information in kernel space. The uaddr was used for the fast locking in userspace, but not for maintaining the robustness .

Correct me if I'm wrong Dave.


In the general case of memory corruption, the data protected by the robust futex might be corrupted, and no robust futex implementation can protect against that, In fact it's a lot more likely since the application code has pointers to the data but not to the robust list.

--
Do not meddle in the internals of kernels, for they are subtle and quick to panic.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux