Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750960AbWBPV4x (ORCPT ); Thu, 16 Feb 2006 16:56:53 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932561AbWBPV4x (ORCPT ); Thu, 16 Feb 2006 16:56:53 -0500 Received: from mx2.mail.elte.hu ([157.181.151.9]:40921 "EHLO mx2.mail.elte.hu") by vger.kernel.org with ESMTP id S1750960AbWBPV4x (ORCPT ); Thu, 16 Feb 2006 16:56:53 -0500 Date: Thu, 16 Feb 2006 22:55:05 +0100 From: Ingo Molnar To: Christopher Friesen Cc: Daniel Walker , linux-kernel@vger.kernel.org, Ulrich Drepper , Thomas Gleixner , Arjan van de Ven , Andrew Morton Subject: Re: [patch 0/6] lightweight robust futexes: -V3 Message-ID: <20060216215505.GB2612@elte.hu> References: <20060216094130.GA29716@elte.hu> <1140107585.21681.18.camel@localhost.localdomain> <20060216172435.GC29151@elte.hu> <1140111257.21681.26.camel@localhost.localdomain> <20060216202357.GA21415@elte.hu> <20060216212651.GB25738@elte.hu> <43F4F397.5000704@nortel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <43F4F397.5000704@nortel.com> User-Agent: Mutt/1.4.2.1i X-ELTE-SpamScore: -2.2 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-2.2 required=5.9 tests=ALL_TRUSTED,AWL autolearn=no SpamAssassin version=3.0.3 -2.8 ALL_TRUSTED Did not pass through any untrusted hosts 0.6 AWL AWL: From: address is in the auto white-list X-ELTE-VirusStatus: clean Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 920 Lines: 23 * Christopher Friesen wrote: > Ingo Molnar wrote: > > >basically, ->futex_offset is not blindly trusted by the kernel either: > >it's simply used to calculate a "userspace pointer" value, which it then > >uses in a (secure) get_user() access, to do a FUTEX_WAKEUP. [Note that > >FUTEX_WAKEUP is already done at do_exit() time via the ->clear_child_tid > >userspace pointer.] All in one: this is totally safe. > > As mentioned by Paul...how do you deal with 32/64 compatibility where > your pointers are different sizes? i just replied to Paul's mail with details about this. (Please reply to that mail if there are any open questions.) Ingo - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/