NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/44369 (raw_usrreq() may fail to release kernel lock)

The following reply was made to PR kern/44369; it has been noted by GNATS.

From: Antti Kantee <>
To: Manuel Bouyer <>
Subject: Re: kern/44369 (raw_usrreq() may fail to release kernel lock)
Date: Thu, 13 Jan 2011 19:31:29 +0200

 On Wed Jan 12 2011 at 19:27:56 +0100, Manuel Bouyer wrote:
 > On Tue, Jan 11, 2011 at 10:53:14AM +0000, wrote:
 > > Synopsis: raw_usrreq() may fail to release kernel lock
 > > 
 > > State-Changed-From-To: open->closed
 > > State-Changed-By:
 > > State-Changed-When: Tue, 11 Jan 2011 12:53:13 +0200
 > > State-Changed-Why:
 > > patch applied.  thanks!
 > Hi,
 > did you check if netbsd-4 or netbsd-5 is affected ?
 > if so, please send pullup requests.
 I checked netbsd-5 now and issued a pullup.  I didn't bother with
 netbsd-4, since yesterday when we analyzed the problem with kefren we
 couldn't find any critical issues: the kernel lock is fully dropped
 always when a lock holder blocks, so biglock leak has effect only when
 when a thread which made a PRU_SENSE call is running.  Additionally,
 the lock level is reset to 0 when an lwp exists (at least currently).
 So while in theory an attacker could use PRU_SENSE from multiple lwps
 and busyloop all of them, there must be easier ways to DoS a system.
 älä karot toivorikkauttas, kyl rätei ja lumpui piisaa

Home | Main Index | Thread Index | Old Index