Hi,
> -Original Message-
> From: Yann Droneaud [mailto:ydrone...@opteya.com]
> Sent: Thursday, April 02, 2015 1:05 PM
> To: Shachar Raindel
> Cc: oss-secur...@lists.openwall.com;
> (linux-r...@vger.kernel.org); linux-kernel@vger.kernel.org;
> sta...@vger.kernel.o
> -Original Message-
> From: Yann Droneaud [mailto:ydrone...@opteya.com]
> Sent: Thursday, April 02, 2015 7:35 PM
> To: Haggai Eran
> Cc: Shachar Raindel; Sagi Grimberg; oss-secur...@lists.openwall.com;
> (linux-r...@vger.kernel.org); linux-
> ker...
Hi,
> -Original Message-
> From: Yann Droneaud [mailto:ydrone...@opteya.com]
> Sent: Thursday, April 02, 2015 6:16 PM
> To: Shachar Raindel
> Cc: oss-secur...@lists.openwall.com;
> (linux-r...@vger.kernel.org); linux-kernel@vger.kernel.org;
> sta...@vger.kernel.o
f2fs_quota_sync is calling f2fs_lock_op, in an attempt to prevent
an AB/BA type deadlock with quota_sem locking in block_operation.
However, rwsem in Linux is not recursive. As a result, the following
deadlock may occur:
f2fs_quota_sync
down_read(cp_rwsem) // f2fs_lock_op
filemap_fdatawrite
f2fs_w
sting
lock.
Signed-off-by: Shachar Raindel
Fixes: db6ec53b7e03 f2fs: add a rw_sem to cover quota flag changes
---
fs/f2fs/f2fs.h | 3 +++
fs/f2fs/super.c | 13 +++--
2 files changed, 14 insertions(+), 2 deletions(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index cb700d797296..b3e55137b
; Yishai Hadas; Or
> Gerlitz; Haggai Eran; Shachar Raindel; Christoph Lameter; Shawn Bohrer
> Subject: [PATCH v3] ib_umem_release should decrement mm->pinned_vm from
> ib_umem_get
>
> From: Shawn Bohrer
>
> In debugging an application that receives -ENOMEM from ib_reg_mr() I
&
Hi,
I'm afraid this patch, in its current form, will not work.
See below for additional comments.
> -Original Message-
> From: linux-rdma-ow...@vger.kernel.org [mailto:linux-rdma-
> ow...@vger.kernel.org] On Behalf Of Shawn Bohrer
> Sent: Thursday, August 21, 2014 2:23 AM
> To: Roland Dre
Hi,
Generally speaking, code now looks better.
However, I think you have a resource leak in your code. See below.
Thanks,
--Shachar
> -Original Message-
> From: linux-rdma-ow...@vger.kernel.org [mailto:linux-rdma-
> ow...@vger.kernel.org] On Behalf Of Shawn Bohrer
> Sent: Friday, August
> -Original Message-
> From: Thomas Graf [mailto:t...@infradead.org] On Behalf Of Thomas Graf
> Sent: Thursday, February 19, 2015 5:49 PM
> To: Shachar Raindel
> Cc: net...@vger.kernel.org; linux-kernel@vger.kernel.org
> Subject: Re: Use-after-free oops in next-20150204
Hi,
I'm running trinity inside a VM running linux-next tagged next-20150204.
The kernel debugging infrastructure detected a use-after-free situation,
probably in netlink:
[25041.653858]
=
[25041.654502] BUG kmalloc-204
10 matches
Mail list logo