RE: CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

2015-04-02 Thread Shachar Raindel
Hi, > -Original Message- > From: Yann Droneaud [mailto:ydrone...@opteya.com] > Sent: Thursday, April 02, 2015 1:05 PM > To: Shachar Raindel > Cc: oss-secur...@lists.openwall.com; > (linux-r...@vger.kernel.org); linux-kernel@vger.kernel.org; > sta...@vger.kernel.o

RE: CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

2015-04-02 Thread Shachar Raindel
> -Original Message- > From: Yann Droneaud [mailto:ydrone...@opteya.com] > Sent: Thursday, April 02, 2015 7:35 PM > To: Haggai Eran > Cc: Shachar Raindel; Sagi Grimberg; oss-secur...@lists.openwall.com; > (linux-r...@vger.kernel.org); linux- > ker...

RE: CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

2015-04-02 Thread Shachar Raindel
Hi, > -Original Message- > From: Yann Droneaud [mailto:ydrone...@opteya.com] > Sent: Thursday, April 02, 2015 6:16 PM > To: Shachar Raindel > Cc: oss-secur...@lists.openwall.com; > (linux-r...@vger.kernel.org); linux-kernel@vger.kernel.org; > sta...@vger.kernel.o

[PATCH] f2fs: Fix deadlock between f2fs_quota_sync and block_operation

2020-11-28 Thread Shachar Raindel
f2fs_quota_sync is calling f2fs_lock_op, in an attempt to prevent an AB/BA type deadlock with quota_sem locking in block_operation. However, rwsem in Linux is not recursive. As a result, the following deadlock may occur: f2fs_quota_sync down_read(cp_rwsem) // f2fs_lock_op filemap_fdatawrite f2fs_w

[PATCH] f2fs: Fix deadlock between f2fs_quota_sync and block_operation

2020-11-28 Thread Shachar Raindel
sting lock. Signed-off-by: Shachar Raindel Fixes: db6ec53b7e03 f2fs: add a rw_sem to cover quota flag changes --- fs/f2fs/f2fs.h | 3 +++ fs/f2fs/super.c | 13 +++-- 2 files changed, 14 insertions(+), 2 deletions(-) diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h index cb700d797296..b3e55137b

RE: [PATCH v3] ib_umem_release should decrement mm->pinned_vm from ib_umem_get

2014-09-15 Thread Shachar Raindel
; Yishai Hadas; Or > Gerlitz; Haggai Eran; Shachar Raindel; Christoph Lameter; Shawn Bohrer > Subject: [PATCH v3] ib_umem_release should decrement mm->pinned_vm from > ib_umem_get > > From: Shawn Bohrer > > In debugging an application that receives -ENOMEM from ib_reg_mr() I &

RE: [PATCH] ib_umem_release should decrement mm->pinned_vm from ib_umem_get

2014-08-21 Thread Shachar Raindel
Hi, I'm afraid this patch, in its current form, will not work. See below for additional comments. > -Original Message- > From: linux-rdma-ow...@vger.kernel.org [mailto:linux-rdma- > ow...@vger.kernel.org] On Behalf Of Shawn Bohrer > Sent: Thursday, August 21, 2014 2:23 AM > To: Roland Dre

RE: [PATCH v2] ib_umem_release should decrement mm->pinned_vm from ib_umem_get

2014-08-31 Thread Shachar Raindel
Hi, Generally speaking, code now looks better. However, I think you have a resource leak in your code. See below. Thanks, --Shachar > -Original Message- > From: linux-rdma-ow...@vger.kernel.org [mailto:linux-rdma- > ow...@vger.kernel.org] On Behalf Of Shawn Bohrer > Sent: Friday, August

RE: Use-after-free oops in next-20150204 - probably nelink related

2015-02-21 Thread Shachar Raindel
> -Original Message- > From: Thomas Graf [mailto:t...@infradead.org] On Behalf Of Thomas Graf > Sent: Thursday, February 19, 2015 5:49 PM > To: Shachar Raindel > Cc: net...@vger.kernel.org; linux-kernel@vger.kernel.org > Subject: Re: Use-after-free oops in next-20150204

Use-after-free oops in next-20150204 - probably nelink related

2015-02-18 Thread Shachar Raindel
Hi, I'm running trinity inside a VM running linux-next tagged next-20150204. The kernel debugging infrastructure detected a use-after-free situation, probably in netlink: [25041.653858] = [25041.654502] BUG kmalloc-204