lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160926160724.GA6739@redhat.com>
Date:   Mon, 26 Sep 2016 18:07:24 +0200
From:   Oleg Nesterov <oleg@...hat.com>
To:     Al Viro <viro@...iv.linux.org.uk>
Cc:     Dave Chinner <david@...morbit.com>, Jan Kara <jack@...e.cz>,
        Nikolay Borisov <kernel@...p.com>,
        "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
        linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] (Was: BUG_ON in rcu_sync_func triggered)

Hello,

The patches do not depend on each other.

1/2 is the trivial fix, imo -stable material. The bug is very old it seems,
but today this race (leading to unbalanced unlock)  manifests itself via
mysterious BUG_ON's in rcu/sync.c.

2/2 is old, I forgot to send it before. It was already reviewed by Dave and Jan,
but the generic/068 test from xfstests triggered the warning. This was fixed by
dbad7c993053 "xfs: stop holding ILOCK over filldir callbacks" so we can hopefully
kill the early-lockdep-release kludge.

Oleg.

 fs/super.c | 43 ++++++++++++++++++++++++++++---------------
 1 file changed, 28 insertions(+), 15 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ