From: Peter Zijlstra
Extract lockdep_assert{,_once}() helpers to more easily write composite
assertions like, for example:
lockdep_assert(lockdep_is_held(&drm_device.master_mutex) ||
lockdep_is_held(&drm_file.master_lookup_lock));
Signed-off-by: Peter Zijlstra (In
From: Shuah Khan
Some kernel functions must be called without holding a specific lock.
Add lockdep_assert_not_held() to be used in these functions to detect
incorrect calls while holding a lock.
lockdep_assert_not_held() provides the opposite functionality of
lockdep_assert_held() which is used
task_will_free_mem() requires the task_lock lock is held or the function
is called on the current, but this is just a function comment,
let's add the proper lockdep check according to this comment.
https://jira.sw.ru/browse/PSBM-143283
Signed-off-by: Konstantin Khorenko
Suggested-by: Nikolay Bor
From: Shuah Khan
Adds defines for lock state returns from lock_is_held_type() based on
Johannes Berg's suggestions as it make it easier to read and maintain
the lock states. These are defines and a enum to avoid changes to
lock_is_held_type() and lockdep_is_held() return types.
Updates to lock_i
--
Best regards,
Konstantin Khorenko,
Virtuozzo Linux Kernel Team
On 26.11.2022 23:15, nb wrote:
On 23.11.22 г. 20:53 ч., Konstantin Khorenko wrote:
Currently it's possible to mark a task as a victim even in case it has
already cleared its ->mm.
This might lead (and leads) to a situation
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit 4009eb1c432a03133677eb76008f9063b9f9b443
Author: Konstantin Khorenko
Date: Wed Nov 23 20:58:56 2022 +0300
o
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit f3efd4f04c384f2d2e16db4f5a6b8b41174906ae
Author: Konstantin Khorenko
Date: Wed Nov 23 19:00:40 2022 +0300
o
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit 542557c8c8bc38655ef771acca6a7d213a728ccc
Author: Shuah Khan
Date: Fri Feb 26 17:06:58 2021 -0700
ms/lockdep
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit 3277a00d3ddc427c8d12be92287b51e1c42b1203
Author: Shuah Khan
Date: Fri Feb 26 17:06:59 2021 -0700
ms/lockdep
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit c7e3b0fe08e47762cc7ab4c46547e53844f4b8b5
Author: Peter Zijlstra
Date: Mon Aug 2 18:59:56 2021 +0800
ms/lock
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.190.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.190.1
-->
commit acce6e8d56cbd2730d12ca3bcd6399d3df3135eb
Author: Konstantin Khorenko
Date: Mon Nov 28 17:44:17 2022 +0300
o
The commit is pushed to "branch-rh9-5.14.0-70.22.1.vz9.17.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh9-5.14.0-70.22.1.vz9.17.11
-->
commit d9dda981a07a092458c78a988923e746aec3a970
Author: Peter Zijlstra
Date: Mon Aug 2 18:59:56 2021 +0800
ms/locking/l
The commit is pushed to "branch-rh9-5.14.0-70.22.1.vz9.17.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh9-5.14.0-70.22.1.vz9.17.11
-->
commit 0b9d9d056113db1de9529d3185c2f0b2fba46e1e
Author: Konstantin Khorenko
Date: Mon Nov 28 20:13:14 2022 +0300
oom: C
When the devtmpfs fails to mount, a dangling pointer still remains in
global. Specifically, the err variable is passed by a pointer to the
devtmpfsd. When the devtmpfsd exits, it sets the error and completes the
setup_done. In this situation, the thread pointer is not set to null.
After the devtmpf
Missing calls to mntget() (or equivalently, too many calls to mntput())
are hard to detect because mntput() delays freeing mounts using
task_work_add(), then again using call_rcu(). As a result, mnt_count
can often be decremented to -1 without getting a KASAN use-after-free
report. Such cases are
syzbot writes:
> KASAN: use-after-free Read in dput (2)
>
> proc_fill_super: allocate dentry failed
> ==
> BUG: KASAN: use-after-free in fast_dput fs/dcache.c:727 [inline]
> BUG: KASAN: use-after-free in dput+0x53e/0xdf0 fs/dcache.c:84
16 matches
Mail list logo