[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-112631-13602-f2pCFB0vFw@https.bugzilla.kernel.org/>
Date: Sat, 20 Feb 2016 02:28:03 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: linux-ext4@...r.kernel.org
Subject: [Bug 112631] Cannot open encrypted Luks root filesystem
https://bugzilla.kernel.org/show_bug.cgi?id=112631
Andreas Amann <andreas.amann@....de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |andreas.amann@....de
--- Comment #3 from Andreas Amann <andreas.amann@....de> ---
I have the same problem. Bisection leads to the following commit:
commit 0571ba52a19e18a1c20469454231eef681cb1310
Author: Herbert Xu <herbert@...dor.apana.org.au>
Date: Wed Dec 30 11:47:53 2015 +0800
crypto: af_alg - Disallow bind/setkey/... after accept(2)
[ Upstream commit c840ac6af3f8713a71b4d2363419145760bd6044 ]
Each af_alg parent socket obtained by socket(2) corresponds to a
tfm object once bind(2) has succeeded. An accept(2) call on that
parent socket creates a context which then uses the tfm object.
Therefore as long as any child sockets created by accept(2) exist
the parent socket must not be modified or freed.
This patch guarantees this by using locks and a reference count
on the parent socket. Any attempt to modify the parent socket will
fail with EBUSY.
Cc: stable@...r.kernel.org
Reported-by: Dmitry Vyukov <dvyukov@...gle.com>
Signed-off-by: Herbert Xu <herbert@...dor.apana.org.au>
Signed-off-by: Sasha Levin <sasha.levin@...cle.com>
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists