lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 15 Jun 2020 00:40:38 +0000
From:   bugzilla-daemon@...zilla.kernel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 208173] BUG: using smp_processor_id() in preemptible, caller is
 ext4_mb_new_blocks

https://bugzilla.kernel.org/show_bug.cgi?id=208173

--- Comment #3 from Tom Seewald (tseewald@...il.com) ---
After looking around, syzkaller already found this bug [1], and a fix was
already posted [2] but Linus didn't pull it before tagging the rc1 release.

I manually applied commit 811985365378df01386c3cfb7ff716e74ca376d5 ("ext4:
mballoc: Use this_cpu_read instead of this_cpu_ptr") from
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git, and I can
confirm that this fixes the problem. Hopefully this makes it in by rc2.

I'll close this report once Linus pulls the fix.

[1]
https://syzkaller.appspot.com/bug?id=b7f459091a40a67a13f27d2281281ffd0ed8e5e1
[2] https://lore.kernel.org/lkml/20200614200034.GA3294624@mit.edu/T/

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ