lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 10 Aug 2021 10:13:59 +0530 From: Ashish Mhetre <amhetre@...dia.com> To: <amhetre@...dia.com>, <robin.murphy@....com>, <will@...nel.org>, <vdumpa@...dia.com> CC: <iommu@...ts.linux-foundation.org>, <linux-kernel@...r.kernel.org>, <linux-arm-kernel@...ts.infradead.org> Subject: [Patch V3 0/2] iommu/arm-smmu: Fix races in iommu domain/group creation When two devices with same SID are getting probed concurrently through iommu_probe_device(), the iommu_group and iommu_domain are allocated more than once because they are not protected for concurrency. This is leading to context faults when one device is accessing IOVA from other device. Fix this by protecting iommu_domain and iommu_group creation with mutexes. Changes in v3: * Updated commit messages. * Added Signed-off-by in patch 2. Ashish Mhetre (1): iommu: Fix race condition during default domain allocation Krishna Reddy (1): iommu/arm-smmu: Fix race condition during iommu_group creation drivers/iommu/arm/arm-smmu/arm-smmu.c | 6 +++++- drivers/iommu/iommu.c | 2 ++ 2 files changed, 7 insertions(+), 1 deletion(-) -- 2.7.4
Powered by blists - more mailing lists