lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20240905215550.cegYWVFe@linutronix.de> Date: Thu, 5 Sep 2024 23:55:50 +0200 From: Nam Cao <namcao@...utronix.de> To: Alexandre Ghiti <alexghiti@...osinc.com> Cc: Atish Patra <atishp@...shpatra.org>, Anup Patel <anup@...infault.org>, Will Deacon <will@...nel.org>, Mark Rutland <mark.rutland@....com>, Paul Walmsley <paul.walmsley@...ive.com>, Palmer Dabbelt <palmer@...belt.com>, Albert Ou <aou@...s.berkeley.edu>, linux-riscv@...ts.infradead.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, Andrea Parri <parri.andrea@...il.com> Subject: Re: [PATCH -fixes v2] drivers: perf: Fix smp_processor_id() use in preemptible code On Thu, Aug 29, 2024 at 11:00:34AM +0200, Alexandre Ghiti wrote: > As reported in [1], the use of smp_processor_id() in > pmu_sbi_device_probe() must be protected by disabling the preemption, so > simply use get_cpu()/put_cpu() instead. > > Reported-by: Andrea Parri <parri.andrea@...il.com> > Reported-by: Nam Cao <namcao@...utronix.de> > Closes: https://lore.kernel.org/linux-riscv/20240820074925.ReMKUPP3@linutronix.de/ [1] > Signed-off-by: Alexandre Ghiti <alexghiti@...osinc.com> Tested-by: Nam Cao <namcao@...utronix.de> Best regards, Nam
Powered by blists - more mailing lists