lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Wed, 01 Mar 2017 20:58:16 -0800 (PST)
From:   David Miller <>
Subject: Re: [PATCH net] net: net_enable_timestamp() can be called from irq

From: Eric Dumazet <>
Date: Wed, 01 Mar 2017 14:28:39 -0800

> From: Eric Dumazet <>
> It is now very clear that silly TCP listeners might play with
> enabling/disabling timestamping while new children are added
> to their accept queue.
> Meaning net_enable_timestamp() can be called from BH context
> while current state of the static key is not enabled.
> Lets play safe and allow all contexts.
> The work queue is scheduled only under the problematic cases,
> which are the static key enable/disable transition, to not slow down
> critical paths.
> This extends and improves what we did in commit 5fa8bbda38c6 ("net: use
> a work queue to defer net_disable_timestamp() work")
> Fixes: b90e5794c5bd ("net: dont call jump_label_dec from irq context")
> Signed-off-by: Eric Dumazet <>
> Reported-by: Dmitry Vyukov <>

Applied and queued up for -stable.

Powered by blists - more mailing lists