lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 30 Aug 2020 19:14:11 -0700 (PDT) From: David Miller <davem@...emloft.net> To: tuong.t.lien@...tech.com.au Cc: jmaloy@...hat.com, maloy@...jonn.com, ying.xue@...driver.com, netdev@...r.kernel.org, tipc-discussion@...ts.sourceforge.net Subject: Re: [net] tipc: fix using smp_processor_id() in preemptible From: Tuong Lien <tuong.t.lien@...tech.com.au> Date: Sun, 30 Aug 2020 02:37:55 +0700 > The 'this_cpu_ptr()' is used to obtain the AEAD key' TFM on the current > CPU for encryption, however the execution can be preemptible since it's > actually user-space context, so the 'using smp_processor_id() in > preemptible' has been observed. > > We fix the issue by using the 'get/put_cpu_ptr()' API which consists of > a 'preempt_disable()' instead. > > Fixes: fc1b6d6de220 ("tipc: introduce TIPC encryption & authentication") > Acked-by: Jon Maloy <jmaloy@...hat.com> > Signed-off-by: Tuong Lien <tuong.t.lien@...tech.com.au> Applied and queued up for -stable.
Powered by blists - more mailing lists