From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net-next] net: sched: fix unprotected access to rcu cookie pointer Date: Wed, 11 Jul 2018 23:01:24 -0700 (PDT) Message-ID: <20180711.230124.620436909136588461.davem@davemloft.net> References: <1531157207-10850-1-git-send-email-vladbu@mellanox.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, jhs@mojatatu.com, xiyou.wangcong@gmail.com, jiri@resnulli.us, marcelo.leitner@gmail.com To: vladbu@mellanox.com Return-path: Received: from shards.monkeyblade.net ([23.128.96.9]:54528 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725995AbeGLGJY (ORCPT ); Thu, 12 Jul 2018 02:09:24 -0400 In-Reply-To: <1531157207-10850-1-git-send-email-vladbu@mellanox.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Vlad Buslov Date: Mon, 9 Jul 2018 20:26:47 +0300 > Fix action attribute size calculation function to take rcu read lock and > access act_cookie pointer with rcu dereference. > > Fixes: eec94fdb0480 ("net: sched: use rcu for action cookie update") > Reported-by: Marcelo Ricardo Leitner > Signed-off-by: Vlad Buslov Applied.