Hi Eric, Thanks for your comments, please see my answers inline.
> -----Original Message----- > From: Eric Dumazet <eric.duma...@gmail.com> > Sent: Monday, August 31, 2020 3:15 PM > To: Tuong Tong Lien <tuong.t.l...@dektech.com.au>; da...@davemloft.net; > jma...@redhat.com; ma...@donjonn.com; > ying....@windriver.com; netdev@vger.kernel.org > Cc: tipc-discuss...@lists.sourceforge.net > Subject: Re: [net] tipc: fix using smp_processor_id() in preemptible > > > > On 8/29/20 12:37 PM, Tuong Lien wrote: > > The 'this_cpu_ptr()' is used to obtain the AEAD key' TFM on the current > > CPU for encryption, however the execution can be preemptible since it's > > actually user-space context, so the 'using smp_processor_id() in > > preemptible' has been observed. > > > > We fix the issue by using the 'get/put_cpu_ptr()' API which consists of > > a 'preempt_disable()' instead. > > > > Fixes: fc1b6d6de220 ("tipc: introduce TIPC encryption & authentication") > > Have you forgotten ' Reported-by: > syzbot+263f8c0d007dc09b2...@syzkaller.appspotmail.com' ? Well, really I detected the issue during my testing instead, didn't know if it was reported by syzbot too. > > > Acked-by: Jon Maloy <jma...@redhat.com> > > Signed-off-by: Tuong Lien <tuong.t.l...@dektech.com.au> > > --- > > net/tipc/crypto.c | 12 +++++++++--- > > 1 file changed, 9 insertions(+), 3 deletions(-) > > > > diff --git a/net/tipc/crypto.c b/net/tipc/crypto.c > > index c38babaa4e57..7c523dc81575 100644 > > --- a/net/tipc/crypto.c > > +++ b/net/tipc/crypto.c > > @@ -326,7 +326,8 @@ static void tipc_aead_free(struct rcu_head *rp) > > if (aead->cloned) { > > tipc_aead_put(aead->cloned); > > } else { > > - head = *this_cpu_ptr(aead->tfm_entry); > > + head = *get_cpu_ptr(aead->tfm_entry); > > + put_cpu_ptr(aead->tfm_entry); > > Why is this safe ? > > I think that this very unusual construct needs a comment, because this is not > obvious. > > This really looks like an attempt to silence syzbot to me. No, this is not to silence syzbot but really safe. This is because the "aead->tfm_entry" object is "common" between CPUs, there is only its pointer to be the "per_cpu" one. So just trying to lock the process on the current CPU or 'preempt_disable()', taking the per-cpu pointer and dereferencing to the actual "tfm_entry" object... is enough. Later on, that’s fine to play with the actual object without any locking. BR/Tuong > > > list_for_each_entry_safe(tfm_entry, tmp, &head->list, list) { > > crypto_free_aead(tfm_entry->tfm); > > list_del(&tfm_entry->list); > > @@ -399,10 +400,15 @@ static void tipc_aead_users_set(struct tipc_aead > > __rcu *aead, int val) > > */ > > static struct crypto_aead *tipc_aead_tfm_next(struct tipc_aead *aead) > > { > > - struct tipc_tfm **tfm_entry = this_cpu_ptr(aead->tfm_entry); > > + struct tipc_tfm **tfm_entry; > > + struct crypto_aead *tfm; > > > > + tfm_entry = get_cpu_ptr(aead->tfm_entry); > > *tfm_entry = list_next_entry(*tfm_entry, list); > > - return (*tfm_entry)->tfm; > > + tfm = (*tfm_entry)->tfm; > > + put_cpu_ptr(tfm_entry); > > Again, this looks suspicious to me. I can not explain why this would be safe. > > > + > > + return tfm; > > } > > > > /** > >