lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 14 Jun 2022 21:58:41 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     wangyufen <wangyufen@...wei.com>,
        syzbot <syzbot+140186ceba0c496183bc@...kaller.appspotmail.com>,
        andrii@...nel.org, ast@...nel.org, bpf@...r.kernel.org,
        davem@...emloft.net, edumazet@...gle.com, jakub@...udflare.com,
        john.fastabend@...il.com, kafai@...com, kpsingh@...nel.org,
        kuba@...nel.org, linux-kernel@...r.kernel.org,
        netdev@...r.kernel.org, pabeni@...hat.com, songliubraving@...com,
        syzkaller-bugs@...glegroups.com, yhs@...com
Subject: Re: [syzbot] BUG: sleeping function called from invalid context in
 sk_psock_stop

On 6/13/22 12:52 PM, wangyufen wrote:
> 在 2022/6/10 22:35, Daniel Borkmann 写道:
>> On 6/10/22 4:23 PM, syzbot wrote:
>>> Hello,
>>>
>>> syzbot found the following issue on:
>>>
>>> HEAD commit:    ff539ac73ea5 Add linux-next specific files for 20220609
>>> git tree:       linux-next
>>> console+strace: https://syzkaller.appspot.com/x/log.txt?x=176c121bf00000
>>> kernel config: https://syzkaller.appspot.com/x/.config?x=a5002042f00a8bce
>>> dashboard link: https://syzkaller.appspot.com/bug?extid=140186ceba0c496183bc
>>> compiler:       gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
>>> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13083353f00000
>>> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=173e67f0080000
>>>
>>> The issue was bisected to:
>>>
>>> commit d8616ee2affcff37c5d315310da557a694a3303d
>>> Author: Wang Yufen <wangyufen@...wei.com>
>>> Date:   Tue May 24 07:53:11 2022 +0000
>>>
>>>      bpf, sockmap: Fix sk->sk_forward_alloc warn_on in sk_stream_kill_queues
>>
>> Same ping to Wang: Please take a look, otherwise we might need to revert if it stays unfixed.
> 
> Thanks for Hillf's fix : https://groups.google.com/g/syzkaller-bugs/c/zunoClAqFQo/m/6SP7LIQoCQAJ
> 
> and sorry for the delay.

Please send this as a proper fix then, so it lands in patchwork and can be applied.

Thanks,
Daniel

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ