[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160225074344.GB9068@zurbaran.home>
Date: Thu, 25 Feb 2016 08:43:44 +0100
From: Samuel Ortiz <sameo@...ux.intel.com>
To: Cong Wang <xiyou.wangcong@...il.com>
Cc: netdev@...r.kernel.org, dvyukov@...gle.com,
linux-wireless@...r.kernel.org,
Lauro Ramos Venancio <lauro.venancio@...nbossa.org>,
Aloisio Almeida Jr <aloisio.almeida@...nbossa.org>
Subject: Re: [PATCH v2 net] nfc: close a race condition in llcp_sock_getname()
Hi Cong,
On Fri, Jan 29, 2016 at 11:37:40AM -0800, Cong Wang wrote:
> llcp_sock_getname() checks llcp_sock->dev to make sure
> llcp_sock is already connected or bound, however, we could
> be in the middle of llcp_sock_bind() where llcp_sock->dev
> is bound and llcp_sock->service_name_len is set,
> but llcp_sock->service_name is not, in this case we would
> lead to copy some bytes from a NULL pointer.
>
> Just lock the sock since this is not a hot path anyway.
>
> Reported-by: Dmitry Vyukov <dvyukov@...gle.com>
> Cc: Lauro Ramos Venancio <lauro.venancio@...nbossa.org>
> Cc: Aloisio Almeida Jr <aloisio.almeida@...nbossa.org>
> Cc: Samuel Ortiz <sameo@...ux.intel.com>
> Signed-off-by: Cong Wang <xiyou.wangcong@...il.com>
> ---
> net/nfc/llcp_sock.c | 6 ++++++
> 1 file changed, 6 insertions(+)
Applied as well, thanks.
Cheers,
Samuel.
Powered by blists - more mailing lists