lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 22 Jul 2021 18:36:58 +0900
From:   Tetsuo Handa <>
To:     LinMa <>
Cc:     Desmond Cheong Zhi Xi <>,
        Luiz Augusto von Dentz <>,
        Johan Hedberg <>,
        Marcel Holtmann <>,
        "" <>,
        "David S. Miller" <>,
        Jakub Kicinski <>,
        "open list:NETWORKING [GENERAL]" <>
Subject: Re: [PATCH v3] Bluetooth: call lock_sock() outside of spinlock

On 2021/07/17 0:26, LinMa wrote:
> Hello everyone,
> Sorry, it's my fault to cause the misunderstanding.
> As I keep mentioning "hci_sock_sendmsg()" instead of "hci_sock_bound_ioctl()". In fact,
> both these two functions are able to cause the race.

I sent two patches for avoiding page fault with kernel lock held.

  [PATCH v2] Bluetooth: reorganize ioctls from hci_sock_bound_ioctl()

  [PATCH] Bluetooth: reorganize functions from hci_sock_sendmsg()

These two patches will eliminate user-controlled delay at lock_sock() which

  [PATCH v3] Bluetooth: call lock_sock() outside of spinlock section

would suffer.

Are you aware of more locations which trigger page fault with sock lock held?
If none, we can send these three patches together.

If we are absolutely sure that there is no more locations, we could try choice (1) or (2)
at .

Powered by blists - more mailing lists