lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20230818160711.k7irnjba3qxx3rfu@skbuf> Date: Fri, 18 Aug 2023 19:07:11 +0300 From: Vladimir Oltean <vladimir.oltean@....com> To: Jamal Hadi Salim <jhs@...atatu.com> Cc: Jakub Kicinski <kuba@...nel.org>, Cong Wang <xiyou.wangcong@...il.com>, Pedro Tammela <pctammela@...atatu.com>, Victor Nogueira <victor@...atatu.com>, syzbot <syzbot+a3618a167af2021433cd@...kaller.appspotmail.com>, bpf@...r.kernel.org, brauner@...nel.org, davem@...emloft.net, edumazet@...gle.com, jiri@...dia.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, pabeni@...hat.com, syzkaller-bugs@...glegroups.com, Vinicius Costa Gomes <vinicius.gomes@...el.com> Subject: Re: [syzbot] [net?] INFO: rcu detected stall in unix_release Hi Jamal, On Fri, Aug 18, 2023 at 11:27:27AM -0400, Jamal Hadi Salim wrote: > Can you try the attached patchlet? Thanks for the patch. I've tried it, and it eliminates the code path (and thus the problem) exposed by the syzbot program, by responding to RTM_NEWQDISC messages having the NLM_F_CREATE|NLM_F_REPLACE|NLM_F_EXCL flags with "Error: Exclusivity flag on, cannot modify.". Actually, to be precise, the first such netlink message successfully creates the qdisc, but then the subsequent ones leave that qdisc alone (don't change it), by failing with this extack message. If that's the behavior that you intended, then I guess the answer is that it works. Thanks a lot. What would be an appropriate Fixes: tag? Side note: I believe that we can now also revert commit be3618d96510 ("net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq"), which was papering over an unknown (at the time) issue - the same as this one - without really even completely covering it, either. Hence this other syzbot report. https://lore.kernel.org/netdev/3b977f76-0289-270e-8310-179315ee927d@huawei.com/T/ https://lore.kernel.org/netdev/20230608062756.3626573-1-shaozhengchao@huawei.com/
Powered by blists - more mailing lists