[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<174410523201.1843579.6108769809547984395.git-patchwork-notify@kernel.org>
Date: Tue, 08 Apr 2025 09:40:32 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Ricardo CaƱuelo Navarro <rcn@...lia.com>@codeaurora.org
Cc: marcelo.leitner@...il.com, lucien.xin@...il.com, davem@...emloft.net,
edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, horms@...nel.org,
revest@...gle.com, kernel-dev@...lia.com, linux-sctp@...r.kernel.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org, stable@...r.kernel.org
Subject: Re: [PATCH] sctp: detect and prevent references to a freed transport
in sendmsg
Hello:
This patch was applied to netdev/net.git (main)
by Paolo Abeni <pabeni@...hat.com>:
On Fri, 04 Apr 2025 16:53:21 +0200 you wrote:
> sctp_sendmsg() re-uses associations and transports when possible by
> doing a lookup based on the socket endpoint and the message destination
> address, and then sctp_sendmsg_to_asoc() sets the selected transport in
> all the message chunks to be sent.
>
> There's a possible race condition if another thread triggers the removal
> of that selected transport, for instance, by explicitly unbinding an
> address with setsockopt(SCTP_SOCKOPT_BINDX_REM), after the chunks have
> been set up and before the message is sent. This can happen if the send
> buffer is full, during the period when the sender thread temporarily
> releases the socket lock in sctp_wait_for_sndbuf().
>
> [...]
Here is the summary with links:
- sctp: detect and prevent references to a freed transport in sendmsg
https://git.kernel.org/netdev/net/c/f1a69a940de5
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists