lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2025081422-monetize-ferocity-fe28@gregkh>
Date: Thu, 14 Aug 2025 15:57:55 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: Julian Taylor <julian.taylor@...d1.de>
Cc: patchwork-bot+netdevbpf@...nel.org, Fedor Pchelkin <pchelkin@...ras.ru>,
	davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com,
	kuniyu@...gle.com, edumazet@...gle.com, horms@...nel.org,
	netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
	lvc-project@...uxtesting.org, stable@...r.kernel.org
Subject: Re: [PATCH net] netlink: avoid infinite retry looping in
 netlink_unicast()

On Thu, Aug 14, 2025 at 02:51:27PM +0200, Julian Taylor wrote:
> 
> On 31.07.25 04:30, patchwork-bot+netdevbpf@...nel.org wrote:
> > Hello:
> > 
> > This patch was applied to netdev/net.git (main)
> > by Jakub Kicinski <kuba@...nel.org>:
> > 
> > On Mon, 28 Jul 2025 11:06:47 +0300 you wrote:
> > > netlink_attachskb() checks for the socket's read memory allocation
> > > constraints. Firstly, it has:
> > > 
> > >    rmem < READ_ONCE(sk->sk_rcvbuf)
> > > 
> > > to check if the just increased rmem value fits into the socket's receive
> > > buffer. If not, it proceeds and tries to wait for the memory under:
> > > 
> > > [...]
> > 
> > Here is the summary with links:
> >    - [net] netlink: avoid infinite retry looping in netlink_unicast()
> >      https://git.kernel.org/netdev/net/c/759dfc7d04ba
> > 
> > You are awesome, thank you!
> 
> hello,
> as far as I can tell this patch has not made it to the 6.1 stable tree yet in the 6.1.148 review yet:
> https://www.spinics.net/lists/stable/msg866199.html

Please use lore.kernel.org links.

> As this seems to be causing issues in distributions releasing 6.1.147 can this still be added to the next possible stable release?
> See following issues in relation to loading audit rules which seems to trigger the fixed bug:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111017
> https://github.com/amazonlinux/amazon-linux-2023/issues/988
> 
> I have tested this patch solves the problem in the Debian bookworm using 6.1.x

What is the git commit id of this patch in Linus's tree?

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ