[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2025081448-version-excursion-1456@gregkh>
Date: Thu, 14 Aug 2025 16:21:46 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: Julian Taylor <julian.taylor@...d1.de>
Cc: patchwork-bot+netdevbpf@...nel.org, Fedor Pchelkin <pchelkin@...ras.ru>,
davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com,
kuniyu@...gle.com, edumazet@...gle.com, horms@...nel.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
lvc-project@...uxtesting.org, stable@...r.kernel.org
Subject: Re: [PATCH net] netlink: avoid infinite retry looping in
netlink_unicast()
On Thu, Aug 14, 2025 at 04:14:39PM +0200, Julian Taylor wrote:
>
>
> On 14.08.25 15:57, Greg KH wrote:
> > On Thu, Aug 14, 2025 at 02:51:27PM +0200, Julian Taylor wrote:
> > >
> > > On 31.07.25 04:30, patchwork-bot+netdevbpf@...nel.org wrote:
> > > > Hello:
> > > >
> > > > This patch was applied to netdev/net.git (main)
> > > > by Jakub Kicinski <kuba@...nel.org>:
> > > >
> > > > On Mon, 28 Jul 2025 11:06:47 +0300 you wrote:
> > > > > netlink_attachskb() checks for the socket's read memory allocation
> > > > > constraints. Firstly, it has:
> > > > >
> > > > > rmem < READ_ONCE(sk->sk_rcvbuf)
> > > > >
> > > > > to check if the just increased rmem value fits into the socket's receive
> > > > > buffer. If not, it proceeds and tries to wait for the memory under:
> > > > >
> > > > > [...]
> > > >
> > > > Here is the summary with links:
> > > > - [net] netlink: avoid infinite retry looping in netlink_unicast()
> > > > https://git.kernel.org/netdev/net/c/759dfc7d04ba
> > > >
> > > > You are awesome, thank you!
> > >
> > > hello,
> > > as far as I can tell this patch has not made it to the 6.1 stable tree yet in the 6.1.148 review yet:
> > > https://www.spinics.net/lists/stable/msg866199.html
> >
> > Please use lore.kernel.org links.
> >
> > > As this seems to be causing issues in distributions releasing 6.1.147 can this still be added to the next possible stable release?
> > > See following issues in relation to loading audit rules which seems to trigger the fixed bug:
> > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111017
> > > https://github.com/amazonlinux/amazon-linux-2023/issues/988
> > >
> > > I have tested this patch solves the problem in the Debian bookworm using 6.1.x
> >
> > What is the git commit id of this patch in Linus's tree?
> >
>
>
> The commit id is 759dfc7d04bab1b0b86113f1164dc1fec192b859
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=759dfc7d04bab1b0b86113f1164dc1fec192b859
Thanks, I'll queue this up for the next round of kernels.
Right now we have a backlog of 500+ patches due to all of these being
added during the -rc1 merge window. Please be patient while we dig
through them.
thanks,
greg k-h
Powered by blists - more mailing lists