lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <176953440910.945615.5240442156824844283.git-patchwork-notify@kernel.org>
Date: Tue, 27 Jan 2026 17:20:09 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Jiayuan Chen <jiayuan.chen@...ux.dev>
Cc: bpf@...r.kernel.org, john.fastabend@...il.com, jakub@...udflare.com,
 davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com,
 horms@...nel.org, ncardwell@...gle.com, kuniyu@...gle.com,
 dsahern@...nel.org, andrii@...nel.org, eddyz87@...il.com, ast@...nel.org,
 daniel@...earbox.net, martin.lau@...ux.dev, song@...nel.org,
 yonghong.song@...ux.dev, kpsingh@...nel.org, sdf@...ichev.me,
 haoluo@...gle.com, jolsa@...nel.org, shuah@...nel.org, mhal@...x.co,
 cong.wang@...edance.com, netdev@...r.kernel.org,
 linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org
Subject: Re: [PATCH bpf-next v9 0/3] bpf: Fix FIONREAD and copied_seq issues

Hello:

This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@...nel.org>:

On Sat, 24 Jan 2026 19:32:42 +0800 you wrote:
> syzkaller reported a bug [1] where a socket using sockmap, after being
> unloaded, exposed incorrect copied_seq calculation. The selftest I
> provided can be used to reproduce the issue reported by syzkaller.
> 
> TCP recvmsg seq # bug 2: copied E92C873, seq E68D125, rcvnxt E7CEB7C, fl 40
> WARNING: CPU: 1 PID: 5997 at net/ipv4/tcp.c:2724 tcp_recvmsg_locked+0xb2f/0x2910 net/ipv4/tcp.c:2724
> Call Trace:
>  <TASK>
>  receive_fallback_to_copy net/ipv4/tcp.c:1968 [inline]
>  tcp_zerocopy_receive+0x131a/0x2120 net/ipv4/tcp.c:2200
>  do_tcp_getsockopt+0xe28/0x26c0 net/ipv4/tcp.c:4713
>  tcp_getsockopt+0xdf/0x100 net/ipv4/tcp.c:4812
>  do_sock_getsockopt+0x34d/0x440 net/socket.c:2421
>  __sys_getsockopt+0x12f/0x260 net/socket.c:2450
>  __do_sys_getsockopt net/socket.c:2457 [inline]
>  __se_sys_getsockopt net/socket.c:2454 [inline]
>  __x64_sys_getsockopt+0xbd/0x160 net/socket.c:2454
>  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
>  do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
>  entry_SYSCALL_64_after_hwframe+0x77/0x7f
> 
> [...]

Here is the summary with links:
  - [bpf-next,v9,1/3] bpf, sockmap: Fix incorrect copied_seq calculation
    https://git.kernel.org/bpf/bpf-next/c/b40cc5adaa80
  - [bpf-next,v9,2/3] bpf, sockmap: Fix FIONREAD for sockmap
    https://git.kernel.org/bpf/bpf-next/c/929e30f93125
  - [bpf-next,v9,3/3] bpf, selftest: Add tests for FIONREAD and copied_seq
    https://git.kernel.org/bpf/bpf-next/c/17e2ce02bf56

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ