stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()")
@ 2019-05-09 16:54 Zubin Mithra
  2019-05-09 17:29 ` Greg KH
  0 siblings, 1 reply; 2+ messages in thread
From: Zubin Mithra @ 2019-05-09 16:54 UTC (permalink / raw)
  To: stable
  Cc: gregkh, groeck, xiyou.wangcong, davem, kuznet, jmorris, yoshfuji,
	kaber

Hello,

Syzkaller has triggered a lockdep warning when fuzzing a 4.4 kernel with the following stacktrace.

Call Trace:
 [<ffffffff81cb9fad>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81cb9fad>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
 [<ffffffff813eceac>] print_circular_bug.cold.51+0x1bd/0x27d kernel/locking/lockdep.c:1226
 [<ffffffff81207f1a>] check_prev_add kernel/locking/lockdep.c:1853 [inline]
 [<ffffffff81207f1a>] check_prevs_add kernel/locking/lockdep.c:1958 [inline]
 [<ffffffff81207f1a>] validate_chain kernel/locking/lockdep.c:2144 [inline]
 [<ffffffff81207f1a>] __lock_acquire+0x38da/0x52a0 kernel/locking/lockdep.c:3213
 [<ffffffff8120b0be>] lock_acquire+0x15e/0x440 kernel/locking/lockdep.c:3592
 [<ffffffff82a53056>] __mutex_lock_common kernel/locking/mutex.c:624 [inline]
 [<ffffffff82a53056>] mutex_lock_nested+0xc6/0x10b0 kernel/locking/mutex.c:744
 [<ffffffff822e186c>] rtnl_lock+0x1c/0x20 net/core/rtnetlink.c:70
 [<ffffffff828ae743>] ipv6_sock_mc_close+0x113/0x350 net/ipv6/mcast.c:288
 [<ffffffff82875f06>] do_ipv6_setsockopt.isra.12+0xce6/0x2cc0 net/ipv6/ipv6_sockglue.c:202
 [<ffffffff82877f7c>] ipv6_setsockopt+0x9c/0x130 net/ipv6/ipv6_sockglue.c:905
 [<ffffffff828863af>] udpv6_setsockopt+0x4f/0x90 net/ipv6/udp.c:1436
 [<ffffffff82250fef>] sock_common_setsockopt+0x9f/0xe0 net/core/sock.c:2693
 [<ffffffff8224e223>] SYSC_setsockopt net/socket.c:1780 [inline]
 [<ffffffff8224e223>] SyS_setsockopt+0x163/0x250 net/socket.c:1759
 [<ffffffff82a5f267>] entry_SYSCALL_64_fastpath+0x1e/0xa0

Could the following patch be applied in order to v4.4.y? This patch is present in
linux-4.9.y.
* 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()")

Tests run:
* Chrome OS tryjobs
* Syzkaller reproducer


Thanks,
- Zubin

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()")
  2019-05-09 16:54 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()") Zubin Mithra
@ 2019-05-09 17:29 ` Greg KH
  0 siblings, 0 replies; 2+ messages in thread
From: Greg KH @ 2019-05-09 17:29 UTC (permalink / raw)
  To: Zubin Mithra
  Cc: stable, groeck, xiyou.wangcong, davem, kuznet, jmorris, yoshfuji,
	kaber

On Thu, May 09, 2019 at 09:54:14AM -0700, Zubin Mithra wrote:
> Hello,
> 
> Syzkaller has triggered a lockdep warning when fuzzing a 4.4 kernel with the following stacktrace.
> 
> Call Trace:
>  [<ffffffff81cb9fad>] __dump_stack lib/dump_stack.c:15 [inline]
>  [<ffffffff81cb9fad>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
>  [<ffffffff813eceac>] print_circular_bug.cold.51+0x1bd/0x27d kernel/locking/lockdep.c:1226
>  [<ffffffff81207f1a>] check_prev_add kernel/locking/lockdep.c:1853 [inline]
>  [<ffffffff81207f1a>] check_prevs_add kernel/locking/lockdep.c:1958 [inline]
>  [<ffffffff81207f1a>] validate_chain kernel/locking/lockdep.c:2144 [inline]
>  [<ffffffff81207f1a>] __lock_acquire+0x38da/0x52a0 kernel/locking/lockdep.c:3213
>  [<ffffffff8120b0be>] lock_acquire+0x15e/0x440 kernel/locking/lockdep.c:3592
>  [<ffffffff82a53056>] __mutex_lock_common kernel/locking/mutex.c:624 [inline]
>  [<ffffffff82a53056>] mutex_lock_nested+0xc6/0x10b0 kernel/locking/mutex.c:744
>  [<ffffffff822e186c>] rtnl_lock+0x1c/0x20 net/core/rtnetlink.c:70
>  [<ffffffff828ae743>] ipv6_sock_mc_close+0x113/0x350 net/ipv6/mcast.c:288
>  [<ffffffff82875f06>] do_ipv6_setsockopt.isra.12+0xce6/0x2cc0 net/ipv6/ipv6_sockglue.c:202
>  [<ffffffff82877f7c>] ipv6_setsockopt+0x9c/0x130 net/ipv6/ipv6_sockglue.c:905
>  [<ffffffff828863af>] udpv6_setsockopt+0x4f/0x90 net/ipv6/udp.c:1436
>  [<ffffffff82250fef>] sock_common_setsockopt+0x9f/0xe0 net/core/sock.c:2693
>  [<ffffffff8224e223>] SYSC_setsockopt net/socket.c:1780 [inline]
>  [<ffffffff8224e223>] SyS_setsockopt+0x163/0x250 net/socket.c:1759
>  [<ffffffff82a5f267>] entry_SYSCALL_64_fastpath+0x1e/0xa0
> 
> Could the following patch be applied in order to v4.4.y? This patch is present in
> linux-4.9.y.
> * 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()")
> 
> Tests run:
> * Chrome OS tryjobs
> * Syzkaller reproducer

Now queued up, thanks.

greg k-h

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2019-05-09 17:29 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-05-09 16:54 8651be8f14a1 ("ipv6: fix a potential deadlock in do_ipv6_setsockopt()") Zubin Mithra
2019-05-09 17:29 ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).