Linux kernel -stable discussions
 help / color / mirror / Atom feed
* [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref
@ 2025-02-25 14:26 Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 1/3] bpf, vsock: Invoke proto::close on close() Luigi Leonardi
                   ` (3 more replies)
  0 siblings, 4 replies; 6+ messages in thread
From: Luigi Leonardi @ 2025-02-25 14:26 UTC (permalink / raw)
  To: Stefano Garzarella, Michal Luczaj, stable
  Cc: Luigi Leonardi, Alexei Starovoitov, John Fastabend,
	Jakub Kicinski, syzbot+9d55b199192a4be7d02c

Hi all,

This series backports three upstream commits:
- 135ffc7 "bpf, vsock: Invoke proto::close on close()"
- fcdd224 "vsock: Keep the binding until socket destruction"
- 78dafe1 "vsock: Orphan socket after transport release"

Although this version of the kernel does not support sockmap, I think
backporting this patch can be useful to reduce conflicts in future
backports [1]. It does not harm the system. The comment it introduces in
the code can be misleading. I added some words in the commit to explain
the situation.

The other two commits are untouched, fixing a use-after free[2] and a
null-ptr-deref[3] respectively.

[1]https://lore.kernel.org/stable/f7lr3ftzo66sl6phlcygh4xx4spga4b6je37fhawjrsjtexzne@xhhwaqrjznlp/
[2]https://lore.kernel.org/all/20250128-vsock-transport-vs-autobind-v3-0-1cf57065b770@rbox.co/
[3]https://lore.kernel.org/all/20250210-vsock-linger-nullderef-v3-0-ef6244d02b54@rbox.co/

Cheers,
Luigi

To: Stefano Garzarella <sgarzare@redhat.com>
To: Michal Luczaj <mhal@rbox.co>
To: stable@vger.kernel.org

Signed-off-by: Luigi Leonardi <leonardi@redhat.com>
---
Michal Luczaj (3):
      bpf, vsock: Invoke proto::close on close()
      vsock: Keep the binding until socket destruction
      vsock: Orphan socket after transport release

 net/vmw_vsock/af_vsock.c | 77 +++++++++++++++++++++++++++++++-----------------
 1 file changed, 50 insertions(+), 27 deletions(-)
---
base-commit: f0a53361993a94f602df6f35e78149ad2ac12c89
change-id: 20250220-backport_fix_5_10-0ae85f834bc4

Best regards,
-- 
Luigi Leonardi <leonardi@redhat.com>


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH 5.10.y 1/3] bpf, vsock: Invoke proto::close on close()
  2025-02-25 14:26 [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
@ 2025-02-25 14:26 ` Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 2/3] vsock: Keep the binding until socket destruction Luigi Leonardi
                   ` (2 subsequent siblings)
  3 siblings, 0 replies; 6+ messages in thread
From: Luigi Leonardi @ 2025-02-25 14:26 UTC (permalink / raw)
  To: Stefano Garzarella, Michal Luczaj, stable
  Cc: Luigi Leonardi, Alexei Starovoitov, John Fastabend

From: Michal Luczaj <mhal@rbox.co>

commit 135ffc7becc82cfb84936ae133da7969220b43b2 upstream.

vsock defines a BPF callback to be invoked when close() is called. However,
this callback is never actually executed. As a result, a closed vsock
socket is not automatically removed from the sockmap/sockhash.

Introduce a dummy vsock_close() and make vsock_release() call proto::close.

Note: changes in __vsock_release() look messy, but it's only due to indent
level reduction and variables xmas tree reorder.

Fixes: 634f1a7110b4 ("vsock: support sockmap")
Signed-off-by: Michal Luczaj <mhal@rbox.co>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Reviewed-by: Luigi Leonardi <leonardi@redhat.com>
Link: https://lore.kernel.org/r/20241118-vsock-bpf-poll-close-v1-3-f1b9669cacdc@rbox.co
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
[LL: There is no sockmap support for this kernel version. This patch has
been backported because it helps reduce conflicts on future backports]
Signed-off-by: Luigi Leonardi <leonardi@redhat.com>
---
 net/vmw_vsock/af_vsock.c | 67 +++++++++++++++++++++++++++++-------------------
 1 file changed, 40 insertions(+), 27 deletions(-)

diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c
index 53a9c0a73489bad5d4d9de1d0299b7b850462204..f80b28934c4b5af11765074da8d3f6f3d92ce6ff 100644
--- a/net/vmw_vsock/af_vsock.c
+++ b/net/vmw_vsock/af_vsock.c
@@ -113,12 +113,14 @@
 static int __vsock_bind(struct sock *sk, struct sockaddr_vm *addr);
 static void vsock_sk_destruct(struct sock *sk);
 static int vsock_queue_rcv_skb(struct sock *sk, struct sk_buff *skb);
+static void vsock_close(struct sock *sk, long timeout);
 
 /* Protocol family. */
 static struct proto vsock_proto = {
 	.name = "AF_VSOCK",
 	.owner = THIS_MODULE,
 	.obj_size = sizeof(struct vsock_sock),
+	.close = vsock_close,
 };
 
 /* The default peer timeout indicates how long we will wait for a peer response
@@ -767,39 +769,37 @@ static struct sock *__vsock_create(struct net *net,
 
 static void __vsock_release(struct sock *sk, int level)
 {
-	if (sk) {
-		struct sock *pending;
-		struct vsock_sock *vsk;
-
-		vsk = vsock_sk(sk);
-		pending = NULL;	/* Compiler warning. */
+	struct vsock_sock *vsk;
+	struct sock *pending;
 
-		/* When "level" is SINGLE_DEPTH_NESTING, use the nested
-		 * version to avoid the warning "possible recursive locking
-		 * detected". When "level" is 0, lock_sock_nested(sk, level)
-		 * is the same as lock_sock(sk).
-		 */
-		lock_sock_nested(sk, level);
+	vsk = vsock_sk(sk);
+	pending = NULL;	/* Compiler warning. */
 
-		if (vsk->transport)
-			vsk->transport->release(vsk);
-		else if (sk->sk_type == SOCK_STREAM)
-			vsock_remove_sock(vsk);
+	/* When "level" is SINGLE_DEPTH_NESTING, use the nested
+	 * version to avoid the warning "possible recursive locking
+	 * detected". When "level" is 0, lock_sock_nested(sk, level)
+	 * is the same as lock_sock(sk).
+	 */
+	lock_sock_nested(sk, level);
 
-		sock_orphan(sk);
-		sk->sk_shutdown = SHUTDOWN_MASK;
+	if (vsk->transport)
+		vsk->transport->release(vsk);
+	else if (sk->sk_type == SOCK_STREAM)
+		vsock_remove_sock(vsk);
 
-		skb_queue_purge(&sk->sk_receive_queue);
+	sock_orphan(sk);
+	sk->sk_shutdown = SHUTDOWN_MASK;
 
-		/* Clean up any sockets that never were accepted. */
-		while ((pending = vsock_dequeue_accept(sk)) != NULL) {
-			__vsock_release(pending, SINGLE_DEPTH_NESTING);
-			sock_put(pending);
-		}
+	skb_queue_purge(&sk->sk_receive_queue);
 
-		release_sock(sk);
-		sock_put(sk);
+	/* Clean up any sockets that never were accepted. */
+	while ((pending = vsock_dequeue_accept(sk)) != NULL) {
+		__vsock_release(pending, SINGLE_DEPTH_NESTING);
+		sock_put(pending);
 	}
+
+	release_sock(sk);
+	sock_put(sk);
 }
 
 static void vsock_sk_destruct(struct sock *sk)
@@ -853,9 +853,22 @@ s64 vsock_stream_has_space(struct vsock_sock *vsk)
 }
 EXPORT_SYMBOL_GPL(vsock_stream_has_space);
 
+/* Dummy callback required by sockmap.
+ * See unconditional call of saved_close() in sock_map_close().
+ */
+static void vsock_close(struct sock *sk, long timeout)
+{
+}
+
 static int vsock_release(struct socket *sock)
 {
-	__vsock_release(sock->sk, 0);
+	struct sock *sk = sock->sk;
+
+	if (!sk)
+		return 0;
+
+	sk->sk_prot->close(sk, 0);
+	__vsock_release(sk, 0);
 	sock->sk = NULL;
 	sock->state = SS_FREE;
 

-- 
2.48.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH 5.10.y 2/3] vsock: Keep the binding until socket destruction
  2025-02-25 14:26 [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 1/3] bpf, vsock: Invoke proto::close on close() Luigi Leonardi
@ 2025-02-25 14:26 ` Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 3/3] vsock: Orphan socket after transport release Luigi Leonardi
  2025-03-06  9:21 ` [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
  3 siblings, 0 replies; 6+ messages in thread
From: Luigi Leonardi @ 2025-02-25 14:26 UTC (permalink / raw)
  To: Stefano Garzarella, Michal Luczaj, stable; +Cc: Luigi Leonardi, Jakub Kicinski

From: Michal Luczaj <mhal@rbox.co>

commit fcdd2242c0231032fc84e1404315c245ae56322a upstream.

Preserve sockets bindings; this includes both resulting from an explicit
bind() and those implicitly bound through autobind during connect().

Prevents socket unbinding during a transport reassignment, which fixes a
use-after-free:

    1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)
    2. transport->release() calls vsock_remove_bound() without checking if
       sk was bound and moved to bound list (refcnt=1)
    3. vsock_bind() assumes sk is in unbound list and before
       __vsock_insert_bound(vsock_bound_sockets()) calls
       __vsock_remove_bound() which does:
           list_del_init(&vsk->bound_table); // nop
           sock_put(&vsk->sk);               // refcnt=0

BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730
Read of size 4 at addr ffff88816b46a74c by task a.out/2057
 dump_stack_lvl+0x68/0x90
 print_report+0x174/0x4f6
 kasan_report+0xb9/0x190
 __vsock_bind+0x62e/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Allocated by task 2057:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 __kasan_slab_alloc+0x85/0x90
 kmem_cache_alloc_noprof+0x131/0x450
 sk_prot_alloc+0x5b/0x220
 sk_alloc+0x2c/0x870
 __vsock_create.constprop.0+0x2e/0xb60
 vsock_create+0xe4/0x420
 __sock_create+0x241/0x650
 __sys_socket+0xf2/0x1a0
 __x64_sys_socket+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 2057:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x37/0x60
 __kasan_slab_free+0x4b/0x70
 kmem_cache_free+0x1a1/0x590
 __sk_destruct+0x388/0x5a0
 __vsock_bind+0x5e1/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150
RIP: 0010:refcount_warn_saturate+0xce/0x150
 __vsock_bind+0x66d/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

refcount_t: underflow; use-after-free.
WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150
RIP: 0010:refcount_warn_saturate+0xee/0x150
 vsock_remove_bound+0x187/0x1e0
 __vsock_release+0x383/0x4a0
 vsock_release+0x90/0x120
 __sock_release+0xa3/0x250
 sock_close+0x14/0x20
 __fput+0x359/0xa80
 task_work_run+0x107/0x1d0
 do_exit+0x847/0x2560
 do_group_exit+0xb8/0x250
 __x64_sys_exit_group+0x3a/0x50
 x64_sys_call+0xfec/0x14f0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Fixes: c0cfa2d8a788 ("vsock: add multi-transports support")
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Signed-off-by: Michal Luczaj <mhal@rbox.co>
Link: https://patch.msgid.link/20250128-vsock-transport-vs-autobind-v3-1-1cf57065b770@rbox.co
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Luigi Leonardi <leonardi@redhat.com>
---
 net/vmw_vsock/af_vsock.c | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c
index f80b28934c4b5af11765074da8d3f6f3d92ce6ff..f3e520e127bc271810ce80152d1e05a9ed1bea42 100644
--- a/net/vmw_vsock/af_vsock.c
+++ b/net/vmw_vsock/af_vsock.c
@@ -330,7 +330,10 @@ EXPORT_SYMBOL_GPL(vsock_find_connected_socket);
 
 void vsock_remove_sock(struct vsock_sock *vsk)
 {
-	vsock_remove_bound(vsk);
+	/* Transport reassignment must not remove the binding. */
+	if (sock_flag(sk_vsock(vsk), SOCK_DEAD))
+		vsock_remove_bound(vsk);
+
 	vsock_remove_connected(vsk);
 }
 EXPORT_SYMBOL_GPL(vsock_remove_sock);
@@ -782,12 +785,13 @@ static void __vsock_release(struct sock *sk, int level)
 	 */
 	lock_sock_nested(sk, level);
 
+	sock_orphan(sk);
+
 	if (vsk->transport)
 		vsk->transport->release(vsk);
 	else if (sk->sk_type == SOCK_STREAM)
 		vsock_remove_sock(vsk);
 
-	sock_orphan(sk);
 	sk->sk_shutdown = SHUTDOWN_MASK;
 
 	skb_queue_purge(&sk->sk_receive_queue);

-- 
2.48.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH 5.10.y 3/3] vsock: Orphan socket after transport release
  2025-02-25 14:26 [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 1/3] bpf, vsock: Invoke proto::close on close() Luigi Leonardi
  2025-02-25 14:26 ` [PATCH 5.10.y 2/3] vsock: Keep the binding until socket destruction Luigi Leonardi
@ 2025-02-25 14:26 ` Luigi Leonardi
  2025-03-06  9:21 ` [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
  3 siblings, 0 replies; 6+ messages in thread
From: Luigi Leonardi @ 2025-02-25 14:26 UTC (permalink / raw)
  To: Stefano Garzarella, Michal Luczaj, stable
  Cc: Luigi Leonardi, syzbot+9d55b199192a4be7d02c, Jakub Kicinski

From: Michal Luczaj <mhal@rbox.co>

commit 78dafe1cf3afa02ed71084b350713b07e72a18fb upstream.

During socket release, sock_orphan() is called without considering that it
sets sk->sk_wq to NULL. Later, if SO_LINGER is enabled, this leads to a
null pointer dereferenced in virtio_transport_wait_close().

Orphan the socket only after transport release.

Partially reverts the 'Fixes:' commit.

KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
 lock_acquire+0x19e/0x500
 _raw_spin_lock_irqsave+0x47/0x70
 add_wait_queue+0x46/0x230
 virtio_transport_release+0x4e7/0x7f0
 __vsock_release+0xfd/0x490
 vsock_release+0x90/0x120
 __sock_release+0xa3/0x250
 sock_close+0x14/0x20
 __fput+0x35e/0xa90
 __x64_sys_close+0x78/0xd0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Reported-by: syzbot+9d55b199192a4be7d02c@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=9d55b199192a4be7d02c
Fixes: fcdd2242c023 ("vsock: Keep the binding until socket destruction")
Tested-by: Luigi Leonardi <leonardi@redhat.com>
Reviewed-by: Luigi Leonardi <leonardi@redhat.com>
Signed-off-by: Michal Luczaj <mhal@rbox.co>
Link: https://patch.msgid.link/20250210-vsock-linger-nullderef-v3-1-ef6244d02b54@rbox.co
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Luigi Leonardi <leonardi@redhat.com>
---
 net/vmw_vsock/af_vsock.c | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c
index f3e520e127bc271810ce80152d1e05a9ed1bea42..8955a574719f2df6431cc9240f1bbb7f1b637b31 100644
--- a/net/vmw_vsock/af_vsock.c
+++ b/net/vmw_vsock/af_vsock.c
@@ -785,13 +785,19 @@ static void __vsock_release(struct sock *sk, int level)
 	 */
 	lock_sock_nested(sk, level);
 
-	sock_orphan(sk);
+	/* Indicate to vsock_remove_sock() that the socket is being released and
+	 * can be removed from the bound_table. Unlike transport reassignment
+	 * case, where the socket must remain bound despite vsock_remove_sock()
+	 * being called from the transport release() callback.
+	 */
+	sock_set_flag(sk, SOCK_DEAD);
 
 	if (vsk->transport)
 		vsk->transport->release(vsk);
 	else if (sk->sk_type == SOCK_STREAM)
 		vsock_remove_sock(vsk);
 
+	sock_orphan(sk);
 	sk->sk_shutdown = SHUTDOWN_MASK;
 
 	skb_queue_purge(&sk->sk_receive_queue);

-- 
2.48.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref
  2025-02-25 14:26 [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
                   ` (2 preceding siblings ...)
  2025-02-25 14:26 ` [PATCH 5.10.y 3/3] vsock: Orphan socket after transport release Luigi Leonardi
@ 2025-03-06  9:21 ` Luigi Leonardi
  2025-03-06 12:40   ` Greg Kroah-Hartman
  3 siblings, 1 reply; 6+ messages in thread
From: Luigi Leonardi @ 2025-03-06  9:21 UTC (permalink / raw)
  To: Stefano Garzarella, Michal Luczaj, stable, Greg Kroah-Hartman
  Cc: Alexei Starovoitov, John Fastabend, Jakub Kicinski,
	syzbot+9d55b199192a4be7d02c

+To Greg

Ping :)

This series is also available for 6.1 [1] and 5.15 [2]

@Greg:
In the future, should I put you or someone else in CC every time I send 
a series?

Thanks,
Luigi

[1]https://lore.kernel.org/stable/20250225-backport_fix-v1-0-71243c63da05@redhat.com/
[2]https://lore.kernel.org/stable/20250225-backport_fix_5_15-v1-0-479a1cce11a8@redhat.com/

On Tue, Feb 25, 2025 at 03:26:27PM +0100, Luigi Leonardi wrote:
>Hi all,
>
>This series backports three upstream commits:
>- 135ffc7 "bpf, vsock: Invoke proto::close on close()"
>- fcdd224 "vsock: Keep the binding until socket destruction"
>- 78dafe1 "vsock: Orphan socket after transport release"
>
>Although this version of the kernel does not support sockmap, I think
>backporting this patch can be useful to reduce conflicts in future
>backports [1]. It does not harm the system. The comment it introduces in
>the code can be misleading. I added some words in the commit to explain
>the situation.
>
>The other two commits are untouched, fixing a use-after free[2] and a
>null-ptr-deref[3] respectively.
>
>[1]https://lore.kernel.org/stable/f7lr3ftzo66sl6phlcygh4xx4spga4b6je37fhawjrsjtexzne@xhhwaqrjznlp/
>[2]https://lore.kernel.org/all/20250128-vsock-transport-vs-autobind-v3-0-1cf57065b770@rbox.co/
>[3]https://lore.kernel.org/all/20250210-vsock-linger-nullderef-v3-0-ef6244d02b54@rbox.co/
>
>Cheers,
>Luigi
>
>To: Stefano Garzarella <sgarzare@redhat.com>
>To: Michal Luczaj <mhal@rbox.co>
>To: stable@vger.kernel.org
>
>Signed-off-by: Luigi Leonardi <leonardi@redhat.com>
>---
>Michal Luczaj (3):
>      bpf, vsock: Invoke proto::close on close()
>      vsock: Keep the binding until socket destruction
>      vsock: Orphan socket after transport release
>
> net/vmw_vsock/af_vsock.c | 77 +++++++++++++++++++++++++++++++-----------------
> 1 file changed, 50 insertions(+), 27 deletions(-)
>---
>base-commit: f0a53361993a94f602df6f35e78149ad2ac12c89
>change-id: 20250220-backport_fix_5_10-0ae85f834bc4
>
>Best regards,
>-- 
>Luigi Leonardi <leonardi@redhat.com>
>


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref
  2025-03-06  9:21 ` [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
@ 2025-03-06 12:40   ` Greg Kroah-Hartman
  0 siblings, 0 replies; 6+ messages in thread
From: Greg Kroah-Hartman @ 2025-03-06 12:40 UTC (permalink / raw)
  To: Luigi Leonardi
  Cc: Stefano Garzarella, Michal Luczaj, stable, Alexei Starovoitov,
	John Fastabend, Jakub Kicinski, syzbot+9d55b199192a4be7d02c

On Thu, Mar 06, 2025 at 10:21:47AM +0100, Luigi Leonardi wrote:
> +To Greg

No need to top-post :(

> Ping :)
> 
> This series is also available for 6.1 [1] and 5.15 [2]

Yes, I see it.  The backlog of patches manually sent to us for stable
trees is very long now due to lots of different reasons.  I'll be
working to catch up on them over the next few weeks.

> @Greg:
> In the future, should I put you or someone else in CC every time I send a
> series?

No need.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2025-03-06 12:40 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-25 14:26 [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
2025-02-25 14:26 ` [PATCH 5.10.y 1/3] bpf, vsock: Invoke proto::close on close() Luigi Leonardi
2025-02-25 14:26 ` [PATCH 5.10.y 2/3] vsock: Keep the binding until socket destruction Luigi Leonardi
2025-02-25 14:26 ` [PATCH 5.10.y 3/3] vsock: Orphan socket after transport release Luigi Leonardi
2025-03-06  9:21 ` [PATCH 5.10.y 0/3] vsock: fix use-after free and null-ptr-deref Luigi Leonardi
2025-03-06 12:40   ` Greg Kroah-Hartman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox