Skip to content

Commit f504465

Browse files
dmantipovPaolo Abeni
authored andcommitted
net: sched: fix use-after-free in taprio_change()
In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing. Fixes: a3d43c0 ("taprio: Add support adding an admin schedule") Reported-by: [email protected] Closes: https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa Acked-by: Vinicius Costa Gomes <[email protected]> Signed-off-by: Dmitry Antipov <[email protected]> Link: https://patch.msgid.link/[email protected] Signed-off-by: Paolo Abeni <[email protected]>
1 parent 34d35b4 commit f504465

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

net/sched/sch_taprio.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1965,7 +1965,8 @@ static int taprio_change(struct Qdisc *sch, struct nlattr *opt,
19651965

19661966
taprio_start_sched(sch, start, new_admin);
19671967

1968-
rcu_assign_pointer(q->admin_sched, new_admin);
1968+
admin = rcu_replace_pointer(q->admin_sched, new_admin,
1969+
lockdep_rtnl_is_held());
19691970
if (admin)
19701971
call_rcu(&admin->rcu, taprio_free_sched_cb);
19711972

0 commit comments

Comments
 (0)