linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH net 0/6] rxrpc: Syzbot-inspired fixes
@ 2019-10-07 10:15 David Howells
  2019-10-07 10:15 ` [PATCH net 1/6] rxrpc: Fix call ref leak David Howells
                   ` (6 more replies)
  0 siblings, 7 replies; 8+ messages in thread
From: David Howells @ 2019-10-07 10:15 UTC (permalink / raw)
  To: netdev; +Cc: dhowells, linux-afs, linux-kernel


Here's a series of patches that fix a number of issues found by syzbot:

 (1) A reference leak on rxrpc_call structs in a sendmsg error path.

 (2) A tracepoint that looked in the rxrpc_peer record after putting it.

     Analogous with this, though not presently detected, the same bug is
     also fixed in relation to rxrpc_connection and rxrpc_call records.

 (3) Peer records don't pin local endpoint records, despite accessing them.

 (4) Access to connection crypto ops to clean up a call after the call's
     ref on that connection has been put.

The patches are tagged here:

	git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
	rxrpc-fixes-20191007

and can also be found on the following branch:

	http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes

David
---
David Howells (6):
      rxrpc: Fix call ref leak
      rxrpc: Fix trace-after-put looking at the put peer record
      rxrpc: Fix trace-after-put looking at the put connection record
      rxrpc: Fix trace-after-put looking at the put call record
      rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
      rxrpc: Fix call crypto state cleanup


 include/trace/events/rxrpc.h |   18 +++++++++---------
 net/rxrpc/ar-internal.h      |    1 +
 net/rxrpc/call_accept.c      |    5 +++--
 net/rxrpc/call_object.c      |   34 ++++++++++++++++++++--------------
 net/rxrpc/conn_client.c      |    9 +++++++--
 net/rxrpc/conn_object.c      |   13 +++++++------
 net/rxrpc/conn_service.c     |    2 +-
 net/rxrpc/peer_object.c      |   16 ++++++++++------
 net/rxrpc/recvmsg.c          |    6 +++---
 net/rxrpc/sendmsg.c          |    3 ++-
 10 files changed, 63 insertions(+), 44 deletions(-)


^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2019-10-07 13:13 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-10-07 10:15 [PATCH net 0/6] rxrpc: Syzbot-inspired fixes David Howells
2019-10-07 10:15 ` [PATCH net 1/6] rxrpc: Fix call ref leak David Howells
2019-10-07 10:15 ` [PATCH net 2/6] rxrpc: Fix trace-after-put looking at the put peer record David Howells
2019-10-07 10:15 ` [PATCH net 3/6] rxrpc: Fix trace-after-put looking at the put connection record David Howells
2019-10-07 10:16 ` [PATCH net 4/6] rxrpc: Fix trace-after-put looking at the put call record David Howells
2019-10-07 10:16 ` [PATCH net 5/6] rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record David Howells
2019-10-07 10:16 ` [PATCH net 6/6] rxrpc: Fix call crypto state cleanup David Howells
2019-10-07 13:13 ` [PATCH net 0/6] rxrpc: Syzbot-inspired fixes David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).