Skip to content
Snippets Groups Projects
Commit f5044659 authored by Dmitry Antipov's avatar Dmitry Antipov Committed by Paolo Abeni
Browse files

net: sched: fix use-after-free in taprio_change()


In 'taprio_change()', 'admin' pointer may become dangling due to sched
switch / removal caused by 'advance_sched()', and critical section
protected by 'q->current_entry_lock' is too small to prevent from such
a scenario (which causes use-after-free detected by KASAN). Fix this
by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update
'admin' immediately before an attempt to schedule freeing.

Fixes: a3d43c0d ("taprio: Add support adding an admin schedule")
Reported-by: default avatar <syzbot+b65e0af58423fc8a73aa@syzkaller.appspotmail.com>
Closes: https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa


Acked-by: default avatarVinicius Costa Gomes <vinicius.gomes@intel.com>
Signed-off-by: default avatarDmitry Antipov <dmantipov@yandex.ru>
Link: https://patch.msgid.link/20241018051339.418890-1-dmantipov@yandex.ru


Signed-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
parent 34d35b4e
No related branches found
No related tags found
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment