aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authorHyunwoo Kim <imv4bel@gmail.com>2025-06-13 20:54:57 -0400
committerJakub Kicinski <kuba@kernel.org>2025-06-17 16:14:04 -0700
commitb160766e26d4e2e2d6fe2294e0b02f92baefcec5 (patch)
tree55f1862608c1e82a56e6ba24cb01898c2eb1158f
parentMerge branch 'ptp_vclock-fixes' (diff)
downloadwireguard-linux-b160766e26d4e2e2d6fe2294e0b02f92baefcec5.tar.xz
wireguard-linux-b160766e26d4e2e2d6fe2294e0b02f92baefcec5.zip
net/sched: fix use-after-free in taprio_dev_notifier
Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this. Fixes: fed87cc6718a ("net/sched: taprio: automatically calculate queueMaxSDU based on TC gate durations") Cc: stable@vger.kernel.org Signed-off-by: Hyunwoo Kim <imv4bel@gmail.com> Reviewed-by: Simon Horman <horms@kernel.org> Reviewed-by: Eric Dumazet <edumazet@google.com> Link: https://patch.msgid.link/aEzIYYxt0is9upYG@v4bel-B760M-AORUS-ELITE-AX Signed-off-by: Jakub Kicinski <kuba@kernel.org>
-rw-r--r--net/sched/sch_taprio.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/net/sched/sch_taprio.c b/net/sched/sch_taprio.c
index 14021b812329..2b14c81a87e5 100644
--- a/net/sched/sch_taprio.c
+++ b/net/sched/sch_taprio.c
@@ -1328,13 +1328,15 @@ static int taprio_dev_notifier(struct notifier_block *nb, unsigned long event,
stab = rtnl_dereference(q->root->stab);
- oper = rtnl_dereference(q->oper_sched);
+ rcu_read_lock();
+ oper = rcu_dereference(q->oper_sched);
if (oper)
taprio_update_queue_max_sdu(q, oper, stab);
- admin = rtnl_dereference(q->admin_sched);
+ admin = rcu_dereference(q->admin_sched);
if (admin)
taprio_update_queue_max_sdu(q, admin, stab);
+ rcu_read_unlock();
break;
}