summaryrefslogtreecommitdiffstats
path: root/net/core
diff options
context:
space:
mode:
authorEric Dumazet2018-10-02 08:24:26 +0200
committerGreg Kroah-Hartman2018-12-01 09:37:28 +0100
commitcddcc9959a32999ce2d38018900595a5ab453eb2 (patch)
tree9b32d515c35c86a1d78d460eb5006d675a927dd8 /net/core
parentmm/memory.c: recheck page table entry with page table lock held (diff)
downloadkernel-qcow2-linux-cddcc9959a32999ce2d38018900595a5ab453eb2.tar.gz
kernel-qcow2-linux-cddcc9959a32999ce2d38018900595a5ab453eb2.tar.xz
kernel-qcow2-linux-cddcc9959a32999ce2d38018900595a5ab453eb2.zip
tcp: do not release socket ownership in tcp_close()
commit 8873c064d1de579ea23412a6d3eee972593f142b upstream. syzkaller was able to hit the WARN_ON(sock_owned_by_user(sk)); in tcp_close() While a socket is being closed, it is very possible other threads find it in rtnetlink dump. tcp_get_info() will acquire the socket lock for a short amount of time (slow = lock_sock_fast(sk)/unlock_sock_fast(sk, slow);), enough to trigger the warning. Fixes: 67db3e4bfbc9 ("tcp: no longer hold ehash lock while calling tcp_get_info()") Signed-off-by: Eric Dumazet <edumazet@google.com> Reported-by: syzbot <syzkaller@googlegroups.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/core')
-rw-r--r--net/core/sock.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/core/sock.c b/net/core/sock.c
index 3730eb855095..748765e35423 100644
--- a/net/core/sock.c
+++ b/net/core/sock.c
@@ -2317,7 +2317,7 @@ static void __lock_sock(struct sock *sk)
finish_wait(&sk->sk_lock.wq, &wait);
}
-static void __release_sock(struct sock *sk)
+void __release_sock(struct sock *sk)
__releases(&sk->sk_lock.slock)
__acquires(&sk->sk_lock.slock)
{