diff options
author | Nikolay Aleksandrov <nikolay@nvidia.com> | 2021-08-05 11:29:01 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2021-08-05 13:36:59 +0300 |
commit | 893b195875340cb44b54c9db99e708145f1210e8 (patch) | |
tree | f5d98a9ed881302ccbbb53865b82f7d7e9fb8b6a /net/bluetooth/l2cap_sock.c | |
parent | 4167a960574fcadc9067f4280951a35b8c021c68 (diff) | |
download | linux-893b195875340cb44b54c9db99e708145f1210e8.tar.xz |
net: bridge: fix ioctl locking
Before commit ad2f99aedf8f ("net: bridge: move bridge ioctls out of
.ndo_do_ioctl") the bridge ioctl calls were divided in two parts:
one was deviceless called by sock_ioctl and didn't expect rtnl to be held,
the other was with a device called by dev_ifsioc() and expected rtnl to be
held. After the commit above they were united in a single ioctl stub, but
it didn't take care of the locking expectations.
For sock_ioctl now we acquire (1) br_ioctl_mutex, (2) rtnl
and for dev_ifsioc we acquire (1) rtnl, (2) br_ioctl_mutex
The fix is to get a refcnt on the netdev for dev_ifsioc calls and drop rtnl
then to reacquire it in the bridge ioctl stub after br_ioctl_mutex has
been acquired. That will avoid playing locking games and make the rules
straight-forward: we always take br_ioctl_mutex first, and then rtnl.
Reported-by: syzbot+34fe5894623c4ab1b379@syzkaller.appspotmail.com
Fixes: ad2f99aedf8f ("net: bridge: move bridge ioctls out of .ndo_do_ioctl")
Signed-off-by: Nikolay Aleksandrov <nikolay@nvidia.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/bluetooth/l2cap_sock.c')
0 files changed, 0 insertions, 0 deletions