aboutsummaryrefslogtreecommitdiff
path: root/lib/test_overflow.c
diff options
context:
space:
mode:
authorTetsuo Handa <[email protected]>2021-12-15 20:52:40 +0900
committerGreg Kroah-Hartman <[email protected]>2021-12-15 21:50:39 +0100
commit1ee33b1ca2b8dabfcc17198ffd049a6b55674a86 (patch)
tree2ce60430e41f2151ed7e848973188e2b5e29b744 /lib/test_overflow.c
parent0fcfb00b28c0b7884635dacf38e46d60bf3d4eb1 (diff)
tty: n_hdlc: make n_hdlc_tty_wakeup() asynchronous
syzbot is reporting that an unprivileged user who logged in from tty console can crash the system using a reproducer shown below [1], for n_hdlc_tty_wakeup() is synchronously calling n_hdlc_send_frames(). ---------- #include <sys/ioctl.h> #include <unistd.h> int main(int argc, char *argv[]) { const int disc = 0xd; ioctl(1, TIOCSETD, &disc); while (1) { ioctl(1, TCXONC, 0); write(1, "", 1); ioctl(1, TCXONC, 1); /* Kernel panic - not syncing: scheduling while atomic */ } } ---------- Linus suspected that "struct tty_ldisc"->ops->write_wakeup() must not sleep, and Jiri confirmed it from include/linux/tty_ldisc.h. Thus, defer n_hdlc_send_frames() from n_hdlc_tty_wakeup() to a WQ context like net/nfc/nci/uart.c does. Link: https://syzkaller.appspot.com/bug?extid=5f47a8cea6a12b77a876 [1] Reported-by: syzbot <[email protected]> Cc: stable <[email protected]> Analyzed-by: Fabio M. De Francesco <[email protected]> Suggested-by: Linus Torvalds <[email protected]> Confirmed-by: Jiri Slaby <[email protected]> Reviewed-by: Fabio M. De Francesco <[email protected]> Signed-off-by: Tetsuo Handa <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Greg Kroah-Hartman <[email protected]>
Diffstat (limited to 'lib/test_overflow.c')
0 files changed, 0 insertions, 0 deletions