diff options
author | Jens Axboe <[email protected]> | 2019-10-28 09:15:33 -0600 |
---|---|---|
committer | Jens Axboe <[email protected]> | 2019-10-28 09:15:33 -0600 |
commit | 044c1ab399afbe9f2ebef49a3204ef1509826dc7 (patch) | |
tree | 25b1ccdca5d8d48a99f2370144f797f56754866a /tools/perf/util | |
parent | 7b20238d28da46f394d37d4d51cc420e1ff9414a (diff) |
io_uring: don't touch ctx in setup after ring fd install
syzkaller reported an issue where it looks like a malicious app can
trigger a use-after-free of reading the ctx ->sq_array and ->rings
value right after having installed the ring fd in the process file
table.
Defer ring fd installation until after we're done reading those
values.
Fixes: 75b28affdd6a ("io_uring: allocate the two rings together")
Reported-by: [email protected]
Signed-off-by: Jens Axboe <[email protected]>
Diffstat (limited to 'tools/perf/util')
0 files changed, 0 insertions, 0 deletions