From: Nikolay Aleksandrov <ra...@blackwall.org> Date: Mon, 15 Jun 2015 20:28:51 +0300
> After the ->set() spinlocks were removed br_stp_set_bridge_priority > was left running without any protection when used via sysfs. It can > race with port add/del and could result in use-after-free cases and > corrupted lists. Tested by running port add/del in a loop with stp > enabled while setting priority in a loop, crashes are easily > reproducible. > The spinlocks around sysfs ->set() were removed in commit: > 14f98f258f19 ("bridge: range check STP parameters") > There's also a race condition in the netlink priority support that is > fixed by this change, but it was introduced recently and the fixes tag > covers it, just in case it's needed the commit is: > af615762e972 ("bridge: add ageing_time, stp_state, priority over netlink") > > Signed-off-by: Nikolay Aleksandrov <ra...@blackwall.org> > Fixes: 14f98f258f19 ("bridge: range check STP parameters") Applied and queued up for -stable, thanks. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html