I port the fix to fix CVE-2024-50018 in linux 6.1.
-----Original Message----- From: Jakub Kicinski kuba@kernel.org Sent: Thursday, December 12, 2024 12:08 To: Ren, Jianqi (Jacky) (CN) Jianqi.Ren.CN@windriver.com Cc: gregkh@linuxfoundation.org; stable@vger.kernel.org; davem@davemloft.net; edumazet@google.com; pabeni@redhat.com; sashal@kernel.org; jamie.bainbridge@gmail.com; jdamato@fastly.com; netdev@vger.kernel.org; linux-kernel@vger.kernel.org Subject: Re: [PATCH 6.1.y] net: napi: Prevent overflow of napi_defer_hard_irqs
CAUTION: This email comes from a non Wind River email account! Do not click links or open attachments unless you recognize the sender and know the content is safe.
On Wed, 11 Dec 2024 12:03:04 +0800 jianqi.ren.cn@windriver.com wrote:
From: Joe Damato jdamato@fastly.com
[ Upstream commit 08062af0a52107a243f7608fd972edb54ca5b7f8 ]
In commit 6f8b12d661d0 ("net: napi: add hard irqs deferral feature") napi_defer_irqs was added to net_device and napi_defer_irqs_count was added to napi_struct, both as type int.
This value never goes below zero, so there is not reason for it to be a signed int. Change the type for both from int to u32, and add an overflow check to sysfs to limit the value to S32_MAX.
Could you explain why you want to backport this change to stable?