From: Simon Horman <horms@kernel.org>
To: n05ec@lzu.edu.cn
Cc: 'Simon Horman' <horms@kernel.org>,
linux-afs@lists.infradead.org, netdev@vger.kernel.org,
dhowells@redhat.com, marc.dionne@auristor.com,
yuantan098@gmail.com, yifanwucs@gmail.com,
tomapufckgml@gmail.com, bird@lzu.edu.cn, d4n.for.sec@gmail.com
Subject: Re: [PATCH net 1/1] rxrpc: serialize kernel accept preallocation with socket teardown
Date: Tue, 12 May 2026 14:25:55 +0100 [thread overview]
Message-ID: <20260512132554.387036-2-horms@kernel.org> (raw)
In-Reply-To: <4e9e2d92be94ed4bcb43b70b36fcc3863414d61e.1778230563.git.d4n.for.sec@gmail.com>
From: 'Simon Horman' <horms@kernel.org>
This is an AI-generated review of your patch. The human sending this
email has considered the AI review valid, or at least plausible.
Full review at: https://sashiko.dev
---
rxrpc: serialize kernel accept preallocation with socket teardown
This commit attempts to fix a use-after-free in the rxrpc accept
preallocation path by serializing the state check and backlog lookup
with the socket lock.
Reported-by: Yuan Tan <yuantan098@gmail.com>
Reported-by: Yifan Wu <yifanwucs@gmail.com>
Reported-by: Juefei Pu <tomapufckgml@gmail.com>
Reported-by: Xin Liu <bird@lzu.edu.cn>
> diff --git a/net/rxrpc/call_accept.c b/net/rxrpc/call_accept.c
> index ee2d1319e69a8..47824120f1da1 100644
> --- a/net/rxrpc/call_accept.c
> +++ b/net/rxrpc/call_accept.c
> @@ -471,13 +471,26 @@ int rxrpc_kernel_charge_accept(struct socket *sock, rxrpc_notify_rx_t notify_rx,
> unsigned long user_call_ID, gfp_t gfp,
> unsigned int debug_id)
> {
> - struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
> - struct rxrpc_backlog *b = rx->backlog;
> + struct rxrpc_backlog *b;
> + struct rxrpc_sock *rx;
> + struct sock *sk;
> + int ret;
>
> - if (sock->sk->sk_state == RXRPC_CLOSE)
> - return -ESHUTDOWN;
> + sk = sock->sk;
Could the sock pointer passed to this function already be freed by the time it
executes?
The AFS subsystem afs_rx_new_call() queues charge_preallocation_work on
afs_wq. However, during socket teardown, afs_close_socket() appears to flush
afs_async_calls instead of afs_wq and doesn't cancel the work item with
cancel_work_sync().
If the stray work executes asynchronously after sock_release() has destroyed
the socket, wouldn't dereferencing sock->sk result in a use-after-free?
> + rx = rxrpc_sk(sk);
> +
> + lock_sock(sk);
Does lock_sock() adequately protect against concurrent socket release?
Looking at the socket release path, rxrpc_release_sock() modifies
sk->sk_state and calls rxrpc_discard_prealloc() (which frees the
backlog) without holding lock_sock().
If rxrpc_kernel_charge_accept() runs concurrently with socket release,
could rxrpc_release_sock() locklessly free the backlog from under it while
this function holds the socket lock, leading to a use-after-free when
accessing the backlog below?
> + if (sk->sk_state != RXRPC_SERVER_LISTENING || !rx->backlog) {
> + ret = -ESHUTDOWN;
> + goto out;
> + }
> +
> + b = rx->backlog;
> + ret = rxrpc_service_prealloc_one(rx, b, notify_rx, user_call_ID,
> + gfp, debug_id);
[ ... ]
prev parent reply other threads:[~2026-05-12 13:26 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <cover.1778230563.git.d4n.for.sec@gmail.com>
2026-05-08 15:58 ` [PATCH net 1/1] rxrpc: serialize kernel accept preallocation with socket teardown Ren Wei
2026-05-12 13:25 ` Simon Horman [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260512132554.387036-2-horms@kernel.org \
--to=horms@kernel.org \
--cc=bird@lzu.edu.cn \
--cc=d4n.for.sec@gmail.com \
--cc=dhowells@redhat.com \
--cc=linux-afs@lists.infradead.org \
--cc=marc.dionne@auristor.com \
--cc=n05ec@lzu.edu.cn \
--cc=netdev@vger.kernel.org \
--cc=tomapufckgml@gmail.com \
--cc=yifanwucs@gmail.com \
--cc=yuantan098@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox