]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
tls: Fix race condition in tls_sw_cancel_work_tx()
authorHyunwoo Kim <imv4bel@gmail.com>
Fri, 20 Feb 2026 09:40:36 +0000 (18:40 +0900)
committerJakub Kicinski <kuba@kernel.org>
Tue, 24 Feb 2026 01:08:14 +0000 (17:08 -0800)
This issue was discovered during a code audit.

After cancel_delayed_work_sync() is called from tls_sk_proto_close(),
tx_work_handler() can still be scheduled from paths such as the
Delayed ACK handler or ksoftirqd.
As a result, the tx_work_handler() worker may dereference a freed
TLS object.

The following is a simple race scenario:

          cpu0                         cpu1

tls_sk_proto_close()
  tls_sw_cancel_work_tx()
                                 tls_write_space()
                                   tls_sw_write_space()
                                     if (!test_and_set_bit(BIT_TX_SCHEDULED, &tx_ctx->tx_bitmask))
    set_bit(BIT_TX_SCHEDULED, &ctx->tx_bitmask);
    cancel_delayed_work_sync(&ctx->tx_work.work);
                                     schedule_delayed_work(&tx_ctx->tx_work.work, 0);

To prevent this race condition, cancel_delayed_work_sync() is
replaced with disable_delayed_work_sync().

Fixes: f87e62d45e51 ("net/tls: remove close callback sock unlock/lock around TX work flush")
Signed-off-by: Hyunwoo Kim <imv4bel@gmail.com>
Reviewed-by: Simon Horman <horms@kernel.org>
Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
Link: https://patch.msgid.link/aZgsFO6nfylfvLE7@v4bel
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/tls/tls_sw.c

index 9937d4c810f2bde1a8887b9416c1fd74bcb80b5e..b1fa62de9dab5ecc8048074122304a8e3b891c3e 100644 (file)
@@ -2533,7 +2533,7 @@ void tls_sw_cancel_work_tx(struct tls_context *tls_ctx)
 
        set_bit(BIT_TX_CLOSING, &ctx->tx_bitmask);
        set_bit(BIT_TX_SCHEDULED, &ctx->tx_bitmask);
-       cancel_delayed_work_sync(&ctx->tx_work.work);
+       disable_delayed_work_sync(&ctx->tx_work.work);
 }
 
 void tls_sw_release_resources_tx(struct sock *sk)