Skip to content

Commit

Permalink
Revert "smb: client: Fix netns refcount imbalance causing leaks and u…
Browse files Browse the repository at this point in the history
…se-after-free"

commit c707193 upstream.

This reverts commit 4e7f164.

The commit e9f2517 ("smb: client: fix TCP timers deadlock after
rmmod") is not only a bogus fix for LOCKDEP null-ptr-deref but also
introduces a real issue, TCP sockets leak, which will be explained in
detail in the next revert.

Also, CNA assigned CVE-2024-54680 to it but is rejecting it. [0]

Thus, we are reverting the commit and its follow-up commit 4e7f164
("smb: client: Fix netns refcount imbalance causing leaks and
use-after-free").

Link: https://lore.kernel.org/all/2025040248-tummy-smilingly-4240@gregkh/ #[0]
Fixes: 4e7f164 ("smb: client: Fix netns refcount imbalance causing leaks and use-after-free")
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Cc: stable@vger.kernel.org
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  • Loading branch information
Kuniyuki Iwashima authored and Greg Kroah-Hartman committed Apr 25, 2025
1 parent 2a879da commit 2aa10d2
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions fs/smb/client/connect.c
Original file line number Diff line number Diff line change
Expand Up @@ -316,7 +316,6 @@ cifs_abort_connection(struct TCP_Server_Info *server)
server->ssocket->flags);
sock_release(server->ssocket);
server->ssocket = NULL;
put_net(cifs_net_ns(server));
}
server->sequence_number = 0;
server->session_estab = false;
Expand Down Expand Up @@ -3142,12 +3141,8 @@ generic_ip_connect(struct TCP_Server_Info *server)
/*
* Grab netns reference for the socket.
*
* This reference will be released in several situations:
* - In the failure path before the cifsd thread is started.
* - In the all place where server->socket is released, it is
* also set to NULL.
* - Ultimately in clean_demultiplex_info(), during the final
* teardown.
* It'll be released here, on error, or in clean_demultiplex_info() upon server
* teardown.
*/
get_net(net);

Expand All @@ -3163,8 +3158,10 @@ generic_ip_connect(struct TCP_Server_Info *server)
}

rc = bind_socket(server);
if (rc < 0)
if (rc < 0) {
put_net(cifs_net_ns(server));
return rc;
}

/*
* Eventually check for other socket options to change from
Expand Down Expand Up @@ -3210,6 +3207,9 @@ generic_ip_connect(struct TCP_Server_Info *server)
if (sport == htons(RFC1001_PORT))
rc = ip_rfc1001_connect(server);

if (rc < 0)
put_net(cifs_net_ns(server));

return rc;
}

Expand Down

0 comments on commit 2aa10d2

Please sign in to comment.