https://bugzilla.kernel.org/show_bug.cgi?id=112631 Andreas Amann <andreas.amann@xxxxxx> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |andreas.amann@xxxxxx --- Comment #3 from Andreas Amann <andreas.amann@xxxxxx> --- I have the same problem. Bisection leads to the following commit: commit 0571ba52a19e18a1c20469454231eef681cb1310 Author: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Date: Wed Dec 30 11:47:53 2015 +0800 crypto: af_alg - Disallow bind/setkey/... after accept(2) [ Upstream commit c840ac6af3f8713a71b4d2363419145760bd6044 ] Each af_alg parent socket obtained by socket(2) corresponds to a tfm object once bind(2) has succeeded. An accept(2) call on that parent socket creates a context which then uses the tfm object. Therefore as long as any child sockets created by accept(2) exist the parent socket must not be modified or freed. This patch guarantees this by using locks and a reference count on the parent socket. Any attempt to modify the parent socket will fail with EBUSY. Cc: stable@xxxxxxxxxxxxxxx Reported-by: Dmitry Vyukov <dvyukov@xxxxxxxxxx> Signed-off-by: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Signed-off-by: Sasha Levin <sasha.levin@xxxxxxxxxx> -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html