Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3910252ybi; Mon, 3 Jun 2019 02:21:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqychaP3xWbZqzAYkXRyTWgC+sIMnGaP2Kj016WCIJKXLCdTNQx4iZYOYSR7aAFO5hXEUhbz X-Received: by 2002:a17:90a:9bc4:: with SMTP id b4mr28926327pjw.100.1559553696933; Mon, 03 Jun 2019 02:21:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559553696; cv=none; d=google.com; s=arc-20160816; b=GxrrbOB449shV24rDf5eRPKsXUV/nADwhwQp3ccImyKok43sxBQmzKwZFktKYFQXvp UbYqoWkYV49K8CndFCoKcJHFTmXOImNuXAs1qxllDT3CLboeCKVfpf2gltxYEhyRcqd3 y6RgsvZuI44RSb4Cjei/gtWTX0lLw69yXiI4AoADlcy0hvRZek7xBtWOUrWKCeBrdhsB nzAnRXRF2vaDHQl7MNo4QEJr4PQlAusXkMnQ/1niofZ8gCCH25dhfq49MLHT5CqLqS5X l2rZZ9IyhArMbeZy6smoa8MttDkliQagJwrFap5CnHwKCThagntmgo2OX6vwaIvD/6FM jFkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Z7WfrdrtBZ0qBgHxLsPLJWcAjmDujhzFePLCrr7+htQ=; b=OrJBRXC406Qxv5ZiUVwAt/Q6HtV3ljg2djJgsYlWtmZmTHhC/ClkmsPExNedtIIHqf WgOQgeX/pYV8/6FpslkzQsGf1/v9wxx0gTTyDaNYENJKlLAtIakXKmyEe9dBEB2ACEal 0BW7lCs5YC1Ro9L+WZoDZzFPAAtY+R5dX/SCEhNUYl22KYvXYVimPQwYBepMTyi6+Jjs B2A8OyxVQBk3CSfRacGAtl1XxcquKbFPyys3+KQNw/u+6MO+DcM2WnvvrSi0c9lI9bXh ZTUk541jJdcsEFMjRzh7GH7jResdTSHSnK8yqH21ih5gFfE8yDKykpZalD/csWPaqBVV HETg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nROb5jCz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v11si5473950plp.304.2019.06.03.02.21.21; Mon, 03 Jun 2019 02:21:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nROb5jCz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728113AbfFCJKY (ORCPT + 99 others); Mon, 3 Jun 2019 05:10:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:54688 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727850AbfFCJKX (ORCPT ); Mon, 3 Jun 2019 05:10:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 65B9427E29; Mon, 3 Jun 2019 09:10:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559553022; bh=wKCZQfloSpRZsgtcJU3MXzB5pE5c7tabPFKee3XowaE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nROb5jCzzzQzFIYt1B3B7TZ28EiWT1a0C5SLuYufEftzFu7gccfte0xyAq/mntwQR AOjGTLu9bC7YM+Joy5BorErv2UyiRZiZK09WBmYKRy/hrrNvj8i7HwCFnXhFF4lu2J uryWmECuC0/9jl977U4zGMmkuDnCCg7JZxCm9h4E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jakub Kicinski , Dirk van der Merwe , "David S. Miller" Subject: [PATCH 4.19 25/32] net/tls: dont ignore netdev notifications if no TLS features Date: Mon, 3 Jun 2019 11:08:19 +0200 Message-Id: <20190603090315.254419938@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190603090308.472021390@linuxfoundation.org> References: <20190603090308.472021390@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jakub Kicinski [ Upstream commit c3f4a6c39cf269a40d45f813c05fa830318ad875 ] On device surprise removal path (the notifier) we can't bail just because the features are disabled. They may have been enabled during the lifetime of the device. This bug leads to leaking netdev references and use-after-frees if there are active connections while device features are cleared. Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure") Signed-off-by: Jakub Kicinski Reviewed-by: Dirk van der Merwe Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/tls/tls_device.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/net/tls/tls_device.c +++ b/net/tls/tls_device.c @@ -974,7 +974,8 @@ static int tls_dev_event(struct notifier { struct net_device *dev = netdev_notifier_info_to_dev(ptr); - if (!(dev->features & (NETIF_F_HW_TLS_RX | NETIF_F_HW_TLS_TX))) + if (!dev->tlsdev_ops && + !(dev->features & (NETIF_F_HW_TLS_RX | NETIF_F_HW_TLS_TX))) return NOTIFY_DONE; switch (event) {