Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp215412ybi; Fri, 26 Jul 2019 08:35:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqwO+spd0blJDPIP7tGlbOi/d+KOo1AsBXDy4QETYNPma3EIIz4YqfITye2CEJJvTkDfsUvk X-Received: by 2002:a62:764d:: with SMTP id r74mr23778996pfc.110.1564155331557; Fri, 26 Jul 2019 08:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564155331; cv=none; d=google.com; s=arc-20160816; b=LlBRCBLqzCvcK/jFJnlflL1qVushylnFG233e92BlhrkmKc1RTaYyf6kWeG3CzJ3AJ l8OHNcGIG3fsz0/3i1CnXlK2bvxrcAg6oPzkJAupIDgJ+5dFsgpVrJmIrZSKW3q2KT0c N9/0IDqYDv9v/dMSJSvpXxSPrt9aMXh94PD8x8cHyB8nwskHLq0DKImxhZdN+OlAtYJz cX0+XRLlq90hH5DjfQLM6B0j+INmnXtUGVN6ZOL+4ysjouA9aX7bMbJ3upne6H3MAmtn 3VOJqSQZEBnMyvSrdfJ8U26Dk0tP0xpLVVBCfQIfWOzqB8RxSnH/e2pZxI0sWBrgz8tT Wvxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tuyfF/3UGUsC1VAB1nomdC2E7phzpPDOh6Wwp2lmKLo=; b=IzpHQg09O/sFJtgfi0PZ6Xcz8Y8tnr4CyoqkEnZz3NrJ9Kz2LC1Duyvxvz1sFx+Jjm pAF1RGTtolUuCRuRD2FGvZPdmkam9oglKsLde7aE8eYTvkM4/U5CRXpW8wzLg+7RBNfl /aNs722F9aJc4ExcB9f3M6WR58DMrn/I6h2TkIk2XMfxiEmfBVFG0zhPhIbyzZQJRsUF 4SkLC4jGFvkRwhMSzXDj7Tl+vC9EbHYCwRtGAvOJkfAUH82FSqPXJTRN/1Qq413S0IBB aUeMlbxdibxxqk2dt/GHjxXZ2O+T2YsEEB02gREx2XiKPWOTR6YNGfEeober1lXU33kc 9F9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yBkG49qb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l35si18935690plb.186.2019.07.26.08.35.16; Fri, 26 Jul 2019 08:35:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yBkG49qb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389753AbfGZPd5 (ORCPT + 99 others); Fri, 26 Jul 2019 11:33:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:49396 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389733AbfGZPdy (ORCPT ); Fri, 26 Jul 2019 11:33:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0B19F2054F; Fri, 26 Jul 2019 15:33:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564155233; bh=GzdrERlVciSo6HfVAEApRX/1niK8SDg3s81xyoCbM6M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yBkG49qb4BxH66oRCCiMN0caqzrsvw7y4lnQUUfuCAB2iY5cmjfoGnj/19se//Y0e MqIpsOjKh0akgDWApGRvN8vVMM/dWZquAKMsNT4/l/d9HeEJTLcg/WtUOLN9YmUpO2 r1PI8s+DHBxriG76vYQG+zUHDvNJ2lAaVNpeB8dE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jakub Kicinski , Dirk van der Merwe , "David S. Miller" Subject: [PATCH 4.19 30/50] net/tls: make sure offload also gets the keys wiped Date: Fri, 26 Jul 2019 17:25:05 +0200 Message-Id: <20190726152303.707657736@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190726152300.760439618@linuxfoundation.org> References: <20190726152300.760439618@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jakub Kicinski [ Upstream commit acd3e96d53a24d219f720ed4012b62723ae05da1 ] Commit 86029d10af18 ("tls: zero the crypto information from tls_context before freeing") added memzero_explicit() calls to clear the key material before freeing struct tls_context, but it missed tls_device.c has its own way of freeing this structure. Replace the missing free. Fixes: 86029d10af18 ("tls: zero the crypto information from tls_context before freeing") Signed-off-by: Jakub Kicinski Reviewed-by: Dirk van der Merwe Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/tls.h | 1 + net/tls/tls_device.c | 2 +- net/tls/tls_main.c | 2 +- 3 files changed, 3 insertions(+), 2 deletions(-) --- a/include/net/tls.h +++ b/include/net/tls.h @@ -234,6 +234,7 @@ struct tls_offload_context_rx { (ALIGN(sizeof(struct tls_offload_context_rx), sizeof(void *)) + \ TLS_DRIVER_STATE_SIZE) +void tls_ctx_free(struct tls_context *ctx); int wait_on_pending_writer(struct sock *sk, long *timeo); int tls_sk_query(struct sock *sk, int optname, char __user *optval, int __user *optlen); --- a/net/tls/tls_device.c +++ b/net/tls/tls_device.c @@ -61,7 +61,7 @@ static void tls_device_free_ctx(struct t if (ctx->rx_conf == TLS_HW) kfree(tls_offload_ctx_rx(ctx)); - kfree(ctx); + tls_ctx_free(ctx); } static void tls_device_gc_task(struct work_struct *work) --- a/net/tls/tls_main.c +++ b/net/tls/tls_main.c @@ -241,7 +241,7 @@ static void tls_write_space(struct sock ctx->sk_write_space(sk); } -static void tls_ctx_free(struct tls_context *ctx) +void tls_ctx_free(struct tls_context *ctx) { if (!ctx) return;