Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3878504pxb; Tue, 17 Nov 2020 06:03:50 -0800 (PST) X-Google-Smtp-Source: ABdhPJzKQljsox/MJwMc05Wziz+/qQmL2/GxmqbuF3Y9OJerASgprQmxYLISPYuOnXxIX48PtXqd X-Received: by 2002:a05:651c:124b:: with SMTP id h11mr1798805ljh.451.1605621829820; Tue, 17 Nov 2020 06:03:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605621829; cv=none; d=google.com; s=arc-20160816; b=fyUx/Z28Xj1BP6ejgJcH4irjtKW7qkc4YQn3D8hDWu/o/MOQfi7UyDMbIQU69OC2/0 MsZPMDEmirEQVUm8l5qo7qDGoDkOtlavTZYMMpE6dj57kMIQkMhdGTNvqgO2G2Sj91DF pOML81ACiRMToBgWq6YlzTmEuATPPePpaA9tI3si/uq+s//BnIF7vsQ4YCVpgzrHqePP 7/cmsuDUY+VBBtag1WRIBmQKldpZKS7jfNfd9cwkNsefJCOaYcdlggzDCGDl/O0bHmuo 8UC/d9SwwbkpnPXSZ+bOiA5Sqp4V0koREWG9H9JWzvqTKdDvtIE5Z/sKN8qZjqSYIs1j fixA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cY2WXfRWCnEYoJYJ2oUaOJJKWXZeBje+XOkEuOr9TPU=; b=mfIdcS1yL4g2AAkg23cyMDh7HnsIKs7JQxL0J2KN0PEtXJr/qbULNiExKxOLHIuMND J6YZOawBm7qOrOlHr4i8oNsU/ycjuOGT0KYGd/uC3BTyl/Q6qUYB1f8O5mbv9J2f8ub5 bpHi/WsUxuB/kkQJHwJhPBQbNiCwx9X7sdbDS/l8WTc0Vbrc3lPGYYzmq6jDQYtlxL14 IMbEMGGsHn29yjeCYj98PBwgRxqBbTgcfeJRILaSdW9/sbH56LcoIRwvlv5x7TlX6QjB BQVMpmPocfK5rMEL2gNm5hVbq2n/O0qErJSPXSpdq+MSJjqxdFIhjhbh/txE1MkcHza4 JiFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KmrxrpBN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s6si14344610ejb.276.2020.11.17.06.03.24; Tue, 17 Nov 2020 06:03:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KmrxrpBN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731235AbgKQOBJ (ORCPT + 99 others); Tue, 17 Nov 2020 09:01:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:45216 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730036AbgKQNOU (ORCPT ); Tue, 17 Nov 2020 08:14:20 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4B5242225B; Tue, 17 Nov 2020 13:14:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605618858; bh=Dfgg1Zhwokh20GcGy7w+kYaS9x+RYxcfE22/X3DR9yk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KmrxrpBNz+Vga0tqe6pDY+28hqEY92aeCzjQrAPxC9Fi5nlIHEhKJs3uqiNQxioSC IkW6Li2ivzIbqRSGMDTwgmJspaX68AW35M9uVosft2WE2e888BtEf0nyNTHPIyVIQA jwXNPS+Gml2ix+sOo4b9ZdJ7mFdu91aIkfK/4aH8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+2e293dbd67de2836ba42@syzkaller.appspotmail.com, Johannes Berg , Sasha Levin Subject: [PATCH 4.14 30/85] mac80211: always wind down STA state Date: Tue, 17 Nov 2020 14:04:59 +0100 Message-Id: <20201117122112.505581852@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201117122111.018425544@linuxfoundation.org> References: <20201117122111.018425544@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg [ Upstream commit dcd479e10a0510522a5d88b29b8f79ea3467d501 ] When (for example) an IBSS station is pre-moved to AUTHORIZED before it's inserted, and then the insertion fails, we don't clean up the fast RX/TX states that might already have been created, since we don't go through all the state transitions again on the way down. Do that, if it hasn't been done already, when the station is freed. I considered only freeing the fast TX/RX state there, but we might add more state so it's more robust to wind down the state properly. Note that we warn if the station was ever inserted, it should have been properly cleaned up in that case, and the driver will probably not like things happening out of order. Reported-by: syzbot+2e293dbd67de2836ba42@syzkaller.appspotmail.com Link: https://lore.kernel.org/r/20201009141710.7223b322a955.I95bd08b9ad0e039c034927cce0b75beea38e059b@changeid Signed-off-by: Johannes Berg Signed-off-by: Sasha Levin --- net/mac80211/sta_info.c | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/net/mac80211/sta_info.c b/net/mac80211/sta_info.c index 2a18687019003..b74551323f5fb 100644 --- a/net/mac80211/sta_info.c +++ b/net/mac80211/sta_info.c @@ -244,6 +244,24 @@ struct sta_info *sta_info_get_by_idx(struct ieee80211_sub_if_data *sdata, */ void sta_info_free(struct ieee80211_local *local, struct sta_info *sta) { + /* + * If we had used sta_info_pre_move_state() then we might not + * have gone through the state transitions down again, so do + * it here now (and warn if it's inserted). + * + * This will clear state such as fast TX/RX that may have been + * allocated during state transitions. + */ + while (sta->sta_state > IEEE80211_STA_NONE) { + int ret; + + WARN_ON_ONCE(test_sta_flag(sta, WLAN_STA_INSERTED)); + + ret = sta_info_move_state(sta, sta->sta_state - 1); + if (WARN_ONCE(ret, "sta_info_move_state() returned %d\n", ret)) + break; + } + if (sta->rate_ctrl) rate_control_free_sta(sta); -- 2.27.0