Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1678880pxu; Sun, 6 Dec 2020 03:48:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJw6jP1EE0wkHvm9Licr+fyDWpkERRficwL8GW9ujHXSes0+d5HH3N2il75y4+UROT8glrH5 X-Received: by 2002:a17:906:e086:: with SMTP id gh6mr14344074ejb.95.1607255308490; Sun, 06 Dec 2020 03:48:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607255308; cv=none; d=google.com; s=arc-20160816; b=DrquJS4yAZuVMQdCe4jVJxmyoEiLU7buHYZuUXdXJMlFcoenv1a2GTAyY9bk/71Wo9 sI1PunWzbI8ughd4AwMDiOZkZ9WXKnzYPf1ZgugQpcd7ngp6b/WWzn2AYr7ICgWL+iVo 73+wIH5gEXhqYPSnBOYUsm6jElC//7B44QXJqE0dSH2uWbAh4M5FcSp597kn2Q41U8+r H8r40GnsfzsjO0vRiSefMANCeQ2hvtZ+M0GCwgo5aT3hM3ujexVMWLwSxJfGVbHGF3az VpbjpaXF+MKXB/uq1StPMOBTzj1JlesU8LO4jVW0+2GNyuQmPLmKqAlxUVBt93aiNsrC u03w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=6KTcQOvzCACIK7IWg4T1wlEJuo+BjsZXtOAnqxSLcxE=; b=olX5PAYvXbTY60/l24sApXQWy0GwoU4F50fKIOgg8cR40mDP9UL+CvE3s0gJHUErSg pjWyqUCp7uk4Cdh/GjIYLA9UKH7mCqPxCCJRh4RmQBJXQidlU53ZnZMq1xYpLNgrsjaa 2B/sbClKEebHEjaw8irENd2gfqvN8K3JjZvnIRm1cRKT/nt5iNyh8SJnWQvsgrNGLp8H UYRkc6tdmUqavgjSoITSYtB39/DaDCyMzwr1QAK5cDCkajGWyWccYK3u5zXGKyNcc4xx Bpo7HIGFGJMf0aBpYO8zqUtrQDy9Jr4khkNQVoZgLKAf1oxhi/RtPAHe4oArrwfXcl46 cOiA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cb6si4877417ejb.459.2020.12.06.03.48.06; Sun, 06 Dec 2020 03:48:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728617AbgLFLof (ORCPT + 99 others); Sun, 6 Dec 2020 06:44:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:44124 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727939AbgLFLob (ORCPT ); Sun, 6 Dec 2020 06:44:31 -0500 From: Greg Kroah-Hartman Authentication-Results: mail.kernel.org; dkim=permerror (bad message/signature format) To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Udai Sharma , Vinay Kumar Yadav , Jakub Kicinski Subject: [PATCH 5.9 19/46] chelsio/chtls: fix panic during unload reload chtls Date: Sun, 6 Dec 2020 12:17:27 +0100 Message-Id: <20201206111557.385339882@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201206111556.455533723@linuxfoundation.org> References: <20201206111556.455533723@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vinay Kumar Yadav [ Upstream commit e3d5e971d2f83d8ddd4b91a50cea4517fb488383 ] there is kernel panic in inet_twsk_free() while chtls module unload when socket is in TIME_WAIT state because sk_prot_creator was not preserved on connection socket. Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition") Signed-off-by: Udai Sharma Signed-off-by: Vinay Kumar Yadav Link: https://lore.kernel.org/r/20201125214913.16938-1-vinay.yadav@chelsio.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/chelsio/chtls/chtls_cm.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/crypto/chelsio/chtls/chtls_cm.c +++ b/drivers/crypto/chelsio/chtls/chtls_cm.c @@ -1206,6 +1206,7 @@ static struct sock *chtls_recv_sock(stru sk_setup_caps(newsk, dst); ctx = tls_get_ctx(lsk); newsk->sk_destruct = ctx->sk_destruct; + newsk->sk_prot_creator = lsk->sk_prot_creator; csk->sk = newsk; csk->passive_reap_next = oreq; csk->tx_chan = cxgb4_port_chan(ndev);