[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190829094343.0248c61c@cakuba.netronome.com>
Date: Thu, 29 Aug 2019 09:43:43 -0700
From: Jakub Kicinski <jakub.kicinski@...ronome.com>
To: Hillf Danton <hdanton@...a.com>
Cc: john.fastabend@...il.com,
syzbot <syzbot+7a6ee4d0078eac6bf782@...kaller.appspotmail.com>,
aviadye@...lanox.com, borisp@...lanox.com, daniel@...earbox.net,
davejwatson@...com, davem@...emloft.net,
linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
syzkaller-bugs@...glegroups.com
Subject: Re: general protection fault in tls_sk_proto_close (2)
On Thu, 29 Aug 2019 11:52:00 +0800, Hillf Danton wrote:
> Alternatively work is done if sock is closed again. Anyway ctx is reset
> under sock's callback lock in write mode.
>
> --- a/net/tls/tls_main.c
> +++ b/net/tls/tls_main.c
> @@ -295,6 +295,8 @@ static void tls_sk_proto_close(struct so
> long timeo = sock_sndtimeo(sk, 0);
> bool free_ctx;
>
> + if (!ctx)
> + return;
> if (ctx->tx_conf == TLS_SW)
> tls_sw_cancel_work_tx(ctx);
That's no bueno, the real socket's close will never get called.
Powered by blists - more mailing lists