Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3759560imm; Mon, 18 Jun 2018 03:40:40 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKBgsCXjPrC/tkKbDxcAiGbYMzz3BfOeKp6lT4uhzJureJnHXioMukVFF04yojpBhw8quBg X-Received: by 2002:a63:bf0b:: with SMTP id v11-v6mr10197029pgf.29.1529318440047; Mon, 18 Jun 2018 03:40:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529318440; cv=none; d=google.com; s=arc-20160816; b=hdDLyiEGsSor5ZfrTsCVZi8YfWKeUCDKzUcZhjnYsJo33jQZgVS2J1u+JSdlhEf/TQ zW2q4o3Oad3MzkkyRRncQtDO/fQrWHj2ns4R54nDZ1riPA2L1ScVFCAMfwx+1czhLjUv 2E2+xLyYZnmcoXn0OtiHIOdU6Hb8XXEtGEvPtJgM0TkMTnIk9YGCbKgyvWs0SVEa6Mjm k3SyKYGqZB9AIGZ/jPiQko3JMuReTawMMKNT4Vu2Ce9+183BD2sp/uhbbGb3mrajdcf9 kbGnIzL9a4TiHY6bs8QHpjigWq2OYadGAVB4ZseJmUuy2cpuemBu0vCV8Liwrs9lUkrG tlXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=9Y5b8vSXGd4Ka1FAWt/Quwvixo/+tkatH67jQ30Unwo=; b=v02jYIzAdNaOY85rpy0MLBE5Qz0Gco8rKo4Hx7L50teZmpnf7FzZoEhesnyhJSshev +zbaGTGGhqzRS6VK7B3rO6b0N6zQ0K4u5IYfAZ5WBgO3u0hqo0aQb2Qw//CeC90u4ZVM h+jUFVOahoLRDjfLS5udU4jjCztpVFSelN2zicYANu0UUurVtF6vlT91x1gSxRw0gSJH K3z7vGCMg1hXlzv13WxtkdrYdPxi+0U1YXmbbmYqBwk1QoQmaq4DJq7LQawLPgLdA0lc CAqofM/r5UZZUG6N8ixRJLdwSRywPRMwzEoz0u7ejNHKHNVjzraG/SbPiPui4qVvPVko ijHA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m11-v6si14171003plt.284.2018.06.18.03.40.26; Mon, 18 Jun 2018 03:40:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934710AbeFRIRH (ORCPT + 99 others); Mon, 18 Jun 2018 04:17:07 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:53584 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934611AbeFRIRE (ORCPT ); Mon, 18 Jun 2018 04:17:04 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id C90B2C77; Mon, 18 Jun 2018 08:17:03 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tung Nguyen , Jon Maloy , "David S. Miller" , Sasha Levin Subject: [PATCH 4.16 049/279] tipc: fix infinite loop when dumping link monitor summary Date: Mon, 18 Jun 2018 10:10:34 +0200 Message-Id: <20180618080610.867190924@linuxfoundation.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180618080608.851973560@linuxfoundation.org> References: <20180618080608.851973560@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tung Nguyen [ Upstream commit 36a50a989ee8267588de520b8704b85f045a3220 ] When configuring the number of used bearers to MAX_BEARER and issuing command "tipc link monitor summary", the command enters infinite loop in user space. This issue happens because function tipc_nl_node_dump_monitor() returns the wrong 'prev_bearer' value when all potential monitors have been scanned. The correct behavior is to always try to scan all monitors until either the netlink message is full, in which case we return the bearer identity of the affected monitor, or we continue through the whole bearer array until we can return MAX_BEARERS. This solution also caters for the case where there may be gaps in the bearer array. Signed-off-by: Tung Nguyen Signed-off-by: Jon Maloy Signed-off-by: David S. Miller Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/tipc/monitor.c | 2 +- net/tipc/node.c | 11 ++++------- 2 files changed, 5 insertions(+), 8 deletions(-) --- a/net/tipc/monitor.c +++ b/net/tipc/monitor.c @@ -777,7 +777,7 @@ int __tipc_nl_add_monitor(struct net *ne ret = tipc_bearer_get_name(net, bearer_name, bearer_id); if (ret || !mon) - return -EINVAL; + return 0; hdr = genlmsg_put(msg->skb, msg->portid, msg->seq, &tipc_genl_family, NLM_F_MULTI, TIPC_NL_MON_GET); --- a/net/tipc/node.c +++ b/net/tipc/node.c @@ -2145,8 +2145,8 @@ int tipc_nl_node_dump_monitor(struct sk_ struct net *net = sock_net(skb->sk); u32 prev_bearer = cb->args[0]; struct tipc_nl_msg msg; + int bearer_id; int err; - int i; if (prev_bearer == MAX_BEARERS) return 0; @@ -2156,16 +2156,13 @@ int tipc_nl_node_dump_monitor(struct sk_ msg.seq = cb->nlh->nlmsg_seq; rtnl_lock(); - for (i = prev_bearer; i < MAX_BEARERS; i++) { - prev_bearer = i; + for (bearer_id = prev_bearer; bearer_id < MAX_BEARERS; bearer_id++) { err = __tipc_nl_add_monitor(net, &msg, prev_bearer); if (err) - goto out; + break; } - -out: rtnl_unlock(); - cb->args[0] = prev_bearer; + cb->args[0] = bearer_id; return skb->len; }