Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3059252ybb; Sun, 22 Mar 2020 14:25:05 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvgjjPwBJjpia0Ca9GWZ8w157bPQr25fUfT4FCYmvsxsYIJf0/nls+lhP4ToRDb/31d9FyR X-Received: by 2002:a9d:895:: with SMTP id 21mr14952010otf.365.1584912304944; Sun, 22 Mar 2020 14:25:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584912304; cv=none; d=google.com; s=arc-20160816; b=PVCbvRIU5bte25wRousDxPMbvDcq36ICgA3tjC0o5BkunZ99P1VB2odClzFrL/UeQv Ok3cqKha7C1XpxtAWNTtSD/hqLIKlSHYNJ8DZxMwipYTkNfuszIXmd3Zte/z2EDEuCZu HGoemrGwmNTsV/OZSdDcYLXQpMtMxNAGV9QFjq+DFopbyVuJH48iichSpJSpODidCvzq JCt45gJ2zXYwbcUBKJysOC4MVbbed0f1gtzlI7KsDkWES9NH/wxPuQtD44o+Mgb7SFqx YfRek6piMXGeu6CrGxkQMysw5CSdLxGm+VoBqcNPtu6xhlXlIEZyrg1RCAtjiMUd33Pq 9FjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:message-id:cc:to:subject:from; bh=goFCR4Sq1MgLHd5soeJZ1ZfQFzI+z/k1iRU3Ilk4V44=; b=KCEHOIeaoZXGLTq0qRtcbDzXLx1Pngcs5Lu6ZTFy6dmHhGSUviHJciPBtpKZCqdXZ7 8jWTxOxQr4D+o64P7hfbr/+KsxsAjFEPVnYkU7AHkNgU8M1tLx+yVgJYxhgWqD/Ua8t/ 6X0yzdIen+GaJNCHnhtTweTWqEeQMhPNHnp+RTXkjtKQK7qTrkAuVVRzP1TtRGPY5ufO AUqYyg4cOUqc5vwWhXCWYYt3jDoWCGqHOwdh5RPFBfazhBkrzyHPXWtxXnP3QWIhVNK8 fwSH0rfJxk90Z3UBWyuVPSUNIlcLBksIEKYw5Xki16pg6S+fEWN2r7sT72CH5NrJfx5B 6J4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c19si8998369ots.118.2020.03.22.14.24.53; Sun, 22 Mar 2020 14:25:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726896AbgCVVYZ (ORCPT + 99 others); Sun, 22 Mar 2020 17:24:25 -0400 Received: from mx2.suse.de ([195.135.220.15]:57092 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726809AbgCVVYY (ORCPT ); Sun, 22 Mar 2020 17:24:24 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 1070BAB7F; Sun, 22 Mar 2020 21:24:22 +0000 (UTC) Received: by unicorn.suse.cz (Postfix, from userid 1000) id 4A8B1E0FD3; Sun, 22 Mar 2020 22:24:21 +0100 (CET) From: Michal Kubecek Subject: [PATCH net v2] ethtool: fix reference leak in some *_SET handlers To: "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org Cc: Andrew Lunn , linux-kernel@vger.kernel.org Message-Id: <20200322212421.4A8B1E0FD3@unicorn.suse.cz> Date: Sun, 22 Mar 2020 22:24:21 +0100 (CET) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andrew noticed that some handlers for *_SET commands leak a netdev reference if required ethtool_ops callbacks do not exist. A simple reproducer would be e.g. ip link add veth1 type veth peer name veth2 ethtool -s veth1 wol g ip link del veth1 Make sure dev_put() is called when ethtool_ops check fails. v2: add Fixes tags Fixes: a53f3d41e4d3 ("ethtool: set link settings with LINKINFO_SET request") Fixes: bfbcfe2032e7 ("ethtool: set link modes related data with LINKMODES_SET request") Fixes: e54d04e3afea ("ethtool: set message mask with DEBUG_SET request") Fixes: 8d425b19b305 ("ethtool: set wake-on-lan settings with WOL_SET request") Reported-by: Andrew Lunn Signed-off-by: Michal Kubecek Reviewed-by: Andrew Lunn Reviewed-by: Florian Fainelli Reviewed-by: Jakub Kicinski --- net/ethtool/debug.c | 4 +++- net/ethtool/linkinfo.c | 4 +++- net/ethtool/linkmodes.c | 4 +++- net/ethtool/wol.c | 4 +++- 4 files changed, 12 insertions(+), 4 deletions(-) diff --git a/net/ethtool/debug.c b/net/ethtool/debug.c index aaef4843e6ba..92599ad7b3c2 100644 --- a/net/ethtool/debug.c +++ b/net/ethtool/debug.c @@ -107,8 +107,9 @@ int ethnl_set_debug(struct sk_buff *skb, struct genl_info *info) if (ret < 0) return ret; dev = req_info.dev; + ret = -EOPNOTSUPP; if (!dev->ethtool_ops->get_msglevel || !dev->ethtool_ops->set_msglevel) - return -EOPNOTSUPP; + goto out_dev; rtnl_lock(); ret = ethnl_ops_begin(dev); @@ -129,6 +130,7 @@ int ethnl_set_debug(struct sk_buff *skb, struct genl_info *info) ethnl_ops_complete(dev); out_rtnl: rtnl_unlock(); +out_dev: dev_put(dev); return ret; } diff --git a/net/ethtool/linkinfo.c b/net/ethtool/linkinfo.c index 5d16cb4e8693..6e9e0b590bb5 100644 --- a/net/ethtool/linkinfo.c +++ b/net/ethtool/linkinfo.c @@ -126,9 +126,10 @@ int ethnl_set_linkinfo(struct sk_buff *skb, struct genl_info *info) if (ret < 0) return ret; dev = req_info.dev; + ret = -EOPNOTSUPP; if (!dev->ethtool_ops->get_link_ksettings || !dev->ethtool_ops->set_link_ksettings) - return -EOPNOTSUPP; + goto out_dev; rtnl_lock(); ret = ethnl_ops_begin(dev); @@ -162,6 +163,7 @@ int ethnl_set_linkinfo(struct sk_buff *skb, struct genl_info *info) ethnl_ops_complete(dev); out_rtnl: rtnl_unlock(); +out_dev: dev_put(dev); return ret; } diff --git a/net/ethtool/linkmodes.c b/net/ethtool/linkmodes.c index 96f20be64553..18cc37be2d9c 100644 --- a/net/ethtool/linkmodes.c +++ b/net/ethtool/linkmodes.c @@ -338,9 +338,10 @@ int ethnl_set_linkmodes(struct sk_buff *skb, struct genl_info *info) if (ret < 0) return ret; dev = req_info.dev; + ret = -EOPNOTSUPP; if (!dev->ethtool_ops->get_link_ksettings || !dev->ethtool_ops->set_link_ksettings) - return -EOPNOTSUPP; + goto out_dev; rtnl_lock(); ret = ethnl_ops_begin(dev); @@ -370,6 +371,7 @@ int ethnl_set_linkmodes(struct sk_buff *skb, struct genl_info *info) ethnl_ops_complete(dev); out_rtnl: rtnl_unlock(); +out_dev: dev_put(dev); return ret; } diff --git a/net/ethtool/wol.c b/net/ethtool/wol.c index e1b8a65b64c4..55e1ecaaf739 100644 --- a/net/ethtool/wol.c +++ b/net/ethtool/wol.c @@ -128,8 +128,9 @@ int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info) if (ret < 0) return ret; dev = req_info.dev; + ret = -EOPNOTSUPP; if (!dev->ethtool_ops->get_wol || !dev->ethtool_ops->set_wol) - return -EOPNOTSUPP; + goto out_dev; rtnl_lock(); ret = ethnl_ops_begin(dev); @@ -172,6 +173,7 @@ int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info) ethnl_ops_complete(dev); out_rtnl: rtnl_unlock(); +out_dev: dev_put(dev); return ret; } -- 2.25.1