Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp637958ybz; Wed, 15 Apr 2020 15:40:59 -0700 (PDT) X-Google-Smtp-Source: APiQypI+eflzg9yVMt2FtiF0mmczegTLMZtDPr5nd+UaDGJoX/ne+o6BkFrhH+J1kVq62LaVbs9x X-Received: by 2002:a17:906:8152:: with SMTP id z18mr6906039ejw.4.1586990459029; Wed, 15 Apr 2020 15:40:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586990459; cv=none; d=google.com; s=arc-20160816; b=ycwPJamnVYCcfiuQs5SKvhe0xXWMVXffRSO2uyQzCNm+xj2BPfPYbj3XRNXR/ULnPG tcimAPr6KC5lI7RK98ZgZcREUNHAsSdCIH3k6uZ/fiCR05tGI7NEaeIcXaIq6oTkNnY1 T9Nw9beQY98qc5fAkXdyGraIi0FB7xLypsViCmlDUdgVzHBKu6Shz/u3/CQ0BO1oDwke jkRaLfbZ5H50wjXV3iZX2+7KE1KbiSDdhBUuvHZuqPnJNFpH9kldXYVA9cSm3ntdO1Be FWpEe/1UubDdKevOJzhkvnsgFHwceSpdjxXJQtXkFrOEgH7kYjHux5OokhJ3IwWykbUo 6kMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=+7ymPy9X5j+FaNt3AHq7PMuOVkMbwkiPlxtK3UBUMTw=; b=nev+vCdrCEjVAHFlsFIMkOtbKhl9UAPJVpu0rW5lJQoscs/k+Pjtddn7rPeixpGCQ7 l1RdbYaqPu2mYlx5nD68j+iXeplyqR0kP3gmjI07Pq8avBTnHuXDBuEKg6ry8CI8xR2C Iyakbkvq9+wasgcf0t0ygwSXH5wvaG4jPD+l2XPGb3CusWkVahMrObXO7/A/ZySXzguV /CvtdpwrPQSxkWhY3jX3gD5p9i6Dj3398AIcBF7xucTPu7O8ZY03ieYJJdX+Xusmle40 67+/b94XM83SqhYAluARAor/QitW58TSQ9oMBer9cXjDxf7rN7jUiXxrCKsnZ+Kl5AFW 3Y6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=u04oYSc7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i26si6312363ejg.474.2020.04.15.15.40.35; Wed, 15 Apr 2020 15:40:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=u04oYSc7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2894802AbgDOIkt (ORCPT + 99 others); Wed, 15 Apr 2020 04:40:49 -0400 Received: from mail.fudan.edu.cn ([202.120.224.10]:34153 "EHLO fudan.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2894777AbgDOIka (ORCPT ); Wed, 15 Apr 2020 04:40:30 -0400 X-Greylist: delayed 352 seconds by postgrey-1.27 at vger.kernel.org; Wed, 15 Apr 2020 04:40:27 EDT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fudan.edu.cn; s=dkim; h=Received:From:To:Cc:Subject:Date: Message-Id; bh=+7ymPy9X5j+FaNt3AHq7PMuOVkMbwkiPlxtK3UBUMTw=; b=u 04oYSc7tk0cfjSIke3bOGW3JxrcDlCqpiux8KCJ5Eboeh9sb7NcnebuvYit1DemF ZFeXCu6gKj5PyIWUkJQW0L0DbS/gqAOOd2ENh1tftYBQSoZLlM8pVEQOqJBNl/6h lCs9vthKbMCat/c5wYs68Dx5B05jCyeR3dZAzm5MqA= Received: from localhost.localdomain (unknown [120.229.255.108]) by app1 (Coremail) with SMTP id XAUFCgAHzSxyyJZejoVFAA--.36467S3; Wed, 15 Apr 2020 16:40:19 +0800 (CST) From: Xiyu Yang To: Jon Maloy , Ying Xue , "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net, linux-kernel@vger.kernel.org Cc: yuanxzhang@fudan.edu.cn, kjlu@umn.edu, Xiyu Yang , Xin Tan Subject: [PATCH] tipc: Fix potential tipc_aead refcnt leak in tipc_crypto_rcv Date: Wed, 15 Apr 2020 16:39:56 +0800 Message-Id: <1586939996-69937-1-git-send-email-xiyuyang19@fudan.edu.cn> X-Mailer: git-send-email 2.7.4 X-CM-TRANSID: XAUFCgAHzSxyyJZejoVFAA--.36467S3 X-Coremail-Antispam: 1UD129KBjvJXoWrurW7XF1rAryUWw1rZr1rXrb_yoW8Jr1xp3 yUC39rArn5Gr4DKan5GF93K348Gry7urZxWFZ8uF15XFsFqw1IyrySqrWj9ry5uFWUArWq vrZYvw1Y9F45uFDanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9K14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26rxl 6s0DM28EF7xvwVC2z280aVAFwI0_GcCE3s1l84ACjcxK6I8E87Iv6xkF7I0E14v26rxl6s 0DM2vYz4IE04k24VAvwVAKI4IrM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVACY4xI 64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r126r1DMcIj6I8E87Iv67AKxVWUJVW8Jw Am72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lF7I21c0EjII2zVCS5cI20VAG YxC7M4IIrI8v6xkF7I0E8cxan2IY04v7MxkIecxEwVAFwVW8ZwCF04k20xvY0x0EwIxGrw CFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE 14v26r106r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkGc2Ij64vIr41lIxAIcVC0I7IYx2 IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Cr0_Gr1UMIIF0xvE42xK8VAv wI8IcIk0rVW8JVW3JwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14 v26r4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjfUePfQDUUUU X-CM-SenderInfo: irzsiiysuqikmy6i3vldqovvfxof0/ Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org tipc_crypto_rcv() invokes tipc_aead_get(), which returns a reference of the tipc_aead object to "aead" with increased refcnt. When tipc_crypto_rcv() returns, the original local reference of "aead" becomes invalid, so the refcount should be decreased to keep refcount balanced. The issue happens in one error path of tipc_crypto_rcv(). When TIPC message decryption status is EINPROGRESS or EBUSY, the function forgets to decrease the refcnt increased by tipc_aead_get() and causes a refcnt leak. Fix this issue by calling tipc_aead_put() on the error path when TIPC message decryption status is EINPROGRESS or EBUSY. Signed-off-by: Xiyu Yang Signed-off-by: Xin Tan --- net/tipc/crypto.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/tipc/crypto.c b/net/tipc/crypto.c index c8c47fc72653..8c47ded2edb6 100644 --- a/net/tipc/crypto.c +++ b/net/tipc/crypto.c @@ -1712,6 +1712,7 @@ int tipc_crypto_rcv(struct net *net, struct tipc_crypto *rx, case -EBUSY: this_cpu_inc(stats->stat[STAT_ASYNC]); *skb = NULL; + tipc_aead_put(aead); return rc; default: this_cpu_inc(stats->stat[STAT_NOK]); -- 2.7.4