Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2017425ybz; Sat, 18 Apr 2020 13:29:32 -0700 (PDT) X-Google-Smtp-Source: APiQypJTKuxqxfjgrVsjOSzGmdYKnyF7WyJEzJcqiDKjwKcc6vs2dgAKFtPXk335J4Xj3gHAnG2F X-Received: by 2002:a50:dac9:: with SMTP id s9mr8416140edj.313.1587241772419; Sat, 18 Apr 2020 13:29:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587241772; cv=none; d=google.com; s=arc-20160816; b=dm1UcQFNks7Mv2Fysb6IyuwfkYnRvff+OKgywDYGuqx4LojT+2Vgnq3xjWLSIHEOVm TchfEW7TcguAdtEmjvJ2FAaZ+rr3qYADyzZkyzRM300avBNCyv/+gzqPMUjJ7o+bc6+9 VYzxCPo1L+XNuy1mDYfEBXl98fp9vVVq2IY/6ghAhRXKUz/PMXwIx0w0KMbKNSaf+fMg WZ6FM86BHRLdK29WdyUOouLQTAPqhlpndJI2Hed2SUT9AQdEbAoGccEwetCQebbMtMAv xF8Wfw7UUt+wZfzaMHPaeBjA7fnnDnO77/q6u8PbkmkvNB1OYaMITqaMjfiO1bHH1rB4 NLeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=RCUFBgo6kdjUlTW2s3gAJAKMPWKZE+r32vbY3z690Dk=; b=NDHJ8kvjUok6CnLmEBF0tpg++3UVEWmygUdxem179FjWlwuVZ6uGKn3v5ssKppa88+ dPbIzX2DaWtThXpZ2riEzVAk3CbN3ezjzg0JaXdUMvfVwoTkK5XLneWoDGDTZUsCnxtK RF8pb+h7yD5I+MTKuBnBfC4jefO+k7RXPIyhk+Vm5A0wAyx7IRbHYab4MLWgFWtorfBO E58VtR4yvXBxUUyyQ2Io/KyDhsCe/PC+YHzjsb9OlpI45tkHgJvnLNHQJbwO6s9x3llo tL79P3tmDe1D/4zhjWwc2pFuhtnRl7RnYPsbR4WMcDGGt9/nN56Lianyea5nxWW7rIei ufpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m25si16397537ejb.358.2020.04.18.13.29.09; Sat, 18 Apr 2020 13:29:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728079AbgDRU0R (ORCPT + 99 others); Sat, 18 Apr 2020 16:26:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57462 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726014AbgDRU0Q (ORCPT ); Sat, 18 Apr 2020 16:26:16 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9DC30C061A0C; Sat, 18 Apr 2020 13:26:16 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 5574912753E8B; Sat, 18 Apr 2020 13:26:15 -0700 (PDT) Date: Sat, 18 Apr 2020 13:26:14 -0700 (PDT) Message-Id: <20200418.132614.92642620154751485.davem@davemloft.net> To: xiyuyang19@fudan.edu.cn Cc: jmaloy@redhat.com, ying.xue@windriver.com, kuba@kernel.org, netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net, linux-kernel@vger.kernel.org, yuanxzhang@fudan.edu.cn, kjlu@umn.edu, tanxin.ctf@gmail.com Subject: Re: [PATCH] tipc: Fix potential tipc_node refcnt leak in tipc_rcv From: David Miller In-Reply-To: <1586940029-69994-1-git-send-email-xiyuyang19@fudan.edu.cn> References: <1586940029-69994-1-git-send-email-xiyuyang19@fudan.edu.cn> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sat, 18 Apr 2020 13:26:15 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xiyu Yang Date: Wed, 15 Apr 2020 16:40:28 +0800 > tipc_rcv() invokes tipc_node_find() twice, which returns a reference of > the specified tipc_node object to "n" with increased refcnt. > > When tipc_rcv() returns or a new object is assigned to "n", the original > local reference of "n" becomes invalid, so the refcount should be > decreased to keep refcount balanced. > > The issue happens in some paths of tipc_rcv(), which forget to decrease > the refcnt increased by tipc_node_find() and will cause a refcnt leak. > > Fix this issue by calling tipc_node_put() before the original object > pointed by "n" becomes invalid. > > Signed-off-by: Xiyu Yang > Signed-off-by: Xin Tan Applied and queued up for -stable.