Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp419014ybh; Wed, 15 Jul 2020 05:39:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyS52PZJ0BIt25VLOC+NOQtXbDt6a5J1MI6Fr0AjnwbSTGIRsid1l0DQvvla0bEvw9740QD X-Received: by 2002:a17:907:2058:: with SMTP id pg24mr9571158ejb.79.1594816747599; Wed, 15 Jul 2020 05:39:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594816747; cv=none; d=google.com; s=arc-20160816; b=JDPGI2a1o/JXH2E4asyN7i11B0f6Ia8FoLaDKe5hPSiqkHKhmUKG2FcjbWhIE8y/ph 4EvJMK+305CDbHtmAOSfiar2wsw9F64mIyC0H1zh3skQiBarcQ2Yf1m/JVBpZ4Jq/uu9 KsMNuDCaeeE3ylFdEwWsqdHQIbeu7hI+fhZpdna8sbC8KBwvSQZddfwFZ3SWi0smPcCk rkYwe60Kmw/sOONuxIKIHYbXsLntB6BevpKVfp/HiaiIVBenfwOdkGQoP/LigOxlF41K HqXJjmB+vOJtc+ubcUbA1fHEK3IfGTSpYZQRmn44qzOvfcs6CaiVuX3cbOZsL4YKLNog 0XAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=24PQH3mrkG9J5Mr+XW77ictnEMjnn5qJzESa8wIV7hI=; b=E+mfXZoCuVVGQRfneDHXqw9V+uuIJV19nB5MT/mBHWcVdAPDt/fTeSjFXh2vQKTutz cnH49iE15pj1SQBouwPfZHjlRllJ9DYGAGVOKW7tV1IgdfkkvceNiqYDV6XyfDbKV+f3 eNY3HUYwfBeJhS2z47DdveqkgYIVI+rDeC0V60DGSL2oVUaIudKwBVLUv/DUcI4aUS14 ro15zt959H4iDJKrx/1tus538ZAAlHk2aZkMLYWF5QWB3+ctQd8SGSqCd9j/rs/WkIzz y0j4xUfJJIfV8n86mqKz0hT8WeEAuJb5lLLQGQUqkit0u9T2sSn0wvAB6Yrp4SPkZZyV zmKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dm22si1425075ejc.535.2020.07.15.05.38.43; Wed, 15 Jul 2020 05:39:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730741AbgGOMOh (ORCPT + 99 others); Wed, 15 Jul 2020 08:14:37 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:46038 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728866AbgGOMOg (ORCPT ); Wed, 15 Jul 2020 08:14:36 -0400 Received: from DGGEMS410-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 63CC3A091324B8FB5E4A; Wed, 15 Jul 2020 20:14:33 +0800 (CST) Received: from localhost (10.175.101.6) by DGGEMS410-HUB.china.huawei.com (10.3.19.210) with Microsoft SMTP Server id 14.3.487.0; Wed, 15 Jul 2020 20:14:27 +0800 From: Weilong Chen To: , , , , CC: , Subject: [PATCH v5 net] rtnetlink: Fix memory(net_device) leak when ->newlink fails Date: Wed, 15 Jul 2020 20:58:10 +0800 Message-ID: <20200715125810.59760-1-chenweilong@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.101.6] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When vlan_newlink call register_vlan_dev fails, it might return error with dev->reg_state = NETREG_UNREGISTERED. The rtnl_newlink should free the memory. But currently rtnl_newlink only free the memory which state is NETREG_UNINITIALIZED. BUG: memory leak unreferenced object 0xffff8881051de000 (size 4096): comm "syz-executor139", pid 560, jiffies 4294745346 (age 32.445s) hex dump (first 32 bytes): 76 6c 61 6e 32 00 00 00 00 00 00 00 00 00 00 00 vlan2........... 00 45 28 03 81 88 ff ff 00 00 00 00 00 00 00 00 .E(............. backtrace: [<0000000047527e31>] kmalloc_node include/linux/slab.h:578 [inline] [<0000000047527e31>] kvmalloc_node+0x33/0xd0 mm/util.c:574 [<000000002b59e3bc>] kvmalloc include/linux/mm.h:753 [inline] [<000000002b59e3bc>] kvzalloc include/linux/mm.h:761 [inline] [<000000002b59e3bc>] alloc_netdev_mqs+0x83/0xd90 net/core/dev.c:9929 [<000000006076752a>] rtnl_create_link+0x2c0/0xa20 net/core/rtnetlink.c:3067 [<00000000572b3be5>] __rtnl_newlink+0xc9c/0x1330 net/core/rtnetlink.c:3329 [<00000000e84ea553>] rtnl_newlink+0x66/0x90 net/core/rtnetlink.c:3397 [<0000000052c7c0a9>] rtnetlink_rcv_msg+0x540/0x990 net/core/rtnetlink.c:5460 [<000000004b5cb379>] netlink_rcv_skb+0x12b/0x3a0 net/netlink/af_netlink.c:2469 [<00000000c71c20d3>] netlink_unicast_kernel net/netlink/af_netlink.c:1303 [inline] [<00000000c71c20d3>] netlink_unicast+0x4c6/0x690 net/netlink/af_netlink.c:1329 [<00000000cca72fa9>] netlink_sendmsg+0x735/0xcc0 net/netlink/af_netlink.c:1918 [<000000009221ebf7>] sock_sendmsg_nosec net/socket.c:652 [inline] [<000000009221ebf7>] sock_sendmsg+0x109/0x140 net/socket.c:672 [<000000001c30ffe4>] ____sys_sendmsg+0x5f5/0x780 net/socket.c:2352 [<00000000b71ca6f3>] ___sys_sendmsg+0x11d/0x1a0 net/socket.c:2406 [<0000000007297384>] __sys_sendmsg+0xeb/0x1b0 net/socket.c:2439 [<000000000eb29b11>] do_syscall_64+0x56/0xa0 arch/x86/entry/common.c:359 [<000000006839b4d0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Fixes: cb626bf566eb ("net-sysfs: Fix reference count leak") Reported-by: Hulk Robot Signed-off-by: Weilong Chen --- net/core/rtnetlink.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index 9aedc15736ad..85a4b0101f76 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c @@ -3343,7 +3343,8 @@ static int __rtnl_newlink(struct sk_buff *skb, struct nlmsghdr *nlh, */ if (err < 0) { /* If device is not registered at all, free it now */ - if (dev->reg_state == NETREG_UNINITIALIZED) + if (dev->reg_state == NETREG_UNINITIALIZED || + dev->reg_state == NETREG_UNREGISTERED) free_netdev(dev); goto out; } -- 2.17.1