Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3005029pxb; Sun, 8 Nov 2020 22:57:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJzlRoclCxCKsJNo8XwT3w6WSFYmROY4BHuOcO3v91vUAjuVtuoiyXJYru6udf9pm/4e0+/V X-Received: by 2002:a17:906:37d2:: with SMTP id o18mr608742ejc.379.1604905032121; Sun, 08 Nov 2020 22:57:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604905032; cv=none; d=google.com; s=arc-20160816; b=PUE8STs/kbqPP47GZkxxFwz7lAIQxMlCyCoqbj2kQ6t9NvqpOdFy82wpWfXFf7j2V7 gTupiqcmudi01FEQVjm5bLHY1FZkXgUFUxw3zI7Y8PqPfHrmSMMns57aN4oLGvTFpGyX y6vlIhOCrUPSiPvrnFMb13hiTSQp8q1VJk3Ob3cPgQsETp36gNX1ctnneUIfzdOgMCNl Ive9m7lRldXBClB1rT+PfD8Q0KMqJoueJoQc2J/v32iqbuAE+tHFS059MBqJYTncsmwS RCTk1rUmc9HHS91EQ0VD8mrIoZjx8zwxzDxhRaSt1W/8lYObeoV24mp0p42kfkZYVEQN WehA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=XXqfHwrUpX3zvEdg9qFK1/0TzU2110aq5uF+MFlqGEA=; b=NARYQBsRkphMnxME3Rq+MVH6ZbjyIKu9io5OLprbKW7gMay/QzYZkpbglUWI4ENDOM BRUg2lncBDp4a/1ukU71wd1UJxr+gg9RDiVAIDLVGDloqedtsSws7M8U+5NrZcOmAKmf Ei4XtemtZ8M1+R7Hl8Z8gIUi3voyv9OrY9ZFvkAmuY5HMVkLxKsCBvTvJBKf9Y1Ck90G aCE5RuAe3oHaHQ5JwxoNLZcUWjIggR4GPViJg3GWvcjGU4OTpGm5CxAJq/85SCle/sg2 2FmHdomUkPOujWSU2SqcrxZxw4OYqEwdnOT0BFeBDernTa0BidHrEh1YrKyi1SINfREf o4ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp1si6928833ejc.286.2020.11.08.22.56.48; Sun, 08 Nov 2020 22:57:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729587AbgKIGzX (ORCPT + 99 others); Mon, 9 Nov 2020 01:55:23 -0500 Received: from mxout70.expurgate.net ([91.198.224.70]:8475 "EHLO mxout70.expurgate.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727077AbgKIGzX (ORCPT ); Mon, 9 Nov 2020 01:55:23 -0500 Received: from [127.0.0.1] (helo=localhost) by relay.expurgate.net with smtp (Exim 4.92) (envelope-from ) id 1kc155-000Mue-VZ; Mon, 09 Nov 2020 07:55:12 +0100 Received: from [195.243.126.94] (helo=securemail.tdt.de) by relay.expurgate.net with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1kc154-000UAf-Eo; Mon, 09 Nov 2020 07:55:10 +0100 Received: from securemail.tdt.de (localhost [127.0.0.1]) by securemail.tdt.de (Postfix) with ESMTP id 88DA824004B; Mon, 9 Nov 2020 07:55:09 +0100 (CET) Received: from mail.dev.tdt.de (unknown [10.2.4.42]) by securemail.tdt.de (Postfix) with ESMTP id ED16C240049; Mon, 9 Nov 2020 07:55:08 +0100 (CET) Received: from mschiller01.dev.tdt.de (unknown [10.2.3.20]) by mail.dev.tdt.de (Postfix) with ESMTPSA id 463C820484; Mon, 9 Nov 2020 07:55:08 +0100 (CET) From: Martin Schiller To: andrew.hendry@gmail.com, davem@davemloft.net, kuba@kernel.org, edumazet@google.com, xiyuyang19@fudan.edu.cn Cc: linux-x25@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Martin Schiller Subject: [RESEND PATCH v2] net/x25: Fix null-ptr-deref in x25_connect Date: Mon, 9 Nov 2020 07:54:49 +0100 Message-ID: <20201109065449.9014-1-ms@dev.tdt.de> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dev.tdt.de Content-Transfer-Encoding: quoted-printable X-purgate-type: clean X-purgate-ID: 151534::1604904911-00014126-C9C59892/0/0 X-purgate: clean Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes a regression for blocking connects introduced by commit 4becb7ee5b3d ("net/x25: Fix x25_neigh refcnt leak when x25 disconnect"). The x25->neighbour is already set to "NULL" by x25_disconnect() now, while a blocking connect is waiting in x25_wait_for_connection_establishment(). Therefore x25->neighbour must not be accessed here again and x25->state is also already set to X25_STATE_0 by x25_disconnect(). Fixes: 4becb7ee5b3d ("net/x25: Fix x25_neigh refcnt leak when x25 disconn= ect") Signed-off-by: Martin Schiller --- Change from v1: also handle interrupting signals correctly --- net/x25/af_x25.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/x25/af_x25.c b/net/x25/af_x25.c index 0bbb283f23c9..046d3fee66a9 100644 --- a/net/x25/af_x25.c +++ b/net/x25/af_x25.c @@ -825,7 +825,7 @@ static int x25_connect(struct socket *sock, struct so= ckaddr *uaddr, sock->state =3D SS_CONNECTED; rc =3D 0; out_put_neigh: - if (rc) { + if (rc && x25->neighbour) { read_lock_bh(&x25_list_lock); x25_neigh_put(x25->neighbour); x25->neighbour =3D NULL; --=20 2.20.1