Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp284281pxb; Wed, 11 Nov 2020 03:43:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJzB9arvUVrL1SCZo0qneje+IWRZFYvbiU7XiCK1K3e8VfUsOn4NqRhHeCrzyi08yR2llWm6 X-Received: by 2002:a17:906:4712:: with SMTP id y18mr24415279ejq.51.1605095018224; Wed, 11 Nov 2020 03:43:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605095018; cv=none; d=google.com; s=arc-20160816; b=XfJt3MYHIEl2EcHJkhwojhCoM9VO3lxDgZnk0CuYSzDwcorW5LLIIE9zNv6KWj9jGb 4xoY0MK5xy4roz+edO3kWsl0HbF3XnkfzNpd7t5tOAGaghHjua0yWDzbOFX6TOhAFY1o V+Xot6tSfqbmisoP0yh+GSAdzxAN+EsM3UtGrddi23ihHd45xdK1MC2ZaGk4NLDMXEci enDz80gcYx0arRSu6tV4xN8hmbKfi5/kYdxtAMFYgFqQmMdTsVxfD4Agygt0909RCRpO nNJqPGJpIqFnkJ48/zzVGXGl2BUD3jABmcZwHGrFBvri4BrZ+RJSk1Jw7d6Z0A0l76NL RspA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :organization:subject:cc:to:from:date:content-transfer-encoding :mime-version; bh=t08G4i4zemU2ir+MntjYwqPBOAaY8mz6AFVRks4ZKr0=; b=OP79ZphRqEGI/tfZ0Q5NngzfvG+zZ0gmsdqEB0qjyDqQARRHY6cX/Gy2nd9c+RB352 JoArGqg7TP+u3ax4m5aEC8pbY03cjsntD4WwMF9BjB0VHQBxKwNpii12xnZE0Acb4WG8 vn5hQbwkGwQRhdlWaCzBdh/coFsZ2pCgRxa5X2WDBNzv4xlMeLE7J+IIn2pBUWIC64F2 pDQMzxsb3ciFiQOgL3+f2p04R/0EiqAkpGdUDq4BgCQXxxUZxAwUdDF4fgr04mOtmnNI WLBNOZrIXcjUFeM6nhci4CSsQEuUlMOb/QSjxreHHCQcUagZBUtpRCAffy0p1ZaONe2F s4Pw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a42si1649629edf.535.2020.11.11.03.43.14; Wed, 11 Nov 2020 03:43:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726290AbgKKLl2 (ORCPT + 99 others); Wed, 11 Nov 2020 06:41:28 -0500 Received: from mxout70.expurgate.net ([194.37.255.70]:48917 "EHLO mxout70.expurgate.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725903AbgKKLlX (ORCPT ); Wed, 11 Nov 2020 06:41:23 -0500 Received: from [127.0.0.1] (helo=localhost) by relay.expurgate.net with smtp (Exim 4.90) (envelope-from ) id 1kcoV2-000Arb-Tv; Wed, 11 Nov 2020 12:41:16 +0100 Received: from [195.243.126.94] (helo=securemail.tdt.de) by relay.expurgate.net with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90) (envelope-from ) id 1kcoV1-0005Zg-SM; Wed, 11 Nov 2020 12:41:15 +0100 Received: from securemail.tdt.de (localhost [127.0.0.1]) by securemail.tdt.de (Postfix) with ESMTP id 1BEEB24004B; Wed, 11 Nov 2020 12:41:15 +0100 (CET) Received: from mail.dev.tdt.de (unknown [10.2.4.42]) by securemail.tdt.de (Postfix) with ESMTP id A25BD240049; Wed, 11 Nov 2020 12:41:14 +0100 (CET) Received: from mail.dev.tdt.de (localhost [IPv6:::1]) by mail.dev.tdt.de (Postfix) with ESMTP id EC805200AE; Wed, 11 Nov 2020 12:41:13 +0100 (CET) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 11 Nov 2020 12:41:13 +0100 From: Martin Schiller To: Xie He Cc: Jakub Kicinski , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH net] net: x25: Fix kernel crashes due to x25_disconnect releasing x25_neigh Organization: TDT AG In-Reply-To: <20201111100424.3989-1-xie.he.0141@gmail.com> References: <20201111100424.3989-1-xie.he.0141@gmail.com> Message-ID: <89483cb5fbf9e06edf3108fa4def6eef@dev.tdt.de> X-Sender: ms@dev.tdt.de User-Agent: Roundcube Webmail/1.3.15 X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dev.tdt.de X-purgate-ID: 151534::1605094876-0000CF01-6FFAE7B9/0/0 X-purgate: clean X-purgate-type: clean Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-11-11 11:04, Xie He wrote: > The x25_disconnect function in x25_subr.c would decrease the refcount > of > "x25->neighbour" (struct x25_neigh) and reset this pointer to NULL. > > However: > > 1) When we receive a connection, the x25_rx_call_request function in > af_x25.c does not increase the refcount when it assigns the pointer. > When we disconnect, x25_disconnect is called and the struct's refcount > is decreased without being increased in the first place. Yes, this is a problem and should be fixed. As an alternative to your approach, you could also go the way to prevent the call of x25_neigh_put(nb) in x25_lapb_receive_frame() in case of a Call Request. However, this would require more effort. > > This causes frequent kernel crashes when using AF_X25 sockets. > > 2) When we initiate a connection but the connection is refused by the > remote side, x25_disconnect is called which decreases the refcount and > resets the pointer to NULL. But the x25_connect function in af_x25.c, > which is waiting for the connection to be established, notices the > failure and then tries to decrease the refcount again, resulting in a > NULL-pointer-dereference error. > > This crashes the kernel every time a connection is refused by the > remote > side. For this bug I already sent a fix some time ago (last time I sent a RESEND yesterday), but unfortunately it was not merged yet: https://lore.kernel.org/patchwork/patch/1334917/ > > Fixes: 4becb7ee5b3d ("net/x25: Fix x25_neigh refcnt leak when x25 > disconnect") > Cc: Martin Schiller > Signed-off-by: Xie He > --- > net/x25/af_x25.c | 11 +++++++---- > 1 file changed, 7 insertions(+), 4 deletions(-) > > diff --git a/net/x25/af_x25.c b/net/x25/af_x25.c > index 0bbb283f23c9..8e59f9ecbeab 100644 > --- a/net/x25/af_x25.c > +++ b/net/x25/af_x25.c > @@ -826,10 +826,12 @@ static int x25_connect(struct socket *sock, > struct sockaddr *uaddr, > rc = 0; > out_put_neigh: > if (rc) { > - read_lock_bh(&x25_list_lock); > - x25_neigh_put(x25->neighbour); > - x25->neighbour = NULL; > - read_unlock_bh(&x25_list_lock); > + if (x25->neighbour) { > + read_lock_bh(&x25_list_lock); > + x25_neigh_put(x25->neighbour); > + x25->neighbour = NULL; > + read_unlock_bh(&x25_list_lock); > + } > x25->state = X25_STATE_0; > } > out_put_route: > @@ -1050,6 +1052,7 @@ int x25_rx_call_request(struct sk_buff *skb, > struct x25_neigh *nb, > makex25->lci = lci; > makex25->dest_addr = dest_addr; > makex25->source_addr = source_addr; > + x25_neigh_hold(nb); > makex25->neighbour = nb; > makex25->facilities = facilities; > makex25->dte_facilities= dte_facilities;