Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp832127pxu; Mon, 23 Nov 2020 05:26:00 -0800 (PST) X-Google-Smtp-Source: ABdhPJwAVAAqiHkIod1eK6gRb652eku9N9EpRc/TBpWBgIPy439O5Z9kPpRHZMKHg6q0DTO/pVUK X-Received: by 2002:a17:907:250c:: with SMTP id y12mr22631484ejl.367.1606137960376; Mon, 23 Nov 2020 05:26:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606137960; cv=none; d=google.com; s=arc-20160816; b=uOBkoIv+xizxn5dOI3Vf8xv8ybEe6lBguHD9oMzzYtvXW/e6HttdKY/JRst2eajH8z iwNqwWAiH9ovBs/lh0DwKfRUj5iYaI18wH2hlA1s1SY34CO7/uArRubZ4TsiLVy1q34a aRKXRE/Cfv45Uj0VVQjZSYoB7mzRn9FI1pEd7rF+9OokbGJgP7r7fVDdCsuHAM9B8ppU qz2/aH29hu8c+Yfd5hZTmXgq8eoZN6/2wYcJQPA0WDhxvHhufT/7f8l+pV2FJFmuiGOH 3AgDbsj/+Hkki+O9iKKywyB5BBuq9okil/1Uxt24A+b6/gHTcj+zV76LMX2nztonqlqW n6bA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nkgUXSOvgvhl7AORV2/5xm3o0l878RBuaQm6UZCQf4M=; b=BRpZwly1R1sU9VkP14RphRbvFvP29KESpzPHnOpVe6lG222636Z6zHcnXC/MMeRZLR Dw80y9skUfKbag/nkUzWk0AclfZ02g9vjU97KvuxQ7OYz8MIhO8eqT1raJei+NqbQxLO PyH+/2qIxAhJusQWixDzeqFRvO9UiuoNj1COHyOB8Ra4HZKiKdVjDsr6asuEGee+ULAd 28V4wpM3fFMrlCMECyOELuuRWerBgyeA5M/4Cyw4/cb5o48X3YCfTIcDuZsx4sF5IEf7 IbDhVWQiVrR+uWstmdA5weYxNdrp9MuQvu/5CYP8aZooENfsFlCRuPuma1u1hBpEcRHS gGVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vyk79r3j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x18si7346837ejd.242.2020.11.23.05.25.36; Mon, 23 Nov 2020 05:26:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vyk79r3j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731566AbgKWMfh (ORCPT + 99 others); Mon, 23 Nov 2020 07:35:37 -0500 Received: from mail.kernel.org ([198.145.29.99]:47304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731513AbgKWMfW (ORCPT ); Mon, 23 Nov 2020 07:35:22 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2434F20721; Mon, 23 Nov 2020 12:35:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606134922; bh=uDnvYsOCHkH+xLduyrdjo6QLJad6WUZ/By7nhrH5pU0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vyk79r3jCZjEC+HVAfq0ScHFF4s5Whob0Au5Qel7GsuC5DMBkhTJJ+6VvA7Joi6nz ugRCg9W5fZpnPJOEDdzT+mjw9u6F7Mwni6lCQGBigOuGipr1bsXchwUT7doU7vSHiv D9t50DchMqRnuwCTcOndR3kcQC2LTAL7veicc/5A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Schiller , Xie He , Jakub Kicinski Subject: [PATCH 5.4 023/158] net: x25: Increase refcnt of "struct x25_neigh" in x25_rx_call_request Date: Mon, 23 Nov 2020 13:20:51 +0100 Message-Id: <20201123121821.052409377@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201123121819.943135899@linuxfoundation.org> References: <20201123121819.943135899@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xie He [ Upstream commit 4ee18c179e5e815fa5575e0d2db0c05795a804ee ] The x25_disconnect function in x25_subr.c would decrease the refcount of "x25->neighbour" (struct x25_neigh) and reset this pointer to NULL. However, the x25_rx_call_request function in af_x25.c, which is called when we receive a connection request, does not increase the refcount when it assigns the pointer. Fix this issue by increasing the refcount of "struct x25_neigh" in x25_rx_call_request. This patch fixes frequent kernel crashes when using AF_X25 sockets. Fixes: 4becb7ee5b3d ("net/x25: Fix x25_neigh refcnt leak when x25 disconnect") Cc: Martin Schiller Signed-off-by: Xie He Link: https://lore.kernel.org/r/20201112103506.5875-1-xie.he.0141@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/x25/af_x25.c | 1 + 1 file changed, 1 insertion(+) --- a/net/x25/af_x25.c +++ b/net/x25/af_x25.c @@ -1044,6 +1044,7 @@ int x25_rx_call_request(struct sk_buff * makex25->lci = lci; makex25->dest_addr = dest_addr; makex25->source_addr = source_addr; + x25_neigh_hold(nb); makex25->neighbour = nb; makex25->facilities = facilities; makex25->dte_facilities= dte_facilities;