Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp2744001pxf; Sun, 28 Mar 2021 00:32:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy917izSKHw6ISxe2KeR12FrRhG/z0fL7WzvK9iSTXUy4EC8ZXKkweMjf6MIFSEDKtIC3Fj X-Received: by 2002:a05:6402:34d:: with SMTP id r13mr23477446edw.64.1616916748016; Sun, 28 Mar 2021 00:32:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616916748; cv=none; d=google.com; s=arc-20160816; b=n2MoR78oGWpeF9wPkZEgv2mbo3VGf3aPCtrV7mzu4+TFoWsG5nW+wu11reY48inUgY XwPObppCA04iULuYcr5BSOzjvW2AxxfO/CHIhJVZwQouUZZaPyUiGkg0J0U5gh8/8p5Q iesPpyixnIpPIQKVi5eGktldGTpGfEsByvpK4SGLgU9P2gKiwB23sZD37JLxxd9tbkia Oc97KS+tfrF2jPtrusy3KtddZ5zSyJpeJX82fw4XaZdPJs1T9Swfrx9U9EcaC2yoq8WN obBNHXyOWbkvTzErc01uvZ+BrlQBC9kbJnWbiE0h4/MK72IhOOpiaMZyJbPEPG6+tDzQ tFbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ySo3LejcKxhpiNYrTW7rYd2XKHLRzJ0Dm1JJ/H0CViE=; b=CIjQahvb2pSfcIfFTyHvgFpFL+G3RzGO5I2X/remffmWgOhYpY8Eq2Fo6znn2sN2qe VGINvQU2gkqYaXWKFybcMCy05uFDJQhJsSSZYFpAe8FlV9XVgHqKATX8QQh6W5ln7RIM sDkmyPAaFMr8QjvbAbnTG+BibG06Vky2u+5sPiffaPD6DT4v1i06m24kgBY9x3QTCsZY 3k6RElzKh35ktuWKUxATy+DzDQcnd2LI1u6mmzjOsokcIbQDh0Amqj3x/43bItjlZk/G S0guyga6sR400Z49QF/AmT507PmXIjNsMHVpjr9eZFAUjDWFhenaYK7Gp/glMr8AMwxt qxow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mail.ustc.edu.cn header.s=dkim header.b=Y0JTSslW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=mail.ustc.edu.cn Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id fx8si10581298ejb.481.2021.03.28.00.32.06; Sun, 28 Mar 2021 00:32:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mail.ustc.edu.cn header.s=dkim header.b=Y0JTSslW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=mail.ustc.edu.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230247AbhC1HbJ (ORCPT + 99 others); Sun, 28 Mar 2021 03:31:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229563AbhC1HbC (ORCPT ); Sun, 28 Mar 2021 03:31:02 -0400 Received: from ustc.edu.cn (email6.ustc.edu.cn [IPv6:2001:da8:d800::8]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2775DC061762; Sun, 28 Mar 2021 00:30:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mail.ustc.edu.cn; s=dkim; h=Received:From:To:Cc:Subject:Date: Message-Id:MIME-Version:Content-Transfer-Encoding; bh=ySo3LejcKx hpiNYrTW7rYd2XKHLRzJ0Dm1JJ/H0CViE=; b=Y0JTSslWLJr2ilr4o55nMybfXO JhLkgthVElLkm+N1ME4thTBB6koj5fCp4xS/lWSaTpJWZXOgXdjAEm3r6U2Cgp/J JX+6g0F70jHxM5ZbDR2EQ69ETOIFhSptPQQlRLBBpvJ1WZfx8QxtejsMESsRuXJM UIa06KPaqxrVabyVQ= Received: from ubuntu.localdomain (unknown [202.38.69.14]) by newmailweb.ustc.edu.cn (Coremail) with SMTP id LkAmygBHT0uaMGBgV45cAA--.3225S4; Sun, 28 Mar 2021 15:30:34 +0800 (CST) From: Lv Yunlong To: jmaloy@redhat.com, ying.xue@windriver.com, davem@davemloft.net, kuba@kernel.org Cc: netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net, linux-kernel@vger.kernel.org, Lv Yunlong Subject: [PATCH] net:tipc: Fix a double free in tipc_sk_mcast_rcv Date: Sun, 28 Mar 2021 00:30:29 -0700 Message-Id: <20210328073029.4325-1-lyl2019@mail.ustc.edu.cn> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID: LkAmygBHT0uaMGBgV45cAA--.3225S4 X-Coremail-Antispam: 1UD129KBjvJXoWxJrWxXFWDWrWrCr43JFyftFb_yoW8JFWxpF 45Gr15GrZ7Jws09FyIqw40gr43C3yqkrsI9rW7Jr4kZrs0gw1Sqr409F4YgF45JrZ8CF4S qr1IqFs0qrWrZ37anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUvm14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26ryj6F1UM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26F4j 6r4UJwA2z4x0Y4vEx4A2jsIE14v26rxl6s0DM28EF7xvwVC2z280aVCY1x0267AKxVW0oV Cq3wAac4AC62xK8xCEY4vEwIxC4wAS0I0E0xvYzxvE52x082IY62kv0487Mc02F40EFcxC 0VAKzVAqx4xG6I80ewAv7VC0I7IYx2IY67AKxVWUJVWUGwAv7VC2z280aVAFwI0_Jr0_Gr 1lOx8S6xCaFVCjc4AY6r1j6r4UM4x0Y48IcxkI7VAKI48JM4x0x7Aq67IIx4CEVc8vx2IE rcIFxwCY02Avz4vE14v_GF4l42xK82IYc2Ij64vIr41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr 1lx2IqxVAqx4xG67AKxVWUJVWUGwC20s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE 14v26r1q6r43MIIYrxkI7VAKI48JMIIF0xvE2Ix0cI8IcVAFwI0_Jr0_JF4lIxAIcVC0I7 IYx2IY6xkF7I0E14v26r1j6r4UMIIF0xvE42xK8VAvwI8IcIk0rVWrZr1j6s0DMIIF0xvE x4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Jr0_GrUvcSsGvfC2KfnxnU UI43ZEXa7VUbVHq5UUUUU== X-CM-SenderInfo: ho1ojiyrz6zt1loo32lwfovvfxof0/ Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the if(skb_peek(arrvq) == skb) branch, it calls __skb_dequeue(arrvq) to get the skb by skb = skb_peek(arrvq). Then __skb_dequeue() unlinks the skb from arrvq and returns the skb which equals to skb_peek(arrvq). After __skb_dequeue(arrvq) finished, the skb is freed by kfree_skb(__skb_dequeue(arrvq)) in the first time. Unfortunately, the same skb is freed in the second time by kfree_skb(skb) after the branch completed. My patch removes kfree_skb() in the if(skb_peek(arrvq) == skb) branch, because this skb will be freed by kfree_skb(skb) finally. Fixes: cb1b728096f54 ("tipc: eliminate race condition at multicast reception") Signed-off-by: Lv Yunlong --- net/tipc/socket.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/tipc/socket.c b/net/tipc/socket.c index cebcc104dc70..022999e0202d 100644 --- a/net/tipc/socket.c +++ b/net/tipc/socket.c @@ -1265,7 +1265,7 @@ void tipc_sk_mcast_rcv(struct net *net, struct sk_buff_head *arrvq, spin_lock_bh(&inputq->lock); if (skb_peek(arrvq) == skb) { skb_queue_splice_tail_init(&tmpq, inputq); - kfree_skb(__skb_dequeue(arrvq)); + __skb_dequeue(arrvq); } spin_unlock_bh(&inputq->lock); __skb_queue_purge(&tmpq); -- 2.25.1