Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp2154736rwb; Sun, 14 Aug 2022 23:00:27 -0700 (PDT) X-Google-Smtp-Source: AA6agR4z0Vm7fdra9VEhZlhWbXhAKTljOSvPGgdilhZyk3xaLHJfXhrKQMyV2UAAR/xuVCHwub3o X-Received: by 2002:a17:90a:c402:b0:1f8:c335:d4d7 with SMTP id i2-20020a17090ac40200b001f8c335d4d7mr15858996pjt.242.1660543227227; Sun, 14 Aug 2022 23:00:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660543227; cv=none; d=google.com; s=arc-20160816; b=k67qxektahc64JL7USORGbEV6L1u528aASm38efDn5Vy5m1Dof0D98xQNDVAWvkHw7 D6mVzuIIRwd4FHiPz3F5TdUpHPGOAqwnl9eeJwM2euSbusi8vwtDWt+btntZTP9x2ewO fLx50dIzf1eXjJ/sjmZ6ks4y7JgaDnHdzBBmiZd69V72+gtwlP4XofvPc2mFGjqDcmvi 5+mekZyxC9CQh3e88CsJQEi15l912RKmXhjGF2YK3ZfaDBTvSkM0OllUso3xNO4x2qkk +eU25C4rDCMVYdhC5kLvUOORYUnLu+MN21L9J18kZURoTogy4JA/X6W8GjcPtzh1N/rJ EaUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=mMUN8Qee6AU9PyduawvjEcL4SapJHncscr/7tXu4+K4=; b=anjuK32kCf4YefgxyXALL6lwuslJDC7YYLkdHxhgFHedjSwlBNMapytK26lDKg80/g zcwxsktNZRlKnOlxRtHrqu6JRQTRF08tFnxWPTri/QsTGRBg7vncQ+3F2u7bxy9M/Pxd jKY/OncGFRKBgxuvZtJbZRkZu+bc9EtbZUTUEihg77bsUbL7CBHpllmSOOlFFdBb0F9J QP15TmZxPlLv0zBe6IjQTCz5gIn4meqBWFMAO71mOabhsugZXwKNxbb3dzVmXnFGUt8i 2gYJYe37KA0/+SRx2vOuJOfgzkdRSWFqVRs56gZ+SrYnpw5HO129VSZS7kr3Rm69kg2k e3ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=Tm5jgzTU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t5-20020a635345000000b0041d296559desi9511353pgl.690.2022.08.14.23.00.16; Sun, 14 Aug 2022 23:00:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=Tm5jgzTU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229460AbiHOFpA (ORCPT + 99 others); Mon, 15 Aug 2022 01:45:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46512 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229887AbiHOFo7 (ORCPT ); Mon, 15 Aug 2022 01:44:59 -0400 Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com [IPv6:2a00:1450:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8853A14081 for ; Sun, 14 Aug 2022 22:44:58 -0700 (PDT) Received: by mail-ed1-x52c.google.com with SMTP id a89so8342672edf.5 for ; Sun, 14 Aug 2022 22:44:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blackwall-org.20210112.gappssmtp.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc; bh=mMUN8Qee6AU9PyduawvjEcL4SapJHncscr/7tXu4+K4=; b=Tm5jgzTUgOoMSpl3LI8IvwEC8JMinl+dfgcGXsPbqWsYTOq549KDt7bK8DtuIhoqfd AFlbevdMUrem9eftVh5qM2VuCXBx1BoQnw2fa/tNbicaGYRDoqkEu0Ungjj0AMd5YBbW ClNV4qmZBmiFhJg0D/n2jAeIYC/xIpR7T8X3b/HXdkD9KRu3Ectb0IWkXE/e3REKDILA I6mm9CK7IErvIAP/FlFTdF0vXQAq2+TTZlAHaWGYxM589WTZTAnr99Jpav2WcRfbSryo 7H7MeQ48OrAFyosCRasiMYIiMJE29a8VqsRZRUrgDw3KiXE5MXaoNYXdpVV3JWT1RsFK 5NPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc; bh=mMUN8Qee6AU9PyduawvjEcL4SapJHncscr/7tXu4+K4=; b=I4+e1b+SPu12/nw45ZM+fIsbmqsNOQnGTabmpZAcFUd1KThz9ZpZpE3FaCePrjZd/F P9XzVqfEwQZnpzLBjVuEQbPd9dqqoLrfzbe+PPpOH9NR9LzZdyfbVanzSbhm9gt8bLrf LStewy2HsYKMIovcoA3+OM7Em3MuAnM/wdpgb0LPwGWZRNVsrs+jKmznLygameFX53Ja 8OhRTmjzquhHV+UI4RH6uYWTTPzlQYHjWxgEgjirLyoimuUOAnEnoZSfQdreI0Z8S70U 6BqV4F9hUeG/a29A/xtbxs0gJzVQlrU5V50ln1V/lCn6JThkClOe4FDHNETFI477iIce PNvQ== X-Gm-Message-State: ACgBeo0MzVz9nqJcwU2own5C6g7/FPPirUHY9drnFBHw3X5h7XHgxVtJ lqXM6DdcULFLWxDPjix9xaxaQg== X-Received: by 2002:a05:6402:3408:b0:43c:2dd3:d86b with SMTP id k8-20020a056402340800b0043c2dd3d86bmr13277953edc.108.1660542297073; Sun, 14 Aug 2022 22:44:57 -0700 (PDT) Received: from [192.168.0.111] (87-243-81-1.ip.btc-net.bg. [87.243.81.1]) by smtp.gmail.com with ESMTPSA id r21-20020aa7cb95000000b0043cfc872e7dsm5979905edt.10.2022.08.14.22.44.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 14 Aug 2022 22:44:56 -0700 (PDT) Message-ID: Date: Mon, 15 Aug 2022 08:44:55 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0 Subject: Re: [PATCH net-next] net: rtnetlink: fix module reference count leak issue in rtnetlink_rcv_msg Content-Language: en-US To: Zhengchao Shao , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Cc: idosch@nvidia.com, petrm@nvidia.com, florent.fourcot@wifirst.fr, weiyongjun1@huawei.com, yuehaibing@huawei.com References: <20220815024629.240367-1-shaozhengchao@huawei.com> From: Nikolay Aleksandrov In-Reply-To: <20220815024629.240367-1-shaozhengchao@huawei.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15/08/2022 05:46, Zhengchao Shao wrote: > When bulk delete command is received in the rtnetlink_rcv_msg function, > if bulk delete is not supported, module_put is not called to release > the reference counting. As a result, module reference count is leaked. > > Fixes: a6cec0bcd342("net: rtnetlink: add bulk delete support flag") > Signed-off-by: Zhengchao Shao > --- > net/core/rtnetlink.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c > index ac45328607f7..4b5b15c684ed 100644 > --- a/net/core/rtnetlink.c > +++ b/net/core/rtnetlink.c > @@ -6070,6 +6070,7 @@ static int rtnetlink_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, > if (kind == RTNL_KIND_DEL && (nlh->nlmsg_flags & NLM_F_BULK) && > !(flags & RTNL_FLAG_BULK_DEL_SUPPORTED)) { > NL_SET_ERR_MSG(extack, "Bulk delete is not supported"); > + module_put(owner); > goto err_unlock; > } > Oops, thanks. Acked-by: Nikolay Aleksandrov