Skip to content

Commit

Permalink
netlink: Fix dump skb leak/double free
Browse files Browse the repository at this point in the history
When we free cb->skb after a dump, we do it after releasing the
lock.  This means that a new dump could have started in the time
being and we'll end up freeing their skb instead of ours.

This patch saves the skb and module before we unlock so we free
the right memory.

Fixes: 16b304f ("netlink: Eliminate kmalloc in netlink dump operation.")
Change-Id: Ief0aaf3d7153aa3dc53e73562f2ae2670789acba
Reported-by: Baozeng Ding <sploving1@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Acked-by: Cong Wang <xiyou.wangcong@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
  • Loading branch information
herbertx authored and codewalkerster committed Nov 2, 2018
1 parent f8174e3 commit edf2f18
Showing 1 changed file with 5 additions and 2 deletions.
7 changes: 5 additions & 2 deletions net/netlink/af_netlink.c
Original file line number Diff line number Diff line change
Expand Up @@ -2642,6 +2642,7 @@ static int netlink_dump(struct sock *sk)
struct netlink_callback *cb;
struct sk_buff *skb = NULL;
struct nlmsghdr *nlh;
struct module *module;
int len, err = -ENOBUFS;
int alloc_size;

Expand Down Expand Up @@ -2691,9 +2692,11 @@ static int netlink_dump(struct sock *sk)
cb->done(cb);

nlk->cb_running = false;
module = cb->module;
skb = cb->skb;
mutex_unlock(nlk->cb_mutex);
module_put(cb->module);
consume_skb(cb->skb);
module_put(module);
consume_skb(skb);
return 0;

errout_skb:
Expand Down

0 comments on commit edf2f18

Please sign in to comment.