mirror of
https://github.com/joel16/android_kernel_sony_msm8994.git
synced 2024-11-23 04:00:20 +00:00
netlink: Fix dump skb leak/double free
When we free cb->skb after a dump, we do it after releasing the lock. This means that a new dump could have started in the time being and we'll end up freeing their skb instead of ours. This patch saves the skb and module before we unlock so we free the right memory. Fixes: 16b304f3404f ("netlink: Eliminate kmalloc in netlink dump operation.") Reported-by: Baozeng Ding <sploving1@gmail.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
1d5e2e8605
commit
428d82f4c2
@ -2448,6 +2448,7 @@ static int netlink_dump(struct sock *sk)
|
||||
struct netlink_callback *cb;
|
||||
struct sk_buff *skb = NULL;
|
||||
struct nlmsghdr *nlh;
|
||||
struct module *module;
|
||||
int len, err = -ENOBUFS;
|
||||
int alloc_size;
|
||||
|
||||
@ -2497,9 +2498,11 @@ static int netlink_dump(struct sock *sk)
|
||||
cb->done(cb);
|
||||
|
||||
nlk->cb_running = false;
|
||||
module = cb->module;
|
||||
skb = cb->skb;
|
||||
mutex_unlock(nlk->cb_mutex);
|
||||
module_put(cb->module);
|
||||
consume_skb(cb->skb);
|
||||
module_put(module);
|
||||
consume_skb(skb);
|
||||
return 0;
|
||||
|
||||
errout_skb:
|
||||
|
Loading…
Reference in New Issue
Block a user