]> git.baikalelectronics.ru Git - kernel.git/commitdiff
netfilter: nf_tables: free flowtable hooks on hook register error
authorFlorian Westphal <fw@strlen.de>
Mon, 2 Mar 2020 20:58:50 +0000 (21:58 +0100)
committerPablo Neira Ayuso <pablo@netfilter.org>
Wed, 4 Mar 2020 01:27:18 +0000 (02:27 +0100)
If hook registration fails, the hooks allocated via nft_netdev_hook_alloc
need to be freed.

We can't change the goto label to 'goto 5' -- while it does fix the memleak
it does cause a warning splat from the netfilter core (the hooks were not
registered).

Fixes: 4a9aad95eb40 ("netfilter: nf_tables: dynamically allocate hooks per net_device in flowtables")
Reported-by: syzbot+a2ff6fa45162a5ed4dd3@syzkaller.appspotmail.com
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
net/netfilter/nf_tables_api.c

index d1318bdf49ca97bcdc0b4dd9ff209fdb6cb183f2..bb064aa4154b491762309524b25c23c25cf56199 100644 (file)
@@ -6300,8 +6300,13 @@ static int nf_tables_newflowtable(struct net *net, struct sock *nlsk,
                goto err4;
 
        err = nft_register_flowtable_net_hooks(ctx.net, table, flowtable);
-       if (err < 0)
+       if (err < 0) {
+               list_for_each_entry_safe(hook, next, &flowtable->hook_list, list) {
+                       list_del_rcu(&hook->list);
+                       kfree_rcu(hook, rcu);
+               }
                goto err4;
+       }
 
        err = nft_trans_flowtable_add(&ctx, NFT_MSG_NEWFLOWTABLE, flowtable);
        if (err < 0)