]> git.baikalelectronics.ru Git - kernel.git/commitdiff
Revert "Revert "ipv4: fix memory leaks in ip_cmsg_send() callers""
authorEric Dumazet <edumazet@google.com>
Tue, 14 Sep 2021 05:18:51 +0000 (22:18 -0700)
committerDavid S. Miller <davem@davemloft.net>
Tue, 14 Sep 2021 13:24:31 +0000 (14:24 +0100)
This reverts commit 168508dc2278e7f9bfed0f3189d8d41bcb663e96.

As mentioned in https://lkml.org/lkml/2021/9/13/1819
5 years old commit 49587447b55d ("ipv4: fix memory leaks in ip_cmsg_send() callers")
was a correct fix.

  ip_cmsg_send() can loop over multiple cmsghdr()

  If IP_RETOPTS has been successful, but following cmsghdr generates an error,
  we do not free ipc.ok

  If IP_RETOPTS is not successful, we have freed the allocated temporary space,
  not the one currently in ipc.opt.

Sure, code could be refactored, but let's not bring back old bugs.

Fixes: 168508dc2278 ("Revert "ipv4: fix memory leaks in ip_cmsg_send() callers"")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Yajun Deng <yajun.deng@linux.dev>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/ipv4/ip_sockglue.c
net/ipv4/ping.c
net/ipv4/raw.c
net/ipv4/udp.c

index 7cef9987ab4ace4444c4b470a3393ce50219a69a..b297bb28556ec5cf383068f67ee910af38591cc3 100644 (file)
@@ -279,7 +279,7 @@ int ip_cmsg_send(struct sock *sk, struct msghdr *msg, struct ipcm_cookie *ipc,
                case IP_RETOPTS:
                        err = cmsg->cmsg_len - sizeof(struct cmsghdr);
 
-                       /* Our caller is responsible for freeing ipc->opt when err = 0 */
+                       /* Our caller is responsible for freeing ipc->opt */
                        err = ip_options_get(net, &ipc->opt,
                                             KERNEL_SOCKPTR(CMSG_DATA(cmsg)),
                                             err < 40 ? err : 40);
index c588f9f2f46c2b91fc9424ecfc0590b2b63a3470..1e44a43acfe2dfe57efdc64479c2d18402881d73 100644 (file)
@@ -727,9 +727,10 @@ static int ping_v4_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
 
        if (msg->msg_controllen) {
                err = ip_cmsg_send(sk, msg, &ipc, false);
-               if (unlikely(err))
+               if (unlikely(err)) {
+                       kfree(ipc.opt);
                        return err;
-
+               }
                if (ipc.opt)
                        free = 1;
        }
index 1c98063a3ae816ecfd7135b0168fea5a9380676f..bb446e60cf58057b448f094b4d6f48d6e91d113c 100644 (file)
@@ -562,9 +562,10 @@ static int raw_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
 
        if (msg->msg_controllen) {
                err = ip_cmsg_send(sk, msg, &ipc, false);
-               if (unlikely(err))
+               if (unlikely(err)) {
+                       kfree(ipc.opt);
                        goto out;
-
+               }
                if (ipc.opt)
                        free = 1;
        }
index d5f5981d7a43244cace63653b790a34174364e3e..8851c9463b4b62c9017565f545250c4ffe22927c 100644 (file)
@@ -1122,9 +1122,10 @@ int udp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
                if (err > 0)
                        err = ip_cmsg_send(sk, msg, &ipc,
                                           sk->sk_family == AF_INET6);
-               if (unlikely(err < 0))
+               if (unlikely(err < 0)) {
+                       kfree(ipc.opt);
                        return err;
-
+               }
                if (ipc.opt)
                        free = 1;
                connected = 0;