diff options
| author | Michael S. Tsirkin <mst@redhat.com> | 2013-06-06 08:20:46 -0400 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2013-06-11 05:46:21 -0400 |
| commit | 288cfe78c8173f35c7a94f06859f60b3693d828a (patch) | |
| tree | f84bd0f51046e6372ca390ba3302ae60c3a6bc28 | |
| parent | 05c05351943cc03bf5c77e86953b24ae6fb21368 (diff) | |
vhost: fix ubuf_info cleanup
vhost_net_clear_ubuf_info didn't clear ubuf_info
after kfree, this could trigger double free.
Fix this and simplify this code to make it more robust: make sure
ubuf info is always freed through vhost_net_clear_ubuf_info.
Reported-by: Tommi Rantala <tt.rantala@gmail.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
| -rw-r--r-- | drivers/vhost/net.c | 22 |
1 files changed, 7 insertions, 15 deletions
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c index 8cf5aece8c84..f80d3dd41d8c 100644 --- a/drivers/vhost/net.c +++ b/drivers/vhost/net.c | |||
| @@ -155,14 +155,11 @@ static void vhost_net_ubuf_put_and_wait(struct vhost_net_ubuf_ref *ubufs) | |||
| 155 | 155 | ||
| 156 | static void vhost_net_clear_ubuf_info(struct vhost_net *n) | 156 | static void vhost_net_clear_ubuf_info(struct vhost_net *n) |
| 157 | { | 157 | { |
| 158 | |||
| 159 | bool zcopy; | ||
| 160 | int i; | 158 | int i; |
| 161 | 159 | ||
| 162 | for (i = 0; i < n->dev.nvqs; ++i) { | 160 | for (i = 0; i < VHOST_NET_VQ_MAX; ++i) { |
| 163 | zcopy = vhost_net_zcopy_mask & (0x1 << i); | 161 | kfree(n->vqs[i].ubuf_info); |
| 164 | if (zcopy) | 162 | n->vqs[i].ubuf_info = NULL; |
| 165 | kfree(n->vqs[i].ubuf_info); | ||
| 166 | } | 163 | } |
| 167 | } | 164 | } |
| 168 | 165 | ||
| @@ -171,7 +168,7 @@ int vhost_net_set_ubuf_info(struct vhost_net *n) | |||
| 171 | bool zcopy; | 168 | bool zcopy; |
| 172 | int i; | 169 | int i; |
| 173 | 170 | ||
| 174 | for (i = 0; i < n->dev.nvqs; ++i) { | 171 | for (i = 0; i < VHOST_NET_VQ_MAX; ++i) { |
| 175 | zcopy = vhost_net_zcopy_mask & (0x1 << i); | 172 | zcopy = vhost_net_zcopy_mask & (0x1 << i); |
| 176 | if (!zcopy) | 173 | if (!zcopy) |
| 177 | continue; | 174 | continue; |
| @@ -183,12 +180,7 @@ int vhost_net_set_ubuf_info(struct vhost_net *n) | |||
| 183 | return 0; | 180 | return 0; |
| 184 | 181 | ||
| 185 | err: | 182 | err: |
| 186 | while (i--) { | 183 | vhost_net_clear_ubuf_info(n); |
| 187 | zcopy = vhost_net_zcopy_mask & (0x1 << i); | ||
| 188 | if (!zcopy) | ||
| 189 | continue; | ||
| 190 | kfree(n->vqs[i].ubuf_info); | ||
| 191 | } | ||
| 192 | return -ENOMEM; | 184 | return -ENOMEM; |
| 193 | } | 185 | } |
| 194 | 186 | ||
| @@ -196,12 +188,12 @@ void vhost_net_vq_reset(struct vhost_net *n) | |||
| 196 | { | 188 | { |
| 197 | int i; | 189 | int i; |
| 198 | 190 | ||
| 191 | vhost_net_clear_ubuf_info(n); | ||
| 192 | |||
| 199 | for (i = 0; i < VHOST_NET_VQ_MAX; i++) { | 193 | for (i = 0; i < VHOST_NET_VQ_MAX; i++) { |
| 200 | n->vqs[i].done_idx = 0; | 194 | n->vqs[i].done_idx = 0; |
| 201 | n->vqs[i].upend_idx = 0; | 195 | n->vqs[i].upend_idx = 0; |
| 202 | n->vqs[i].ubufs = NULL; | 196 | n->vqs[i].ubufs = NULL; |
| 203 | kfree(n->vqs[i].ubuf_info); | ||
| 204 | n->vqs[i].ubuf_info = NULL; | ||
| 205 | n->vqs[i].vhost_hlen = 0; | 197 | n->vqs[i].vhost_hlen = 0; |
| 206 | n->vqs[i].sock_hlen = 0; | 198 | n->vqs[i].sock_hlen = 0; |
| 207 | } | 199 | } |
