diff options
author | Sasha Levin <sasha.levin@oracle.com> | 2014-09-13 00:06:30 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-09-13 17:37:49 -0400 |
commit | c0d1379a19c3dde3c32be50164997d246241c1e4 (patch) | |
tree | bab2f0bb3c42e17d571f8fcc20bffa5ebd89e2ab | |
parent | 3fc8867740b4a0bf56f372c6f5ddd14970962fb1 (diff) |
net: bpf: correctly handle errors in sk_attach_filter()
Commit "net: bpf: make eBPF interpreter images read-only" has changed bpf_prog
to be vmalloc()ed but never handled some of the errors paths of the old code.
On error within sk_attach_filter (which userspace can easily trigger), we'd
kfree() the vmalloc()ed memory, and leak the internal bpf_work_struct.
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Acked-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/core/filter.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/net/core/filter.c b/net/core/filter.c index 601f28de7311..fcd3f6742a6a 100644 --- a/net/core/filter.c +++ b/net/core/filter.c | |||
@@ -1047,7 +1047,7 @@ int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk) | |||
1047 | return -ENOMEM; | 1047 | return -ENOMEM; |
1048 | 1048 | ||
1049 | if (copy_from_user(prog->insns, fprog->filter, fsize)) { | 1049 | if (copy_from_user(prog->insns, fprog->filter, fsize)) { |
1050 | kfree(prog); | 1050 | __bpf_prog_free(prog); |
1051 | return -EFAULT; | 1051 | return -EFAULT; |
1052 | } | 1052 | } |
1053 | 1053 | ||
@@ -1055,7 +1055,7 @@ int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk) | |||
1055 | 1055 | ||
1056 | err = bpf_prog_store_orig_filter(prog, fprog); | 1056 | err = bpf_prog_store_orig_filter(prog, fprog); |
1057 | if (err) { | 1057 | if (err) { |
1058 | kfree(prog); | 1058 | __bpf_prog_free(prog); |
1059 | return -ENOMEM; | 1059 | return -ENOMEM; |
1060 | } | 1060 | } |
1061 | 1061 | ||