diff options
author | 2021-07-12 12:55:45 -0700 | |
---|---|---|
committer | 2021-07-15 19:49:12 +0200 | |
commit | 7e6b27a69167f97c56b5437871d29e9722c3e470 (patch) | |
tree | 410c90ca2c317060d065ba411c7fd8821256ec23 /net/unix/af_unix.c | |
parent | s390/bpf: Perform r1 range checking before accessing jit->seen_reg[r1] (diff) | |
download | wireguard-linux-7e6b27a69167f97c56b5437871d29e9722c3e470.tar.xz wireguard-linux-7e6b27a69167f97c56b5437871d29e9722c3e470.zip |
bpf, sockmap: Fix potential memory leak on unlikely error case
If skb_linearize is needed and fails we could leak a msg on the error
handling. To fix ensure we kfree the msg block before returning error.
Found during code review.
Fixes: 4363023d2668e ("bpf, sockmap: Avoid failures from skb_to_sgvec when skb has frag_list")
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Reviewed-by: Cong Wang <cong.wang@bytedance.com>
Link: https://lore.kernel.org/bpf/20210712195546.423990-2-john.fastabend@gmail.com
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions