diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2010-05-29 00:20:48 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2010-05-29 00:20:48 -0700 |
commit | 2903037400a26e7c0cc93ab75a7d62abfacdf485 (patch) | |
tree | c29d8b3199d8fa52856e5edcd374411f962d7c11 /net/core | |
parent | 7dfde179c38056b91d51e60f3d50902387f27c84 (diff) | |
download | blackbird-op-linux-2903037400a26e7c0cc93ab75a7d62abfacdf485.tar.gz blackbird-op-linux-2903037400a26e7c0cc93ab75a7d62abfacdf485.zip |
net: fix sk_forward_alloc corruptions
As David found out, sock_queue_err_skb() should be called with socket
lock hold, or we risk sk_forward_alloc corruption, since we use non
atomic operations to update this field.
This patch adds bh_lock_sock()/bh_unlock_sock() pair to three spots.
(BH already disabled)
1) skb_tstamp_tx()
2) Before calling ip_icmp_error(), in __udp4_lib_err()
3) Before calling ipv6_icmp_error(), in __udp6_lib_err()
Reported-by: Anton Blanchard <anton@samba.org>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/core')
-rw-r--r-- | net/core/skbuff.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/core/skbuff.c b/net/core/skbuff.c index 4667d4d7c162..f2913ae2b52c 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -2992,7 +2992,11 @@ void skb_tstamp_tx(struct sk_buff *orig_skb, memset(serr, 0, sizeof(*serr)); serr->ee.ee_errno = ENOMSG; serr->ee.ee_origin = SO_EE_ORIGIN_TIMESTAMPING; + + bh_lock_sock(sk); err = sock_queue_err_skb(sk, skb); + bh_unlock_sock(sk); + if (err) kfree_skb(skb); } |