forked from luck/tmp_suning_uos_patched
052d41c01b
After refcnt reaches zero, vlan_vid_del() could free
dev->vlan_info via RCU:
RCU_INIT_POINTER(dev->vlan_info, NULL);
call_rcu(&vlan_info->rcu, vlan_info_rcu_free);
However, the pointer 'grp' still points to that memory
since it is set before vlan_vid_del():
vlan_info = rtnl_dereference(dev->vlan_info);
if (!vlan_info)
goto out;
grp = &vlan_info->grp;
Depends on when that RCU callback is scheduled, we could
trigger a use-after-free in vlan_group_for_each_dev()
right following this vlan_vid_del().
Fix it by moving vlan_vid_del() before setting grp. This
is also symmetric to the vlan_vid_add() we call in
vlan_device_event().
Reported-by: Fengguang Wu <fengguang.wu@intel.com>
Fixes:
|
||
---|---|---|
.. | ||
Kconfig | ||
Makefile | ||
vlan_core.c | ||
vlan_dev.c | ||
vlan_gvrp.c | ||
vlan_mvrp.c | ||
vlan_netlink.c | ||
vlan.c | ||
vlan.h | ||
vlanproc.c | ||
vlanproc.h |