netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] kfree_skb() bug in 2.4.22
@ 2003-10-08 12:44 Tobias DiPasquale
  2003-10-08 13:09 ` Jeff Garzik
  0 siblings, 1 reply; 9+ messages in thread
From: Tobias DiPasquale @ 2003-10-08 12:44 UTC (permalink / raw)
  To: netdev
  Cc: linux-net, linux-kernel, coreteam, netfilter, akpm, jgarzik,
	davem, kuznet, pekkas, jmorris, yoshfuji

Hi all,

I was debugging one of my iptables/netfilter modules yesterday and I
came across this bug in kfree_skb(). One of my functions returns a
struct skbuff * on success and NULL on failure. When it failed, the code
calling said function attempted to free the struct skbuff *, which at
that point was NULL. This produced a kernel panic. I investigated the
problem and found that, not only should I be checking for a NULL pointer
when freeing the struct skbuff *, but the actual cause of the panic was
because kfree_skb() and kfree_skb_fast() do not check for skb==NULL,
either. They immediately attempt to dereference the users field of the
struct skbuff * in order to decrement that reference counter. 

I have come up with a patch that applies to both the 2.4.22 pristine
source tree and the 2.4.23-pre6 source tree that solves this issue (see
below). I tried to follow Documentation/SubmittingPatches to the letter;
please let me know if I failed this in some way. Thanks :)

P.S. I wasn't sure who exactly maintains this particular code; that's
why I just sent it to everyone listed in MAINTAINERS remotely associated
with include/linux/skbuff.h ;)


--- include/linux/skbuff.h.orig	2003-10-08 07:52:31.000000000 -0400
+++ include/linux/skbuff.h	2003-10-08 07:52:52.000000000 -0400
@@ -293,6 +293,8 @@
  
 static inline void kfree_skb(struct sk_buff *skb)
 {
+	if (!skb)
+		return;
 	if (atomic_read(&skb->users) == 1 || atomic_dec_and_test(&skb->users))
 		__kfree_skb(skb);
 }
@@ -300,6 +302,8 @@
 /* Use this if you didn't touch the skb state [for fast switching] */
 static inline void kfree_skb_fast(struct sk_buff *skb)
 {
+	if (!skb)
+		return;
 	if (atomic_read(&skb->users) == 1 || atomic_dec_and_test(&skb->users))
 		kfree_skbmem(skb);	
 }



^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2003-10-10 16:57 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-10-08 12:44 [PATCH] kfree_skb() bug in 2.4.22 Tobias DiPasquale
2003-10-08 13:09 ` Jeff Garzik
2003-10-08 13:47   ` David S. Miller
2003-10-10 12:53     ` Ingo Oeser
2003-10-10 13:00       ` David S. Miller
2003-10-10 15:43         ` Ingo Oeser
2003-10-10 16:57           ` Dan Kegel
2003-10-08 14:11   ` Tobias DiPasquale
2003-10-08 14:11     ` David S. Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).