l2tp: hold reference on tunnels in netlink dumps
l2tp_tunnel_find_nth() is unsafe: no reference is held on the returned
tunnel, therefore it can be freed whenever the caller uses it.
This patch defines l2tp_tunnel_get_nth() which works similarly, but
also takes a reference on the returned tunnel. The caller then has to
drop it after it stops using the tunnel.
Convert netlink dumps to make them safe against concurrent tunnel
deletion.
Fixes: 309795f4be
("l2tp: Add netlink control API for L2TP")
Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:

committed by
David S. Miller

parent
9267c430c6
commit
5846c131c3
@@ -487,14 +487,17 @@ static int l2tp_nl_cmd_tunnel_dump(struct sk_buff *skb, struct netlink_callback
|
||||
struct net *net = sock_net(skb->sk);
|
||||
|
||||
for (;;) {
|
||||
tunnel = l2tp_tunnel_find_nth(net, ti);
|
||||
tunnel = l2tp_tunnel_get_nth(net, ti);
|
||||
if (tunnel == NULL)
|
||||
goto out;
|
||||
|
||||
if (l2tp_nl_tunnel_send(skb, NETLINK_CB(cb->skb).portid,
|
||||
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
||||
tunnel, L2TP_CMD_TUNNEL_GET) < 0)
|
||||
tunnel, L2TP_CMD_TUNNEL_GET) < 0) {
|
||||
l2tp_tunnel_dec_refcount(tunnel);
|
||||
goto out;
|
||||
}
|
||||
l2tp_tunnel_dec_refcount(tunnel);
|
||||
|
||||
ti++;
|
||||
}
|
||||
@@ -848,7 +851,7 @@ static int l2tp_nl_cmd_session_dump(struct sk_buff *skb, struct netlink_callback
|
||||
|
||||
for (;;) {
|
||||
if (tunnel == NULL) {
|
||||
tunnel = l2tp_tunnel_find_nth(net, ti);
|
||||
tunnel = l2tp_tunnel_get_nth(net, ti);
|
||||
if (tunnel == NULL)
|
||||
goto out;
|
||||
}
|
||||
@@ -856,6 +859,7 @@ static int l2tp_nl_cmd_session_dump(struct sk_buff *skb, struct netlink_callback
|
||||
session = l2tp_session_get_nth(tunnel, si);
|
||||
if (session == NULL) {
|
||||
ti++;
|
||||
l2tp_tunnel_dec_refcount(tunnel);
|
||||
tunnel = NULL;
|
||||
si = 0;
|
||||
continue;
|
||||
@@ -865,6 +869,7 @@ static int l2tp_nl_cmd_session_dump(struct sk_buff *skb, struct netlink_callback
|
||||
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
||||
session, L2TP_CMD_SESSION_GET) < 0) {
|
||||
l2tp_session_dec_refcount(session);
|
||||
l2tp_tunnel_dec_refcount(tunnel);
|
||||
break;
|
||||
}
|
||||
l2tp_session_dec_refcount(session);
|
||||
|
Reference in New Issue
Block a user