Commit 7e177d32 authored by YueHaibing's avatar YueHaibing Committed by Jakub Kicinski

net: hsr: Fix potential use-after-free

The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.

Fixes: f421436a ("net/hsr: Add support for the High-availability Seamless Redundancy protocol (HSRv0)")
Signed-off-by: default avatarYueHaibing <yuehaibing@huawei.com>
Link: https://lore.kernel.org/r/20221125075724.27912-1-yuehaibing@huawei.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
parent 3067bc61
...@@ -351,17 +351,18 @@ static void hsr_deliver_master(struct sk_buff *skb, struct net_device *dev, ...@@ -351,17 +351,18 @@ static void hsr_deliver_master(struct sk_buff *skb, struct net_device *dev,
struct hsr_node *node_src) struct hsr_node *node_src)
{ {
bool was_multicast_frame; bool was_multicast_frame;
int res; int res, recv_len;
was_multicast_frame = (skb->pkt_type == PACKET_MULTICAST); was_multicast_frame = (skb->pkt_type == PACKET_MULTICAST);
hsr_addr_subst_source(node_src, skb); hsr_addr_subst_source(node_src, skb);
skb_pull(skb, ETH_HLEN); skb_pull(skb, ETH_HLEN);
recv_len = skb->len;
res = netif_rx(skb); res = netif_rx(skb);
if (res == NET_RX_DROP) { if (res == NET_RX_DROP) {
dev->stats.rx_dropped++; dev->stats.rx_dropped++;
} else { } else {
dev->stats.rx_packets++; dev->stats.rx_packets++;
dev->stats.rx_bytes += skb->len; dev->stats.rx_bytes += recv_len;
if (was_multicast_frame) if (was_multicast_frame)
dev->stats.multicast++; dev->stats.multicast++;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment