net: socionext: fix possible user-after-free in netsec_process_rx
authorLorenzo Bianconi <lorenzo@kernel.org>
Sat, 25 Jan 2020 11:48:50 +0000 (12:48 +0100)
committerDavid S. Miller <davem@davemloft.net>
Mon, 27 Jan 2020 10:05:42 +0000 (11:05 +0100)
commitb5e82e3c89c78ee0407ea8e8087af5519b6c7bae
treefbcfaedd310ff8e968efbe410492f7b6df0e18e6
parent09917a126d5babd9d0d9bee8ee2c5fc8517851e6
net: socionext: fix possible user-after-free in netsec_process_rx

Fix possible use-after-free in in netsec_process_rx that can occurs if
the first packet is sent to the normal networking stack and the
following one is dropped by the bpf program attached to the xdp hook.
Fix the issue defining the skb pointer in the 'budget' loop

Fixes: ba2b232108d3c ("net: netsec: add XDP support")
Signed-off-by: Lorenzo Bianconi <lorenzo@kernel.org>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Acked-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
drivers/net/ethernet/socionext/netsec.c