udp: Fix a memory leak in udp_read_sock()
authorCong Wang <cong.wang@bytedance.com>
Tue, 15 Jun 2021 02:13:37 +0000 (19:13 -0700)
committerDaniel Borkmann <daniel@iogearbox.net>
Mon, 21 Jun 2021 14:48:24 +0000 (16:48 +0200)
sk_psock_verdict_recv() clones the skb and uses the clone
afterward, so udp_read_sock() should free the skb after using
it, regardless of error or not.

This fixes a real kmemleak.

Fixes: d7f571188ecf ("udp: Implement ->read_sock() for sockmap")
Signed-off-by: Cong Wang <cong.wang@bytedance.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: Jakub Sitnicki <jakub@cloudflare.com>
Link: https://lore.kernel.org/bpf/20210615021342.7416-4-xiyou.wangcong@gmail.com
net/ipv4/udp.c

index 1307ad0..8091276 100644 (file)
@@ -1798,11 +1798,13 @@ int udp_read_sock(struct sock *sk, read_descriptor_t *desc,
                if (used <= 0) {
                        if (!copied)
                                copied = used;
+                       kfree_skb(skb);
                        break;
                } else if (used <= skb->len) {
                        copied += used;
                }
 
+               kfree_skb(skb);
                if (!desc->count)
                        break;
        }