summaryrefslogtreecommitdiffstats
path: root/src/netlink.c
diff options
context:
space:
mode:
authorYanchuan Nian <ycnian@gmail.com>2014-08-11 10:24:24 +0800
committerPablo Neira Ayuso <pablo@netfilter.org>2014-08-14 21:00:31 +0200
commit8aef3c458838b2bfcee646b8842648abc7d9bfa0 (patch)
tree77123d1f0c2175ce31e9ebfdc71c5494a5a40478 /src/netlink.c
parent6cd8140b3ecea2ed42124878552b6ad01f00be25 (diff)
Fix memory leak in nft get operation
Some memories are forgotten to release on the error path in get operation. Just release them. Also, in netlink_get_chain, it's better to return immediately when a error is detected. Signed-off-by: Yanchuan Nian <ycnian@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'src/netlink.c')
-rw-r--r--src/netlink.c17
1 files changed, 11 insertions, 6 deletions
diff --git a/src/netlink.c b/src/netlink.c
index e1492152..dc7a7c4b 100644
--- a/src/netlink.c
+++ b/src/netlink.c
@@ -751,15 +751,17 @@ int netlink_get_chain(struct netlink_ctx *ctx, const struct handle *h,
nlc = alloc_nft_chain(h);
err = mnl_nft_chain_get(nf_sock, nlc, 0);
+ if (err < 0) {
+ nft_chain_free(nlc);
+ return netlink_io_error(ctx, loc,
+ "Could not receive chain from kernel: %s",
+ strerror(errno));
+ }
chain = netlink_delinearize_chain(ctx, nlc);
list_add_tail(&chain->list, &ctx->list);
nft_chain_free(nlc);
- if (err < 0)
- return netlink_io_error(ctx, loc,
- "Could not receive chain from kernel: %s",
- strerror(errno));
return err;
}
@@ -1218,16 +1220,18 @@ int netlink_get_set(struct netlink_ctx *ctx, const struct handle *h,
nls = alloc_nft_set(h);
netlink_dump_set(nls);
err = mnl_nft_set_get(nf_sock, nls);
- if (err < 0)
+ if (err < 0) {
+ nft_set_free(nls);
return netlink_io_error(ctx, loc,
"Could not receive set from kernel: %s",
strerror(errno));
+ }
set = netlink_delinearize_set(ctx, nls);
+ nft_set_free(nls);
if (set == NULL)
return -1;
list_add_tail(&set->list, &ctx->list);
- nft_set_free(nls);
return err;
}
@@ -1415,6 +1419,7 @@ int netlink_get_setelems(struct netlink_ctx *ctx, const struct handle *h,
err = mnl_nft_setelem_get(nf_sock, nls);
if (err < 0) {
+ nft_set_free(nls);
if (errno == EINTR)
return -1;