summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorPablo Neira Ayuso <pablo@netfilter.org>2014-05-22 15:17:20 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2014-05-22 16:21:05 +0200
commitdcb0a6141f4d4c6f7ad9a051a7c129bc136caf0c (patch)
treef35ab18594425c89346078345aa2ecb5f1715d64 /src
parenta8b0e09ad01eed49ad0d1272665c48789d417dba (diff)
netlink: don't add table/chain/set to ctx->list in the event path
The delinearize functions for tables, chains and sets add these objects to the ctx->list. In the chain case, this is not required. Regarding tables and sets, those are added to the cache. This patch implicitly fixes an use chain object after free that result in random crashes. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'src')
-rw-r--r--src/netlink.c24
1 files changed, 16 insertions, 8 deletions
diff --git a/src/netlink.c b/src/netlink.c
index e1307677..db42884c 100644
--- a/src/netlink.c
+++ b/src/netlink.c
@@ -671,7 +671,6 @@ static struct chain *netlink_delinearize_chain(struct netlink_ctx *ctx,
xstrdup(nft_chain_attr_get_str(nlc, NFT_CHAIN_ATTR_TYPE));
chain->flags |= CHAIN_F_BASECHAIN;
}
- list_add_tail(&chain->list, &ctx->list);
return chain;
}
@@ -682,6 +681,7 @@ static int list_chain_cb(struct nft_chain *nlc, void *arg)
const struct handle *h = ctx->data;
const char *table = nft_chain_attr_get_str(nlc, NFT_CHAIN_ATTR_TABLE);
const char *name = nft_chain_attr_get_str(nlc, NFT_CHAIN_ATTR_NAME);
+ struct chain *chain;
if ((h->family != nft_chain_attr_get_u32(nlc, NFT_CHAIN_ATTR_FAMILY)) ||
strcmp(table, h->table) != 0)
@@ -690,7 +690,9 @@ static int list_chain_cb(struct nft_chain *nlc, void *arg)
if (h->chain && strcmp(name, h->chain) != 0)
return 0;
- netlink_delinearize_chain(ctx, nlc);
+ chain = netlink_delinearize_chain(ctx, nlc);
+ list_add_tail(&chain->list, &ctx->list);
+
return 0;
}
@@ -730,12 +732,14 @@ int netlink_get_chain(struct netlink_ctx *ctx, const struct handle *h,
const struct location *loc)
{
struct nft_chain *nlc;
+ struct chain *chain;
int err;
nlc = alloc_nft_chain(h);
err = mnl_nft_chain_get(nf_sock, nlc, 0);
- netlink_delinearize_chain(ctx, nlc);
+ chain = netlink_delinearize_chain(ctx, nlc);
+ list_add_tail(&chain->list, &ctx->list);
nft_chain_free(nlc);
if (err < 0)
@@ -881,7 +885,6 @@ static struct table *netlink_delinearize_table(struct netlink_ctx *ctx,
nft_table_attr_get_u32(nlt, NFT_TABLE_ATTR_FAMILY);
table->handle.table =
xstrdup(nft_table_attr_get_str(nlt, NFT_TABLE_ATTR_NAME));
- list_add_tail(&table->list, &ctx->list);
return table;
}
@@ -889,8 +892,10 @@ static struct table *netlink_delinearize_table(struct netlink_ctx *ctx,
static int list_table_cb(struct nft_table *nlt, void *arg)
{
struct netlink_ctx *ctx = arg;
+ struct table *table;
- netlink_delinearize_table(ctx, nlt);
+ table = netlink_delinearize_table(ctx, nlt);
+ list_add_tail(&table->list, &ctx->list);
return 0;
}
@@ -1020,7 +1025,6 @@ static struct set *netlink_delinearize_set(struct netlink_ctx *ctx,
data_len = nft_set_attr_get_u32(nls, NFT_SET_ATTR_DATA_LEN);
set->datalen = data_len * BITS_PER_BYTE;
}
- list_add_tail(&set->list, &ctx->list);
return set;
}
@@ -1155,9 +1159,11 @@ int netlink_delete_set(struct netlink_ctx *ctx, const struct handle *h,
static int list_set_cb(struct nft_set *nls, void *arg)
{
struct netlink_ctx *ctx = arg;
+ struct set *set;
netlink_dump_set(nls);
- netlink_delinearize_set(ctx, nls);
+ set = netlink_delinearize_set(ctx, nls);
+ list_add_tail(&set->list, &ctx->list);
return 0;
}
@@ -1181,6 +1187,7 @@ int netlink_get_set(struct netlink_ctx *ctx, const struct handle *h,
const struct location *loc)
{
struct nft_set *nls;
+ struct set *set;
int err;
nls = alloc_nft_set(h);
@@ -1191,7 +1198,8 @@ int netlink_get_set(struct netlink_ctx *ctx, const struct handle *h,
"Could not receive set from kernel: %s",
strerror(errno));
- netlink_delinearize_set(ctx, nls);
+ set = netlink_delinearize_set(ctx, nls);
+ list_add_tail(&set->list, &ctx->list);
nft_set_free(nls);
return err;