raw: Raw socket leak.
The program below just leaks the raw kernel socket
int main() {
int fd = socket(PF_INET, SOCK_RAW, IPPROTO_UDP);
struct sockaddr_in addr;
memset(&addr, 0, sizeof(addr));
inet_aton("127.0.0.1", &addr.sin_addr);
addr.sin_family = AF_INET;
addr.sin_port = htons(2048);
sendto(fd, "a", 1, MSG_MORE, &addr, sizeof(addr));
return 0;
}
Corked packet is allocated via sock_wmalloc which holds the owner socket,
so one should uncork it and flush all pending data on close. Do this in the
same way as in UDP.
Signed-off-by: Denis V. Lunev <den@openvz.org>
Acked-by: Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
199f7d24ae
commit
22dd485022
@@ -608,6 +608,14 @@ static void raw_close(struct sock *sk, long timeout)
|
||||
sk_common_release(sk);
|
||||
}
|
||||
|
||||
static int raw_destroy(struct sock *sk)
|
||||
{
|
||||
lock_sock(sk);
|
||||
ip_flush_pending_frames(sk);
|
||||
release_sock(sk);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* This gets rid of all the nasties in af_inet. -DaveM */
|
||||
static int raw_bind(struct sock *sk, struct sockaddr *uaddr, int addr_len)
|
||||
{
|
||||
@@ -820,6 +828,7 @@ struct proto raw_prot = {
|
||||
.name = "RAW",
|
||||
.owner = THIS_MODULE,
|
||||
.close = raw_close,
|
||||
.destroy = raw_destroy,
|
||||
.connect = ip4_datagram_connect,
|
||||
.disconnect = udp_disconnect,
|
||||
.ioctl = raw_ioctl,
|
||||
|
||||
Reference in New Issue
Block a user