Browse Source

netlink: Avoid netlink mmap alloc if msg size exceeds frame size

An insufficent ring frame size configuration can lead to an
unnecessary skb allocation for every Netlink message. Check frame
size before taking the queue lock and allocating the skb and
re-check with lock to be safe.

Signed-off-by: Thomas Graf <tgraf@suug.ch>
Reviewed-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: Jesse Gross <jesse@nicira.com>
Thomas Graf 11 years ago
parent
commit
aae9f0e22c
1 changed files with 4 additions and 0 deletions
  1. 4 0
      net/netlink/af_netlink.c

+ 4 - 0
net/netlink/af_netlink.c

@@ -1769,6 +1769,9 @@ struct sk_buff *netlink_alloc_skb(struct sock *ssk, unsigned int size,
 	if (ring->pg_vec == NULL)
 	if (ring->pg_vec == NULL)
 		goto out_put;
 		goto out_put;
 
 
+	if (ring->frame_size - NL_MMAP_HDRLEN < size)
+		goto out_put;
+
 	skb = alloc_skb_head(gfp_mask);
 	skb = alloc_skb_head(gfp_mask);
 	if (skb == NULL)
 	if (skb == NULL)
 		goto err1;
 		goto err1;
@@ -1778,6 +1781,7 @@ struct sk_buff *netlink_alloc_skb(struct sock *ssk, unsigned int size,
 	if (ring->pg_vec == NULL)
 	if (ring->pg_vec == NULL)
 		goto out_free;
 		goto out_free;
 
 
+	/* check again under lock */
 	maxlen = ring->frame_size - NL_MMAP_HDRLEN;
 	maxlen = ring->frame_size - NL_MMAP_HDRLEN;
 	if (maxlen < size)
 	if (maxlen < size)
 		goto out_free;
 		goto out_free;