]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/commit
netlink: don't send NETLINK_URELEASE for unbound sockets
authorDmitry Ivanov <dmitrijs.ivanovs@ubnt.com>
Thu, 7 Apr 2016 07:31:38 +0000 (09:31 +0200)
committerKamal Mostafa <kamal@canonical.com>
Mon, 16 May 2016 17:25:52 +0000 (10:25 -0700)
commit8dcea94cee93a095306ee1f88433d9cf314aab25
tree300d1c3ea4075b88b45a257e0519a248e00fe1ad
parentf5d7415c3a9da617e7ab8ec75863f831fd64cd05
netlink: don't send NETLINK_URELEASE for unbound sockets

BugLink: http://bugs.launchpad.net/bugs/1578798
commit e27260203912b40751fa353d009eaa5a642c739f upstream.

All existing users of NETLINK_URELEASE use it to clean up resources that
were previously allocated to a socket via some command. As a result, no
users require getting this notification for unbound sockets.

Sending it for unbound sockets, however, is a problem because any user
(including unprivileged users) can create a socket that uses the same ID
as an existing socket. Binding this new socket will fail, but if the
NETLINK_URELEASE notification is generated for such sockets, the users
thereof will be tricked into thinking the socket that they allocated the
resources for is closed.

In the nl80211 case, this will cause destruction of virtual interfaces
that still belong to an existing hostapd process; this is the case that
Dmitry noticed. In the NFC case, it will cause a poll abort. In the case
of netlink log/queue it will cause them to stop reporting events, as if
NFULNL_CFG_CMD_UNBIND/NFQNL_CFG_CMD_UNBIND had been called.

Fix this problem by checking that the socket is bound before generating
the NETLINK_URELEASE notification.

Signed-off-by: Dmitry Ivanov <dima@ubnt.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
net/netlink/af_netlink.c