Also please revert the patch "fix-cred-leak-in-af_netlink" from 2.6.35.12.
The proper fix was "af_netlink-add-needed-scm_destroy-after-scm_send" which
was also added in that release. Here's a revert patch:
Signed-off-by: Andi Kleen <ak@linux.intel.com>
return err;
if (msg->msg_namelen) {
- if (addr->nl_family != AF_NETLINK) {
- err = -EINVAL;
- goto out;
- }
+ if (addr->nl_family != AF_NETLINK)
+ return -EINVAL;
dst_pid = addr->nl_pid;
dst_group = ffs(addr->nl_groups);
- if (dst_group && !netlink_capable(sock, NL_NONROOT_SEND)) {
- err = -EPERM;
- goto out;
- }
+ if (dst_group && !netlink_capable(sock, NL_NONROOT_SEND))
+ return -EPERM;
} else {
dst_pid = nlk->dst_pid;
dst_group = nlk->dst_group;
err = netlink_unicast(sk, skb, dst_pid, msg->msg_flags&MSG_DONTWAIT);
out:
- scm_destroy(siocb->scm);
- siocb->scm = NULL;
return err;
}