diff options
author | Lorenzo Colitti <lorenzo@google.com> | 2017-08-23 17:14:39 +0900 |
---|---|---|
committer | Steffen Klassert <steffen.klassert@secunet.com> | 2017-08-24 13:01:14 +0200 |
commit | 8a4b5784fac2af93ad6a8c08fb56d021e0c0416b (patch) | |
tree | 43edc44a531d6665bda28b4a86855ea863ddc541 /net/xfrm/xfrm_policy.c | |
parent | 2b33bc8aa236b75d6e86a8a79126fd9739e4a5bd (diff) | |
download | op-kernel-dev-8a4b5784fac2af93ad6a8c08fb56d021e0c0416b.zip op-kernel-dev-8a4b5784fac2af93ad6a8c08fb56d021e0c0416b.tar.gz |
net: xfrm: don't double-hold dst when sk_policy in use.
While removing dst_entry garbage collection, commit 52df157f17e5
("xfrm: take refcnt of dst when creating struct xfrm_dst bundle")
changed xfrm_resolve_and_create_bundle so it returns an xdst with
a refcount of 1 instead of 0.
However, it did not delete the dst_hold performed by xfrm_lookup
when a per-socket policy is in use. This means that when a
socket policy is in use, dst entries returned by xfrm_lookup have
a refcount of 2, and are not freed when no longer in use.
Cc: Wei Wang <weiwan@google.com>
Fixes: 52df157f17 ("xfrm: take refcnt of dst when creating struct xfrm_dst bundle")
Tested: https://android-review.googlesource.com/417481
Tested: https://android-review.googlesource.com/418659
Tested: https://android-review.googlesource.com/424463
Tested: https://android-review.googlesource.com/452776 passes on net-next
Signed-off-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Wei Wang <weiwan@google.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'net/xfrm/xfrm_policy.c')
-rw-r--r-- | net/xfrm/xfrm_policy.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 6f5a0dad..69b16ee 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c @@ -2226,7 +2226,6 @@ struct dst_entry *xfrm_lookup(struct net *net, struct dst_entry *dst_orig, goto no_transform; } - dst_hold(&xdst->u.dst); route = xdst->route; } } |