From patchwork Thu Oct 1 23:16:41 2009 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: gregkh@suse.de X-Patchwork-Id: 34789 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.176.167]) by ozlabs.org (Postfix) with ESMTP id 675831007D5 for ; Fri, 2 Oct 2009 09:25:25 +1000 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756684AbZJAXXp (ORCPT ); Thu, 1 Oct 2009 19:23:45 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1756679AbZJAXXo (ORCPT ); Thu, 1 Oct 2009 19:23:44 -0400 Received: from kroah.org ([198.145.64.141]:39686 "EHLO coco.kroah.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754794AbZJAXXW (ORCPT ); Thu, 1 Oct 2009 19:23:22 -0400 Received: from localhost (c-98-246-45-209.hsd1.or.comcast.net [98.246.45.209]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by coco.kroah.org (Postfix) with ESMTPSA id 34FCB488DB; Thu, 1 Oct 2009 16:23:26 -0700 (PDT) X-Mailbox-Line: From gregkh@mini.kroah.org Thu Oct 1 16:18:05 2009 Message-Id: <20091001231805.637821425@mini.kroah.org> User-Agent: quilt/0.48-1 Date: Thu, 01 Oct 2009 16:16:41 -0700 From: Greg KH To: linux-kernel@vger.kernel.org, stable@kernel.org Cc: stable-review@kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, alan@lxorguk.ukuu.org.uk, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, Patrick McHardy , davem@davemloft.net, Eric Dumazet Subject: [patch 8/9] netfilter: bridge: refcount fix References: <20091001231633.719696398@mini.kroah.org> Content-Disposition: inline; filename=netfilter-bridge-refcount-fix.patch Lines: 35 In-Reply-To: <20091001231938.GA29593@kroah.com> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org 2.6.27-stable review patch. If anyone has any objections, please let us know. ------------------ From: Patrick McHardy netfilter: bridge: refcount fix Upstream commit f3abc9b9: commit f216f082b2b37c4943f1e7c393e2786648d48f6f ([NETFILTER]: bridge netfilter: deal with martians correctly) added a refcount leak on in_dev. Instead of using in_dev_get(), we can use __in_dev_get_rcu(), as netfilter hooks are running under rcu_read_lock(), as pointed by Patrick. Signed-off-by: Eric Dumazet Signed-off-by: Patrick McHardy Signed-off-by: Greg Kroah-Hartman --- net/bridge/br_netfilter.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html --- a/net/bridge/br_netfilter.c +++ b/net/bridge/br_netfilter.c @@ -358,7 +358,7 @@ static int br_nf_pre_routing_finish(stru }, .proto = 0, }; - struct in_device *in_dev = in_dev_get(dev); + struct in_device *in_dev = __in_dev_get_rcu(dev); /* If err equals -EHOSTUNREACH the error is due to a * martian destination or due to the fact that