xfrm: release dst_orig in case of error in xfrm_lookup()
dst_orig should be released on error. Function like __xfrm_route_forward() expects that behavior. Since a recent commit, xfrm_lookup() may also be called by xfrm_lookup_route(), which expects the opposite. Let's introduce a new flag (XFRM_LOOKUP_KEEP_DST_REF) to tell what should be done in case of error. Fixes: f92ee61982d("xfrm: Generate blackhole routes only from route lookup functions") Signed-off-by: huaibin Wang <huaibin.wang@6wind.com> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
This commit is contained in:
Родитель
044a832a77
Коммит
ac37e2515c
|
@ -481,6 +481,7 @@ void dst_init(void);
|
||||||
enum {
|
enum {
|
||||||
XFRM_LOOKUP_ICMP = 1 << 0,
|
XFRM_LOOKUP_ICMP = 1 << 0,
|
||||||
XFRM_LOOKUP_QUEUE = 1 << 1,
|
XFRM_LOOKUP_QUEUE = 1 << 1,
|
||||||
|
XFRM_LOOKUP_KEEP_DST_REF = 1 << 2,
|
||||||
};
|
};
|
||||||
|
|
||||||
struct flowi;
|
struct flowi;
|
||||||
|
|
|
@ -2269,11 +2269,9 @@ struct dst_entry *xfrm_lookup(struct net *net, struct dst_entry *dst_orig,
|
||||||
* have the xfrm_state's. We need to wait for KM to
|
* have the xfrm_state's. We need to wait for KM to
|
||||||
* negotiate new SA's or bail out with error.*/
|
* negotiate new SA's or bail out with error.*/
|
||||||
if (net->xfrm.sysctl_larval_drop) {
|
if (net->xfrm.sysctl_larval_drop) {
|
||||||
dst_release(dst);
|
|
||||||
xfrm_pols_put(pols, drop_pols);
|
|
||||||
XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTNOSTATES);
|
XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTNOSTATES);
|
||||||
|
err = -EREMOTE;
|
||||||
return ERR_PTR(-EREMOTE);
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
err = -EAGAIN;
|
err = -EAGAIN;
|
||||||
|
@ -2324,7 +2322,8 @@ nopol:
|
||||||
error:
|
error:
|
||||||
dst_release(dst);
|
dst_release(dst);
|
||||||
dropdst:
|
dropdst:
|
||||||
dst_release(dst_orig);
|
if (!(flags & XFRM_LOOKUP_KEEP_DST_REF))
|
||||||
|
dst_release(dst_orig);
|
||||||
xfrm_pols_put(pols, drop_pols);
|
xfrm_pols_put(pols, drop_pols);
|
||||||
return ERR_PTR(err);
|
return ERR_PTR(err);
|
||||||
}
|
}
|
||||||
|
@ -2338,7 +2337,8 @@ struct dst_entry *xfrm_lookup_route(struct net *net, struct dst_entry *dst_orig,
|
||||||
struct sock *sk, int flags)
|
struct sock *sk, int flags)
|
||||||
{
|
{
|
||||||
struct dst_entry *dst = xfrm_lookup(net, dst_orig, fl, sk,
|
struct dst_entry *dst = xfrm_lookup(net, dst_orig, fl, sk,
|
||||||
flags | XFRM_LOOKUP_QUEUE);
|
flags | XFRM_LOOKUP_QUEUE |
|
||||||
|
XFRM_LOOKUP_KEEP_DST_REF);
|
||||||
|
|
||||||
if (IS_ERR(dst) && PTR_ERR(dst) == -EREMOTE)
|
if (IS_ERR(dst) && PTR_ERR(dst) == -EREMOTE)
|
||||||
return make_blackhole(net, dst_orig->ops->family, dst_orig);
|
return make_blackhole(net, dst_orig->ops->family, dst_orig);
|
||||||
|
|
Загрузка…
Ссылка в новой задаче