netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/4 net-2.6.25] Proper netlink kernel sockets disposal.
@ 2008-01-18 12:51 Denis V. Lunev
  2008-01-18 12:53 ` [PATCH] [NETNS 1/4 net-2.6.25] Double free in netlink_release Denis V. Lunev
                   ` (4 more replies)
  0 siblings, 5 replies; 6+ messages in thread
From: Denis V. Lunev @ 2008-01-18 12:51 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, Linux Containers, devel

Alexey Dobriyan found, that virtualized netlink kernel sockets (fibl &
rtnl) are leaked during namespace start/stop loop.

Leaking fix (simple and obvious) reveals that netlink kernel socket
disposal leads to OOPSes:
- nl_table[protocol]->listeners is double freed
- sometimes during namespace stop netlink_sock_destruct
  BUG_TRAP(!atomic_read(&sk->sk_rmem_alloc)); is hit

This set address all these issues.

Signed-off-by: Denis V. Lunev <den@openvz.org>
Tested-by: Alexey Dobriayn <adobriyan@openvz.org>


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2008-01-19  7:55 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-01-18 12:51 [PATCH 0/4 net-2.6.25] Proper netlink kernel sockets disposal Denis V. Lunev
2008-01-18 12:53 ` [PATCH] [NETNS 1/4 net-2.6.25] Double free in netlink_release Denis V. Lunev
2008-01-18 12:53 ` [PATCH] [NETNS 2/4 net-2.6.25] Memory leak on network namespace stop Denis V. Lunev
2008-01-18 12:53 ` [PATCH ] [NETNS 3/4 net-2.6.25] Consolidate kernel netlink socket destruction Denis V. Lunev
2008-01-18 12:53 ` [PATCH] [NETNS 4/4 net-2.6.25] Namespace stop vs 'ip r l' race Denis V. Lunev
2008-01-19  7:55 ` [PATCH 0/4 net-2.6.25] Proper netlink kernel sockets disposal David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).