[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220819183451.410855-1-harshmodi@google.com>
Date: Fri, 19 Aug 2022 11:34:51 -0700
From: Harsh Modi <harshmodi@...gle.com>
To: netdev@...r.kernel.org
Cc: harshmodi@...gle.com, sdf@...gle.com
Subject: [PATCH] br_netfilter: Drop dst references before setting.
It is possible that there is already a dst allocated. If it is not
released, it will be leaked. This is similar to what is done in
bpf_set_tunnel_key().
Signed-off-by: Harsh Modi <harshmodi@...gle.com>
---
net/bridge/br_netfilter_hooks.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/net/bridge/br_netfilter_hooks.c b/net/bridge/br_netfilter_hooks.c
index ff4779036649..f20f4373ff40 100644
--- a/net/bridge/br_netfilter_hooks.c
+++ b/net/bridge/br_netfilter_hooks.c
@@ -384,6 +384,7 @@ static int br_nf_pre_routing_finish(struct net *net, struct sock *sk, struct sk_
/* - Bridged-and-DNAT'ed traffic doesn't
* require ip_forwarding. */
if (rt->dst.dev == dev) {
+ skb_dst_drop(skb);
skb_dst_set(skb, &rt->dst);
goto bridged_dnat;
}
@@ -413,6 +414,7 @@ static int br_nf_pre_routing_finish(struct net *net, struct sock *sk, struct sk_
kfree_skb(skb);
return 0;
}
+ skb_dst_drop(skb);
skb_dst_set_noref(skb, &rt->dst);
}
--
2.37.1.595.g718a3a8f04-goog
Powered by blists - more mailing lists