diff options
author | Basil Gunn <basil@pacabunga.com> | 2016-06-16 09:42:30 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2016-06-18 20:55:34 -0700 |
commit | 4a7d99ea1b27734558feb6833f180cd38a159940 (patch) | |
tree | 3ef63dc61cd8243272b86213c933335b9f1bcb12 /net/ax25/ax25_std_timer.c | |
parent | 3bb549ae4c51028c1930528ae9fcd6eca0474724 (diff) | |
download | linux-4a7d99ea1b27734558feb6833f180cd38a159940.tar.gz linux-4a7d99ea1b27734558feb6833f180cd38a159940.tar.bz2 linux-4a7d99ea1b27734558feb6833f180cd38a159940.zip |
AX.25: Close socket connection on session completion
A socket connection made in ax.25 is not closed when session is
completed. The heartbeat timer is stopped prematurely and this is
where the socket gets closed. Allow heatbeat timer to run to close
socket. Symptom occurs in kernels >= 4.2.0
Originally sent 6/15/2016. Resend with distribution list matching
scripts/maintainer.pl output.
Signed-off-by: Basil Gunn <basil@pacabunga.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ax25/ax25_std_timer.c')
-rw-r--r-- | net/ax25/ax25_std_timer.c | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/net/ax25/ax25_std_timer.c b/net/ax25/ax25_std_timer.c index 004467c9e6e1..2c0d6ef66f9d 100644 --- a/net/ax25/ax25_std_timer.c +++ b/net/ax25/ax25_std_timer.c @@ -38,6 +38,7 @@ void ax25_std_heartbeat_expiry(ax25_cb *ax25) switch (ax25->state) { case AX25_STATE_0: + case AX25_STATE_2: /* Magic here: If we listen() and a new link dies before it is accepted() it isn't 'dead' so doesn't get removed. */ if (!sk || sock_flag(sk, SOCK_DESTROY) || @@ -47,6 +48,7 @@ void ax25_std_heartbeat_expiry(ax25_cb *ax25) sock_hold(sk); ax25_destroy_socket(ax25); bh_unlock_sock(sk); + /* Ungrab socket and destroy it */ sock_put(sk); } else ax25_destroy_socket(ax25); @@ -144,7 +146,8 @@ void ax25_std_t1timer_expiry(ax25_cb *ax25) case AX25_STATE_2: if (ax25->n2count == ax25->n2) { ax25_send_control(ax25, AX25_DISC, AX25_POLLON, AX25_COMMAND); - ax25_disconnect(ax25, ETIMEDOUT); + if (!sock_flag(ax25->sk, SOCK_DESTROY)) + ax25_disconnect(ax25, ETIMEDOUT); return; } else { ax25->n2count++; |