diff options
author | Pavel Emelyanov <xemul@openvz.org> | 2008-04-12 18:33:50 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-04-12 18:33:50 -0700 |
commit | ae1b6a31b1f9ef2c7ba5ef89799f210a9ba6937c (patch) | |
tree | 76f26c291c480345de8d70a6c37143c43ac5f749 /net/ax25 | |
parent | 2de58e30db3f7e83592e22fb459dd6695b648889 (diff) | |
download | linux-ae1b6a31b1f9ef2c7ba5ef89799f210a9ba6937c.tar.gz linux-ae1b6a31b1f9ef2c7ba5ef89799f210a9ba6937c.tar.bz2 linux-ae1b6a31b1f9ef2c7ba5ef89799f210a9ba6937c.zip |
[AX25]: Potential ax25_uid_assoc-s leaks on module unload.
The ax25_uid_free call walks the ax25_uid_list and releases entries
from it. The problem is that after the fisrt call to hlist_del_init
the hlist_for_each_entry (which hides behind the ax25_uid_for_each)
will consider the current position to be the last and will return.
Thus, the whole list will be left not freed.
Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ax25')
-rw-r--r-- | net/ax25/ax25_uid.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/ax25/ax25_uid.c b/net/ax25/ax25_uid.c index 5f4eb73fb9d3..57aeba729bae 100644 --- a/net/ax25/ax25_uid.c +++ b/net/ax25/ax25_uid.c @@ -218,9 +218,11 @@ void __exit ax25_uid_free(void) struct hlist_node *node; write_lock(&ax25_uid_lock); +again: ax25_uid_for_each(ax25_uid, node, &ax25_uid_list) { hlist_del_init(&ax25_uid->uid_node); ax25_uid_put(ax25_uid); + goto again; } write_unlock(&ax25_uid_lock); } |