[NETNS]: Memory leak on network namespace stop.
authorDenis V. Lunev <den@openvz.org>
Sat, 19 Jan 2008 07:54:15 +0000 (23:54 -0800)
committerDavid S. Miller <davem@davemloft.net>
Mon, 28 Jan 2008 23:08:06 +0000 (15:08 -0800)
Network namespace allocates 2 kernel netlink sockets, fibnl &
rtnl. These sockets should be disposed properly, i.e. by
sock_release. Plain sock_put is not enough.

Signed-off-by: Denis V. Lunev <den@openvz.org>
Tested-by: Alexey Dobriyan <adobriyan@openvz.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/rtnetlink.c
net/ipv4/fib_frontend.c

index 8c45d7e..a5f4f66 100644 (file)
@@ -1384,7 +1384,7 @@ static void rtnetlink_net_exit(struct net *net)
                 * free.
                 */
                sk->sk_net = get_net(&init_net);
-               sock_put(sk);
+               sock_release(net->rtnl->sk_socket);
                net->rtnl = NULL;
        }
 }
index 8ddcd3f..4e5216e 100644 (file)
@@ -881,7 +881,7 @@ static void nl_fib_lookup_exit(struct net *net)
         * initial network namespace. So the socket will  be safe to free.
         */
        net->ipv4.fibnl->sk_net = get_net(&init_net);
-       sock_put(net->ipv4.fibnl);
+       sock_release(net->ipv4.fibnl->sk_socket);
 }
 
 static void fib_disable_ip(struct net_device *dev, int force)