From: Gal Pressman Date: Mon, 17 Jan 2022 09:27:33 +0000 (+0200) Subject: net: Flush deferred skb free on socket destroy X-Git-Url: http://git.maquefel.me/?a=commitdiff_plain;h=79074a72d335dbd021a716d8cc65cba3b2f706ab;p=linux.git net: Flush deferred skb free on socket destroy The cited Fixes patch moved to a deferred skb approach where the skbs are not freed immediately under the socket lock. Add a WARN_ON_ONCE() to verify the deferred list is empty on socket destroy, and empty it to prevent potential memory leaks. Fixes: f35f821935d8 ("tcp: defer skb freeing after socket lock is released") Signed-off-by: Gal Pressman Signed-off-by: David S. Miller --- diff --git a/net/core/sock.c b/net/core/sock.c index f32ec08a0c37b..4ff806d719216 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -2049,6 +2049,9 @@ void sk_destruct(struct sock *sk) { bool use_call_rcu = sock_flag(sk, SOCK_RCU_FREE); + WARN_ON_ONCE(!llist_empty(&sk->defer_list)); + sk_defer_free_flush(sk); + if (rcu_access_pointer(sk->sk_reuseport_cb)) { reuseport_detach_sock(sk); use_call_rcu = true;