> > as for key_sp_unlink(), i don't think the patch is correct. > > even if you do not call key_sp_unlink() in key_spdflush(), spd entries > > will get unlink'ed in key_timehandler(). therefore the end result > > will be the same. > > No ! calling key_sp_unlink() from key_spdflush() will result in an > _extra_ call of key_freesp() and thus refcnt will be decremented > though it shouldn't. > This will result in a refcnt being 0 too early and with valid > pointers to that secpolicy and will further lead to "Memory accessed > and/or modified after free" situations somewhen after the first and > all successive flushes of the SPD. > Each part of the code checks for the state == .._DEAD when getting an > sp from sptree so the comment above key_spdflush() is correct. Only > mark the sp as dead. > > Hope this explains the problem a bit better. the refcnt decremented in key_sp_unlink() is for the link from sptree[]. i guess this is the proper fix. does it fix your situation? itojun Index: key.c =================================================================== RCS file: /cvsroot/kame/kame/kame/sys/netkey/key.c,v retrieving revision 1.324 diff -u -r1.324 key.c --- key.c 14 Jan 2004 04:10:24 -0000 1.324 +++ key.c 14 Jan 2004 08:43:18 -0000 _at__at_ -2092,9 +2092,9 _at__at_ newsp->lifetime = lft ? lft->sadb_lifetime_addtime : 0; newsp->validtime = lft ? lft->sadb_lifetime_usetime : 0; - newsp->refcnt = 1; /* do not reclaim until I say I do */ newsp->state = IPSEC_SPSTATE_ALIVE; LIST_INSERT_TAIL(&sptree[newsp->dir], newsp, secpolicy, chain); + newsp->refcnt++; /* delete the entry in spacqtree */ if (mhp->msg->sadb_msg_type == SADB_X_SPDUPDATE &&Received on Tue Jan 13 2004 - 23:43:59 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:38 UTC