linux/include/net/netfilter
Felix Fietkau 0ff90b6c20 netfilter: nf_flow_offload: fix use-after-free and a resource leak
flow_offload_del frees the flow, so all associated resource must be
freed before.

Since the ct entry in struct flow_offload_entry was allocated by
flow_offload_alloc, it should be freed by flow_offload_free to take care
of the error handling path when flow_offload_add fails.

While at it, make flow_offload_del static, since it should never be
called directly, only from the gc step

Signed-off-by: Felix Fietkau <nbd@nbd.name>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
2018-02-07 11:55:52 +01:00
..
ipv4
ipv6
br_netfilter.h
nf_conntrack.h netfilter: remove useless prototype 2018-02-07 11:54:52 +01:00
nf_conntrack_acct.h
nf_conntrack_core.h
nf_conntrack_count.h netfilter: connlimit: split xt_connlimit into front and backend 2018-01-08 18:01:22 +01:00
nf_conntrack_ecache.h
nf_conntrack_expect.h
nf_conntrack_extend.h
nf_conntrack_helper.h
nf_conntrack_l3proto.h
nf_conntrack_l4proto.h
nf_conntrack_labels.h
nf_conntrack_seqadj.h
nf_conntrack_synproxy.h
nf_conntrack_timeout.h
nf_conntrack_timestamp.h
nf_conntrack_tuple.h
nf_conntrack_zones.h
nf_dup_netdev.h
nf_flow_table.h netfilter: nf_flow_offload: fix use-after-free and a resource leak 2018-02-07 11:55:52 +01:00
nf_log.h
nf_nat.h
nf_nat_core.h
nf_nat_helper.h
nf_nat_l3proto.h
nf_nat_l4proto.h
nf_nat_redirect.h
nf_queue.h
nf_socket.h
nf_tables.h netfilter: nf_tables: allocate handle and delete objects via handle 2018-01-19 14:00:46 +01:00
nf_tables_core.h
nf_tables_ipv4.h
nf_tables_ipv6.h
nfnetlink_log.h
nft_dup.h
nft_fib.h
nft_masq.h
nft_meta.h
nft_redir.h
nft_reject.h
xt_rateest.h