From: Felix Fietkau Date: Mon, 8 Dec 2014 12:21:17 +0000 (+0000) Subject: kernel: add missing check for skb->dev on netfilter xfrm optimization patch X-Git-Url: http://git.lede-project.org./?a=commitdiff_plain;h=0cebaafa6e721bda850ee88e84c4712643601e49;p=openwrt%2Fstaging%2Fynezz.git kernel: add missing check for skb->dev on netfilter xfrm optimization patch Signed-off-by: Felix Fietkau SVN-Revision: 43567 --- diff --git a/target/linux/generic/patches-3.10/616-net_optimize_xfrm_calls.patch b/target/linux/generic/patches-3.10/616-net_optimize_xfrm_calls.patch index 5724367c1f..1caf1ef59c 100644 --- a/target/linux/generic/patches-3.10/616-net_optimize_xfrm_calls.patch +++ b/target/linux/generic/patches-3.10/616-net_optimize_xfrm_calls.patch @@ -4,7 +4,7 @@ struct dst_entry *dst; int err; -+ if (!dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) ++ if (skb->dev && !dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) + return 0; + err = xfrm_decode_session(skb, &fl, family); diff --git a/target/linux/generic/patches-3.14/616-net_optimize_xfrm_calls.patch b/target/linux/generic/patches-3.14/616-net_optimize_xfrm_calls.patch index a4e4157300..2a64d5420a 100644 --- a/target/linux/generic/patches-3.14/616-net_optimize_xfrm_calls.patch +++ b/target/linux/generic/patches-3.14/616-net_optimize_xfrm_calls.patch @@ -4,7 +4,7 @@ struct dst_entry *dst; int err; -+ if (!dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) ++ if (skb->dev && !dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) + return 0; + err = xfrm_decode_session(skb, &fl, family); diff --git a/target/linux/generic/patches-3.18/616-net_optimize_xfrm_calls.patch b/target/linux/generic/patches-3.18/616-net_optimize_xfrm_calls.patch index a4e4157300..2a64d5420a 100644 --- a/target/linux/generic/patches-3.18/616-net_optimize_xfrm_calls.patch +++ b/target/linux/generic/patches-3.18/616-net_optimize_xfrm_calls.patch @@ -4,7 +4,7 @@ struct dst_entry *dst; int err; -+ if (!dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) ++ if (skb->dev && !dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) + return 0; + err = xfrm_decode_session(skb, &fl, family);