)]}' { "commit": "1b26c9b334044cff6d1d2698f2be41bc7d9a0864", "tree": "533eb56100209cd0d8ec2c1f3d354af1695226f9", "parents": [ "bda7bad62bc4c4e0783348e8db51abe094153c56" ], "author": { "name": "Pravin B Shelar", "email": "pshelar@nicira.com", "time": "Fri Mar 23 15:02:55 2012 -0700" }, "committer": { "name": "Linus Torvalds", "email": "torvalds@linux-foundation.org", "time": "Fri Mar 23 16:58:42 2012 -0700" }, "message": "proc-ns: use d_set_d_op() API to set dentry ops in proc_ns_instantiate().\n\nThe namespace cleanup path leaks a dentry which holds a reference count\non a network namespace. Keeping that network namespace from being freed\nwhen the last user goes away. Leaving things like vlan devices in the\nleaked network namespace.\n\nIf you use ip netns add for much real work this problem becomes apparent\npretty quickly. It light testing the problem hides because frequently\nyou simply don\u0027t notice the leak.\n\nUse d_set_d_op() so that DCACHE_OP_* flags are set correctly.\n\nThis issue exists back to 3.0.\n\nAcked-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nReported-by: Justin Pettit \u003cjpettit@nicira.com\u003e\nSigned-off-by: Pravin B Shelar \u003cpshelar@nicira.com\u003e\nSigned-off-by: Jesse Gross \u003cjesse@nicira.com\u003e\nCc: David Miller \u003cdavem@davemloft.net\u003e\nCc: \u003cstable@vger.kernel.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "27da860115c64aac30f8bd591adb1230f2bdeba6", "old_mode": 33188, "old_path": "fs/proc/namespaces.c", "new_id": "3551f1f839eb163801a22bfb1243211ee41b404f", "new_mode": 33188, "new_path": "fs/proc/namespaces.c" } ] }