diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2009-07-08 21:36:05 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2009-07-12 05:26:19 +0200 |
commit | e912b1142be8f1e2c71c71001dc992c6e5eb2ec1 (patch) | |
tree | 9812c7d3e5431852d25bc15860830413ff15dc51 /drivers | |
parent | cxgb3: Fix crash caused by stashing wrong netdev_queue (diff) | |
download | linux-e912b1142be8f1e2c71c71001dc992c6e5eb2ec1.tar.xz linux-e912b1142be8f1e2c71c71001dc992c6e5eb2ec1.zip |
net: sk_prot_alloc() should not blindly overwrite memory
Some sockets use SLAB_DESTROY_BY_RCU, and our RCU code correctness
depends on sk->sk_nulls_node.next being always valid. A NULL
value is not allowed as it might fault a lockless reader.
Current sk_prot_alloc() implementation doesnt respect this hypothesis,
calling kmem_cache_alloc() with __GFP_ZERO. Just call memset() around
the forbidden field.
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers')
0 files changed, 0 insertions, 0 deletions