lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 01 Nov 2008 21:19:31 -0700 (PDT) From: David Miller <davem@...emloft.net> To: dada1@...mosbay.com Cc: minyard@....org, paulmck@...ux.vnet.ibm.com, shemminger@...tta.com, benny+usenet@...rsen.dk, netdev@...r.kernel.org, cl@...ux-foundation.org, a.p.zijlstra@...llo.nl, johnpol@....mipt.ru, christian@...i.com Subject: Re: [PATCH 2/2] udp: RCU handling for Unicast packets. From: Eric Dumazet <dada1@...mosbay.com> Date: Thu, 30 Oct 2008 06:50:07 +0100 > [PATCH] udp: add a missing smp_wmb() in udp_lib_get_port() > > Corey Minyard spotted a missing memory barrier in udp_lib_get_port() > > We need to make sure a reader cannot read the new 'sk->sk_next' value > and previous value of 'sk->sk_hash'. Or else, an item could be deleted > from a chain, and inserted into another chain. If new chain was empty > before the move, 'next' pointer is NULL, and lockless reader can > not detect it missed following items in original chain. > > This patch is temporary, since we expect an upcoming patch > to introduce another way of handling the problem. > > Signed-off-by: Eric Dumazet <dada1@...mosbay.com> I've applied this to net-next-2.6 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists