[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20071101.003646.208870759.davem@davemloft.net>
Date: Thu, 01 Nov 2007 00:36:46 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: xemul@...nvz.org
Cc: netdev@...r.kernel.org, devel@...nvz.org
Subject: Re: [PATCH 5/8] Move some core sock setup into sk_prot_alloc
From: Pavel Emelyanov <xemul@...nvz.org>
Date: Wed, 31 Oct 2007 16:51:51 +0300
> The security_sk_alloc() and the module_get is a part of the
> object allocations - move it in the proper place.
>
> Note, that since we do not reset the newly allocated sock
> in the sk_alloc() (memset() is removed with the previous
> patch) we can safely do this.
>
> Also fix the error path in sk_prot_alloc() - release the security
> context if needed.
>
> Signed-off-by: Pavel Emelyanov <xemul@...nvz.org>
Applied.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists