lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAM_iQpUuBi4FEqUyxbHx_gGyH4W6U5cXuGkbuQ_yubOnBy0MVg@mail.gmail.com> Date: Wed, 27 Feb 2019 17:50:28 -0800 From: Cong Wang <xiyou.wangcong@...il.com> To: Davide Caratti <dcaratti@...hat.com> Cc: "David S. Miller" <davem@...emloft.net>, Jamal Hadi Salim <jhs@...atatu.com>, Jiri Pirko <jiri@...nulli.us>, Vlad Buslov <vladbu@...lanox.com>, Paolo Abeni <pabeni@...hat.com>, Linux Kernel Network Developers <netdev@...r.kernel.org> Subject: Re: [PATCH net 03/16] net/sched: act_csum: validate the control action inside init() On Wed, Feb 27, 2019 at 9:41 AM Davide Caratti <dcaratti@...hat.com> wrote: > @@ -108,7 +116,16 @@ static int tcf_csum_init(struct net *net, struct nlattr *nla, > if (ret == ACT_P_CREATED) > tcf_idr_insert(tn, *a); > > + if (oldchain) > + tcf_chain_put_by_act(oldchain); Do we need to respect RCU grace period here? Same question for other patches on similar paths.
Powered by blists - more mailing lists