[Cbe-oss-dev] [PATCH 1/15] spidernet: null out skb pointer after its been used.
Linas Vepstas
linas at austin.ibm.com
Tue Jun 12 04:17:02 EST 2007
Avoid kernel crash in mm/slab.c due to double-free of pointer.
If the ethernet interface is brought down while there is still
RX traffic in flight, the device shutdown routine can end up
trying to double-free an skb, leading to a crash in mm/slab.c
Avoid the double-free by nulling out the skb pointer.
Signed-off-by: Linas Vepstas <linas at austin.ibm.com>
----
drivers/net/spider_net.c | 1 +
1 file changed, 1 insertion(+)
Index: linux-2.6.22-rc1/drivers/net/spider_net.c
===================================================================
--- linux-2.6.22-rc1.orig/drivers/net/spider_net.c 2007-06-08 15:45:33.000000000 -0500
+++ linux-2.6.22-rc1/drivers/net/spider_net.c 2007-06-08 15:48:10.000000000 -0500
@@ -1131,6 +1131,7 @@ spider_net_decode_one_descr(struct spide
/* Ok, we've got a packet in descr */
spider_net_pass_skb_up(descr, card);
+ descr->skb = NULL;
hwdescr->dmac_cmd_status = SPIDER_NET_DESCR_NOT_IN_USE;
return 1;
More information about the cbe-oss-dev
mailing list