Le mercredi 22 septembre 2010 Ã 09:17 +0200, kaber@xxxxxxxxx a Ãcrit : > From: Eric Dumazet <Eric Dumazet> > strange email address ;) > As soon as rcu_read_unlock() is called, there is no guarantee current > thread can safely derefence t pointer, rcu protected. > > Fix is to copy t->alloc_size in a temporary variable. > > Signed-off-by: Eric Dumazet <eric.dumazet@xxxxxxxxx> > Reviewed-by: Paul E. McKenney <paulmck@xxxxxxxxxxxxxxxxxx> > Signed-off-by: Patrick McHardy <kaber@xxxxxxxxx> > --- > net/netfilter/nf_conntrack_extend.c | 4 +++- > 1 files changed, 3 insertions(+), 1 deletions(-) > > diff --git a/net/netfilter/nf_conntrack_extend.c b/net/netfilter/nf_conntrack_extend.c > index 7dcf7a4..8d9e4c9 100644 > --- a/net/netfilter/nf_conntrack_extend.c > +++ b/net/netfilter/nf_conntrack_extend.c > @@ -48,15 +48,17 @@ nf_ct_ext_create(struct nf_ct_ext **ext, enum nf_ct_ext_id id, gfp_t gfp) > { > unsigned int off, len; > struct nf_ct_ext_type *t; > + size_t alloc_size; > > rcu_read_lock(); > t = rcu_dereference(nf_ct_ext_types[id]); > BUG_ON(t == NULL); > off = ALIGN(sizeof(struct nf_ct_ext), t->align); > len = off + t->len; > + alloc_size = t->alloc_size; > rcu_read_unlock(); > > - *ext = kzalloc(t->alloc_size, gfp); > + *ext = kzalloc(alloc_size, gfp); > if (!*ext) > return NULL; > -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html