| To: | Ralf Baechle <ralf@xxxxxxxxxxxxxx> |
|---|---|
| Subject: | Re: [PATCH] Fix socket bitop damage |
| From: | Thomas Graf <tgraf@xxxxxxx> |
| Date: | Mon, 22 Aug 2005 13:14:36 +0200 |
| Cc: | "David S. Miller" <davem@xxxxxxxxxxxxx>, netdev@xxxxxxxxxxxxxx, linux-hams@xxxxxxxxxxxxxxx |
| In-reply-to: | <20050822110218.GA7514@linux-mips.org> |
| References: | <20050822110218.GA7514@linux-mips.org> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
* Ralf Baechle <20050822110218.GA7514@xxxxxxxxxxxxxx> 2005-08-22 12:02 > The socket flag cleanups that went into 2.6.12-rc1 are basically oring > the flags of an old socket into the socket just being created. > Unfortunately that one was just initialized by sock_init_data(), so already > has SOCK_ZAPPED set. As the result zapped sockets are created and all > incoming connection will fail due to this bug which again was carefully > replicated to at least AX.25, NET/ROM or ROSE. I'm probably to one to blame here but I don't get the point yet. What I did was to change the bitfield based flags to use sk_flags like this: - sk->sk_zapped = osk->sk_zapped; + + if (sock_flag(osk, SOCK_ZAPPED)) + sock_set_flag(sk, SOCK_ZAPPED); |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | [PATCH] AX.25 UID fixes, Ralf Baechle |
|---|---|
| Next by Date: | Re: [PATCH] Fix socket bitop damage, Thomas Graf |
| Previous by Thread: | [PATCH] Fix socket bitop damage, Ralf Baechle |
| Next by Thread: | Re: [PATCH] Fix socket bitop damage, Thomas Graf |
| Indexes: | [Date] [Thread] [Top] [All Lists] |