diff options
| author | Patrick McHardy <[email protected]> | 2006-03-21 06:40:54 +0000 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2006-03-21 06:40:54 +0000 |
| commit | be33690d8fcf40377f16193c463681170eb6b295 (patch) | |
| tree | 08c7be2ba1d046fca40bbb1d3ddac789b393ecc9 /security/selinux/hooks.c | |
| parent | [TCP]: sysctl to allow TCP window > 32767 sans wscale (diff) | |
| download | kernel-be33690d8fcf40377f16193c463681170eb6b295.tar.gz kernel-be33690d8fcf40377f16193c463681170eb6b295.zip | |
[XFRM]: Fix aevent related crash
When xfrm_user isn't loaded xfrm_nl is NULL, which makes IPsec crash because
xfrm_aevent_is_on passes the NULL pointer to netlink_has_listeners as socket.
A second problem is that the xfrm_nl pointer is not cleared when the socket
is releases at module unload time.
Protect references of xfrm_nl from outside of xfrm_user by RCU, check
that the socket is present in xfrm_aevent_is_on and set it to NULL
when unloading xfrm_user.
Signed-off-by: Patrick McHardy <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions
