diff options
author | Cong Wang <cong.wang@bytedance.com> | 2021-04-06 20:21:11 -0700 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2021-04-12 17:34:27 +0200 |
commit | 51e0158a54321a48d260e95998393934bb0de52c (patch) | |
tree | 886e66f533cd8a55c78f23013ecf3325dafc9519 /crypto/sha512_generic.c | |
parent | cbaa683bb3923df4d3c12481bff6cb6d8fdbc060 (diff) | |
download | linux-51e0158a54321a48d260e95998393934bb0de52c.tar.gz linux-51e0158a54321a48d260e95998393934bb0de52c.tar.bz2 linux-51e0158a54321a48d260e95998393934bb0de52c.zip |
skmsg: Pass psock pointer to ->psock_update_sk_prot()
Using sk_psock() to retrieve psock pointer from sock requires
RCU read lock, but we already get psock pointer before calling
->psock_update_sk_prot() in both cases, so we can just pass it
without bothering sk_psock().
Fixes: 8a59f9d1e3d4 ("sock: Introduce sk->sk_prot->psock_update_sk_prot()")
Reported-by: syzbot+320a3bc8d80f478c37e4@syzkaller.appspotmail.com
Signed-off-by: Cong Wang <cong.wang@bytedance.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Tested-by: syzbot+320a3bc8d80f478c37e4@syzkaller.appspotmail.com
Reviewed-by: Jakub Sitnicki <jakub@cloudflare.com>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Link: https://lore.kernel.org/bpf/20210407032111.33398-1-xiyou.wangcong@gmail.com
Diffstat (limited to 'crypto/sha512_generic.c')
0 files changed, 0 insertions, 0 deletions