diff options
author | Atul Gupta <atul.gupta@chelsio.com> | 2018-05-27 21:15:19 +0530 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2018-05-29 10:14:38 -0400 |
commit | b7af47b33008c3558bd107de647be6f3e6c0dfc6 (patch) | |
tree | 33cc3dd53c827daca02c3e268e8eabb462e8050b /tools/perf/scripts/python/syscall-counts.py | |
parent | a491b9321d486e69040b1ea186ad9b9a3a89f338 (diff) |
crypto: chtls: wait for memory sendmsg, sendpage
address suspicious code <gustavo@embeddedor.com>
1210 set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
1211 }
The issue is that in the code above, set_bit is never reached
due to the 'continue' statement at line 1208.
Also reported by bug report:<dan.carpenter@oracle.com>
1210 set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Not reachable.
Its required to wait for buffer in the send path and takes care of
unaddress and un-handled SOCK_NOSPACE.
v2: use csk_mem_free where appropriate
proper indent of goto do_nonblock
replace out with do_rm_wq
Reported-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Atul Gupta <atul.gupta@chelsio.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions