summaryrefslogtreecommitdiff
path: root/net/8021q
diff options
context:
space:
mode:
authorPavel Emelyanov <xemul@openvz.org>2007-12-11 02:41:25 -0800
committerDavid S. Miller <davem@sunset.davemloft.net>2007-12-11 02:45:32 -0800
commit3f03e387893ffa07a4d5dac96772f9db3221a185 (patch)
tree0b9296bdf891f0d7a8dec09d113a986cebac989f /net/8021q
parentd59b54b150b3b69b721f1e161efd42ecb7619897 (diff)
downloadlinux-3.10-3f03e387893ffa07a4d5dac96772f9db3221a185.tar.gz
linux-3.10-3f03e387893ffa07a4d5dac96772f9db3221a185.tar.bz2
linux-3.10-3f03e387893ffa07a4d5dac96772f9db3221a185.zip
[VLAN]: Fix potential race in vlan_cleanup_module vs vlan_ioctl_handler.
The vlan module cleanup function starts with vlan_netlink_fini(); vlan_ioctl_set(NULL); The first call removes all the vlan devices and the second one closes the vlan ioctl. AFAIS there's a tiny race window between these two calls - after rtnl unregistered all the vlans, but the ioctl handler isn't set to NULL yet, user can manage to call this ioctl and create one vlan device, and that this function will later BUG_ON seeing non-emply hashes. I think, that we must first close the vlan ioctl and only after this remove all the vlans with the vlan_netlink_fini() call. Signed-off-by: Pavel Emelyanov <xemul@openvz.org> Acked-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/8021q')
-rw-r--r--net/8021q/vlan.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/8021q/vlan.c b/net/8021q/vlan.c
index 5b183156307..4add9bd4bc8 100644
--- a/net/8021q/vlan.c
+++ b/net/8021q/vlan.c
@@ -124,8 +124,8 @@ static void __exit vlan_cleanup_module(void)
{
int i;
- vlan_netlink_fini();
vlan_ioctl_set(NULL);
+ vlan_netlink_fini();
/* Un-register us from receiving netdevice events */
unregister_netdevice_notifier(&vlan_notifier_block);