[Devel] Re: [PATCH 0/8] Cleanup/fix the sk_alloc() call
Pavel Emelyanov
xemul at openvz.org
Wed Oct 31 07:32:20 PDT 2007
Arnaldo Carvalho de Melo wrote:
> Em Wed, Oct 31, 2007 at 04:40:01PM +0300, Pavel Emelyanov escreveu:
>> The sk_alloc() function suffers from two problems:
>> 1 (major). The error path is not clean in it - if the security
>> call fails, the net namespace is not put, if the try_module_get
>> fails additionally the security context is not released;
>> 2 (minor). The zero_it argument is misleading, as it doesn't just
>> zeroes it, but performs some extra setup. Besides this argument
>> is used only in one place - in the sk_clone().
>>
>> So this set fixes these problems and performs some additional
>> cleanup.
>>
>> Signed-off-by: Pavel Emelyanov <xemul at openvz.org>
>
> for the series:
>
> Acked-by: Arnaldo Carvalho de Melo <acme at redhat.com>
Thanks a lot :)
> Haven't tested, but it looks straightforward and conceptually sound,
> thanks for improving the sk_prot infrastructure! :-)
> Now we have just to make all the other protocols fill in the missing
> sk->sk_prot-> methods (converting what is there now in socket->ops) so
> that we can kill socket->ops and eliminate one level of indirection :-P
Do I get your idea right, that having the 'struct sock->ops' field is not
that good and the long-term TODO is to remove it (or smth similar)? Can you,
please, pour some more light on this, because I'm not yet very common with
the networking code, but I'm trying to learn it better by fixing obvious
bugs and cleaning the code.
> - Arnaldo
Thanks,
Pavel
More information about the Devel
mailing list