netrom: Fix a data-race around sysctl_netrom_obsolescence_count_initialiser
[ Upstream commit cfd9f4a740f772298308b2e6070d2c744fb5cf79 ]
We need to protect the reader reading the sysctl value
because the value can be changed concurrently.
Fixes: 1da177e4c3
("Linux-2.6.12-rc2")
Signed-off-by: Jason Xing <kernelxing@tencent.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
parent
e041df5dc9
commit
18c95d11c3
@ -763,7 +763,7 @@ int nr_route_frame(struct sk_buff *skb, ax25_cb *ax25)
|
|||||||
if (ax25 != NULL) {
|
if (ax25 != NULL) {
|
||||||
ret = nr_add_node(nr_src, "", &ax25->dest_addr, ax25->digipeat,
|
ret = nr_add_node(nr_src, "", &ax25->dest_addr, ax25->digipeat,
|
||||||
ax25->ax25_dev->dev, 0,
|
ax25->ax25_dev->dev, 0,
|
||||||
sysctl_netrom_obsolescence_count_initialiser);
|
READ_ONCE(sysctl_netrom_obsolescence_count_initialiser));
|
||||||
if (ret)
|
if (ret)
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user