[PACKET]: Fix /proc/net/packet crash due to bogus private pointer
The seq_open_net patch changed the meaning of seq->private. Unfortunately it missed two spots in AF_PACKET, which still used the old way of dereferencing seq->private, thus causing weird and wonderful crashes when reading /proc/net/packet. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
2d4d29802f
commit
1bf40954cf
1 changed files with 2 additions and 2 deletions
|
@ -1878,7 +1878,7 @@ static void *packet_seq_start(struct seq_file *seq, loff_t *pos)
|
|||
|
||||
static void *packet_seq_next(struct seq_file *seq, void *v, loff_t *pos)
|
||||
{
|
||||
struct net *net = seq->private;
|
||||
struct net *net = seq_file_net(seq);
|
||||
++*pos;
|
||||
return (v == SEQ_START_TOKEN)
|
||||
? sk_head(&net->packet.sklist)
|
||||
|
@ -1887,7 +1887,7 @@ static void *packet_seq_next(struct seq_file *seq, void *v, loff_t *pos)
|
|||
|
||||
static void packet_seq_stop(struct seq_file *seq, void *v)
|
||||
{
|
||||
struct net *net = seq->private;
|
||||
struct net *net = seq_file_net(seq);
|
||||
read_unlock(&net->packet.sklist_lock);
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue