net: Fix oops from tcp_collapse() when using splice()
authorSteven J. Magnani <steve@digidescorp.com>
Tue, 30 Mar 2010 20:56:01 +0000 (13:56 -0700)
committerDavid S. Miller <davem@davemloft.net>
Tue, 30 Mar 2010 20:56:01 +0000 (13:56 -0700)
commitbaff42ab1494528907bf4d5870359e31711746ae
tree82cfffb254ea1f5b95701d328375228f7ab343e6
parentc0cd884af045338476b8e69a61fceb3f34ff22f1
net: Fix oops from tcp_collapse() when using splice()

tcp_read_sock() can have a eat skbs without immediately advancing copied_seq.
This can cause a panic in tcp_collapse() if it is called as a result
of the recv_actor dropping the socket lock.

A userspace program that splices data from a socket to either another
socket or to a file can trigger this bug.

Signed-off-by: Steven J. Magnani <steve@digidescorp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/ipv4/tcp.c