diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2005-05-03 14:43:27 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2005-05-03 14:43:27 -0700 |
commit | 96c36023434b7b6824b1da72a6b7b1ca61d7310c (patch) | |
tree | 21b46ccc9e88f5ab77e0578356ba7d86e0f5c964 /crypto | |
parent | 9dfa277f88388a94993b121db46b80df66f48d9e (diff) | |
download | kernel_samsung_aries-96c36023434b7b6824b1da72a6b7b1ca61d7310c.zip kernel_samsung_aries-96c36023434b7b6824b1da72a6b7b1ca61d7310c.tar.gz kernel_samsung_aries-96c36023434b7b6824b1da72a6b7b1ca61d7310c.tar.bz2 |
[NETLINK]: cb_lock does not needs ref count on sk
Here is a little optimisation for the cb_lock used by netlink_dump.
While fixing that race earlier, I noticed that the reference count
held by cb_lock is completely useless. The reason is that in order
to obtain the protection of the reference count, you have to take
the cb_lock. But the only way to take the cb_lock is through
dereferencing the socket.
That is, you must already possess a reference count on the socket
before you can take advantage of the reference count held by cb_lock.
As a corollary, we can remve the reference count held by the cb_lock.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'crypto')
0 files changed, 0 insertions, 0 deletions