spidernet: null out skb pointer after its been used.
commit83d35145c443d8394aaf1743301e79fa0a8054d7
authorLinas Vepstas <linas@austin.ibm.com>
Mon, 11 Jun 2007 18:17:02 +0000 (11 13:17 -0500)
committerJeff Garzik <jeff@garzik.org>
Wed, 20 Jun 2007 23:09:32 +0000 (20 19:09 -0400)
tree4a4fe97485e1690eb43212cb3afda93acc5edc62
parentd025d7858f7415f558e89d870ad1a205954b64cd
spidernet: null out skb pointer after its been used.

Avoid kernel crash in mm/slab.c due to double-free of pointer.

If the ethernet interface is brought down while there is still
RX traffic in flight, the device shutdown routine can end up
trying to double-free an skb, leading to a crash in mm/slab.c
Avoid the double-free by nulling out the skb pointer.

Signed-off-by: Linas Vepstas <linas@austin.ibm.com>
Signed-off-by: Jeff Garzik <jeff@garzik.org>
drivers/net/spider_net.c