1. 11 7月, 2007 21 次提交
  2. 06 7月, 2007 3 次提交
  3. 29 6月, 2007 1 次提交
  4. 27 6月, 2007 1 次提交
  5. 24 6月, 2007 3 次提交
  6. 08 6月, 2007 4 次提交
  7. 04 6月, 2007 1 次提交
    • H
      [NET] gso: Fix GSO feature mask in sk_setup_caps · 4fcd6b99
      Herbert Xu 提交于
      This isn't a bug just yet as only TCP uses sk_setup_caps for GSO.
      However, if and when UDP or something else starts using it this is
      likely to cause a problem if we forget to add software emulation
      for it at the same time.
      
      The problem is that right now we translate GSO emulation to the
      bitmask NETIF_F_GSO_MASK, which includes every protocol, even
      ones that we cannot emulate.
      
      This patch makes it provide only the ones that we can emulate.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      4fcd6b99
  8. 31 5月, 2007 2 次提交
  9. 25 5月, 2007 2 次提交
    • D
      [XFRM]: Allow packet drops during larval state resolution. · 14e50e57
      David S. Miller 提交于
      The current IPSEC rule resolution behavior we have does not work for a
      lot of people, even though technically it's an improvement from the
      -EAGAIN buisness we had before.
      
      Right now we'll block until the key manager resolves the route.  That
      works for simple cases, but many folks would rather packets get
      silently dropped until the key manager resolves the IPSEC rules.
      
      We can't tell these folks to "set the socket non-blocking" because
      they don't have control over the non-block setting of things like the
      sockets used to resolve DNS deep inside of the resolver libraries in
      libc.
      
      With that in mind I coded up the patch below with some help from
      Herbert Xu which provides packet-drop behavior during larval state
      resolution, controllable via sysctl and off by default.
      
      This lays the framework to either:
      
      1) Make this default at some point or...
      
      2) Move this logic into xfrm{4,6}_policy.c and implement the
         ARP-like resolution queue we've all been dreaming of.
         The idea would be to queue packets to the policy, then
         once the larval state is resolved by the key manager we
         re-resolve the route and push the packets out.  The
         packets would timeout if the rule didn't get resolved
         in a certain amount of time.
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      14e50e57
    • V
      [NET]: "wrong timeout value" in sk_wait_data() v2 · ba78073e
      Vasily Averin 提交于
      sys_setsockopt() do not check properly timeout values for
      SO_RCVTIMEO/SO_SNDTIMEO, for example it's possible to set negative timeout
      values. POSIX do not defines behaviour for sys_setsockopt in case negative
      timeouts, but requires that setsockopt() shall fail with -EDOM if the send and
      receive timeout values are too big to fit into the timeout fields in the socket
      structure.
      In current implementation negative timeout can lead to error messages like
      "schedule_timeout: wrong timeout value".
      
      Proposed patch:
      - checks tv_usec and returns -EDOM if it is wrong
      - do not allows to set negative timeout values (sets 0 instead) and outputs
      ratelimited information message about such attempts.
      Signed-off-By: NVasily Averin <vvs@sw.ru>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      ba78073e
  10. 23 5月, 2007 2 次提交