1. 23 9月, 2006 10 次提交
  2. 21 9月, 2006 3 次提交
  3. 20 9月, 2006 1 次提交
  4. 18 9月, 2006 5 次提交
  5. 01 9月, 2006 1 次提交
    • W
      [IPV4]: Fix SNMPv2 "ipFragFails" counter error · 0668b472
      Wei Dong 提交于
        When I tested Linux kernel 2.6.17.7 about statistics
      "ipFragFails",found that this counter couldn't increase correctly. The
      criteria is RFC2011:
      RFC2011
        ipFragFails OBJECT-TYPE
          SYNTAX      Counter32
          MAX-ACCESS  read-only
          STATUS      current
          DESCRIPTION
                  "The number of IP datagrams that have been discarded because
                  they needed to be fragmented at this entity but could not
                  be, e.g., because their Don't Fragment flag was set."
          ::= { ip 18 }
      
      When I send big IP packet to a router with DF bit set to 1 which need to
      be fragmented, and router just sends an ICMP error message
      ICMP_FRAG_NEEDED but no increments for this counter(in the function
      ip_fragment).
      Signed-off-by: NWei Dong <weid@nanjing-fnst.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      0668b472
  6. 30 8月, 2006 1 次提交
  7. 23 8月, 2006 2 次提交
  8. 18 8月, 2006 5 次提交
  9. 14 8月, 2006 5 次提交
  10. 08 8月, 2006 2 次提交
  11. 05 8月, 2006 1 次提交
  12. 03 8月, 2006 4 次提交
    • A
      [NET]: Fix more per-cpu typos · 29bbd72d
      Alexey Dobriyan 提交于
      Signed-off-by: NAlexey Dobriyan <adobriyan@gmail.com>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      29bbd72d
    • C
      [AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec patch · dc49c1f9
      Catherine Zhang 提交于
      From: Catherine Zhang <cxzhang@watson.ibm.com>
      
      This patch implements a cleaner fix for the memory leak problem of the
      original unix datagram getpeersec patch.  Instead of creating a
      security context each time a unix datagram is sent, we only create the
      security context when the receiver requests it.
      
      This new design requires modification of the current
      unix_getsecpeer_dgram LSM hook and addition of two new hooks, namely,
      secid_to_secctx and release_secctx.  The former retrieves the security
      context and the latter releases it.  A hook is required for releasing
      the security context because it is up to the security module to decide
      how that's done.  In the case of Selinux, it's a simple kfree
      operation.
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      dc49c1f9
    • W
      [IPV6]: SNMPv2 "ipv6IfStatsOutFragCreates" counter error · dafee490
      Wei Dong 提交于
        When I tested linux kernel 2.6.71.7 about statistics
      "ipv6IfStatsOutFragCreates", and found that it couldn't increase
      correctly. The criteria is RFC 2465:
      
        ipv6IfStatsOutFragCreates OBJECT-TYPE
            SYNTAX      Counter32
            MAX-ACCESS  read-only
            STATUS      current
            DESCRIPTION
               "The number of output datagram fragments that have
               been generated as a result of fragmentation at
               this output interface."
            ::= { ipv6IfStatsEntry 15 }
      
      I think there are two issues in Linux kernel. 
      1st:
      RFC2465 specifies the counter is "The number of output datagram
      fragments...". I think increasing this counter after output a fragment
      successfully is better. And it should not be increased even though a
      fragment is created but failed to output.
      
      2nd:
      If we send a big ICMP/ICMPv6 echo request to a host, and receive
      ICMP/ICMPv6 echo reply consisted of some fragments. As we know that in
      Linux kernel first fragmentation occurs in ICMP layer(maybe saying
      transport layer is better), but this is not the "real"
      fragmentation,just do some "pre-fragment" -- allocate space for date,
      and form a frag_list, etc. The "real" fragmentation happens in IP layer
      -- set offset and MF flag and so on. So I think in "fast path" for
      ip_fragment/ip6_fragment, if we send a fragment which "pre-fragment" by
      upper layer we should also increase "ipv6IfStatsOutFragCreates".
      Signed-off-by: NWei Dong <weid@nanjing-fnst.com>
      Acked-by: NYOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      dafee490
    • P
      [NETFILTER]: xt_hashlimit/xt_string: missing string validation · 3ab72088
      Patrick McHardy 提交于
      The hashlimit table name and the textsearch algorithm need to be
      terminated, the textsearch pattern length must not exceed the
      maximum size.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      3ab72088