1. 01 2月, 2013 1 次提交
  2. 31 1月, 2013 1 次提交
  3. 28 1月, 2013 4 次提交
  4. 27 1月, 2013 3 次提交
  5. 23 1月, 2013 2 次提交
    • S
      ipv4: Fix route refcount on pmtu discovery · b44108db
      Steffen Klassert 提交于
      git commit 9cb3a50c (ipv4: Invalidate the socket cached route on
      pmtu events if possible) introduced a refcount problem. We don't
      get a refcount on the route if we get it from__sk_dst_get(), but
      we need one if we want to reuse this route because __sk_dst_set()
      releases the refcount of the old route. This patch adds proper
      refcount handling for that case. We introduce a 'new' flag to
      indicate that we are going to use a new route and we release the
      old route only if we replace it by a new one.
      Reported-by: NJulian Anastasov <ja@ssi.bg>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      b44108db
    • D
      net: net_cls: fd passed in SCM_RIGHTS datagram not set correctly · d8429506
      Daniel Wagner 提交于
      Commit 6a328d8c changed the update
      logic for the socket but it does not update the SCM_RIGHTS update
      as well. This patch is based on the net_prio fix commit
      
      48a87cc2
      
          net: netprio: fd passed in SCM_RIGHTS datagram not set correctly
      
          A socket fd passed in a SCM_RIGHTS datagram was not getting
          updated with the new tasks cgrp prioidx. This leaves IO on
          the socket tagged with the old tasks priority.
      
          To fix this add a check in the scm recvmsg path to update the
          sock cgrp prioidx with the new tasks value.
      
      Let's apply the same fix for net_cls.
      Signed-off-by: NDaniel Wagner <daniel.wagner@bmw-carit.de>
      Reported-by: NLi Zefan <lizefan@huawei.com>
      Cc: "David S. Miller" <davem@davemloft.net>
      Cc: "Eric W. Biederman" <ebiederm@xmission.com>
      Cc: Al Viro <viro@zeniv.linux.org.uk>
      Cc: John Fastabend <john.r.fastabend@intel.com>
      Cc: Neil Horman <nhorman@tuxdriver.com>
      Cc: netdev@vger.kernel.org
      Cc: cgroups@vger.kernel.org
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      d8429506
  6. 22 1月, 2013 2 次提交
  7. 21 1月, 2013 5 次提交
  8. 19 1月, 2013 1 次提交
  9. 18 1月, 2013 2 次提交
  10. 17 1月, 2013 5 次提交
  11. 16 1月, 2013 3 次提交
  12. 15 1月, 2013 1 次提交
  13. 13 1月, 2013 1 次提交
    • J
      netfilter: x_tables: print correct hook names for ARP · 5b76c494
      Jan Engelhardt 提交于
      arptables 0.0.4 (released on 10th Jan 2013) supports calling the
      CLASSIFY target, but on adding a rule to the wrong chain, the
      diagnostic is as follows:
      
      	# arptables -A INPUT -j CLASSIFY --set-class 0:0
      	arptables: Invalid argument
      	# dmesg | tail -n1
      	x_tables: arp_tables: CLASSIFY target: used from hooks
      	PREROUTING, but only usable from INPUT/FORWARD
      
      This is incorrect, since xt_CLASSIFY.c does specify
      (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD).
      
      This patch corrects the x_tables diagnostic message to print the
      proper hook names for the NFPROTO_ARP case.
      
      Affects all kernels down to and including v2.6.31.
      Signed-off-by: NJan Engelhardt <jengelh@inai.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      5b76c494
  14. 12 1月, 2013 2 次提交
  15. 11 1月, 2013 6 次提交
  16. 10 1月, 2013 1 次提交