1. 23 9月, 2006 2 次提交
  2. 09 7月, 2006 1 次提交
  3. 23 6月, 2006 1 次提交
    • H
      [IPSEC]: Handle GSO packets · 09b8f7a9
      Herbert Xu 提交于
      This patch segments GSO packets received by the IPsec stack.  This can
      happen when a NIC driver injects GSO packets into the stack which are
      then forwarded to another host.
      
      The primary application of this is going to be Xen where its backend
      driver may inject GSO packets into dom0.
      
      Of course this also can be used by other virtualisation schemes such as
      VMWare or UML since the tap device could be modified to inject GSO packets
      received through splice.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      09b8f7a9
  4. 18 6月, 2006 1 次提交
  5. 30 4月, 2006 1 次提交
    • H
      [IPSEC]: Fix IP ID selection · a76e07ac
      Herbert Xu 提交于
      I was looking through the xfrm input/output code in order to abstract
      out the address family specific encapsulation/decapsulation code.  During
      that process I found this bug in the IP ID selection code in xfrm4_output.c.
      
      At that point dst is still the xfrm_dst for the current SA which
      represents an internal flow as far as the IPsec tunnel is concerned.
      Since the IP ID is going to sit on the outside of the encapsulated
      packet, we obviously want the external flow which is just dst->child.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      a76e07ac
  6. 16 2月, 2006 1 次提交
    • P
      [XFRM]: Fix SNAT-related crash in xfrm4_output_finish · 48d5cad8
      Patrick McHardy 提交于
      When a packet matching an IPsec policy is SNATed so it doesn't match any
      policy anymore it looses its xfrm bundle, which makes xfrm4_output_finish
      crash because of a NULL pointer dereference.
      
      This patch directs these packets to the original output path instead. Since
      the packets have already passed the POST_ROUTING hook, but need to start at
      the beginning of the original output path which includes another
      POST_ROUTING invocation, a flag is added to the IPCB to indicate that the
      packet was rerouted and doesn't need to pass the POST_ROUTING hook again.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      48d5cad8
  7. 08 1月, 2006 3 次提交
    • P
      [NETFILTER]: Redo policy lookups after NAT when neccessary · 5c901daa
      Patrick McHardy 提交于
      When NAT changes the key used for the xfrm lookup it needs to be done
      again. If a new policy is returned in POST_ROUTING the packet needs
      to be passed to xfrm4_output_one manually after all hooks were called
      because POST_ROUTING is called with fixed okfn (ip_finish_output).
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      5c901daa
    • P
      [NETFILTER]: Fix xfrm lookup in ip_route_me_harder/ip6_route_me_harder · 3e3850e9
      Patrick McHardy 提交于
      ip_route_me_harder doesn't use the port numbers of the xfrm lookup and
      uses ip_route_input for non-local addresses which doesn't do a xfrm
      lookup, ip6_route_me_harder doesn't do a xfrm lookup at all.
      
      Use xfrm_decode_session and do the lookup manually, make sure both
      only do the lookup if the packet hasn't been transformed already.
      
      Makeing sure the lookup only happens once needs a new field in the
      IP6CB, which exceeds the size of skb->cb. The size of skb->cb is
      increased to 48b. Apparently the IPv6 mobile extensions need some
      more room anyway.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      3e3850e9
    • P
      [XFRM]: Netfilter IPsec output hooks · 16a6677f
      Patrick McHardy 提交于
      Call netfilter hooks before IPsec transforms. Packets visit the
      FORWARD/LOCAL_OUT and POST_ROUTING hook before the first encapsulation
      and the LOCAL_OUT and POST_ROUTING hook before each following tunnel mode
      transform.
      
      Patch from Herbert Xu <herbert@gondor.apana.org.au>:
      
      Move the loop from dst_output into xfrm4_output/xfrm6_output since they're
      the only ones who need to it. xfrm{4,6}_output_one() processes the first SA
      all subsequent transport mode SAs and is called in a loop that calls the
      netfilter hooks between each two calls.
      
      In order to avoid the tail call issue, I've added the inline function
      nf_hook which is nf_hook_slow plus the empty list check.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      16a6677f
  8. 21 6月, 2005 1 次提交
    • H
      [IPSEC]: Add XFRM_STATE_NOPMTUDISC flag · dd87147e
      Herbert Xu 提交于
      This patch adds the flag XFRM_STATE_NOPMTUDISC for xfrm states.  It is
      similar to the nopmtudisc on IPIP/GRE tunnels.  It only has an effect
      on IPv4 tunnel mode states.  For these states, it will ensure that the
      DF flag is always cleared.
      
      This is primarily useful to work around ICMP blackholes.
      
      In future this flag could also allow a larger MTU to be set within the
      tunnel just like IPIP/GRE tunnels.  This could be useful for short haul
      tunnels where temporary fragmentation outside the tunnel is desired over
      smaller fragments inside the tunnel.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Acked-by: NJames Morris <jmorris@redhat.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      dd87147e
  9. 17 4月, 2005 1 次提交
    • L
      Linux-2.6.12-rc2 · 1da177e4
      Linus Torvalds 提交于
      Initial git repository build. I'm not bothering with the full history,
      even though we have it. We can create a separate "historical" git
      archive of that later if we want to, and in the meantime it's about
      3.2GB when imported into git - space that would just make the early
      git days unnecessarily complicated, when we don't have a lot of good
      infrastructure for it.
      
      Let it rip!
      1da177e4