1. 29 6月, 2007 1 次提交
  2. 27 6月, 2007 1 次提交
  3. 26 6月, 2007 1 次提交
    • Z
      SCTP: lock_sock_nested in sctp_sock_migrate · 5131a184
      Zach Brown 提交于
      sctp_sock_migrate() grabs the socket lock on a newly allocated socket while
      holding the socket lock on an old socket.  lockdep worries that this might
      be a recursive lock attempt.
      
       task/3026 is trying to acquire lock:
        (sk_lock-AF_INET){--..}, at: [<ffffffff88105b8c>] sctp_sock_migrate+0x2e3/0x327 [sctp]
       but task is already holding lock:
        (sk_lock-AF_INET){--..}, at: [<ffffffff8810891f>] sctp_accept+0xdf/0x1e3 [sctp]
      
      This patch tells lockdep that this locking is safe by using
      lock_sock_nested().
      Signed-off-by: NZach Brown <zach.brown@oracle.com>
      Signed-off-by: NVlad Yasevich <vladislav.yasevich@hp.com>
      5131a184
  4. 24 6月, 2007 5 次提交
  5. 23 6月, 2007 3 次提交
  6. 19 6月, 2007 5 次提交
  7. 16 6月, 2007 3 次提交
  8. 15 6月, 2007 2 次提交
    • H
      [IPV6] addrconf: Fix IPv6 on tuntap tunnels · 74235a25
      Herbert Xu 提交于
      The recent patch that added ipv6_hwtype is broken on tuntap tunnels.
      Indeed, it's broken on any device that does not pass the ipv6_hwtype
      test.
      
      The reason is that the original test only applies to autoconfiguration,
      not IPv6 support.  IPv6 support is allowed on any device.  In fact,
      even with the ipv6_hwtype patch applied you can still add IPv6 addresses
      to any interface that doesn't pass thw ipv6_hwtype test provided that
      they have a sufficiently large MTU.  This is a serious problem because
      come deregistration time these devices won't be cleaned up properly.
      
      I've gone back and looked at the rationale for the patch.  It appears
      that the real problem is that we were creating IPv6 devices even if the
      MTU was too small.  So here's a patch which fixes that and reverts the
      ipv6_hwtype stuff.
      
      Thanks to Kanru Chen for reporting this issue.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      74235a25
    • I
      [TCP]: Add missing break to TCP option parsing code · d7ea5b91
      Ilpo Järvinen 提交于
      This flaw does not affect any behavior (currently).
      Signed-off-by: NIlpo Järvinen <ilpo.jarvinen@helsinki.fi>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      d7ea5b91
  9. 14 6月, 2007 6 次提交
  10. 13 6月, 2007 3 次提交
  11. 12 6月, 2007 3 次提交
  12. 09 6月, 2007 5 次提交
  13. 08 6月, 2007 2 次提交
    • J
      xfrm: Add security check before flushing SAD/SPD · 4aa2e62c
      Joy Latten 提交于
      Currently we check for permission before deleting entries from SAD and
      SPD, (see security_xfrm_policy_delete() security_xfrm_state_delete())
      However we are not checking for authorization when flushing the SPD and
      the SAD completely. It was perhaps missed in the original security hooks
      patch.
      
      This patch adds a security check when flushing entries from the SAD and
      SPD.  It runs the entire database and checks each entry for a denial.
      If the process attempting the flush is unable to remove all of the
      entries a denial is logged the the flush function returns an error
      without removing anything.
      
      This is particularly useful when a process may need to create or delete
      its own xfrm entries used for things like labeled networking but that
      same process should not be able to delete other entries or flush the
      entire database.
      
      Signed-off-by: Joy Latten<latten@austin.ibm.com>
      Signed-off-by: NEric Paris <eparis@parisplace.org>
      Signed-off-by: NJames Morris <jmorris@namei.org>
      4aa2e62c
    • P
      [NET_SCHED]: Fix filter double free · b00b4bf9
      Patrick McHardy 提交于
      cbq and atm destroy their filters twice when destroying inner classes
      during qdisc destruction.
      Reported-and-tested-by: NStrobl Anton <a.strobl@aws-it.at>
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      b00b4bf9