“4b47638ab25d90faf4e5499aecd8812f247181fd”上不存在“README.md”
  1. 07 12月, 2011 1 次提交
  2. 06 12月, 2011 1 次提交
  3. 03 12月, 2011 1 次提交
  4. 02 12月, 2011 6 次提交
  5. 01 12月, 2011 7 次提交
  6. 30 11月, 2011 2 次提交
    • P
      netlabel: Fix build problems when IPv6 is not enabled · 1281bc25
      Paul Moore 提交于
      A recent fix to the the NetLabel code caused build problem with
      configurations that did not have IPv6 enabled; see below:
      
       netlabel_kapi.c: In function 'netlbl_cfg_unlbl_map_add':
       netlabel_kapi.c:165:4:
        error: implicit declaration of function 'netlbl_af6list_add'
      
      This patch fixes this problem by making the IPv6 specific code conditional
      on the IPv6 configuration flags as we done in the rest of NetLabel and the
      network stack as a whole.  We have to move some variable declarations
      around as a result so things may not be quite as pretty, but at least it
      builds cleanly now.
      
      Some additional IPv6 conditionals were added to the NetLabel code as well
      for the sake of consistency.
      Reported-by: NRandy Dunlap <rdunlap@xenotime.net>
      Signed-off-by: NPaul Moore <pmoore@redhat.com>
      Acked-by: NRandy Dunlap <rdunlap@xenotime.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      1281bc25
    • X
      sctp: better integer overflow check in sctp_auth_create_key() · c89304b8
      Xi Wang 提交于
      The check from commit 30c2235c is incomplete and cannot prevent
      cases like key_len = 0x80000000 (INT_MAX + 1).  In that case, the
      left-hand side of the check (INT_MAX - key_len), which is unsigned,
      becomes 0xffffffff (UINT_MAX) and bypasses the check.
      
      However this shouldn't be a security issue.  The function is called
      from the following two code paths:
      
       1) setsockopt()
      
       2) sctp_auth_asoc_set_secret()
      
      In case (1), sca_keylength is never going to exceed 65535 since it's
      bounded by a u16 from the user API.  As such, the key length will
      never overflow.
      
      In case (2), sca_keylength is computed based on the user key (1 short)
      and 2 * key_vector (3 shorts) for a total of 7 * USHRT_MAX, which still
      will not overflow.
      
      In other words, this overflow check is not really necessary.  Just
      make it more correct.
      Signed-off-by: NXi Wang <xi.wang@gmail.com>
      Cc: Vlad Yasevich <vladislav.yasevich@hp.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      c89304b8
  7. 29 11月, 2011 6 次提交
  8. 27 11月, 2011 8 次提交
  9. 26 11月, 2011 1 次提交
  10. 25 11月, 2011 1 次提交
  11. 24 11月, 2011 5 次提交
  12. 23 11月, 2011 1 次提交
新手
引导
客服 返回
顶部