1. 11 5月, 2006 3 次提交
  2. 10 5月, 2006 4 次提交
  3. 07 5月, 2006 2 次提交
  4. 06 5月, 2006 10 次提交
  5. 04 5月, 2006 15 次提交
  6. 03 5月, 2006 1 次提交
  7. 02 5月, 2006 1 次提交
    • P
      [NETFILTER] x_tables: fix compat related crash on non-x86 · 46c5ea3c
      Patrick McHardy 提交于
      When iptables userspace adds an ipt_standard_target, it calculates the size
      of the entire entry as:
      
      sizeof(struct ipt_entry) + XT_ALIGN(sizeof(struct ipt_standard_target))
      
      ipt_standard_target looks like this:
      
        struct xt_standard_target
        {
              struct xt_entry_target target;
              int verdict;
        };
      
      xt_entry_target contains a pointer, so when compiled for 64 bit the
      structure gets an extra 4 byte of padding at the end. On 32 bit
      architectures where iptables aligns to 8 byte it will also have 4
      byte padding at the end because it is only 36 bytes large.
      
      The compat_ipt_standard_fn in the kernel adjusts the offsets by
      
        sizeof(struct ipt_standard_target) - sizeof(struct compat_ipt_standard_target),
      
      which will always result in 4, even if the structure from userspace
      was already padded to a multiple of 8. On x86 this works out by
      accident because userspace only aligns to 4, on all other
      architectures this is broken and causes incorrect adjustments to
      the size and following offsets.
      
      Thanks to Linus for lots of debugging help and testing.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      46c5ea3c
  8. 01 5月, 2006 2 次提交
    • S
      [PATCH] Reworked patch for labels on user space messages · e7c34970
      Steve Grubb 提交于
      The below patch should be applied after the inode and ipc sid patches.
      This patch is a reworking of Tim's patch that has been updated to match
      the inode and ipc patches since its similar.
      
      [updated:
      >  Stephen Smalley also wanted to change a variable from isec to tsec in the
      >  user sid patch.                                                              ]
      Signed-off-by: NSteve Grubb <sgrubb@redhat.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      e7c34970
    • S
      [PATCH] sockaddr patch · d6fe3945
      Steve Grubb 提交于
      On Thursday 23 March 2006 09:08, John D. Ramsdell wrote:
      >  I noticed that a socketcall(bind) and socketcall(connect) event contain a
      >  record of type=SOCKADDR, but I cannot see one for a system call event
      >  associated with socketcall(accept).  Recording the sockaddr of an accepted
      >  socket is important for cross platform information flow analys
      
      Thanks for pointing this out. The following patch should address this.
      Signed-off-by: NSteve Grubb <sgrubb@redhat.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      d6fe3945
  9. 30 4月, 2006 2 次提交
    • Y
      [IPV6]: Fix race in route selection. · c302e6d5
      YOSHIFUJI Hideaki 提交于
      We eliminated rt6_dflt_lock (to protect default router pointer)
      at 2.6.17-rc1, and introduced rt6_select() for general router selection.
      The function is called in the context of rt6_lock read-lock held,
      but this means, we have some race conditions when we do round-robin.
      
      Signed-off-by; YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      c302e6d5
    • I
      [XFRM]: fix incorrect xfrm_policy_afinfo_lock use · e959d812
      Ingo Molnar 提交于
      xfrm_policy_afinfo_lock can be taken in bh context, at:
      
       [<c013fe1a>] lockdep_acquire_read+0x54/0x6d
       [<c0f6e024>] _read_lock+0x15/0x22
       [<c0e8fcdb>] xfrm_policy_get_afinfo+0x1a/0x3d
       [<c0e8fd10>] xfrm_decode_session+0x12/0x32
       [<c0e66094>] ip_route_me_harder+0x1c9/0x25b
       [<c0e770d3>] ip_nat_local_fn+0x94/0xad
       [<c0e2bbc8>] nf_iterate+0x2e/0x7a
       [<c0e2bc50>] nf_hook_slow+0x3c/0x9e
       [<c0e3a342>] ip_push_pending_frames+0x2de/0x3a7
       [<c0e53e19>] icmp_push_reply+0x136/0x141
       [<c0e543fb>] icmp_reply+0x118/0x1a0
       [<c0e54581>] icmp_echo+0x44/0x46
       [<c0e53fad>] icmp_rcv+0x111/0x138
       [<c0e36764>] ip_local_deliver+0x150/0x1f9
       [<c0e36be2>] ip_rcv+0x3d5/0x413
       [<c0df760f>] netif_receive_skb+0x337/0x356
       [<c0df76c3>] process_backlog+0x95/0x110
       [<c0df5fe2>] net_rx_action+0xa5/0x16d
       [<c012d8a7>] __do_softirq+0x6f/0xe6
       [<c0105ec2>] do_softirq+0x52/0xb1
      
      this means that all write-locking of xfrm_policy_afinfo_lock must be
      bh-safe. This patch fixes xfrm_policy_register_afinfo() and
      xfrm_policy_unregister_afinfo().
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      e959d812