1. 21 3月, 2006 21 次提交
  2. 20 3月, 2006 1 次提交
    • R
      [AX.25]: Fix potencial memory hole. · c7c694d1
      Ralf Baechle DL5RB 提交于
      If the AX.25 dialect chosen by the sysadmin is set to DAMA master / 3
      (or DAMA slave / 2, if CONFIG_AX25_DAMA_SLAVE=n) ax25_kick() will fall
      through the switch statement without calling ax25_send_iframe() or any
      other function that would eventually free skbn thus leaking the packet.
      
      Fix by restricting the sysctl inferface to allow only actually supported
      AX.25 dialects.
      
      The system administration mistake needed for this to happen is rather
      unlikely, so this is an uncritical hole.
      
      Coverity #651.
      Signed-off-by: NRalf Baechle DL5RB <ralf@linux-mips.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      c7c694d1
  3. 18 3月, 2006 1 次提交
  4. 28 2月, 2006 1 次提交
    • H
      [IPSEC]: Kill post_input hook and do NAT-T in esp_input directly · 752c1f4c
      Herbert Xu 提交于
      The only reason post_input exists at all is that it gives us the
      potential to adjust the checksums incrementally in future which
      we ought to do.
      
      However, after thinking about it for a bit we can adjust the
      checksums without using this post_input stuff at all.  The crucial
      point is that only the inner-most NAT-T SA needs to be considered
      when adjusting checksums.  What's more, the checksum adjustment
      comes down to a single u32 due to the linearity of IP checksums.
      
      We just happen to have a spare u32 lying around in our skb structure :)
      When ip_summed is set to CHECKSUM_NONE on input, the value of skb->csum
      is currently unused.  All we have to do is to make that the checksum
      adjustment and voila, there goes all the post_input and decap structures!
      
      I've left in the decap data structures for now since it's intricately
      woven into the sec_path stuff.  We can kill them later too.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      752c1f4c
  5. 24 2月, 2006 1 次提交
  6. 16 2月, 2006 1 次提交
    • P
      [XFRM]: Fix SNAT-related crash in xfrm4_output_finish · 48d5cad8
      Patrick McHardy 提交于
      When a packet matching an IPsec policy is SNATed so it doesn't match any
      policy anymore it looses its xfrm bundle, which makes xfrm4_output_finish
      crash because of a NULL pointer dereference.
      
      This patch directs these packets to the original output path instead. Since
      the packets have already passed the POST_ROUTING hook, but need to start at
      the beginning of the original output path which includes another
      POST_ROUTING invocation, a flag is added to the IPCB to indicate that the
      packet was rerouted and doesn't need to pass the POST_ROUTING hook again.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      48d5cad8
  7. 14 2月, 2006 1 次提交
  8. 13 2月, 2006 1 次提交
  9. 10 2月, 2006 1 次提交
  10. 05 2月, 2006 1 次提交
  11. 03 2月, 2006 2 次提交
  12. 01 2月, 2006 1 次提交
  13. 31 1月, 2006 1 次提交
  14. 28 1月, 2006 4 次提交
  15. 18 1月, 2006 2 次提交
    • S
      [SCTP]: Fix couple of races between sctp_peeloff() and sctp_rcv(). · c4d2444e
      Sridhar Samudrala 提交于
      Validate and update the sk in sctp_rcv() to avoid the race where an
      assoc/ep could move to a different socket after we get the sk, but before
      the skb is added to the backlog.
      
      Also migrate the skb's in backlog queue to new sk when doing a peeloff.
      Signed-off-by: NSridhar Samudrala <sri@us.ibm.com>
      c4d2444e
    • V
      [SCTP]: Fix machine check/connection hang on IA64. · 313e7b4d
      Vlad Yasevich 提交于
      sctp_unpack_cookie used an on-stack array called digest as a result/out
      parameter in the call to crypto_hmac. However, hmac code
      (crypto_hmac_final)
      assumes that the 'out' argument is in virtual memory (identity mapped
      region)
      and can use virt_to_page call on it.  This does not work with the on-stack
      declared digest.  The problems observed so far have been:
       a) incorrect hmac digest
       b) machine check and hardware reset.
      
      Solution is to define the digest in an identity mapped region by
      kmalloc'ing
      it.  We can do this once as part of the endpoint structure and re-use it
      when
      verifying the SCTP cookie.
      Signed-off-by: NVlad Yasevich <vladislav.yasevich@hp.com>
      Signed-off-by: NSridhar Samudrala <sri@us.ibm.com>
      313e7b4d