1. 22 Jan, 2013 4 commits
    • Steffen Klassert's avatar
      ipv4: Fix route refcount on pmtu discovery · b44108db
      Steffen Klassert authored
      git commit 9cb3a50c (ipv4: Invalidate the socket cached route on
      pmtu events if possible) introduced a refcount problem. We don't
      get a refcount on the route if we get it from__sk_dst_get(), but
      we need one if we want to reuse this route because __sk_dst_set()
      releases the refcount of the old route. This patch adds proper
      refcount handling for that case. We introduce a 'new' flag to
      indicate that we are going to use a new route and we release the
      old route only if we replace it by a new one.
      Reported-by: default avatarJulian Anastasov <ja@ssi.bg>
      Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b44108db
    • David S. Miller's avatar
      Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec · 0c8729c9
      David S. Miller authored
      Steffen Klassert says:
      
      ====================
      1) The transport header did not point to the right place after
         esp/ah processing on tunnel mode in the receive path. As a
         result, the ECN field of the inner header was not set correctly,
         fixes from Li RongQing.
      
      2) We did a null check too late in one of the xfrm_replay advance
         functions. This can lead to a division by zero, fix from
         Nickolai Zeldovich.
      
      3) The size calculation of the hash table missed the muiltplication
         with the actual struct size when the hash table is freed.
         We might call the wrong free function, fix from Michal Kubecek.
      
      4) On IPsec pmtu events we can't access the transport headers of
         the original packet, so force a relookup for all routes
         to notify about the pmtu event.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      0c8729c9
    • Daniel Wagner's avatar
      net: net_cls: fd passed in SCM_RIGHTS datagram not set correctly · d8429506
      Daniel Wagner authored
      Commit 6a328d8c changed the update
      logic for the socket but it does not update the SCM_RIGHTS update
      as well. This patch is based on the net_prio fix commit
      
      48a87cc2
      
          net: netprio: fd passed in SCM_RIGHTS datagram not set correctly
      
          A socket fd passed in a SCM_RIGHTS datagram was not getting
          updated with the new tasks cgrp prioidx. This leaves IO on
          the socket tagged with the old tasks priority.
      
          To fix this add a check in the scm recvmsg path to update the
          sock cgrp prioidx with the new tasks value.
      
      Let's apply the same fix for net_cls.
      Signed-off-by: default avatarDaniel Wagner <daniel.wagner@bmw-carit.de>
      Reported-by: default avatarLi Zefan <lizefan@huawei.com>
      Cc: "David S. Miller" <davem@davemloft.net>
      Cc: "Eric W. Biederman" <ebiederm@xmission.com>
      Cc: Al Viro <viro@zeniv.linux.org.uk>
      Cc: John Fastabend <john.r.fastabend@intel.com>
      Cc: Neil Horman <nhorman@tuxdriver.com>
      Cc: netdev@vger.kernel.org
      Cc: cgroups@vger.kernel.org
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      d8429506
    • Eric Dumazet's avatar
      netxen: fix off by one bug in netxen_release_tx_buffer() · a05948f2
      Eric Dumazet authored
      Christoph Paasch found netxen could trigger a BUG in its dismantle
      phase, in netxen_release_tx_buffer(), using full size TSO packets.
      
      cmd_buf->frag_count includes the skb->data part, so the loop must
      start at index 1 instead of 0, or else we can make an out
      of bound access to cmd_buff->frag_array[MAX_SKB_FRAGS + 2]
      
      Christoph provided the fixes in netxen_map_tx_skb() function.
      In case of a dma mapping error, its better to clear the dma fields
      so that we don't try to unmap them again in netxen_release_tx_buffer()
      Reported-by: default avatarChristoph Paasch <christoph.paasch@uclouvain.be>
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Tested-by: default avatarChristoph Paasch <christoph.paasch@uclouvain.be>
      Cc: Sony Chacko <sony.chacko@qlogic.com>
      Cc: Rajesh Borundia <rajesh.borundia@qlogic.com>
      Signed-off-by: default avatarChristoph Paasch <christoph.paasch@uclouvain.be>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      a05948f2
  2. 21 Jan, 2013 13 commits
  3. 20 Jan, 2013 1 commit
  4. 19 Jan, 2013 2 commits
  5. 18 Jan, 2013 5 commits
  6. 17 Jan, 2013 9 commits
  7. 16 Jan, 2013 6 commits