https://github.com/torvalds/linux
Revision fda0fd6c5b722cc48e904e0daafedca275d332af authored by Herbert Xu on 14 October 2005, 06:38:49 UTC, committed by Arnaldo Carvalho de Melo on 20 October 2005, 16:25:28 UTC
David S. Miller <davem@davemloft.net> wrote:
> One thing you can probably do for this bug is to mark data packets
> explicitly somehow, perhaps in the SKB control block DCCP already
> uses for other data.  Put some boolean in there, set it true for
> data packets.  Then change the test in dccp_transmit_skb() as
> appropriate to test the boolean flag instead of "skb_cloned(skb)".

I agree.  In fact we already have that flag, it's called skb->sk.
So here is patch to test that instead of skb_cloned().

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Acked-by: Ian McDonald <imcdnzl@gmail.com>
Signed-off-by: Arnaldo Carvalho de Melo <acme@mandriva.com>
1 parent ac9b9c6
Raw File
Tip revision: fda0fd6c5b722cc48e904e0daafedca275d332af authored by Herbert Xu on 14 October 2005, 06:38:49 UTC
[DCCP]: Use skb_set_owner_w in dccp_transmit_skb when skb->sk is NULL
Tip revision: fda0fd6
Makefile
#
# Makefile for the kernel security code
#

obj-$(CONFIG_KEYS)			+= keys/
subdir-$(CONFIG_SECURITY_SELINUX)	+= selinux

# if we don't select a security model, use the default capabilities
ifneq ($(CONFIG_SECURITY),y)
obj-y		+= commoncap.o
endif

# Object file lists
obj-$(CONFIG_SECURITY)			+= security.o dummy.o inode.o
# Must precede capability.o in order to stack properly.
obj-$(CONFIG_SECURITY_SELINUX)		+= selinux/built-in.o
obj-$(CONFIG_SECURITY_CAPABILITIES)	+= commoncap.o capability.o
obj-$(CONFIG_SECURITY_ROOTPLUG)		+= commoncap.o root_plug.o
obj-$(CONFIG_SECURITY_SECLVL)		+= seclvl.o
back to top