/openbmc/linux/net/ipv4/ |
H A D | xfrm4_input.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | xfrm4_output.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | ip_forward.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | ip_input.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | arp.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | raw.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/include/linux/ |
H A D | netfilter_bridge.h | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | netfilter.h | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/bridge/ |
H A D | br_stp_bpdu.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | br_forward.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | br_input.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | br_multicast.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv6/ |
H A D | xfrm6_input.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | output_core.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | xfrm6_output.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | ip6_input.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | mcast.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | ip6mr.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | raw.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | ndisc.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv6/netfilter/ |
H A D | nf_defrag_ipv6_hooks.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/netfilter/ |
H A D | nf_queue.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_output.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/netfilter/ipvs/ |
H A D | ip_vs_xmit.c | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/include/net/ |
H A D | ip6_route.h | diff 7026b1ddb6b8d4e6ee33dc2bd06c0ca8746fa7ab Sun Apr 05 21:19:04 CDT 2015 David Miller <davem@davemloft.net> netfilter: Pass socket pointer down through okfn().
On the output paths in particular, we have to sometimes deal with two socket contexts. First, and usually skb->sk, is the local socket that generated the frame.
And second, is potentially the socket used to control a tunneling socket, such as one the encapsulates using UDP.
We do not want to disassociate skb->sk when encapsulating in order to fix this, because that would break socket memory accounting.
The most extreme case where this can cause huge problems is an AF_PACKET socket transmitting over a vxlan device. We hit code paths doing checks that assume they are dealing with an ipv4 socket, but are actually operating upon the AF_PACKET one.
Signed-off-by: David S. Miller <davem@davemloft.net>
|