lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4F4DEF2F.7010109@cn.fujitsu.com> Date: Wed, 29 Feb 2012 17:26:07 +0800 From: Gao feng <gaofeng@...fujitsu.com> To: David Miller <davem@...emloft.net> CC: netdev@...r.kernel.org, eric.dumazet@...il.com, Gao feng <gaofeng@...fujitsu.com> Subject: Re: [PATCH V2] ipv6: Fix problem with expired dst cache Hi David. 于 2012年02月27日 14:36, Gao feng 写道: > If the ipv6 dst cache which copy from the dst generated by ICMPV6 RA packet. > this dst cache will not check expire because it has no RTF_EXPIRES flag. > So this dst cache will always be used until the dst gc run. > > Change the struct dst_entry,add a union contains new pointer from and expires. > When rt6_info.rt6i_flags has no RTF_EXPIRES flag,the dst.expires has no use. > we can use this field to point to where the dst cache copy from. > The dst.from is only used in IPV6. > > In func rt6_check_expired check if rt6_info.dst.from is expired. > > In func ip6_rt_copy only set dst.from when the ort has flag RTF_ADDRCONF > and RTF_DEFAULT. > I will send the v3 PATCH. This version has some changes. 1,hold the ort in ip6_rt_copy and release it in ip6_dst_destroy just as Eric said. 2,add some functions to operate the RTF_EXPIRES flag and expires(from). 3,change the code to use the functions added in 2. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists