summaryrefslogtreecommitdiff
path: root/net/bridge
diff options
context:
space:
mode:
authorShaun Pereira <pereira.shaun@gmail.com>2006-01-06 13:11:35 -0800
committerDavid S. Miller <davem@davemloft.net>2006-01-06 13:11:35 -0800
commita20a8554796bc4e28879beabd0db4bf3ce77b686 (patch)
tree2fdc866d3fe722e6eea6b6bb4017b9ab53927a62 /net/bridge
parent4bad4dc919573dbe9a5b41dd9edff279e99822d7 (diff)
downloadlinux-3.10-a20a8554796bc4e28879beabd0db4bf3ce77b686.tar.gz
linux-3.10-a20a8554796bc4e28879beabd0db4bf3ce77b686.tar.bz2
linux-3.10-a20a8554796bc4e28879beabd0db4bf3ce77b686.zip
[X25]: Fix for broken x25 module.
When a user-space server application calls bind on a socket, then in kernel space this bound socket is considered 'x25-linked' and the SOCK_ZAPPED flag is unset.(As in x25_bind()/af_x25.c). Now when a user-space client application attempts to connect to the server on the listening socket, if the kernel accepts this in-coming call, then it returns a new socket to userland and attempts to reply to the caller. The reply/x25_sendmsg() will fail, because the new socket created on call-accept has its SOCK_ZAPPED flag set by x25_make_new(). (sock_init_data() called by x25_alloc_socket() called by x25_make_new() sets the flag to SOCK_ZAPPED)). Fix: Using the sock_copy_flag() routine available in sock.h fixes this. Tested on 32 and 64 bit kernels with x25 over tcp. Signed-off-by: Shaun Pereira <pereira.shaun@gmail.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/bridge')
0 files changed, 0 insertions, 0 deletions