Search String: Display: Description: Sort:

Results:

References: [ +subject:/^(?:^\s*(re|sv|fwd|fw)[\[\]\d]*[:>-]+\s*)*\[PATCH\s+2\/2\]\s+netfilter\:\s+ipvs\/SIP\:\s+handle\s+ip_vs_fill_iph_skb_off\s+failure\s*$/: 3 ]

Total 3 documents matching your query.

1. Re: [PATCH 2/2] netfilter: ipvs/SIP: handle ip_vs_fill_iph_skb_off failure (score: 1)
Author: Simon Horman <horms@xxxxxxxxxxxx>
Date: Thu, 28 Jan 2016 08:39:14 +0900
Thanks, I have queued this up. I would suggest making such changes incrementally on top of this one. -- To unsubscribe from this list: send the line "unsubscribe lvs-devel" in the body of a message t
/html/lvs-devel/2016-01/msg00006.html (14,072 bytes)

2. Re: [PATCH 2/2] netfilter: ipvs/SIP: handle ip_vs_fill_iph_skb_off failure (score: 1)
Author: Julian Anastasov <ja@xxxxxx>
Date: Wed, 27 Jan 2016 22:56:08 +0200 (EET)
Hello, Looks ok to me, Acked-by: Julian Anastasov <ja@xxxxxx> but see below... There are other places like this where result is not checked because there is always a guarding skb_header_pointer check
/html/lvs-devel/2016-01/msg00005.html (12,900 bytes)

3. [PATCH 2/2] netfilter: ipvs/SIP: handle ip_vs_fill_iph_skb_off failure (score: 1)
Author: Arnd Bergmann <arnd@xxxxxxxx>
Date: Wed, 27 Jan 2016 14:52:02 +0100
ip_vs_fill_iph_skb_off() may not find an IP header, and gcc has determined that ip_vs_sip_fill_param() then incorrectly accesses the protocol fields: net/netfilter/ipvs/ip_vs_pe_sip.c: In function 'i
/html/lvs-devel/2016-01/msg00003.html (11,194 bytes)


This search system is powered by Namazu