diff options
author | Shaun Pereira <pereira.shaun@gmail.com> | 2006-01-07 00:11:35 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2006-01-07 00:11:35 +0300 |
commit | a20a8554796bc4e28879beabd0db4bf3ce77b686 (patch) | |
tree | 2fdc866d3fe722e6eea6b6bb4017b9ab53927a62 /scripts | |
parent | 4bad4dc919573dbe9a5b41dd9edff279e99822d7 (diff) | |
download | linux-a20a8554796bc4e28879beabd0db4bf3ce77b686.tar.xz |
[X25]: Fix for broken x25 module.
When a user-space server application calls bind on a socket, then in kernel
space this bound socket is considered 'x25-linked' and the SOCK_ZAPPED flag
is unset.(As in x25_bind()/af_x25.c).
Now when a user-space client application attempts to connect to the server
on the listening socket, if the kernel accepts this in-coming call, then it
returns a new socket to userland and attempts to reply to the caller.
The reply/x25_sendmsg() will fail, because the new socket created on
call-accept has its SOCK_ZAPPED flag set by x25_make_new().
(sock_init_data() called by x25_alloc_socket() called by x25_make_new()
sets the flag to SOCK_ZAPPED)).
Fix: Using the sock_copy_flag() routine available in sock.h fixes this.
Tested on 32 and 64 bit kernels with x25 over tcp.
Signed-off-by: Shaun Pereira <pereira.shaun@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions