David S. Miller wrote:
Applied to both net-2.6 and net-2.6.14
BTW, the IPv6 skb leak fix is only in your net-2.6.14 tree
so far, I think it should go in net-2.6 as well.
[IPV6]: Fix SKB leak in ip6_input_finish()
Changing it to how ip_input handles should fix it.
Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]>
Signed-off-by: David S. Miller <[EMAIL PROTECTED]>
---
commit e707ebf55746b2862be9d7368d42e9a0f0774757
tree 7753e0e6735394ea682dcf65be4f2195f0963aeb
parent 9d7c46e45eb9d73f96d05dbf5130aa9b5bdc3452
author Patrick McHardy <[EMAIL PROTECTED]> Tue, 09 Aug 2005 19:50:23 -0700
committer David S. Miller <[EMAIL PROTECTED]> Tue, 09 Aug 2005 19:50:23 -0700
net/ipv6/ip6_input.c | 9 +++++----
1 files changed, 5 insertions(+), 4 deletions(-)
diff --git a/net/ipv6/ip6_input.c b/net/ipv6/ip6_input.c
--- a/net/ipv6/ip6_input.c
+++ b/net/ipv6/ip6_input.c
@@ -198,12 +198,13 @@ resubmit:
if (!raw_sk) {
if (xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
IP6_INC_STATS_BH(IPSTATS_MIB_INUNKNOWNPROTOS);
- icmpv6_param_prob(skb, ICMPV6_UNK_NEXTHDR,
nhoff);
+ icmpv6_send(skb, ICMPV6_PARAMPROB,
+ ICMPV6_UNK_NEXTHDR, nhoff,
+ skb->dev);
}
- } else {
+ } else
IP6_INC_STATS_BH(IPSTATS_MIB_INDELIVERS);
- kfree_skb(skb);
- }
+ kfree_skb(skb);
}
rcu_read_unlock();
return 0;