+++ /dev/null
-From 0548cb9cbc64d221fb3851f7c8a0ccb8bc095acb Mon Sep 17 00:00:00 2001
-From: dingtianhong <dingtianhong@huawei.com>
-Date: Mon, 25 Mar 2013 17:02:04 +0000
-Subject: af_unix: dont send SCM_CREDENTIAL when dest socket is NULL
-
-
-From: dingtianhong <dingtianhong@huawei.com>
-
-[ Upstream commit 14134f6584212d585b310ce95428014b653dfaf6 ]
-
-SCM_SCREDENTIALS should apply to write() syscalls only either source or destination
-socket asserted SOCK_PASSCRED. The original implememtation in maybe_add_creds is wrong,
-and breaks several LSB testcases ( i.e. /tset/LSB.os/netowkr/recvfrom/T.recvfrom).
-
-Origionally-authored-by: Karel Srot <ksrot@redhat.com>
-Signed-off-by: Ding Tianhong <dingtianhong@huawei.com>
-Acked-by: Eric Dumazet <edumazet@google.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- net/unix/af_unix.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
---- a/net/unix/af_unix.c
-+++ b/net/unix/af_unix.c
-@@ -1414,8 +1414,8 @@ static void maybe_add_creds(struct sk_bu
- if (UNIXCB(skb).cred)
- return;
- if (test_bit(SOCK_PASSCRED, &sock->flags) ||
-- !other->sk_socket ||
-- test_bit(SOCK_PASSCRED, &other->sk_socket->flags)) {
-+ (other->sk_socket &&
-+ test_bit(SOCK_PASSCRED, &other->sk_socket->flags))) {
- UNIXCB(skb).pid = get_pid(task_tgid(current));
- UNIXCB(skb).cred = get_current_cred();
- }
8021q-fix-a-potential-use-after-free.patch
thermal-shorten-too-long-mcast-group-name.patch
unix-fix-a-race-condition-in-unix_release.patch
-af_unix-dont-send-scm_credential-when-dest-socket-is-null.patch
bonding-remove-already-created-master-sysfs-link-on-failure.patch
bonding-fix-miimon-and-arp_interval-delayed-work-race-conditions.patch
bonding-fix-disabling-of-arp_interval-and-miimon.patch
+++ /dev/null
-From a54e981e407135779bf1d9121c515f7715c4d520 Mon Sep 17 00:00:00 2001
-From: dingtianhong <dingtianhong@huawei.com>
-Date: Mon, 25 Mar 2013 17:02:04 +0000
-Subject: af_unix: dont send SCM_CREDENTIAL when dest socket is NULL
-
-
-From: dingtianhong <dingtianhong@huawei.com>
-
-[ Upstream commit 14134f6584212d585b310ce95428014b653dfaf6 ]
-
-SCM_SCREDENTIALS should apply to write() syscalls only either source or destination
-socket asserted SOCK_PASSCRED. The original implememtation in maybe_add_creds is wrong,
-and breaks several LSB testcases ( i.e. /tset/LSB.os/netowkr/recvfrom/T.recvfrom).
-
-Origionally-authored-by: Karel Srot <ksrot@redhat.com>
-Signed-off-by: Ding Tianhong <dingtianhong@huawei.com>
-Acked-by: Eric Dumazet <edumazet@google.com>
-Signed-off-by: David S. Miller <davem@davemloft.net>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- net/unix/af_unix.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
---- a/net/unix/af_unix.c
-+++ b/net/unix/af_unix.c
-@@ -1414,8 +1414,8 @@ static void maybe_add_creds(struct sk_bu
- if (UNIXCB(skb).cred)
- return;
- if (test_bit(SOCK_PASSCRED, &sock->flags) ||
-- !other->sk_socket ||
-- test_bit(SOCK_PASSCRED, &other->sk_socket->flags)) {
-+ (other->sk_socket &&
-+ test_bit(SOCK_PASSCRED, &other->sk_socket->flags))) {
- UNIXCB(skb).pid = get_pid(task_tgid(current));
- UNIXCB(skb).cred = get_current_cred();
- }
8021q-fix-a-potential-use-after-free.patch
thermal-shorten-too-long-mcast-group-name.patch
unix-fix-a-race-condition-in-unix_release.patch
-af_unix-dont-send-scm_credential-when-dest-socket-is-null.patch
bonding-remove-already-created-master-sysfs-link-on-failure.patch
bonding-fix-disabling-of-arp_interval-and-miimon.patch
drivers-net-ethernet-davinci_emac-use-netif_wake_queue-while-restarting-tx-queue.patch