netfilter: ipset: timeout values corrupted on set resize
authorJosh Hunt <johunt@akamai.com>
Tue, 19 Feb 2013 19:35:59 +0000 (11:35 -0800)
committerJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Thu, 21 Feb 2013 16:34:47 +0000 (17:34 +0100)
commitcf1c4a094f46ace5bf00078e2db73491ddf018fe
tree9dd485659090dfbe799b2c49264b7122bc5ef712
parente29371d762df5bb35d2bc434ea266a046e5a0a75
netfilter: ipset: timeout values corrupted on set resize

If a resize is triggered on a set with timeouts enabled, the timeout
values will get corrupted when copying them to the new set. This occured
b/c the wrong timeout value is supplied to type_pf_elem_tadd().

This also adds simple debug statement similar to the one in type_pf_resize().

Signed-off-by: Josh Hunt <johunt@akamai.com>
Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
include/linux/netfilter/ipset/ip_set_ahash.h