<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/include/net, branch v3.4.3</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/include/net?h=v3.4.3</id>
<link rel='self' href='https://git.amat.us/linux/atom/include/net?h=v3.4.3'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-06-09T15:36:15Z</updated>
<entry>
<title>ipv6: fix incorrect ipsec fragment</title>
<updated>2012-06-09T15:36:15Z</updated>
<author>
<name>Gao feng</name>
<email>gaofeng@cn.fujitsu.com</email>
</author>
<published>2012-05-26T01:30:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=be078c8003469b75aa9119254c163b2961321744'/>
<id>urn:sha1:be078c8003469b75aa9119254c163b2961321744</id>
<content type='text'>
[ Upstream commit 0c1833797a5a6ec23ea9261d979aa18078720b74 ]

Since commit ad0081e43a
"ipv6: Fragment locally generated tunnel-mode IPSec6 packets as needed"
the fragment of packets is incorrect.
because tunnel mode needs IPsec headers and trailer for all fragments,
while on transport mode it is sufficient to add the headers to the
first fragment and the trailer to the last.

so modify mtu and maxfraglen base on ipsec mode and if fragment is first
or last.

with my test,it work well(every fragment's size is the mtu)
and does not trigger slow fragment path.

Changes from v1:
	though optimization, mtu_prev and maxfraglen_prev can be delete.
	replace xfrm mode codes with dst_entry's new frag DST_XFRM_TUNNEL.
	add fuction ip6_append_data_mtu to make codes clearer.

Signed-off-by: Gao feng &lt;gaofeng@cn.fujitsu.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem</title>
<updated>2012-05-15T20:38:00Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2012-05-15T20:38:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=60374631487a6dbf6b888729022f0e8d76eec8fb'/>
<id>urn:sha1:60374631487a6dbf6b888729022f0e8d76eec8fb</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Bluetooth: notify userspace of security level change</title>
<updated>2012-05-14T17:51:25Z</updated>
<author>
<name>Gustavo Padovan</name>
<email>gustavo@padovan.org</email>
</author>
<published>2012-05-13T06:20:07Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a7d7723ae7c0178d715c06c5621e8fd8014ba92f'/>
<id>urn:sha1:a7d7723ae7c0178d715c06c5621e8fd8014ba92f</id>
<content type='text'>
It fixes L2CAP socket based security level elevation during a
connection. The HID profile needs this (for keyboards) and it is the only
way to achieve the security level elevation when using the management
interface to talk to the kernel (hence the management enabling patch
being the one that exposes this issue).

It enables the userspace a security level change when the socket is
already connected and create a way to notify the socket the result of the
request. At the moment of the request the socket is made non writable, if
the request fails the connections closes, otherwise the socket is made
writable again, POLL_OUT is emmited.

Signed-off-by: Gustavo Padovan &lt;gustavo@padovan.org&gt;
Acked-by: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Johan Hedberg &lt;johan.hedberg@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>sctp: check cached dst before using it</title>
<updated>2012-05-11T03:15:47Z</updated>
<author>
<name>Nicolas Dichtel</name>
<email>nicolas.dichtel@6wind.com</email>
</author>
<published>2012-05-04T05:24:54Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e0268868ba064980488fc8c194db3d8e9fb2959c'/>
<id>urn:sha1:e0268868ba064980488fc8c194db3d8e9fb2959c</id>
<content type='text'>
dst_check() will take care of SA (and obsolete field), hence
IPsec rekeying scenario is taken into account.

Signed-off-by: Nicolas Dichtel &lt;nicolas.dichtel@6wind.com&gt;
Acked-by: Vlad Yaseivch &lt;vyasevich@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless into for-davem</title>
<updated>2012-05-01T18:14:05Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2012-05-01T18:14:05Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=076e7779c07c56c7fa593a28c71ea7432d0c7c95'/>
<id>urn:sha1:076e7779c07c56c7fa593a28c71ea7432d0c7c95</id>
<content type='text'>
</content>
</entry>
<entry>
<title>net: fix sk_sockets_allocated_read_positive</title>
<updated>2012-04-30T17:37:59Z</updated>
<author>
<name>Eric Dumazet</name>
<email>edumazet@google.com</email>
</author>
<published>2012-04-28T23:21:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=518fbf9cdf17875d808596afd77fc115a6f942ca'/>
<id>urn:sha1:518fbf9cdf17875d808596afd77fc115a6f942ca</id>
<content type='text'>
Denys Fedoryshchenko reported frequent crashes on a proxy server and kindly
provided a lockdep report that explains it all :

  [  762.903868]
  [  762.903880] =================================
  [  762.903890] [ INFO: inconsistent lock state ]
  [  762.903903] 3.3.4-build-0061 #8 Not tainted
  [  762.904133] ---------------------------------
  [  762.904344] inconsistent {IN-SOFTIRQ-W} -&gt; {SOFTIRQ-ON-W} usage.
  [  762.904542] squid/1603 [HC0[0]:SC0[0]:HE1:SE1] takes:
  [  762.904542]  (key#3){+.?...}, at: [&lt;c0232cc4&gt;]
__percpu_counter_sum+0xd/0x58
  [  762.904542] {IN-SOFTIRQ-W} state was registered at:
  [  762.904542]   [&lt;c0158b84&gt;] __lock_acquire+0x284/0xc26
  [  762.904542]   [&lt;c01598e8&gt;] lock_acquire+0x71/0x85
  [  762.904542]   [&lt;c0349765&gt;] _raw_spin_lock+0x33/0x40
  [  762.904542]   [&lt;c0232c93&gt;] __percpu_counter_add+0x58/0x7c
  [  762.904542]   [&lt;c02cfde1&gt;] sk_clone_lock+0x1e5/0x200
  [  762.904542]   [&lt;c0303ee4&gt;] inet_csk_clone_lock+0xe/0x78
  [  762.904542]   [&lt;c0315778&gt;] tcp_create_openreq_child+0x1b/0x404
  [  762.904542]   [&lt;c031339c&gt;] tcp_v4_syn_recv_sock+0x32/0x1c1
  [  762.904542]   [&lt;c031615a&gt;] tcp_check_req+0x1fd/0x2d7
  [  762.904542]   [&lt;c0313f77&gt;] tcp_v4_do_rcv+0xab/0x194
  [  762.904542]   [&lt;c03153bb&gt;] tcp_v4_rcv+0x3b3/0x5cc
  [  762.904542]   [&lt;c02fc0c4&gt;] ip_local_deliver_finish+0x13a/0x1e9
  [  762.904542]   [&lt;c02fc539&gt;] NF_HOOK.clone.11+0x46/0x4d
  [  762.904542]   [&lt;c02fc652&gt;] ip_local_deliver+0x41/0x45
  [  762.904542]   [&lt;c02fc4d1&gt;] ip_rcv_finish+0x31a/0x33c
  [  762.904542]   [&lt;c02fc539&gt;] NF_HOOK.clone.11+0x46/0x4d
  [  762.904542]   [&lt;c02fc857&gt;] ip_rcv+0x201/0x23e
  [  762.904542]   [&lt;c02daa3a&gt;] __netif_receive_skb+0x319/0x368
  [  762.904542]   [&lt;c02dac07&gt;] netif_receive_skb+0x4e/0x7d
  [  762.904542]   [&lt;c02dacf6&gt;] napi_skb_finish+0x1e/0x34
  [  762.904542]   [&lt;c02db122&gt;] napi_gro_receive+0x20/0x24
  [  762.904542]   [&lt;f85d1743&gt;] e1000_receive_skb+0x3f/0x45 [e1000e]
  [  762.904542]   [&lt;f85d3464&gt;] e1000_clean_rx_irq+0x1f9/0x284 [e1000e]
  [  762.904542]   [&lt;f85d3926&gt;] e1000_clean+0x62/0x1f4 [e1000e]
  [  762.904542]   [&lt;c02db228&gt;] net_rx_action+0x90/0x160
  [  762.904542]   [&lt;c012a445&gt;] __do_softirq+0x7b/0x118
  [  762.904542] irq event stamp: 156915469
  [  762.904542] hardirqs last  enabled at (156915469): [&lt;c019b4f4&gt;]
__slab_alloc.clone.58.clone.63+0xc4/0x2de
  [  762.904542] hardirqs last disabled at (156915468): [&lt;c019b452&gt;]
__slab_alloc.clone.58.clone.63+0x22/0x2de
  [  762.904542] softirqs last  enabled at (156915466): [&lt;c02ce677&gt;]
lock_sock_nested+0x64/0x6c
  [  762.904542] softirqs last disabled at (156915464): [&lt;c0349914&gt;]
_raw_spin_lock_bh+0xe/0x45
  [  762.904542]
  [  762.904542] other info that might help us debug this:
  [  762.904542]  Possible unsafe locking scenario:
  [  762.904542]
  [  762.904542]        CPU0
  [  762.904542]        ----
  [  762.904542]   lock(key#3);
  [  762.904542]   &lt;Interrupt&gt;
  [  762.904542]     lock(key#3);
  [  762.904542]
  [  762.904542]  *** DEADLOCK ***
  [  762.904542]
  [  762.904542] 1 lock held by squid/1603:
  [  762.904542]  #0:  (sk_lock-AF_INET){+.+.+.}, at: [&lt;c03055c0&gt;]
lock_sock+0xa/0xc
  [  762.904542]
  [  762.904542] stack backtrace:
  [  762.904542] Pid: 1603, comm: squid Not tainted 3.3.4-build-0061 #8
  [  762.904542] Call Trace:
  [  762.904542]  [&lt;c0347b73&gt;] ? printk+0x18/0x1d
  [  762.904542]  [&lt;c015873a&gt;] valid_state+0x1f6/0x201
  [  762.904542]  [&lt;c0158816&gt;] mark_lock+0xd1/0x1bb
  [  762.904542]  [&lt;c015876b&gt;] ? mark_lock+0x26/0x1bb
  [  762.904542]  [&lt;c015805d&gt;] ? check_usage_forwards+0x77/0x77
  [  762.904542]  [&lt;c0158bf8&gt;] __lock_acquire+0x2f8/0xc26
  [  762.904542]  [&lt;c0159b8e&gt;] ? mark_held_locks+0x5d/0x7b
  [  762.904542]  [&lt;c0159cf6&gt;] ? trace_hardirqs_on+0xb/0xd
  [  762.904542]  [&lt;c0158dd4&gt;] ? __lock_acquire+0x4d4/0xc26
  [  762.904542]  [&lt;c01598e8&gt;] lock_acquire+0x71/0x85
  [  762.904542]  [&lt;c0232cc4&gt;] ? __percpu_counter_sum+0xd/0x58
  [  762.904542]  [&lt;c0349765&gt;] _raw_spin_lock+0x33/0x40
  [  762.904542]  [&lt;c0232cc4&gt;] ? __percpu_counter_sum+0xd/0x58
  [  762.904542]  [&lt;c0232cc4&gt;] __percpu_counter_sum+0xd/0x58
  [  762.904542]  [&lt;c02cebc4&gt;] __sk_mem_schedule+0xdd/0x1c7
  [  762.904542]  [&lt;c02d178d&gt;] ? __alloc_skb+0x76/0x100
  [  762.904542]  [&lt;c0305e8e&gt;] sk_wmem_schedule+0x21/0x2d
  [  762.904542]  [&lt;c0306370&gt;] sk_stream_alloc_skb+0x42/0xaa
  [  762.904542]  [&lt;c0306567&gt;] tcp_sendmsg+0x18f/0x68b
  [  762.904542]  [&lt;c031f3dc&gt;] ? ip_fast_csum+0x30/0x30
  [  762.904542]  [&lt;c0320193&gt;] inet_sendmsg+0x53/0x5a
  [  762.904542]  [&lt;c02cb633&gt;] sock_aio_write+0xd2/0xda
  [  762.904542]  [&lt;c015876b&gt;] ? mark_lock+0x26/0x1bb
  [  762.904542]  [&lt;c01a1017&gt;] do_sync_write+0x9f/0xd9
  [  762.904542]  [&lt;c01a2111&gt;] ? file_free_rcu+0x2f/0x2f
  [  762.904542]  [&lt;c01a17a1&gt;] vfs_write+0x8f/0xab
  [  762.904542]  [&lt;c01a284d&gt;] ? fget_light+0x75/0x7c
  [  762.904542]  [&lt;c01a1900&gt;] sys_write+0x3d/0x5e
  [  762.904542]  [&lt;c0349ec9&gt;] syscall_call+0x7/0xb
  [  762.904542]  [&lt;c0340000&gt;] ? rp_sidt+0x41/0x83

Bug is that sk_sockets_allocated_read_positive() calls
percpu_counter_sum_positive() without BH being disabled.

This bug was added in commit 180d8cd942ce33
(foundations of per-cgroup memory pressure controlling.), since previous
code was using percpu_counter_read_positive() which is IRQ safe.

In __sk_mem_schedule() we dont need the precise count of allocated
sockets and can revert to previous behavior.

Reported-by: Denys Fedoryshchenko &lt;denys@visp.net.lb&gt;
Sined-off-by: Eric Dumazet &lt;edumazet@google.com&gt;
Cc: Glauber Costa &lt;glommer@parallels.com&gt;
Acked-by: Neal Cardwell &lt;ncardwell@google.com&gt;

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://1984.lsi.us.es/net</title>
<updated>2012-04-30T17:23:22Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2012-04-30T17:23:22Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5414fc12e32a0e0833ec61ba8be864c46cd19966'/>
<id>urn:sha1:5414fc12e32a0e0833ec61ba8be864c46cd19966</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ipvs: kernel oops - do_ip_vs_get_ctl</title>
<updated>2012-04-30T08:40:35Z</updated>
<author>
<name>Hans Schillstrom</name>
<email>hans.schillstrom@ericsson.com</email>
</author>
<published>2012-04-26T05:47:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8537de8a7ab6681cc72fb0411ab1ba7fdba62dd0'/>
<id>urn:sha1:8537de8a7ab6681cc72fb0411ab1ba7fdba62dd0</id>
<content type='text'>
Change order of init so netns init is ready
when register ioctl and netlink.

Ver2
	Whitespace fixes and __init added.

Reported-by: "Ryan O'Hara" &lt;rohara@redhat.com&gt;
Signed-off-by: Hans Schillstrom &lt;hans.schillstrom@ericsson.com&gt;
Acked-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: Jesper Dangaard Brouer &lt;brouer@redhat.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>ipvs: take care of return value from protocol init_netns</title>
<updated>2012-04-30T08:40:35Z</updated>
<author>
<name>Hans Schillstrom</name>
<email>hans.schillstrom@ericsson.com</email>
</author>
<published>2012-04-26T07:45:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=582b8e3eadaec77788c1aa188081a8d5059c42a6'/>
<id>urn:sha1:582b8e3eadaec77788c1aa188081a8d5059c42a6</id>
<content type='text'>
ip_vs_create_timeout_table() can return NULL
All functions protocol init_netns is affected of this patch.

Signed-off-by: Hans Schillstrom &lt;hans.schillstrom@ericsson.com&gt;
Acked-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>Merge branch 'for-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth</title>
<updated>2012-04-27T19:16:43Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2012-04-27T19:16:43Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4dcc0637fc3c36c1f58ffdcaf2dc0dc7de72449f'/>
<id>urn:sha1:4dcc0637fc3c36c1f58ffdcaf2dc0dc7de72449f</id>
<content type='text'>
</content>
</entry>
</feed>
