<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv6/netfilter, branch v3.3.2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/ipv6/netfilter?h=v3.3.2</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/ipv6/netfilter?h=v3.3.2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-01-15T02:36:33Z</updated>
<entry>
<title>Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-security</title>
<updated>2012-01-15T02:36:33Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2012-01-15T02:36:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c49c41a4134679cecb77362e7f6b59acb6320aa7'/>
<id>urn:sha1:c49c41a4134679cecb77362e7f6b59acb6320aa7</id>
<content type='text'>
* 'for-linus' of git://selinuxproject.org/~jmorris/linux-security:
  capabilities: remove __cap_full_set definition
  security: remove the security_netlink_recv hook as it is equivalent to capable()
  ptrace: do not audit capability check when outputing /proc/pid/stat
  capabilities: remove task_ns_* functions
  capabitlies: ns_capable can use the cap helpers rather than lsm call
  capabilities: style only - move capable below ns_capable
  capabilites: introduce new has_ns_capabilities_noaudit
  capabilities: call has_ns_capability from has_capability
  capabilities: remove all _real_ interfaces
  capabilities: introduce security_capable_noaudit
  capabilities: reverse arguments to security_capable
  capabilities: remove the task from capable LSM hook entirely
  selinux: sparse fix: fix several warnings in the security server cod
  selinux: sparse fix: fix warnings in netlink code
  selinux: sparse fix: eliminate warnings for selinuxfs
  selinux: sparse fix: declare selinux_disable() in security.h
  selinux: sparse fix: move selinux_complete_init
  selinux: sparse fix: make selinux_secmark_refcount static
  SELinux: Fix RCU deref check warning in sel_netport_insert()

Manually fix up a semantic mis-merge wrt security_netlink_recv():

 - the interface was removed in commit fd7784615248 ("security: remove
   the security_netlink_recv hook as it is equivalent to capable()")

 - a new user of it appeared in commit a38f7907b926 ("crypto: Add
   userspace configuration API")

causing no automatic merge conflict, but Eric Paris pointed out the
issue.
</content>
</entry>
<entry>
<title>security: remove the security_netlink_recv hook as it is equivalent to capable()</title>
<updated>2012-01-05T23:53:01Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2012-01-03T17:25:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fd778461524849afd035679030ae8e8873c72b81'/>
<id>urn:sha1:fd778461524849afd035679030ae8e8873c72b81</id>
<content type='text'>
Once upon a time netlink was not sync and we had to get the effective
capabilities from the skb that was being received.  Today we instead get
the capabilities from the current task.  This has rendered the entire
purpose of the hook moot as it is now functionally equivalent to the
capable() call.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
</content>
</entry>
<entry>
<title>Merge branch 'nf-next' of git://1984.lsi.us.es/net-next</title>
<updated>2011-12-25T07:21:45Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-12-25T07:21:45Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c5e1fd8ccae09f574d6f978c90c2b968ee29030c'/>
<id>urn:sha1:c5e1fd8ccae09f574d6f978c90c2b968ee29030c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>module_param: make bool parameters really bool (net &amp; drivers/net)</title>
<updated>2011-12-20T03:27:29Z</updated>
<author>
<name>Rusty Russell</name>
<email>rusty@rustcorp.com.au</email>
</author>
<published>2011-12-19T14:08:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=eb93992207dadb946a3b5cf4544957dc924a6f58'/>
<id>urn:sha1:eb93992207dadb946a3b5cf4544957dc924a6f58</id>
<content type='text'>
module_param(bool) used to counter-intuitively take an int.  In
fddd5201 (mid-2009) we allowed bool or int/unsigned int using a messy
trick.

It's time to remove the int/unsigned int option.  For this version
it'll simply give a warning, but it'll break next kernel version.

(Thanks to Joe Perches for suggesting coccinelle for 0/1 -&gt; true/false).

Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Cc: netdev@vger.kernel.org
Signed-off-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: add ipv6 reverse path filter match</title>
<updated>2011-12-13T10:34:43Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2011-08-19T11:52:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e26f9a480fb6c1b614660e824d69a74e2ce990f3'/>
<id>urn:sha1:e26f9a480fb6c1b614660e824d69a74e2ce990f3</id>
<content type='text'>
This is not merged with the ipv4 match into xt_rpfilter.c
to avoid ipv6 module dependency issues.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Acked-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>ipv6: Add fragment reporting to ipv6_skip_exthdr().</title>
<updated>2011-12-03T17:35:10Z</updated>
<author>
<name>Jesse Gross</name>
<email>jesse@nicira.com</email>
</author>
<published>2011-12-01T01:05:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=75f2811c6460ccc59d83c66059943ce9c9f81a18'/>
<id>urn:sha1:75f2811c6460ccc59d83c66059943ce9c9f81a18</id>
<content type='text'>
While parsing through IPv6 extension headers, fragment headers are
skipped making them invisible to the caller.  This reports the
fragment offset of the last header in order to make it possible to
determine whether the packet is fragmented and, if so whether it is
a first or last fragment.

Signed-off-by: Jesse Gross &lt;jesse@nicira.com&gt;
</content>
</entry>
<entry>
<title>net: dont call jump_label_dec from irq context</title>
<updated>2011-11-29T05:26:25Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2011-11-28T11:16:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b90e5794c5bdef91d26c623e992257947c506e35'/>
<id>urn:sha1:b90e5794c5bdef91d26c623e992257947c506e35</id>
<content type='text'>
Igor Maravic reported an error caused by jump_label_dec() being called
from IRQ context :

 BUG: sleeping function called from invalid context at kernel/mutex.c:271
 in_atomic(): 1, irqs_disabled(): 0, pid: 0, name: swapper
 1 lock held by swapper/0:
  #0:  (&amp;n-&gt;timer){+.-...}, at: [&lt;ffffffff8107ce90&gt;] call_timer_fn+0x0/0x340
 Pid: 0, comm: swapper Not tainted 3.2.0-rc2-net-next-mpls+ #1
Call Trace:
 &lt;IRQ&gt;  [&lt;ffffffff8104f417&gt;] __might_sleep+0x137/0x1f0
 [&lt;ffffffff816b9a2f&gt;] mutex_lock_nested+0x2f/0x370
 [&lt;ffffffff810a89fd&gt;] ? trace_hardirqs_off+0xd/0x10
 [&lt;ffffffff8109a37f&gt;] ? local_clock+0x6f/0x80
 [&lt;ffffffff810a90a5&gt;] ? lock_release_holdtime.part.22+0x15/0x1a0
 [&lt;ffffffff81557929&gt;] ? sock_def_write_space+0x59/0x160
 [&lt;ffffffff815e936e&gt;] ? arp_error_report+0x3e/0x90
 [&lt;ffffffff810969cd&gt;] atomic_dec_and_mutex_lock+0x5d/0x80
 [&lt;ffffffff8112fc1d&gt;] jump_label_dec+0x1d/0x50
 [&lt;ffffffff81566525&gt;] net_disable_timestamp+0x15/0x20
 [&lt;ffffffff81557a75&gt;] sock_disable_timestamp+0x45/0x50
 [&lt;ffffffff81557b00&gt;] __sk_free+0x80/0x200
 [&lt;ffffffff815578d0&gt;] ? sk_send_sigurg+0x70/0x70
 [&lt;ffffffff815e936e&gt;] ? arp_error_report+0x3e/0x90
 [&lt;ffffffff81557cba&gt;] sock_wfree+0x3a/0x70
 [&lt;ffffffff8155c2b0&gt;] skb_release_head_state+0x70/0x120
 [&lt;ffffffff8155c0b6&gt;] __kfree_skb+0x16/0x30
 [&lt;ffffffff8155c119&gt;] kfree_skb+0x49/0x170
 [&lt;ffffffff815e936e&gt;] arp_error_report+0x3e/0x90
 [&lt;ffffffff81575bd9&gt;] neigh_invalidate+0x89/0xc0
 [&lt;ffffffff81578dbe&gt;] neigh_timer_handler+0x9e/0x2a0
 [&lt;ffffffff81578d20&gt;] ? neigh_update+0x640/0x640
 [&lt;ffffffff81073558&gt;] __do_softirq+0xc8/0x3a0

Since jump_label_{inc|dec} must be called from process context only,
we must defer jump_label_dec() if net_disable_timestamp() is called
from interrupt context.

Reported-by: Igor Maravic &lt;igorm@etf.rs&gt;
Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2011-11-26T19:47:03Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-11-26T19:47:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6dec4ac4ee1ad894dc0e9647cd3e180f93fc353c'/>
<id>urn:sha1:6dec4ac4ee1ad894dc0e9647cd3e180f93fc353c</id>
<content type='text'>
Conflicts:
	net/ipv4/inet_diag.c
</content>
</entry>
<entry>
<title>netfilter: Remove NOTRACK/RAW dependency on NETFILTER_ADVANCED.</title>
<updated>2011-11-23T21:07:00Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-11-23T21:07:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=46a246c4dff9f248913e791b69f2336cd8d4ec41'/>
<id>urn:sha1:46a246c4dff9f248913e791b69f2336cd8d4ec41</id>
<content type='text'>
Distributions are using this in their default scripts, so don't hide
them behind the advanced setting.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>net: remove ipv6_addr_copy()</title>
<updated>2011-11-22T21:43:32Z</updated>
<author>
<name>Alexey Dobriyan</name>
<email>adobriyan@gmail.com</email>
</author>
<published>2011-11-21T03:39:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4e3fd7a06dc20b2d8ec6892233ad2012968fe7b6'/>
<id>urn:sha1:4e3fd7a06dc20b2d8ec6892233ad2012968fe7b6</id>
<content type='text'>
C assignment can handle struct in6_addr copying.

Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
