<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.20.20</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net?h=v2.6.20.20</id>
<link rel='self' href='https://git.amat.us/linux/atom/net?h=v2.6.20.20'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2007-09-08T19:21:38Z</updated>
<entry>
<title>[IPV6]: Do no rely on skb-&gt;dst before it is assigned.</title>
<updated>2007-09-08T19:21:38Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2007-05-09T21:01:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c7110d58361373f38fc8082da64359ea70bd9ee5'/>
<id>urn:sha1:c7110d58361373f38fc8082da64359ea70bd9ee5</id>
<content type='text'>
Because skb-&gt;dst is assigned in ip6_route_input(), it is really
bad to use it in hop-by-hop option handler(s).

Closes: Bug #8450 (Eric Sesterhenn &lt;snakebyte@gmx.de&gt;)
Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix incorrect config #ifdef around skb_copy_secmark</title>
<updated>2007-08-28T10:14:55Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2007-06-24T05:58:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6b61a2d91e1785711e32fd0ef0d4d97ccb56f939'/>
<id>urn:sha1:6b61a2d91e1785711e32fd0ef0d4d97ccb56f939</id>
<content type='text'>
secmark doesn't depend on CONFIG_NET_SCHED.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] Revert "Keep rfcomm_dev on the list until it is freed"</title>
<updated>2007-08-28T10:14:54Z</updated>
<author>
<name>Willy Tarreau</name>
<email>w@1wt.eu</email>
</author>
<published>2007-08-28T05:02:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1bb9509b816c7a60362a26d1ca40f0187bca5681'/>
<id>urn:sha1:1bb9509b816c7a60362a26d1ca40f0187bca5681</id>
<content type='text'>
Randy Dunlap and Boris B. Zhmurov reported build failure of
rfcomm/tty.c since 2.6.20.17. Marcel Holtmann confirmed that
the following patch was inappropriate for this kernel. Remove
it.

This reverts commit 8c25e9c9cd1fed0d5f57075b584c39a4b9af9830.

Cc: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] softmac: Fix deadlock of wx_set_essid with assoc work</title>
<updated>2007-08-25T15:24:18Z</updated>
<author>
<name>Michael Buesch</name>
<email>mb@bu3sch.de</email>
</author>
<published>2007-08-07T10:20:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=bcc5aca038af561a3ca5b86ce25413d5dfa3244c'/>
<id>urn:sha1:bcc5aca038af561a3ca5b86ce25413d5dfa3244c</id>
<content type='text'>
The essid wireless extension does deadlock against the assoc mutex,
as we don't unlock the assoc mutex when flushing the workqueue, which
also holds the lock.

Signed-off-by: Michael Buesch &lt;mb@bu3sch.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] IPV6: /proc/net/anycast6 unbalanced inet6_dev refcnt</title>
<updated>2007-08-25T15:24:17Z</updated>
<author>
<name>David Stevens</name>
<email>dlstevens@us.ibm.com</email>
</author>
<published>2007-02-27T00:28:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ac82581f098be0d3f6ef011d2b168181f4f79a0e'/>
<id>urn:sha1:ac82581f098be0d3f6ef011d2b168181f4f79a0e</id>
<content type='text'>
Reading /proc/net/anycast6 when there is no anycast address
on an interface results in an ever-increasing inet6_dev reference
count, as well as a reference to the netdevice you can't get rid of.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Cc: Marcus Meissner &lt;meissner@suse.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keep rfcomm_dev on the list until it is freed</title>
<updated>2007-08-25T15:24:16Z</updated>
<author>
<name>Ville Tervo</name>
<email>ville.tervo@nokia.com</email>
</author>
<published>2007-07-11T07:23:41Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8c25e9c9cd1fed0d5f57075b584c39a4b9af9830'/>
<id>urn:sha1:8c25e9c9cd1fed0d5f57075b584c39a4b9af9830</id>
<content type='text'>
This patch changes the RFCOMM TTY release process so that the TTY is kept
on the list until it is really freed. A new device flag is used to keep
track of released TTYs.

Signed-off-by: Ville Tervo &lt;ville.tervo@nokia.com&gt;
Signed-off-by: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] Hangup TTY before releasing rfcomm_dev</title>
<updated>2007-08-25T15:24:16Z</updated>
<author>
<name>Mikko Rapeli</name>
<email>mikko.rapeli@iki.fi</email>
</author>
<published>2007-07-11T07:18:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b37a2fc49a6b4b0dd4fdc0434f7d7b65a3f9aa3c'/>
<id>urn:sha1:b37a2fc49a6b4b0dd4fdc0434f7d7b65a3f9aa3c</id>
<content type='text'>
The core problem is that RFCOMM socket layer ioctl can release
rfcomm_dev struct while RFCOMM TTY layer is still actively using
it. Calling tty_vhangup() is needed for a synchronous hangup before
rfcomm_dev is freed.

Addresses the oops at http://bugzilla.kernel.org/show_bug.cgi?id=7509

Acked-by: Alan Cox &lt;alan@lxorguk.ukuu.org.uk&gt;
Signed-off-by: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] nfsd: fix possible oops on re-insertion of rpcsec_gss modules</title>
<updated>2007-08-25T15:24:14Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@citi.umich.edu</email>
</author>
<published>2007-07-24T01:43:52Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f83801d9974cda3172c4ca9c72ca39940df30f47'/>
<id>urn:sha1:f83801d9974cda3172c4ca9c72ca39940df30f47</id>
<content type='text'>
The handling of the re-registration case is wrong here; the "test" that was
returned from auth_domain_lookup will not be used again, so that reference
should be put.  And auth_domain_lookup never did anything with "new" in
this case, so we should just clean it up ourself.

Thanks to Akinobu Mita for bug report, analysis, and testing.

Cc: Akinobu Mita &lt;akinobu.mita@gmail.com&gt;
Signed-off-by: "J. Bruce Fields" &lt;bfields@citi.umich.edu&gt;
Cc: Neil Brown &lt;neilb@suse.de&gt;
Cc: Trond Myklebust &lt;trond.myklebust@fys.uio.no&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] softmac: Fix ESSID problem</title>
<updated>2007-08-25T15:24:09Z</updated>
<author>
<name>Jean Tourrilhes</name>
<email>jt@hpl.hp.com</email>
</author>
<published>2007-07-17T15:46:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=50dd9072c45f64348e10ae61df948fef43430a0e'/>
<id>urn:sha1:50dd9072c45f64348e10ae61df948fef43430a0e</id>
<content type='text'>
Victor Porton reported that the SoftMAC layer had random problem when setting the ESSID :
http://bugzilla.kernel.org/show_bug.cgi?id=8686 After investigation, it turned out to be
worse, the SoftMAC layer is left in an inconsistent state. The fix is pretty trivial.

Signed-off-by: Jean Tourrilhes &lt;jt@hpl.hp.com&gt;
Acked-by: Michael Buesch &lt;mb@bu3sch.de&gt;
Acked-by: Larry Finger &lt;Larry.Finger@lwfinger.net&gt;
Acked-by: John W. Linville &lt;linville@tuxdriver.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix TCP IPV6 MD5 bug.</title>
<updated>2007-08-25T15:24:01Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2007-07-25T04:47:05Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c3338ef326869755751ae61897c5b475439f557d'/>
<id>urn:sha1:c3338ef326869755751ae61897c5b475439f557d</id>
<content type='text'>
[TCPv6] MD5SIG: Ensure to reset allocation count to avoid panic.

After clearing all passwords for IPv6 peers, we need to
set allocation count to zero as well as we free the storage.
Otherwise, we panic when a user trys to (re)add a password.

Discovered and fixed by MIYAJIMA Mitsuharu &lt;miyajima.mitsuharu@anchor.jp&gt;.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Willy Tarreau &lt;w@1wt.eu&gt;
</content>
</entry>
</feed>
