<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.38.6</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net?h=v2.6.38.6</id>
<link rel='self' href='https://git.amat.us/linux/atom/net?h=v2.6.38.6'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-05-09T22:06:50Z</updated>
<entry>
<title>can: add missing socket check in can/raw release</title>
<updated>2011-05-09T22:06:50Z</updated>
<author>
<name>Oliver Hartkopp</name>
<email>socketcan@hartkopp.net</email>
</author>
<published>2011-04-20T01:57:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8bd26179f756612921ff54dbf4f9d2bd0afa01cd'/>
<id>urn:sha1:8bd26179f756612921ff54dbf4f9d2bd0afa01cd</id>
<content type='text'>
commit 10022a6c66e199d8f61d9044543f38785713cbbd upstream.

v2: added space after 'if' according code style.

We can get here with a NULL socket argument passed from userspace,
so we need to handle it accordingly.

Thanks to Dave Jones pointing at this issue in net/can/bcm.c

Signed-off-by: Oliver Hartkopp &lt;socketcan@hartkopp.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>can: Add missing socket check in can/bcm release.</title>
<updated>2011-05-09T22:06:48Z</updated>
<author>
<name>Dave Jones</name>
<email>davej@redhat.com</email>
</author>
<published>2011-04-20T03:36:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ba1ba1c0aaa659914bf9d47616453f6378add40f'/>
<id>urn:sha1:ba1ba1c0aaa659914bf9d47616453f6378add40f</id>
<content type='text'>
commit c6914a6f261aca0c9f715f883a353ae7ff51fe83 upstream.

We can get here with a NULL socket argument passed from userspace,
so we need to handle it accordingly.

Signed-off-by: Dave Jones &lt;davej@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>af_unix: Only allow recv on connected seqpacket sockets.</title>
<updated>2011-05-09T22:06:46Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2011-04-24T01:54:57Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7a1bbc3614696ea5e90d728f570f3ded8d49b487'/>
<id>urn:sha1:7a1bbc3614696ea5e90d728f570f3ded8d49b487</id>
<content type='text'>
commit a05d2ad1c1f391c7f514a1d1e09b5417968a7d07 upstream.

This fixes the following oops discovered by Dan Aloni:
&gt; Anyway, the following is the output of the Oops that I got on the
&gt; Ubuntu kernel on which I first detected the problem
&gt; (2.6.37-12-generic). The Oops that followed will be more useful, I
&gt; guess.

&gt;[ 5594.669852] BUG: unable to handle kernel NULL pointer dereference
&gt; at           (null)
&gt; [ 5594.681606] IP: [&lt;ffffffff81550b7b&gt;] unix_dgram_recvmsg+0x1fb/0x420
&gt; [ 5594.687576] PGD 2a05d067 PUD 2b951067 PMD 0
&gt; [ 5594.693720] Oops: 0002 [#1] SMP
&gt; [ 5594.699888] last sysfs file:

The bug was that unix domain sockets use a pseduo packet for
connecting and accept uses that psudo packet to get the socket.
In the buggy seqpacket case we were allowing unconnected
sockets to call recvmsg and try to receive the pseudo packet.

That is always wrong and as of commit 7361c36c5 the pseudo
packet had become enough different from a normal packet
that the kernel started oopsing.

Do for seqpacket_recv what was done for seqpacket_send in 2.5
and only allow it on connected seqpacket sockets.

Tested-by: Dan Aloni &lt;dan@aloni.org&gt;
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>mac80211: fix SMPS debugfs locking</title>
<updated>2011-05-09T22:06:46Z</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2011-04-19T18:44:04Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6ee931e9812bdf3774cbd74571d2fdfba037aac9'/>
<id>urn:sha1:6ee931e9812bdf3774cbd74571d2fdfba037aac9</id>
<content type='text'>
commit 243e6df4ed919880d079d717641ad699c6530a03 upstream.

The locking with SMPS requests means that the
debugs file should lock the mgd mutex, not the
iflist mutex. Calls to __ieee80211_request_smps()
need to hold that mutex, so add an assertion.

This has always been wrong, but for some reason
never been noticed, probably because the locking
error only happens while unassociated.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>ip: ip_options_compile() resilient to NULL skb route</title>
<updated>2011-04-21T21:33:00Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2011-04-14T05:55:37Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=50038a29ee9d62aba6e66109d0b9c235bc0e31e2'/>
<id>urn:sha1:50038a29ee9d62aba6e66109d0b9c235bc0e31e2</id>
<content type='text'>
commit c65353daf137dd41f3ede3baf62d561fca076228 upstream.

Scot Doyle demonstrated ip_options_compile() could be called with an skb
without an attached route, using a setup involving a bridge, netfilter,
and forged IP packets.

Let's make ip_options_compile() and ip_options_rcv_srr() a bit more
robust, instead of changing bridge/netfilter code.

With help from Hiroaki SHIMODA.

Reported-by: Scot Doyle &lt;lkml@scotdoyle.com&gt;
Tested-by: Scot Doyle &lt;lkml@scotdoyle.com&gt;
Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Cc: Stephen Hemminger &lt;shemminger@vyatta.com&gt;
Acked-by: Hiroaki SHIMODA &lt;shimoda.hiroaki@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>bridge: reset IPCB in br_parse_ip_options</title>
<updated>2011-04-21T21:33:00Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2011-04-12T20:39:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6935b2f7905bc973676cec541c1ebbbd3bd5692f'/>
<id>urn:sha1:6935b2f7905bc973676cec541c1ebbbd3bd5692f</id>
<content type='text'>
commit f8e9881c2aef1e982e5abc25c046820cd0b7cf64 upstream.

Commit 462fb2af9788a82 (bridge : Sanitize skb before it enters the IP
stack), missed one IPCB init before calling ip_options_compile()

Thanks to Scot Doyle for his tests and bug reports.

Reported-by: Scot Doyle &lt;lkml@scotdoyle.com&gt;
Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Cc: Hiroaki SHIMODA &lt;shimoda.hiroaki@gmail.com&gt;
Acked-by: Bandan Das &lt;bandan.das@stratus.com&gt;
Acked-by: Stephen Hemminger &lt;shemminger@vyatta.com&gt;
Cc: Jan Lübbe &lt;jluebbe@debian.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>Bluetooth: Fix HCI_RESET command synchronization</title>
<updated>2011-04-21T21:32:59Z</updated>
<author>
<name>Gustavo F. Padovan</name>
<email>padovan@profusion.mobi</email>
</author>
<published>2011-03-16T18:36:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2951119b25479349af6ebf1bfa3111bee3c29896'/>
<id>urn:sha1:2951119b25479349af6ebf1bfa3111bee3c29896</id>
<content type='text'>
commit f630cf0d5434e3923e1b8226ffa2753ead6b0ce5 upstream.

We can't send new commands before a cmd_complete for the HCI_RESET command
shows up.

Reported-by: Mikko Vinni &lt;mmvinni@yahoo.com&gt;
Reported-by: Justin P. Mattock &lt;justinmattock@gmail.com&gt;
Reported-by: Ed Tomlinson &lt;edt@aei.ca&gt;
Signed-off-by: Gustavo F. Padovan &lt;padovan@profusion.mobi&gt;
Tested-by: Justin P. Mattock &lt;justinmattock@gmail.com&gt;
Tested-by: Mikko Vinni &lt;mmvinni@yahoo.com&gt;
Tested-by: Ed Tomlinson &lt;edt@aei.ca&gt;


</content>
</entry>
<entry>
<title>bridge: Reset IPCB when entering IP stack on NF_FORWARD</title>
<updated>2011-04-21T21:32:37Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2011-03-18T05:27:28Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5f1c356a3fadc0c19922d660da723b79bcc9aad7'/>
<id>urn:sha1:5f1c356a3fadc0c19922d660da723b79bcc9aad7</id>
<content type='text'>
[ Upstream commit 6b1e960fdbd75dcd9bcc3ba5ff8898ff1ad30b6e ]

Whenever we enter the IP stack proper from bridge netfilter we
need to ensure that the skb is in a form the IP stack expects
it to be in.

The entry point on NF_FORWARD did not meet the requirements of
the IP stack, therefore leading to potential crashes/panics.

This patch fixes the problem.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: Stephen Hemminger &lt;shemminger@vyatta.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>vlan: should take into account needed_headroom</title>
<updated>2011-04-21T21:32:36Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2011-03-18T00:27:27Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=01b7e60bf848901c3a95794c90888e4e33ab751f'/>
<id>urn:sha1:01b7e60bf848901c3a95794c90888e4e33ab751f</id>
<content type='text'>
[ Upstream commit d870bfb9d366c5d466c0f5419a4ec95a3f71ea8a ]

Commit c95b819ad7 (gre: Use needed_headroom)
made gre use needed_headroom instead of hard_header_len

This uncover a bug in vlan code.

We should make sure vlan devices take into account their
real_dev-&gt;needed_headroom or we risk a crash in ipgre_header(), because
we dont have enough room to push IP header in skb.

Reported-by: Diddi Oscarsson &lt;diddi@diddi.se&gt;
Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Cc: Patrick McHardy &lt;kaber@trash.net&gt;
Cc: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>xfrm: Refcount destination entry on xfrm_lookup</title>
<updated>2011-04-21T21:32:34Z</updated>
<author>
<name>Steffen Klassert</name>
<email>steffen.klassert@secunet.com</email>
</author>
<published>2011-03-15T21:12:49Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e5a1f3787f4b43e828de2818faa6a0f658b87a63'/>
<id>urn:sha1:e5a1f3787f4b43e828de2818faa6a0f658b87a63</id>
<content type='text'>
[ Upstream commit fbd5060875d25f7764fd1c3d35b83a8ed1d88d7b ]

We return a destination entry without refcount if a socket
policy is found in xfrm_lookup. This triggers a warning on
a negative refcount when freeeing this dst entry. So take
a refcount in this case to fix it.

This refcount was forgotten when xfrm changed to cache bundles
instead of policies for outgoing flows.

Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Acked-by: Timo Teräs &lt;timo.teras@iki.fi&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
</feed>
