<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux-toradex.git/net, branch v2.6.20.2</title>
<subtitle>Linux kernel for Apalis and Colibri modules</subtitle>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/'/>
<entry>
<title>IPV6: Handle np-&gt;opt being NULL in ipv6_getsockopt_sticky() [CVE-2007-1000]</title>
<updated>2007-03-09T18:50:33+00:00</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2007-03-07T20:50:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=4c9ef074b33690981d81ab0107fe2573007083ef'/>
<id>4c9ef074b33690981d81ab0107fe2573007083ef</id>
<content type='text'>
This fixes http://bugzilla.kernel.org/show_bug.cgi?id=8134

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes http://bugzilla.kernel.org/show_bug.cgi?id=8134

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>TCP: Fix minisock tcp_create_openreq_child() typo.</title>
<updated>2007-03-09T18:50:32+00:00</updated>
<author>
<name>Arnaldo Carvalho de Melo</name>
<email>acme@redhat.com</email>
</author>
<published>2007-02-28T19:29:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=248059edc6503eac8baac39dad42e76383824720'/>
<id>248059edc6503eac8baac39dad42e76383824720</id>
<content type='text'>
On 2/28/07, KOVACS Krisztian &lt;hidden@balabit.hu&gt; wrote:
&gt;
&gt;   Hi,
&gt;
&gt;   While reading TCP minisock code I've found this suspiciously looking
&gt; code fragment:
&gt;
&gt; - 8&lt; -
&gt; struct sock *tcp_create_openreq_child(struct sock *sk, struct request_sock *req, struct sk_buff *skb)
&gt; {
&gt;         struct sock *newsk = inet_csk_clone(sk, req, GFP_ATOMIC);
&gt;
&gt;         if (newsk != NULL) {
&gt;                 const struct inet_request_sock *ireq = inet_rsk(req);
&gt;                 struct tcp_request_sock *treq = tcp_rsk(req);
&gt;                 struct inet_connection_sock *newicsk = inet_csk(sk);
&gt;                 struct tcp_sock *newtp;
&gt; - 8&lt; -
&gt;
&gt;   The above code initializes newicsk to inet_csk(sk), isn't that supposed
&gt; to be inet_csk(newsk)?  As far as I can tell this might leave
&gt; icsk_ack.last_seg_size zero even if we do have received data.

Good catch!

David, please apply the attached patch.

Signed-off-by: Arnaldo Carvalho de Melo &lt;acme@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
On 2/28/07, KOVACS Krisztian &lt;hidden@balabit.hu&gt; wrote:
&gt;
&gt;   Hi,
&gt;
&gt;   While reading TCP minisock code I've found this suspiciously looking
&gt; code fragment:
&gt;
&gt; - 8&lt; -
&gt; struct sock *tcp_create_openreq_child(struct sock *sk, struct request_sock *req, struct sk_buff *skb)
&gt; {
&gt;         struct sock *newsk = inet_csk_clone(sk, req, GFP_ATOMIC);
&gt;
&gt;         if (newsk != NULL) {
&gt;                 const struct inet_request_sock *ireq = inet_rsk(req);
&gt;                 struct tcp_request_sock *treq = tcp_rsk(req);
&gt;                 struct inet_connection_sock *newicsk = inet_csk(sk);
&gt;                 struct tcp_sock *newtp;
&gt; - 8&lt; -
&gt;
&gt;   The above code initializes newicsk to inet_csk(sk), isn't that supposed
&gt; to be inet_csk(newsk)?  As far as I can tell this might leave
&gt; icsk_ack.last_seg_size zero even if we do have received data.

Good catch!

David, please apply the attached patch.

Signed-off-by: Arnaldo Carvalho de Melo &lt;acme@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>RPM: fix double free in portmapper code</title>
<updated>2007-03-09T18:50:29+00:00</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2007-02-05T20:33:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=af2fec7364857f677b3f9ee3617ee9fbc849e6bd'/>
<id>af2fec7364857f677b3f9ee3617ee9fbc849e6bd</id>
<content type='text'>
rpc_run_task is guaranteed to always call -&gt;rpc_release.

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Cc: Neil Brown &lt;neilb@suse.de&gt;
Cc: Jan "Yenya" Kasprzak &lt;kas@fi.muni.cz&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;


</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
rpc_run_task is guaranteed to always call -&gt;rpc_release.

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Cc: Neil Brown &lt;neilb@suse.de&gt;
Cc: Jan "Yenya" Kasprzak &lt;kas@fi.muni.cz&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;


</pre>
</div>
</content>
</entry>
<entry>
<title>Fix reference counting (memory leak) problem in __nfulnl_send() and callers related to packet queueing.</title>
<updated>2007-03-09T18:50:27+00:00</updated>
<author>
<name>MichaÅ MirosÅaw</name>
<email>mirq-linux@rere.qmqm.pl</email>
</author>
<published>2007-03-09T18:50:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=9b1e918ac5dfc73493a2253731ab84a7f907c5be'/>
<id>9b1e918ac5dfc73493a2253731ab84a7f907c5be</id>
<content type='text'>
Signed-off-by: MichaÅ MirosÅaw &lt;mirq-linux@rere.qmqm.pl&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: MichaÅ MirosÅaw &lt;mirq-linux@rere.qmqm.pl&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Fix anycast procfs device leak</title>
<updated>2007-03-09T18:50:27+00:00</updated>
<author>
<name>David Stevens</name>
<email>dlstevens@us.ibm.com</email>
</author>
<published>2007-02-27T19:14:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=9e44f708876955f49190c04ce83b9dcb712ce3ff'/>
<id>9e44f708876955f49190c04ce83b9dcb712ce3ff</id>
<content type='text'>
[IPV6]: /proc/net/anycast6 unbalanced inet6_dev refcnt

From: David Stevens &lt;dlstevens@us.ibm.com&gt;

Reading /proc/net/anycast6 when there is no anycast address
on an interface results in an ever-increasing inet6_dev reference
count, as well as a reference to the netdevice you can't get rid of.

From: David Stevens &lt;dlstevens@us.ibm.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[IPV6]: /proc/net/anycast6 unbalanced inet6_dev refcnt

From: David Stevens &lt;dlstevens@us.ibm.com&gt;

Reading /proc/net/anycast6 when there is no anycast address
on an interface results in an ever-increasing inet6_dev reference
count, as well as a reference to the netdevice you can't get rid of.

From: David Stevens &lt;dlstevens@us.ibm.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Don't add anycast reference to device multiple times</title>
<updated>2007-03-09T18:50:27+00:00</updated>
<author>
<name>Michal Wrobel</name>
<email>xmxwx@asn.pl</email>
</author>
<published>2007-02-27T19:12:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=74ba050ddee2ade5fcdad88433c26ffea7034b13'/>
<id>74ba050ddee2ade5fcdad88433c26ffea7034b13</id>
<content type='text'>
[IPV6]: anycast refcnt fix

This patch fixes a bug in Linux IPv6 stack which caused anycast address
to be added to a device prior DAD has been completed. This led to
incorrect reference count which resulted in infinite wait for
unregister_netdevice completion on interface removal.

Signed-off-by: Michal Wrobel &lt;xmxwx@asn.pl&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[IPV6]: anycast refcnt fix

This patch fixes a bug in Linux IPv6 stack which caused anycast address
to be added to a device prior DAD has been completed. This led to
incorrect reference count which resulted in infinite wait for
unregister_netdevice completion on interface removal.

Signed-off-by: Michal Wrobel &lt;xmxwx@asn.pl&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Fix TCP MD5 locking.</title>
<updated>2007-03-09T18:50:26+00:00</updated>
<author>
<name>David Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2007-02-27T19:11:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=2e8c347d749bc09d21917b2f23fa84cb375e586b'/>
<id>2e8c347d749bc09d21917b2f23fa84cb375e586b</id>
<content type='text'>
[TCP]: Fix MD5 signature pool locking.

The locking calls assumed that these code paths were only
invoked in software interrupt context, but that isn't true.

Therefore we need to use spin_{lock,unlock}_bh() throughout.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[TCP]: Fix MD5 signature pool locking.

The locking calls assumed that these code paths were only
invoked in software interrupt context, but that isn't true.

Therefore we need to use spin_{lock,unlock}_bh() throughout.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Fix skb data reallocation handling in IPSEC</title>
<updated>2007-03-09T18:50:26+00:00</updated>
<author>
<name>Arnaldo Carvalho de Melo</name>
<email>acme@redhat.com</email>
</author>
<published>2007-02-27T19:08:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=03670c6e904a3d9651233f08ead30f530a9a29a2'/>
<id>03670c6e904a3d9651233f08ead30f530a9a29a2</id>
<content type='text'>
[XFRM_TUNNEL]: Reload header pointer after pskb_may_pull/pskb_expand_head

Please consider applying, this was found on your latest
net-2.6 tree while playing around with that ip_hdr() + turn
skb-&gt;nh/h/mac pointers  as offsets on 64 bits idea :-)

Signed-off-by: Arnaldo Carvalho de Melo &lt;acme@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[XFRM_TUNNEL]: Reload header pointer after pskb_may_pull/pskb_expand_head

Please consider applying, this was found on your latest
net-2.6 tree while playing around with that ip_hdr() + turn
skb-&gt;nh/h/mac pointers  as offsets on 64 bits idea :-)

Signed-off-by: Arnaldo Carvalho de Melo &lt;acme@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Fix xfrm_add_sa_expire() return value</title>
<updated>2007-03-09T18:50:25+00:00</updated>
<author>
<name>David Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2007-02-27T19:04:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=c7c5f798fc566b10c91cd436a0ffdc40b9eccd1e'/>
<id>c7c5f798fc566b10c91cd436a0ffdc40b9eccd1e</id>
<content type='text'>
[XFRM] xfrm_user: Fix return values of xfrm_add_sa_expire.

As noted by Kent Yoder, this function will always return an
error.  Make sure it returns zero on success.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[XFRM] xfrm_user: Fix return values of xfrm_add_sa_expire.

As noted by Kent Yoder, this function will always return an
error.  Make sure it returns zero on success.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Fix oops in xfrm_audit_log()</title>
<updated>2007-03-09T18:50:22+00:00</updated>
<author>
<name>David Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2007-02-14T02:22:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.toradex.cn/cgit/linux-toradex.git/commit/?id=7b9ec405b19a1a6ca03a26fceb71d2a7d0a2507d'/>
<id>7b9ec405b19a1a6ca03a26fceb71d2a7d0a2507d</id>
<content type='text'>
[XFRM]: Fix OOPSes in xfrm_audit_log().

Make sure that this function is called correctly, and
add BUG() checking to ensure the arguments are sane.

Based upon a patch by Joy Latten.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[XFRM]: Fix OOPSes in xfrm_audit_log().

Make sure that this function is called correctly, and
add BUG() checking to ensure the arguments are sane.

Based upon a patch by Joy Latten.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</pre>
</div>
</content>
</entry>
</feed>
