<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.23</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.23</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.23'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2007-10-08T07:12:05Z</updated>
<entry>
<title>[IPv6]: Fix ICMPv6 redirect handling with target multicast address</title>
<updated>2007-10-08T07:12:05Z</updated>
<author>
<name>Brian Haley</name>
<email>brian.haley@hp.com</email>
</author>
<published>2007-10-08T07:12:05Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=bf0b48dfc368c07c42b5a3a5658c8ee81b4283ac'/>
<id>urn:sha1:bf0b48dfc368c07c42b5a3a5658c8ee81b4283ac</id>
<content type='text'>
When the ICMPv6 Target address is multicast, Linux processes the 
redirect instead of dropping it.  The problem is in this code in 
ndisc_redirect_rcv():

         if (ipv6_addr_equal(dest, target)) {
                 on_link = 1;
         } else if (!(ipv6_addr_type(target) &amp; IPV6_ADDR_LINKLOCAL)) {
                 ND_PRINTK2(KERN_WARNING
                            "ICMPv6 Redirect: target address is not 
link-local.\n");
                 return;
         }

This second check will succeed if the Target address is, for example, 
FF02::1 because it has link-local scope.  Instead, it should be checking 
if it's a unicast link-local address, as stated in RFC 2461/4861 Section 
8.1:

       - The ICMP Target Address is either a link-local address (when
         redirected to a router) or the same as the ICMP Destination
         Address (when redirected to the on-link destination).

I know this doesn't explicitly say unicast link-local address, but it's 
implied.

This bug is preventing Linux kernels from achieving IPv6 Logo Phase II 
certification because of a recent error that was found in the TAHI test 
suite - Neighbor Disovery suite test 206 (v6LC.2.3.6_G) had the 
multicast address in the Destination field instead of Target field, so 
we were passing the test.  This won't be the case anymore.

The patch below fixes this problem, and also fixes ndisc_send_redirect() 
to not send an invalid redirect with a multicast address in the Target 
field.  I re-ran the TAHI Neighbor Discovery section to make sure Linux 
passes all 245 tests now.

Signed-off-by: Brian Haley &lt;brian.haley@hp.com&gt;
Acked-by: David L Stevens &lt;dlstevens@us.ibm.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PKT_SCHED] cls_u32: error code isn't been propogated properly</title>
<updated>2007-10-08T06:57:45Z</updated>
<author>
<name>Stephen Hemminger</name>
<email>shemminger@linux-foundation.org</email>
</author>
<published>2007-10-08T06:57:45Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=bf1b803b01b00c3801e0aa373ba0305f8278e260'/>
<id>urn:sha1:bf1b803b01b00c3801e0aa373ba0305f8278e260</id>
<content type='text'>
    
Signed-off-by: Stephen Hemminger &lt;shemminger@linux-foundation.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[ROSE]: Fix rose.ko oops on unload</title>
<updated>2007-10-08T06:44:17Z</updated>
<author>
<name>Alexey Dobriyan</name>
<email>adobriyan@gmail.com</email>
</author>
<published>2007-10-08T06:44:17Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=891e6a931255238dddd08a7b306871240961a27f'/>
<id>urn:sha1:891e6a931255238dddd08a7b306871240961a27f</id>
<content type='text'>
Commit a3d384029aa304f8f3f5355d35f0ae274454f7cd aka
"[AX.25]: Fix unchecked rose_add_loopback_neigh uses"
transformed rose_loopback_neigh var into statically allocated one.
However, on unload it will be kfree's which can't work.

Steps to reproduce:

	modprobe rose
	rmmod rose

BUG: unable to handle kernel NULL pointer dereference at virtual address 00000008
 printing eip:
c014c664
*pde = 00000000
Oops: 0000 [#1]
PREEMPT DEBUG_PAGEALLOC
Modules linked in: rose ax25 fan ufs loop usbhid rtc snd_intel8x0 snd_ac97_codec ehci_hcd ac97_bus uhci_hcd thermal usbcore button processor evdev sr_mod cdrom
CPU:    0
EIP:    0060:[&lt;c014c664&gt;]    Not tainted VLI
EFLAGS: 00210086   (2.6.23-rc9 #3)
EIP is at kfree+0x48/0xa1
eax: 00000556   ebx: c1734aa0   ecx: f6a5e000   edx: f7082000
esi: 00000000   edi: f9a55d20   ebp: 00200287   esp: f6a5ef28
ds: 007b   es: 007b   fs: 0000  gs: 0033  ss: 0068
Process rmmod (pid: 1823, ti=f6a5e000 task=f7082000 task.ti=f6a5e000)
Stack: f9a55d20 f9a5200c 00000000 00000000 00000000 f6a5e000 f9a5200c f9a55a00 
       00000000 bf818cf0 f9a51f3f f9a55a00 00000000 c0132c60 65736f72 00000000 
       f69f9630 f69f9528 c014244a f6a4e900 00200246 f7082000 c01025e6 00000000 
Call Trace:
 [&lt;f9a5200c&gt;] rose_rt_free+0x1d/0x49 [rose]
 [&lt;f9a5200c&gt;] rose_rt_free+0x1d/0x49 [rose]
 [&lt;f9a51f3f&gt;] rose_exit+0x4c/0xd5 [rose]
 [&lt;c0132c60&gt;] sys_delete_module+0x15e/0x186
 [&lt;c014244a&gt;] remove_vma+0x40/0x45
 [&lt;c01025e6&gt;] sysenter_past_esp+0x8f/0x99
 [&lt;c012bacf&gt;] trace_hardirqs_on+0x118/0x13b
 [&lt;c01025b6&gt;] sysenter_past_esp+0x5f/0x99
 =======================
Code: 05 03 1d 80 db 5b c0 8b 03 25 00 40 02 00 3d 00 40 02 00 75 03 8b 5b 0c 8b 73 10 8b 44 24 18 89 44 24 04 9c 5d fa e8 77 df fd ff &lt;8b&gt; 56 08 89 f8 e8 84 f4 fd ff e8 bd 32 06 00 3b 5c 86 60 75 0f 
EIP: [&lt;c014c664&gt;] kfree+0x48/0xa1 SS:ESP 0068:f6a5ef28

Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Fix fastpath_cnt_hint when GSO skb is partially ACKed</title>
<updated>2007-10-08T06:43:10Z</updated>
<author>
<name>Ilpo Järvinen</name>
<email>ilpo.jarvinen@helsinki.fi</email>
</author>
<published>2007-10-08T06:43:10Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=48611c47d09023d9356e78550d1cadb8d61da9c8'/>
<id>urn:sha1:48611c47d09023d9356e78550d1cadb8d61da9c8</id>
<content type='text'>
When only GSO skb was partially ACKed, no hints are reset,
therefore fastpath_cnt_hint must be tweaked too or else it can
corrupt fackets_out. The corruption to occur, one must have
non-trivial ACK/SACK sequence, so this bug is not very often
that harmful. There's a fackets_out state reset in TCP because
fackets_out is known to be inaccurate and that fixes the issue
eventually anyway.

In case there was also at least one skb that got fully ACKed,
the fastpath_skb_hint is set to NULL which causes a recount for
fastpath_cnt_hint (the old value won't be accessed anymore),
thus it can safely be decremented without additional checking.

Reported by Cedric Le Goater &lt;clg@fr.ibm.com&gt;

Signed-off-by: Ilpo Järvinen &lt;ilpo.jarvinen@helsinki.fi&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'fixes-jgarzik' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6 into upstream-fixes</title>
<updated>2007-10-03T17:39:16Z</updated>
<author>
<name>Jeff Garzik</name>
<email>jeff@garzik.org</email>
</author>
<published>2007-10-03T17:39:16Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=5c55c434917429f229a1bf43def97fd421f444c6'/>
<id>urn:sha1:5c55c434917429f229a1bf43def97fd421f444c6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[PATCH] softmac: Fix compiler-warning</title>
<updated>2007-10-02T23:41:33Z</updated>
<author>
<name>Richard Knutsson</name>
<email>ricknu-0@student.ltu.se</email>
</author>
<published>2007-10-01T00:24:38Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ee0a8169b693e1c708d0f9af0a5e4ade65a65439'/>
<id>urn:sha1:ee0a8169b693e1c708d0f9af0a5e4ade65a65439</id>
<content type='text'>
  CC      net/ieee80211/softmac/ieee80211softmac_wx.o
/home/kernel/src/net/ieee80211/softmac/ieee80211softmac_wx.c: In function âieee80211softmac_wx_set_essidâ:
/home/kernel/src/net/ieee80211/softmac/ieee80211softmac_wx.c:117: warning: label âoutâ defined but not used

due to commit: efe870f9f4ad74410a18ecbf0d9ba7c14b50a0fb. Removing the label.

Signed-off-by: Richard Knutsson &lt;ricknu-0@student.ltu.se&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>[IEEE80211]: avoid integer underflow for runt rx frames</title>
<updated>2007-10-02T04:03:54Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2007-10-02T04:03:54Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=04045f98e0457aba7d4e6736f37eed189c48a5f7'/>
<id>urn:sha1:04045f98e0457aba7d4e6736f37eed189c48a5f7</id>
<content type='text'>
Reported by Chris Evans &lt;scarybeasts@gmail.com&gt;:

&gt; The summary is that an evil 80211 frame can crash out a victim's
&gt; machine. It only applies to drivers using the 80211 wireless code, and
&gt; only then to certain drivers (and even then depends on a card's
&gt; firmware not dropping a dubious packet). I must confess I'm not
&gt; keeping track of Linux wireless support, and the different protocol
&gt; stacks etc.
&gt;
&gt; Details are as follows:
&gt;
&gt; ieee80211_rx() does not explicitly check that "skb-&gt;len &gt;= hdrlen".
&gt; There are other skb-&gt;len checks, but not enough to prevent a subtle
&gt; off-by-two error if the frame has the IEEE80211_STYPE_QOS_DATA flag
&gt; set.
&gt;
&gt; This leads to integer underflow and crash here:
&gt;
&gt; if (frag != 0)
&gt;    flen -= hdrlen;
&gt;
&gt; (flen is subsequently used as a memcpy length parameter).

How about this?

Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[SFQ]: Remove artificial limitation for queue limit.</title>
<updated>2007-10-02T04:01:23Z</updated>
<author>
<name>Alexey Kuznetsov</name>
<email>kaber@ms2.inr.ac.ru</email>
</author>
<published>2007-10-01T00:51:33Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=32740ddc1095e5e320bf961dda146bf97bc28adb'/>
<id>urn:sha1:32740ddc1095e5e320bf961dda146bf97bc28adb</id>
<content type='text'>
This is followup to Patrick's patch. A little optimization to enqueue
routine allows to remove artificial limitation on queue length.

Plus, testing showed that hash function used by SFQ is too bad or even worse.
It does not even sweep the whole range of hash values.
Switched to Jenkins' hash.

Signed-off-by: Alexey Kuznetsov &lt;kaber@ms2.inr.ac.ru&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Fix MD5 signature handling on big-endian.</title>
<updated>2007-09-28T22:18:35Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2007-09-28T22:18:35Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f8ab18d2d987a59ccbf0495032b2aef05b730037'/>
<id>urn:sha1:f8ab18d2d987a59ccbf0495032b2aef05b730037</id>
<content type='text'>
Based upon a report and initial patch by Peter Lieven.

tcp4_md5sig_key and tcp6_md5sig_key need to start with
the exact same members as tcp_md5sig_key.  Because they
are both cast to that type by tcp_v{4,6}_md5_do_lookup().

Unfortunately tcp{4,6}_md5sig_key use a u16 for the key
length instead of a u8, which is what tcp_md5sig_key
uses.  This just so happens to work by accident on
little-endian, but on big-endian it doesn't.

Instead of casting, just place tcp_md5sig_key as the first member of
the address-family specific structures, adjust the access sites, and
kill off the ugly casts.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NET]: Zero length write() on socket should not simply return 0.</title>
<updated>2007-09-27T20:52:00Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2007-09-27T20:52:00Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e79ad711a0108475c1b3a03815527e7237020b08'/>
<id>urn:sha1:e79ad711a0108475c1b3a03815527e7237020b08</id>
<content type='text'>
This fixes kernel bugzilla #5731

It should generate an empty packet for datagram protocols when the
socket is connected, for one.

The check is doubly-wrong because all that a write() can be is a
sendmsg() call with a NULL msg_control and a single entry iovec.  No
special semantics should be assigned to it, therefore the zero length
check should be removed entirely.

This matches the behavior of BSD and several other systems.

Alan Cox notes that SuSv3 says the behavior of a zero length write on
non-files is "unspecified", but that's kind of useless since BSD has
defined this behavior for a quarter century and BSD is essentially
what application folks code to.

Based upon a patch from Stephen Hemminger.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
