11 Jan, 2012

1 commit


04 Jan, 2012

1 commit


03 Jan, 2012

2 commits


28 Dec, 2011

1 commit


24 Dec, 2011

1 commit


23 Dec, 2011

1 commit


21 Dec, 2011

1 commit


20 Dec, 2011

1 commit

  • module_param(bool) used to counter-intuitively take an int. In
    fddd5201 (mid-2009) we allowed bool or int/unsigned int using a messy
    trick.

    It's time to remove the int/unsigned int option. For this version
    it'll simply give a warning, but it'll break next kernel version.

    (Thanks to Joe Perches for suggesting coccinelle for 0/1 -> true/false).

    Cc: "David S. Miller"
    Cc: netdev@vger.kernel.org
    Signed-off-by: Rusty Russell
    Signed-off-by: David S. Miller

    Rusty Russell
     

19 Dec, 2011

2 commits


10 Nov, 2011

1 commit


08 Nov, 2011

5 commits

  • This was triggered by turning off encryption on ACL link when rfcomm
    was using high security. rfcomm_security_cfm (which is called from rx
    task) was closing DLC and this involves sending disconnect message
    (and locking socket).

    Move closing DLC to rfcomm_process_dlcs and only flag DLC for closure
    in rfcomm_security_cfm.

    BUG: sleeping function called from invalid context at net/core/sock.c:2032
    in_atomic(): 1, irqs_disabled(): 0, pid: 1788, name: kworker/0:3
    [] (unwind_backtrace+0x0/0x108) from [] (dump_stack+0x20/0x24)
    [] (dump_stack+0x20/0x24) from [] (__might_sleep+0x110/0x12c)
    [] (__might_sleep+0x110/0x12c) from [] (lock_sock_nested+0x2c/0x64)
    [] (lock_sock_nested+0x2c/0x64) from [] (l2cap_sock_sendmsg+0x58/0xcc)
    [] (l2cap_sock_sendmsg+0x58/0xcc) from [] (sock_sendmsg+0xb0/0xd0)
    [] (sock_sendmsg+0xb0/0xd0) from [] (kernel_sendmsg+0x3c/0x44)
    [] (kernel_sendmsg+0x3c/0x44) from [] (rfcomm_send_frame+0x50/0x58)
    [] (rfcomm_send_frame+0x50/0x58) from [] (rfcomm_send_disc+0x78/0x80)
    [] (rfcomm_send_disc+0x78/0x80) from [] (__rfcomm_dlc_close+0x2d0/0x2fc)
    [] (__rfcomm_dlc_close+0x2d0/0x2fc) from [] (rfcomm_security_cfm+0x140/0x1e0)
    [] (rfcomm_security_cfm+0x140/0x1e0) from [] (hci_event_packet+0x1ce8/0x4d84)
    [] (hci_event_packet+0x1ce8/0x4d84) from [] (hci_rx_task+0x1d0/0x2d0)
    [] (hci_rx_task+0x1d0/0x2d0) from [] (tasklet_action+0x138/0x1e4)
    [] (tasklet_action+0x138/0x1e4) from [] (__do_softirq+0xcc/0x274)
    [] (__do_softirq+0xcc/0x274) from [] (do_softirq+0x60/0x6c)
    [] (do_softirq+0x60/0x6c) from [] (local_bh_enable_ip+0xc8/0xd4)
    [] (local_bh_enable_ip+0xc8/0xd4) from [] (_raw_spin_unlock_bh+0x48/0x4c)
    [] (_raw_spin_unlock_bh+0x48/0x4c) from [] (data_from_chip+0xf4/0xaec)
    [] (data_from_chip+0xf4/0xaec) from [] (send_skb_to_core+0x40/0x178)
    [] (send_skb_to_core+0x40/0x178) from [] (cg2900_hu_receive+0x15c/0x2d0)
    [] (cg2900_hu_receive+0x15c/0x2d0) from [] (hci_uart_tty_receive+0x74/0xa0)
    [] (hci_uart_tty_receive+0x74/0xa0) from [] (flush_to_ldisc+0x188/0x198)
    [] (flush_to_ldisc+0x188/0x198) from [] (process_one_work+0x144/0x4b8)
    [] (process_one_work+0x144/0x4b8) from [] (worker_thread+0x198/0x468)
    [] (worker_thread+0x198/0x468) from [] (kthread+0x98/0xa0)
    [] (kthread+0x98/0xa0) from [] (kernel_thread_exit+0x0/0x8)

    Signed-off-by: Szymon Janc
    Signed-off-by: Gustavo F. Padovan

    Szymon Janc
     
  • Signed-off-by: Luiz Augusto von Dentz
    Signed-off-by: Gustavo F. Padovan

    Luiz Augusto von Dentz
     
  • When all items in the list have the same type there is no much of a point
    to use list_for_each except if you want to use the list pointer itself.

    Signed-off-by: Luiz Augusto von Dentz
    Signed-off-by: Gustavo F. Padovan

    Luiz Augusto von Dentz
     
  • Remove old tasklets and replace by workqueue. To avoid reentrancy (which
    tasklets always avoid) we use the system_nrt_wq.

    Signed-off-by: David Herrmann
    Signed-off-by: Gustavo F. Padovan

    David Herrmann
     
  • Forward error codes from tty core to the rfcomm_init caller instead of using
    generic -1 errors.

    Signed-off-by: David Herrmann
    Signed-off-by: Gustavo F. Padovan

    David Herrmann
     

03 Nov, 2011

1 commit


25 Oct, 2011

1 commit


19 Oct, 2011

1 commit

  • The Bluetooth stack has internal connection handlers for all of the various
    Bluetooth protocols, and unfortunately, they are currently lacking the LSM
    hooks found in the core network stack's connection handlers. I say
    unfortunately, because this can cause problems for users who have have an
    LSM enabled and are using certain Bluetooth devices. See one problem
    report below:

    * http://bugzilla.redhat.com/show_bug.cgi?id=741703

    In order to keep things simple at this point in time, this patch fixes the
    problem by cloning the parent socket's LSM attributes to the newly created
    child socket. If we decide we need a more elaborate LSM marking mechanism
    for Bluetooth (I somewhat doubt this) we can always revisit this decision
    in the future.

    Reported-by: James M. Cape
    Signed-off-by: Paul Moore
    Acked-by: James Morris
    Signed-off-by: David S. Miller

    Paul Moore
     

15 Oct, 2011

1 commit

  • This was triggered by turning off encryption on ACL link when rfcomm
    was using high security. rfcomm_security_cfm (which is called from rx
    task) was closing DLC and this involves sending disconnect message
    (and locking socket).

    Move closing DLC to rfcomm_process_dlcs and only flag DLC for closure
    in rfcomm_security_cfm.

    BUG: sleeping function called from invalid context at net/core/sock.c:2032
    in_atomic(): 1, irqs_disabled(): 0, pid: 1788, name: kworker/0:3
    [] (unwind_backtrace+0x0/0x108) from [] (dump_stack+0x20/0x24)
    [] (dump_stack+0x20/0x24) from [] (__might_sleep+0x110/0x12c)
    [] (__might_sleep+0x110/0x12c) from [] (lock_sock_nested+0x2c/0x64)
    [] (lock_sock_nested+0x2c/0x64) from [] (l2cap_sock_sendmsg+0x58/0xcc)
    [] (l2cap_sock_sendmsg+0x58/0xcc) from [] (sock_sendmsg+0xb0/0xd0)
    [] (sock_sendmsg+0xb0/0xd0) from [] (kernel_sendmsg+0x3c/0x44)
    [] (kernel_sendmsg+0x3c/0x44) from [] (rfcomm_send_frame+0x50/0x58)
    [] (rfcomm_send_frame+0x50/0x58) from [] (rfcomm_send_disc+0x78/0x80)
    [] (rfcomm_send_disc+0x78/0x80) from [] (__rfcomm_dlc_close+0x2d0/0x2fc)
    [] (__rfcomm_dlc_close+0x2d0/0x2fc) from [] (rfcomm_security_cfm+0x140/0x1e0)
    [] (rfcomm_security_cfm+0x140/0x1e0) from [] (hci_event_packet+0x1ce8/0x4d84)
    [] (hci_event_packet+0x1ce8/0x4d84) from [] (hci_rx_task+0x1d0/0x2d0)
    [] (hci_rx_task+0x1d0/0x2d0) from [] (tasklet_action+0x138/0x1e4)
    [] (tasklet_action+0x138/0x1e4) from [] (__do_softirq+0xcc/0x274)
    [] (__do_softirq+0xcc/0x274) from [] (do_softirq+0x60/0x6c)
    [] (do_softirq+0x60/0x6c) from [] (local_bh_enable_ip+0xc8/0xd4)
    [] (local_bh_enable_ip+0xc8/0xd4) from [] (_raw_spin_unlock_bh+0x48/0x4c)
    [] (_raw_spin_unlock_bh+0x48/0x4c) from [] (data_from_chip+0xf4/0xaec)
    [] (data_from_chip+0xf4/0xaec) from [] (send_skb_to_core+0x40/0x178)
    [] (send_skb_to_core+0x40/0x178) from [] (cg2900_hu_receive+0x15c/0x2d0)
    [] (cg2900_hu_receive+0x15c/0x2d0) from [] (hci_uart_tty_receive+0x74/0xa0)
    [] (hci_uart_tty_receive+0x74/0xa0) from [] (flush_to_ldisc+0x188/0x198)
    [] (flush_to_ldisc+0x188/0x198) from [] (process_one_work+0x144/0x4b8)
    [] (process_one_work+0x144/0x4b8) from [] (worker_thread+0x198/0x468)
    [] (worker_thread+0x198/0x468) from [] (kthread+0x98/0xa0)
    [] (kthread+0x98/0xa0) from [] (kernel_thread_exit+0x0/0x8)

    Signed-off-by: Szymon Janc
    Signed-off-by: Gustavo F. Padovan

    Szymon Janc
     

28 Sep, 2011

1 commit


12 Aug, 2011

2 commits

  • Fix race conditions which can cause lost wakeups (or missed
    signals) while waiting to accept an rfcomm socket connection.

    Signed-off-by: Peter Hurley
    Signed-off-by: Gustavo F. Padovan

    Peter Hurley
     
  • Removed superfluous event handling which was used to signal
    that the rfcomm kthread had been woken. This appears to have been
    used to prevent lost wakeups. Correctly ordering when the task
    state is set to TASK_INTERRUPTIBLE is sufficient to prevent lost wakeups.

    To prevent wakeups which occurred prior to initially setting
    TASK_INTERRUPTIBLE from being lost, the main work of the thread loop -
    rfcomm_process_sessions() - is performed prior to sleeping.

    Signed-off-by: Peter Hurley
    Signed-off-by: Gustavo F. Padovan

    Peter Hurley
     

10 Jun, 2011

3 commits


09 Jun, 2011

1 commit


12 May, 2011

1 commit

  • In case of pre v2.1 devices authentication request will return
    success immediately if the link key already exists without any
    authentication process.

    That means, it's not possible to re-authenticate the link if you
    already have combination key and for instance want to re-authenticate
    to get the high security (use 16 digit pin).

    Therefore, it's necessary to check security requirements on auth
    complete event to prevent not enough secure connection.

    Signed-off-by: Waldemar Rymarkiewicz
    Signed-off-by: Gustavo F. Padovan

    Waldemar Rymarkiewicz
     

28 Apr, 2011

3 commits


17 Mar, 2011

2 commits

  • * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6: (1480 commits)
    bonding: enable netpoll without checking link status
    xfrm: Refcount destination entry on xfrm_lookup
    net: introduce rx_handler results and logic around that
    bonding: get rid of IFF_SLAVE_INACTIVE netdev->priv_flag
    bonding: wrap slave state work
    net: get rid of multiple bond-related netdevice->priv_flags
    bonding: register slave pointer for rx_handler
    be2net: Bump up the version number
    be2net: Copyright notice change. Update to Emulex instead of ServerEngines
    e1000e: fix kconfig for crc32 dependency
    netfilter ebtables: fix xt_AUDIT to work with ebtables
    xen network backend driver
    bonding: Improve syslog message at device creation time
    bonding: Call netif_carrier_off after register_netdevice
    bonding: Incorrect TX queue offset
    net_sched: fix ip_tos2prio
    xfrm: fix __xfrm_route_forward()
    be2net: Fix UDP packet detected status in RX compl
    Phonet: fix aligned-mode pipe socket buffer header reserve
    netxen: support for GbE port settings
    ...

    Fix up conflicts in drivers/staging/brcm80211/brcmsmac/wl_mac80211.c
    with the staging updates.

    Linus Torvalds
     
  • * 'tty-next' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty-2.6: (76 commits)
    pch_uart: reference clock on CM-iTC
    pch_phub: add new device ML7213
    n_gsm: fix UIH control byte : P bit should be 0
    n_gsm: add a documentation
    serial: msm_serial_hs: Add MSM high speed UART driver
    tty_audit: fix tty_audit_add_data live lock on audit disabled
    tty: move cd1865.h to drivers/staging/tty/
    Staging: tty: fix build with epca.c driver
    pcmcia: synclink_cs: fix prototype for mgslpc_ioctl()
    Staging: generic_serial: fix double locking bug
    nozomi: don't use flush_scheduled_work()
    tty/serial: Relax the device_type restriction from of_serial
    MAINTAINERS: Update HVC file patterns
    tty: phase out of ioctl file pointer for tty3270 as well
    tty: forgot to remove ipwireless from drivers/char/pcmcia/Makefile
    pch_uart: Fix DMA channel miss-setting issue.
    pch_uart: fix exclusive access issue
    pch_uart: fix auto flow control miss-setting issue
    pch_uart: fix uart clock setting issue
    pch_uart : Use dev_xxx not pr_xxx
    ...

    Fix up trivial conflicts in drivers/misc/pch_phub.c (same patch applied
    twice, then changes to the same area in one branch)

    Linus Torvalds
     

19 Feb, 2011

1 commit


18 Feb, 2011

3 commits


17 Feb, 2011

1 commit


15 Feb, 2011

1 commit