22 Nov, 2006
15 commits
-
TCP and RAW do not have this issue. Closes Bug #7432.
Signed-off-by: YOSHIFUJI Hideaki
Signed-off-by: David S. Miller -
On Sat, 2006-11-18 at 16:12 +0300, Andrey Borzenkov wrote:
> =============================================
> [ INFO: possible recursive locking detected ]
> 2.6.19-rc5-2avb #2
> - ---------------------------------------------
> pppd/26425 is trying to acquire lock:
> (&hashbin->hb_spinlock){....}, at: [] irlmp_slsap_inuse+0x5a/0x170
> [irda]
>
> but task is already holding lock:
> (&hashbin->hb_spinlock){....}, at: [] irlmp_slsap_inuse+0x37/0x170
> [irda]
>
> other info that might help us debug this:
> 1 lock held by pppd/26425:
> #0: (&hashbin->hb_spinlock){....}, at: []
> irlmp_slsap_inuse+0x37/0x170 [irda]
>
> stack backtrace:
> [] dump_trace+0x1cc/0x200
> [] show_trace_log_lvl+0x1a/0x30
> [] show_trace+0x12/0x20
> [] dump_stack+0x19/0x20
> [] __lock_acquire+0x8fa/0xc20
> [] lock_acquire+0x5d/0x80
> [] _spin_lock+0x2c/0x40
> [] irlmp_slsap_inuse+0x5a/0x170 [irda]
> [] irlmp_open_lsap+0x62/0x180 [irda]
> [] irttp_open_tsap+0x181/0x230 [irda]
> [] ircomm_open_tsap+0x5d/0xa0 [ircomm]
> [] ircomm_open+0xb8/0xd0 [ircomm]
> [] ircomm_tty_open+0x4f7/0x570 [ircomm_tty]
> [] tty_open+0x174/0x340
> [] chrdev_open+0x89/0x170
> [] __dentry_open+0xa6/0x1d0
> [] nameidata_to_filp+0x35/0x40
> [] do_filp_open+0x49/0x50
> [] do_sys_open+0x47/0xd0
> [] sys_open+0x1c/0x20
> [] sysenter_past_esp+0x56/0x8d
> [] 0xb7f86410
> =======================The comment at the nesting lock says:
/* Careful for priority inversions here !
* irlmp->links is never taken while another IrDA
* spinlock is held, so we are safe. Jean II */So, under the assumption the author was right, it just needs a lockdep
annotation.Signed-off-by: Peter Zijlstra
Acked-by: Ingo Molnar
Signed-off-by: Andrew Morton
Signed-off-by: David S. Miller -
The "u16 *" derefs of skb->data need to be wrapped inside of
a get_unaligned().Thanks to Gustavo Zacarias for the bug report.
Signed-off-by: David S. Miller
-
I actually dont have a test case for these; i just found them by
inspection. Refer to patch "[XFRM]: Sub-policies broke policy events"
for more infoSigned-off-by: Jamal Hadi Salim
Acked-by: Masahide NAKAMURA
Signed-off-by: David S. Miller -
XFRM policy events are broken when sub-policy feature is turned on.
A simple test to verify this:
run ip xfrm mon on one window and add then delete a policy on another
window ..Signed-off-by: Jamal Hadi Salim
Acked-by: Masahide NAKAMURA
Signed-off-by: David S. Miller -
Any L2CAP connection in disconnecting state shall not response
to any further config requests from the remote side. So in case
such a request is received, ignore it.Signed-off-by: Ville Tervo
Signed-off-by: Marcel Holtmann -
When sending a positive config response it shall include the actual
MTU to be used on this channel. This differs from the Bluetooth 1.1
specification where it was enough to acknowledge the config request.Signed-off-by: Marcel Holtmann
-
If the RFCOMM session is no longer attached to the TTY device, then it
makes no sense to go through with changing the termios settings.Signed-off-by: Marcel Holtmann
-
After an inquiry completed or got canceled the Bluetooth core should
check for any pending connect attempts.Signed-off-by: Marcel Holtmann
-
To receive uvents for the low-level ACL and SCO links, they must be
assigned to a subsystem. It is enough to attach them to the already
established Bluetooth bus.Signed-off-by: Marcel Holtmann
-
Signed-off-by: Yasuyuki Kozakai
Signed-off-by: YOSHIFUJI Hideaki -
Signed-off-by: Yasuyuki Kozakai
Signed-off-by: YOSHIFUJI Hideaki -
RFC4191 explicitly states that the procedures are applicable to
hosts only. We should not have changed behavior of routers.Signed-off-by: YOSHIFUJI Hideaki
-
Signed-off-by: YOSHIFUJI Hideaki
-
Only routers in "FAILED" state should be considered unreachable.
Otherwise, we do not try to use speicific routes unless all least specific
routers are considered unreachable.Signed-off-by: YOSHIFUJI Hideaki
16 Nov, 2006
4 commits
-
Fix up tcp_mem initial settings to take into account the size of the
hash entries (different on SMP and non-SMP systems).Signed-off-by: John Heffner
Signed-off-by: David S. Miller -
nexthdr is NEXTHDR_FRAGMENT, the nexthdr value from the fragment header
is hp->nexthdr.Signed-off-by: Patrick McHardy
Signed-off-by: David S. Miller -
Based on patch by James D. Nurmi:
I've got some code very dependant on nfnetlink_queue, and turned up a
large number of warns coming from skb_trim. While it's quite possibly
my code, having not seen it on older kernels made me a bit suspect.Anyhow, based on some googling I turned up this thread:
http://lkml.org/lkml/2006/8/13/56And believe the issue to be related, so attached is a small patch to
the kernel -- not sure if this is completely correct, but for anyone
else hitting the WARN_ON(1) in skbuff.h, it might be helpful..Signed-off-by: James D. Nurmi
Ported to ip6_queue and nfnetlink_queue and added return value
checks.Signed-off-by: Patrick McHardy
Signed-off-by: David S. Miller -
NFULA_SEQ_GLOBAL should be in network byteorder.
Spotted by Al Viro.
Signed-off-by: Patrick McHardy
Signed-off-by: David S. Miller
11 Nov, 2006
1 commit
-
- make sure port in FTP data is in network order (in fact it was looking
buggy for big endian boxes before Viro's changes)
- htonl -> htons for portSigned-off-by: Julian Anastasov
Signed-off-by: David S. Miller
08 Nov, 2006
5 commits
-
Here are some fixes to endianess problems spotted by Al Viro.
Signed-off-by: Steven Whitehouse
Signed-off-by: David S. Miller -
Since pskb_copy tacks on the non-linear bits from the original
skb, it needs to count them in the truesize field of the new skb.Signed-off-by: Herbert Xu
Signed-off-by: David S. Miller -
Signed-off-by: Chris Lalancette
Signed-off-by: David S. Miller -
Otherwise we can hit paths that (legally) do multiple deletes on the
same node and OOPS with the HLIST poison values there instead of
NULL.Signed-off-by: David S. Miller
-
This patch removes consideration of high memory when determining TCP
hash table sizes. Taking into account high memory results in tcp_mem
values that are too large.Signed-off-by: John Heffner
Signed-off-by: David S. Miller
06 Nov, 2006
13 commits
-
* 'upstream-linus' of master.kernel.org:/pub/scm/linux/kernel/git/jgarzik/netdev-2.6:
[PATCH] Kconfig: remove redundant NETDEVICES depends
[PATCH] ehea: 64K page support fix
[PATCH] ehea: Removed redundant define
[PATCH] ehea: Nullpointer dereferencation fix
[PATCH] bcm43xx: fix unexpected LED control values in BCM4303 sprom
[PATCH] bcm43xx: Fix low-traffic netdev watchdog TX timeouts
[PATCH] hostap_plx: fix CIS verification
[PATCH] ieee80211: don't flood log with errors -
auth_domain_put() forgot to unlock acquired spinlock.
Cc: Olaf Kirch
Cc: Andy Adamson
Cc: J. Bruce Fields
Acked-by: Trond Myklebust
Signed-off-by: Akinobu Mita
Cc: Neil Brown
Acked-by: Peter Zijlstra
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds -
…inville/wireless-2.6 into upstream-fixes
-
> the build with the attached .config failed, make ends with:
> ...
> : undefined reference to `cipso_v4_sock_getattr'
> net/built-in.o: In function `netlbl_socket_getattr':...
It looks like I was stupid and made NetLabel depend on CONFIG_NET and not
CONFIG_INET, the patch below should fix this by making NetLabel depend on
CONFIG_INET and CONFIG_SECURITY. Please review and apply for 2.6.19.Signed-off-by: Paul Moore
Signed-off-by: David S. Miller -
It would be nice to keep things working even with this built as a
module, it took me some time to realize my IPv6 tunnel was broken
because of the missing sit module. This module alias fixes things
until distributions have added an appropriate alias to modprobe.conf.Signed-off-by: Patrick McHardy
Signed-off-by: David S. Miller -
If inet6_init() fails later than ndisc_init() call, or IPv6 module is
unloaded, ndisc_netdev_notifier call remains in the list and will follows in
oops later.Signed-off-by: Dmitry Mishin
Signed-off-by: David S. Miller -
We have seen a couple of __alloc_pages() failures due to
fragmentation, there is plenty of free memory but no large order pages
available. I think the problem is in sock_alloc_send_pskb(), the
gfp_mask includes __GFP_REPEAT but its never used/passed to the page
allocator. Shouldnt the gfp_mask be passed to alloc_skb() ?Signed-off-by: Larry Woodman
Signed-off-by: David S. Miller -
open-coded variant there works only for little-endian
Signed-off-by: Al Viro
Signed-off-by: David S. Miller -
htons() is not needed (and no, it's not misspelled ntohs() -
userland expects net-endian here).Signed-off-by: Al Viro
Signed-off-by: David S. Miller -
Signed-off-by: Al Viro
Signed-off-by: David S. Miller -
Signed-off-by: Al Viro
Signed-off-by: David S. Miller -
Calculation of IPX checksum got buggered about 2.4.0. The old variant
mangled the packet; that got fixed, but calculation itself got buggered.
Restored the correct logics, fixed a subtle breakage we used to have even
back then: if the sum is 0 mod 0xffff, we want to return 0, not 0xffff.
The latter has special meaning for IPX (cheksum disabled). Observation
(and obvious fix) nicked from history of FreeBSD ipx_cksum.c...Signed-off-by: Al Viro
Signed-off-by: David S. Miller -
Signed-off-by: Al Viro
Signed-off-by: David S. Miller
02 Nov, 2006
2 commits
-
net/bridge/netfilter/ebtables.c: In function 'ebt_dev_check':
net/bridge/netfilter/ebtables.c:89: warning: initialization discards qualifiers from pointer target typeSo make the char* a const char * and the warning is gone.
Signed-off-by: Meelis Roos
Signed-off-by: David S. Miller -
In theory these are opaque 32bit values. However, we end up
allocating them sequentially in host-endian and stick unchanged
on the wire.Signed-off-by: Al Viro
Signed-off-by: David S. Miller