23 Sep, 2014

4 commits

  • Pull networking fixes from David Miller:

    1) If the user gives us a msg_namelen of 0, don't try to interpret
    anything pointed to by msg_name. From Ani Sinha.

    2) Fix some bnx2i/bnx2fc randconfig compilation errors.

    The gist of the issue is that we firstly have drivers that span both
    SCSI and networking. And at the top of that chain of dependencies
    we have things like SCSI_FC_ATTRS and SCSI_NETLINK which are
    selected.

    But since select is a sledgehammer and ignores dependencies,
    everything to select's SCSI_FC_ATTRS and/or SCSI_NETLINK has to also
    explicitly select their dependencies and so on and so forth.

    Generally speaking 'select' is supposed to only be used for child
    nodes, those which have no dependencies of their own. And this
    whole chain of dependencies in the scsi layer violates that rather
    strongly.

    So just make SCSI_NETLINK depend upon it's dependencies, and so on
    and so forth for the things selecting it (either directly or
    indirectly).

    From Anish Bhatt and Randy Dunlap.

    3) Fix generation of blackhole routes in IPSEC, from Steffen Klassert.

    4) Actually notice netdev feature changes in rtl_open() code, from
    Hayes Wang.

    5) Fix divide by zero in bond enslaving, from Nikolay Aleksandrov.

    6) Missing memory barrier in sunvnet driver, from David Stevens.

    7) Don't leave anycast addresses around when ipv6 interface is
    destroyed, from Sabrina Dubroca.

    8) Don't call efx_{arch}_filter_sync_rx_mode before addr_list_lock is
    initialized in SFC driver, from Edward Cree.

    9) Fix missing DMA error checking in 3c59x, from Neal Horman.

    10) Openvswitch doesn't emit OVS_FLOW_CMD_NEW notifications accidently,
    fix from Samuel Gauthier.

    11) pch_gbe needs to select NET_PTP_CLASSIFY otherwise we can get a
    build error.

    12) Fix macvlan regression wherein we stopped emitting
    broadcast/multicast frames over software devices. From Nicolas
    Dichtel.

    13) Fix infiniband bug due to unintended overflow of skb->cb[], from
    Eric Dumazet. And add an assertion so this doesn't happen again.

    14) dm9000_parse_dt() should return error pointers, not NULL. From
    Tobias Klauser.

    15) IP tunneling code uses this_cpu_ptr() in preemptible contexts, fix
    from Eric Dumazet.

    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (87 commits)
    net: bcmgenet: call bcmgenet_dma_teardown in bcmgenet_fini_dma
    net: bcmgenet: fix TX reclaim accounting for fragments
    ipv4: do not use this_cpu_ptr() in preemptible context
    dm9000: Return an ERR_PTR() in all error conditions of dm9000_parse_dt()
    r8169: fix an if condition
    r8152: disable ALDPS
    ipoib: validate struct ipoib_cb size
    net: sched: shrink struct qdisc_skb_cb to 28 bytes
    tg3: Work around HW/FW limitations with vlan encapsulated frames
    macvlan: allow to enqueue broadcast pkt on virtual device
    pch_gbe: 'select' NET_PTP_CLASSIFY.
    scsi: Use 'depends' with LIBFC instead of 'select'.
    openvswitch: restore OVS_FLOW_CMD_NEW notifications
    genetlink: add function genl_has_listeners()
    lib: rhashtable: remove second linux/log2.h inclusion
    net: allow macvlans to move to net namespace
    3c59x: Fix bad offset spec in skb_frag_dma_map
    3c59x: Add dma error checking and recovery
    sparc: bpf_jit: fix support for ldx/stx mem and SKF_AD_VLAN_TAG
    can: at91_can: add missing prepare and unprepare of the clock
    ...

    Linus Torvalds
     
  • this_cpu_ptr() in preemptible context is generally bad

    Sep 22 05:05:55 br kernel: [ 94.608310] BUG: using smp_processor_id()
    in
    preemptible [00000000] code: ip/2261
    Sep 22 05:05:55 br kernel: [ 94.608316] caller is
    tunnel_dst_set.isra.28+0x20/0x60 [ip_tunnel]
    Sep 22 05:05:55 br kernel: [ 94.608319] CPU: 3 PID: 2261 Comm: ip Not
    tainted
    3.17.0-rc5 #82

    We can simply use raw_cpu_ptr(), as preemption is safe in these
    contexts.

    Should fix https://bugzilla.kernel.org/show_bug.cgi?id=84991

    Signed-off-by: Eric Dumazet
    Reported-by: Joe
    Fixes: 9a4aa9af447f ("ipv4: Use percpu Cache route in IP tunnels")
    Acked-by: Tom Herbert
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • Steffen Klassert says:

    ====================
    pull request (net): ipsec 2014-09-22

    We generate a blackhole or queueing route if a packet
    matches an IPsec policy but a state can't be resolved.
    Here we assume that dst_output() is called to kill
    these packets. Unfortunately this assumption is not
    true in all cases, so it is possible that these packets
    leave the system without the necessary transformations.

    This pull request contains two patches to fix this issue:

    1) Fix for blackhole routed packets.

    2) Fix for queue routed packets.

    Both patches are serious stable candidates.

    Please pull or let me know if there are problems.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • We cannot make struct qdisc_skb_cb bigger without impacting IPoIB,
    or increasing skb->cb[] size.

    Commit e0f31d849867 ("flow_keys: Record IP layer protocol in
    skb_flow_dissect()") broke IPoIB.

    Only current offender is sch_choke, and this one do not need an
    absolutely precise flow key.

    If we store 17 bytes of flow key, its more than enough. (Its the actual
    size of flow_keys if it was a packed structure, but we might add new
    fields at the end of it later)

    Signed-off-by: Eric Dumazet
    Fixes: e0f31d849867 ("flow_keys: Record IP layer protocol in skb_flow_dissect()")
    Signed-off-by: David S. Miller

    Eric Dumazet
     

20 Sep, 2014

2 commits

  • Since commit fb5d1e9e127a ("openvswitch: Build flow cmd netlink reply only if needed."),
    the new flows are not notified to the listeners of OVS_FLOW_MCGROUP.

    This commit fixes the problem by using the genl function, ie
    genl_has_listerners() instead of netlink_has_listeners().

    Signed-off-by: Samuel Gauthier
    Signed-off-by: Nicolas Dichtel
    Acked-by: Pravin B Shelar
    Signed-off-by: David S. Miller

    Samuel Gauthier
     
  • John W. Linville says:

    ====================
    pull request: wireless 2014-09-17

    Please pull this batch of fixes intended for the 3.17 stream...

    Arend van Spriel sends a trio of minor brcmfmac fixes, including a
    fix for a Kconfig/build issue, a fix for a crash (null reference),
    and a regression fix related to event handling on a P2P interface.

    Hante Meuleman follows-up with a brcmfmac fix for a memory leak.

    Johannes Stezenbach brings an ath9k_htc fix for a regression related
    to hardware decryption offload.

    Marcel Holtmann delivers a one-liner to properly mark a device ID
    table in rfkill-gpio.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     

17 Sep, 2014

1 commit


16 Sep, 2014

4 commits

  • Currently we genarate a queueing route if we have matching policies
    but can not resolve the states and the sysctl xfrm_larval_drop is
    disabled. Here we assume that dst_output() is called to kill the
    queued packets. Unfortunately this assumption is not true in all
    cases, so it is possible that these packets leave the system unwanted.

    We fix this by generating queueing routes only from the
    route lookup functions, here we can guarantee a call to
    dst_output() afterwards.

    Fixes: a0073fe18e71 ("xfrm: Add a state resolution packet queue")
    Reported-by: Konstantinos Kolelis
    Signed-off-by: Steffen Klassert

    Steffen Klassert
     
  • Currently we genarate a blackhole route route whenever we have
    matching policies but can not resolve the states. Here we assume
    that dst_output() is called to kill the balckholed packets.
    Unfortunately this assumption is not true in all cases, so
    it is possible that these packets leave the system unwanted.

    We fix this by generating blackhole routes only from the
    route lookup functions, here we can guarantee a call to
    dst_output() afterwards.

    Fixes: 2774c131b1d ("xfrm: Handle blackhole route creation via afinfo.")
    Reported-by: Konstantinos Kolelis
    Signed-off-by: Steffen Klassert

    Steffen Klassert
     
  • As Toshiaki Makita pointed out, the BRIDGE_INPUT_SKB_CB will
    not be initialized in br_should_learn() as that function
    is called only from br_handle_local_finish(). That is
    an input handler for link-local ethernet traffic so it perfectly
    correct to check br->vlan_enabled here.

    Reported-by: Toshiaki Makita
    Fixes: 20adfa1 bridge: Check if vlan filtering is enabled only once.
    Signed-off-by: Vladislav Yasevich
    Signed-off-by: David S. Miller

    Vlad Yasevich
     
  • __netdev_adjacent_dev_insert may add adjust device of different net
    namespace, without proper check it leads to emergence of broken
    sysfs links from/to devices in another namespace.
    Fix: rewrite netdev_adjacent_is_neigh_list macro as a function,
    move net_eq check into netdev_adjacent_is_neigh_list.
    (thanks David)
    related to: 4c75431ac3520631f1d9e74aa88407e6374dbbc4

    Signed-off-by: Alexander Fomichev
    Signed-off-by: David S. Miller

    Alexander Y. Fomichev
     

14 Sep, 2014

2 commits

  • Currently, it is possible to modify the vlan filter
    configuration to add pvid or untagged support.
    For example:
    bridge vlan add vid 10 dev eth0
    bridge vlan add vid 10 dev eth0 untagged pvid

    The second statement will modify vlan 10 to
    include untagged and pvid configuration.
    However, it is currently impossible to go backwards
    bridge vlan add vid 10 dev eth0 untagged pvid
    bridge vlan add vid 10 dev eth0

    Here nothing happens. This patch correct this so
    that any modifiers not supplied are removed from
    the configuration.

    Signed-off-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Vlad Yasevich
     
  • The bridge code checks if vlan filtering is enabled on both
    ingress and egress. When the state flip happens, it
    is possible for the bridge to currently be forwarding packets
    and forwarding behavior becomes non-deterministic. Bridge
    may drop packets on some interfaces, but not others.

    This patch solves this by caching the filtered state of the
    packet into skb_cb on ingress. The skb_cb is guaranteed to
    not be over-written between the time packet entres bridge
    forwarding path and the time it leaves it. On egress, we
    can then check the cached state to see if we need to
    apply filtering information.

    Signed-off-by: Vladislav Yasevich
    Signed-off-by: David S. Miller

    Vlad Yasevich
     

13 Sep, 2014

2 commits

  • John W. Linville says:

    ====================
    pull request: wireless 2014-09-11

    Please pull this batch of fixes intended for the 3.17 stream:

    For the mac80211 bits, Johannes says:

    "Two more fixes for mac80211 - one of them addresses a long-standing
    issue that we only found when using vendor events more frequently;
    the other addresses some bad information being reported in userspace
    that people were starting to actually look at."

    For the iwlwifi bits, Emmanuel says:

    "I re-enable scheduled scan on firmware that contain the fix for
    the bug that Linus reported. A few trivial fixes: endianity issues,
    the same DTIM period fix that I did in mac80211. Eyal fixes a few
    issues we identified with EAPOL, we now send them just as if they were
    management frames, this solves interrop issues. Johannes has another
    set of trivial fixes, while Luca fixes the way we configure the filters
    in the firmware. Last but not least, a new device is added by Oren."

    Emmanuel was traveling, resulting in his pull to be a bit larger than
    I would have liked to see at this point. FWIW, I have asked Emmanuel
    to be much more strict for any more pull requests in this cycle.

    In addition to the above, Sujith Manoharan reverts an earlier ath9k
    patch. The earlier change was found to allow for the device to sleep
    too long and miss beacons.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • If we try to rmmod the driver for an interface while sockets with
    setsockopt(JOIN_ANYCAST) are alive, some refcounts aren't cleaned up
    and we get stuck on:

    unregister_netdevice: waiting for ens3 to become free. Usage count = 1

    If we LEAVE_ANYCAST/close everything before rmmod'ing, there is no
    problem.

    We need to perform a cleanup similar to the one for multicast in
    addrconf_ifdown(how == 1).

    Signed-off-by: Sabrina Dubroca
    Acked-by: Hannes Frederic Sowa
    Signed-off-by: David S. Miller

    Sabrina Dubroca
     

12 Sep, 2014

1 commit

  • Pull Ceph fixes from Sage Weil:
    "The main thing here is a set of three patches that fix a buffer
    overrun for large authentication tickets (sigh).

    There is also a trivial warning fix and an error path fix that are
    both regressions"

    * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client:
    libceph: do not hard code max auth ticket len
    libceph: add process_one_ticket() helper
    libceph: gracefully handle large reply messages from the mon
    rbd: fix error return code in rbd_dev_device_setup()
    rbd: avoid format-security warning inside alloc_workqueue()

    Linus Torvalds
     

11 Sep, 2014

3 commits

  • We hard code cephx auth ticket buffer size to 256 bytes. This isn't
    enough for any moderate setups and, in case tickets themselves are not
    encrypted, leads to buffer overflows (ceph_x_decrypt() errors out, but
    ceph_decode_copy() doesn't - it's just a memcpy() wrapper). Since the
    buffer is allocated dynamically anyway, allocated it a bit later, at
    the point where we know how much is going to be needed.

    Fixes: http://tracker.ceph.com/issues/8979

    Cc: stable@vger.kernel.org
    Signed-off-by: Ilya Dryomov
    Reviewed-by: Sage Weil

    Ilya Dryomov
     
  • Add a helper for processing individual cephx auth tickets. Needed for
    the next commit, which deals with allocating ticket buffers. (Most of
    the diff here is whitespace - view with git diff -b).

    Cc: stable@vger.kernel.org
    Signed-off-by: Ilya Dryomov
    Reviewed-by: Sage Weil

    Ilya Dryomov
     
  • We preallocate a few of the message types we get back from the mon. If we
    get a larger message than we are expecting, fall back to trying to allocate
    a new one instead of blindly using the one we have.

    CC: stable@vger.kernel.org
    Signed-off-by: Sage Weil
    Reviewed-by: Ilya Dryomov

    Sage Weil
     

10 Sep, 2014

3 commits


09 Sep, 2014

1 commit


08 Sep, 2014

2 commits

  • John W. Linville says:

    ====================
    pull request: wireless 2014-09-05

    Please pull this batch of fixes intended for the 3.17 stream...

    For the mac80211 bits, Johannes says:

    "Here are a few fixes for mac80211. One has been discussed for a while
    and adds a terminating NUL-byte to the alpha2 sent to userspace, which
    shouldn't be necessary but since many places treat it as a string we
    couldn't move to just sending two bytes.

    In addition to that, we have two VLAN fixes from Felix, a mesh fix, a
    fix for the recently introduced RX aggregation offload, a revert for
    a broken patch (that luckily didn't really cause any harm) and a small
    fix for alignment in debugfs."

    For the iwlwifi bits, Emmanuel says:

    "I revert a patch that disabled CTS to self in dvm because users
    reported issues. The revert is CCed to stable since the offending
    patch was sent to stable too. I also bump the firmware API versions
    since a new firmware is coming up. On top of that, Marcel fixes a
    bug I introduced while fixing a bug in our Kconfig file."

    Please let me know if there are problems!
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • It is possible that the interface is already gone after joining
    the list of anycast on this interface as we don't hold a refcount
    for the device, in this case we are safe to ignore the error.

    What's more important, for API compatibility we should not
    change this behavior for applications even if it were correct.

    Fixes: commit a9ed4a2986e13011 ("ipv6: fix rtnl locking in setsockopt for anycast and multicast")
    Cc: Sabrina Dubroca
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Acked-by: Hannes Frederic Sowa
    Signed-off-by: David S. Miller

    WANG Cong
     

06 Sep, 2014

7 commits

  • This patch fix spelling typo found in DocBook/networking.xml.
    It is because the neworking.xml is generated from comments
    in the source, I have to fix typo in comments within the source.

    Signed-off-by: Masanari Iida
    Acked-by: Randy Dunlap
    Signed-off-by: David S. Miller

    Masanari Iida
     
  • Paul Bolle reports that 'select NETFILTER_XT_NAT' from the IPV4 and IPV6
    NAT tables becomes noop since there is no Kconfig switch for it. Add the
    Kconfig switch to resolve this problem.

    Fixes: 8993cf8 netfilter: move NAT Kconfig switches out of the iptables scope
    Reported-by: Paul Bolle
    Signed-off-by: Pablo Neira Ayuso
    Signed-off-by: David S. Miller

    Pablo Neira Ayuso
     
  • addrconf_get_prefix_route() ensures to get the right route in the right table.

    Signed-off-by: Nicolas Dichtel
    Acked-by: Hannes Frederic Sowa
    Signed-off-by: David S. Miller

    Nicolas Dichtel
     
  • There is no reason to take a refcnt before deleting the peer address route.
    It's done some lines below for the local prefix route because
    inet6_ifa_finish_destroy() will release it at the end.
    For the peer address route, we want to free it right now.

    This bug has been introduced by commit
    caeaba79009c ("ipv6: add support of peer address").

    Signed-off-by: Nicolas Dichtel
    Acked-by: Hannes Frederic Sowa
    Signed-off-by: David S. Miller

    Nicolas Dichtel
     
  • The timestamping API has separate bits for generating and reporting
    timestamps. A software timestamp should only be reported for a packet
    when the packet has the relevant generation flag (SKBTX_..) set
    and the socket has reporting bit SOF_TIMESTAMPING_SOFTWARE set.

    The second check was accidentally removed. Reinstitute the original
    behavior.

    Tested:
    Without this patch, Documentation/networking/txtimestamp reports
    timestamps regardless of whether SOF_TIMESTAMPING_SOFTWARE is set.
    After the patch, it only reports them when the flag is set.

    Fixes: f24b9be5957b ("net-timestamp: extend SCM_TIMESTAMPING ancillary data struct")
    Signed-off-by: Willem de Bruijn
    Signed-off-by: David S. Miller

    Willem de Bruijn
     
  • Use dst_entry held by sk_dst_get() to retrieve tunnel's PMTU.

    The dst_mtu(__sk_dst_get(tunnel->sock)) call was racy. __sk_dst_get()
    could return NULL if tunnel->sock->sk_dst_cache was reset just before the
    call, thus making dst_mtu() dereference a NULL pointer:

    [ 1937.661598] BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
    [ 1937.664005] IP: [] pppol2tp_connect+0x33d/0x41e [l2tp_ppp]
    [ 1937.664005] PGD daf0c067 PUD d9f93067 PMD 0
    [ 1937.664005] Oops: 0000 [#1] SMP
    [ 1937.664005] Modules linked in: l2tp_ppp l2tp_netlink l2tp_core ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables udp_tunnel pppoe pppox ppp_generic slhc deflate ctr twofish_generic twofish_x86_64_3way xts lrw gf128mul glue_helper twofish_x86_64 twofish_common blowfish_generic blowfish_x86_64 blowfish_common des_generic cbc xcbc rmd160 sha512_generic hmac crypto_null af_key xfrm_algo 8021q garp bridge stp llc tun atmtcp clip atm ext3 mbcache jbd iTCO_wdt coretemp kvm_intel iTCO_vendor_support kvm pcspkr evdev ehci_pci lpc_ich mfd_core i5400_edac edac_core i5k_amb shpchp button processor thermal_sys xfs crc32c_generic libcrc32c dm_mod usbhid sg hid sr_mod sd_mod cdrom crc_t10dif crct10dif_common ata_generic ahci ata_piix tg3 libahci libata uhci_hcd ptp ehci_hcd pps_core usbcore scsi_mod libphy usb_common [last unloaded: l2tp_core]
    [ 1937.664005] CPU: 0 PID: 10022 Comm: l2tpstress Tainted: G O 3.17.0-rc1 #1
    [ 1937.664005] Hardware name: HP ProLiant DL160 G5, BIOS O12 08/22/2008
    [ 1937.664005] task: ffff8800d8fda790 ti: ffff8800c43c4000 task.ti: ffff8800c43c4000
    [ 1937.664005] RIP: 0010:[] [] pppol2tp_connect+0x33d/0x41e [l2tp_ppp]
    [ 1937.664005] RSP: 0018:ffff8800c43c7de8 EFLAGS: 00010282
    [ 1937.664005] RAX: ffff8800da8a7240 RBX: ffff8800d8c64600 RCX: 000001c325a137b5
    [ 1937.664005] RDX: 8c6318c6318c6320 RSI: 000000000000010c RDI: 0000000000000000
    [ 1937.664005] RBP: ffff8800c43c7ea8 R08: 0000000000000000 R09: 0000000000000000
    [ 1937.664005] R10: ffffffffa048e2c0 R11: ffff8800d8c64600 R12: ffff8800ca7a5000
    [ 1937.664005] R13: ffff8800c439bf40 R14: 000000000000000c R15: 0000000000000009
    [ 1937.664005] FS: 00007fd7f610f700(0000) GS:ffff88011a600000(0000) knlGS:0000000000000000
    [ 1937.664005] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
    [ 1937.664005] CR2: 0000000000000020 CR3: 00000000d9d75000 CR4: 00000000000027e0
    [ 1937.664005] Stack:
    [ 1937.664005] ffffffffa049da80 ffff8800d8fda790 000000000000005b ffff880000000009
    [ 1937.664005] ffff8800daf3f200 0000000000000003 ffff8800c43c7e48 ffffffff81109b57
    [ 1937.664005] ffffffff81109b0e ffffffff8114c566 0000000000000000 0000000000000000
    [ 1937.664005] Call Trace:
    [ 1937.664005] [] ? pppol2tp_connect+0x235/0x41e [l2tp_ppp]
    [ 1937.664005] [] ? might_fault+0x9e/0xa5
    [ 1937.664005] [] ? might_fault+0x55/0xa5
    [ 1937.664005] [] ? rcu_read_unlock+0x1c/0x26
    [ 1937.664005] [] SYSC_connect+0x87/0xb1
    [ 1937.664005] [] ? sysret_check+0x1b/0x56
    [ 1937.664005] [] ? trace_hardirqs_on_caller+0x145/0x1a1
    [ 1937.664005] [] ? trace_hardirqs_on_thunk+0x3a/0x3f
    [ 1937.664005] [] ? spin_lock+0x9/0xb
    [ 1937.664005] [] SyS_connect+0x9/0xb
    [ 1937.664005] [] system_call_fastpath+0x16/0x1b
    [ 1937.664005] Code: 10 2a 84 81 e8 65 76 bd e0 65 ff 0c 25 10 bb 00 00 4d 85 ed 74 37 48 8b 85 60 ff ff ff 48 8b 80 88 01 00 00 48 8b b8 10 02 00 00 8b 47 20 ff 50 20 85 c0 74 0f 83 e8 28 89 83 10 01 00 00 89
    [ 1937.664005] RIP [] pppol2tp_connect+0x33d/0x41e [l2tp_ppp]
    [ 1937.664005] RSP
    [ 1937.664005] CR2: 0000000000000020
    [ 1939.559375] ---[ end trace 82d44500f28f8708 ]---

    Fixes: f34c4a35d879 ("l2tp: take PMTU from tunnel UDP socket")
    Signed-off-by: Guillaume Nault
    Acked-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Guillaume Nault
     
  • Calling setsockopt with IPV6_JOIN_ANYCAST or IPV6_LEAVE_ANYCAST
    triggers the assertion in addrconf_join_solict()/addrconf_leave_solict()

    ipv6_sock_ac_join(), ipv6_sock_ac_drop(), ipv6_sock_ac_close() need to
    take RTNL before calling ipv6_dev_ac_inc/dec. Same thing with
    ipv6_sock_mc_join(), ipv6_sock_mc_drop(), ipv6_sock_mc_close() before
    calling ipv6_dev_mc_inc/dec.

    This patch moves ASSERT_RTNL() up a level in the call stack.

    Signed-off-by: Cong Wang
    Signed-off-by: Sabrina Dubroca
    Reported-by: Tommi Rantala
    Acked-by: Hannes Frederic Sowa
    Signed-off-by: David S. Miller

    Sabrina Dubroca
     

05 Sep, 2014

2 commits

  • sta_set_sinfo is obviously takes data for specific station.
    This specific station is attached to a specific virtual
    interface. Hence we should use the dtim_period from this
    virtual interface rather than the system wide dtim_period.

    Signed-off-by: Emmanuel Grumbach
    Signed-off-by: Johannes Berg

    Emmanuel Grumbach
     
  • …ernel/git/jberg/mac80211

    Johannes Berg <johannes@sipsolutions.net> says:

    "Here are a few fixes for mac80211. One has been discussed for a while
    and adds a terminating NUL-byte to the alpha2 sent to userspace, which
    shouldn't be necessary but since many places treat it as a string we
    couldn't move to just sending two bytes.

    In addition to that, we have two VLAN fixes from Felix, a mesh fix, a
    fix for the recently introduced RX aggregation offload, a revert for
    a broken patch (that luckily didn't really cause any harm) and a small
    fix for alignment in debugfs."

    Signed-off-by: John W. Linville <linville@redhat.com>

    John W. Linville
     

04 Sep, 2014

1 commit


03 Sep, 2014

4 commits

  • In testmode and vendor command reply/event SKBs we use the
    skb cb data to store nl80211 parameters between allocation
    and sending. This causes the code for CONFIG_NETLINK_MMAP
    to get confused, because it takes ownership of the skb cb
    data when the SKB is handed off to netlink, and it doesn't
    explicitly clear it.

    Clear the skb cb explicitly when we're done and before it
    gets passed to netlink to avoid this issue.

    Cc: stable@vger.kernel.org [this goes way back]
    Reported-by: Assaf Azulay
    Reported-by: David Spinadel
    Signed-off-by: Johannes Berg

    Johannes Berg
     
  • The user_skb maybe be leaked if the operation on it failed and codes
    skipped into the label "out:" without calling genlmsg_unicast.

    Cc: Pravin Shelar
    Signed-off-by: Li RongQing
    Acked-by: Pravin B Shelar
    Signed-off-by: David S. Miller

    Li RongQing
     
  • make defconfig reports:

    warning: (NETFILTER_XT_TARGET_LOG) selects NF_LOG_IPV6 which has unmet direct dependencies (NET && INET && IPV6 && NETFILTER && NETFILTER_ADVANCED)

    Fixes: d79a61d netfilter: NETFILTER_XT_TARGET_LOG selects NF_LOG_*
    Reported-by: kbuild test robot
    Signed-off-by: Pablo Neira Ayuso
    Signed-off-by: David S. Miller

    Pablo Neira
     
  • Pablo Neira Ayuso says:

    ====================
    pull request: Netfilter/IPVS fixes for net

    The following patchset contains seven Netfilter fixes for your net
    tree, they are:

    1) Make the NAT infrastructure independent of x_tables, some users are
    already starting to test nf_tables with NAT without enabling x_tables.
    Without this patch for Kconfig, there's a superfluous dependency
    between NAT and x_tables.
    2) Allow to use 0 in the cgroup match, the kernel rejects with -EINVAL
    with no good reason. From Daniel Borkmann.

    3) Select CONFIG_NF_NAT from the nf_tables NAT expression, this also
    resolves another NAT dependency with x_tables.

    4) Use HAVE_JUMP_LABEL instead of CONFIG_JUMP_LABEL in the Netfilter hook
    code as elsewhere in the kernel to resolve toolchain problems, from
    Zhouyi Zhou.

    5) Use iptunnel_handle_offloads() to set up tunnel encapsulation
    depending on the offload capabilities, reported by Alex Gartrell
    patch from Julian Anastasov.

    6) Fix wrong family when registering the ip_vs_local_reply6() hook,
    also from Julian.

    7) Select the NF_LOG_* symbols from NETFILTER_XT_TARGET_LOG. Rafał
    Miłecki reported that when jumping from 3.16 to 3.17-rc, his log
    target is not selected anymore due to changes in the previous
    development cycle to accomodate the full logging support for
    nf_tables.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     

02 Sep, 2014

1 commit

  • John W. Linville says:

    ====================
    pull request: wireless 2014-08-28

    Please pull this batch of fixes intended for the 3.17 stream.

    For the Bluetooth/6LowPAN/802.15.4 bits, Johan says:

    'It contains a connection reference counting fix for LE where a
    connection might stay up even though it should get disconnected.

    The other 802.15.4 6LoWPAN related patches were sent to the bluetooth
    tree by Alexander Aring and described as follows by him:

    "
    these patches contains patches for the bluetooth branch.

    This series includes memory leak fixes and an errno value fix.
    Also there are two patches for sending and receiving 1280 6LoWPAN
    packets, which makes the IEEE 802.15.4 6LoWPAN stack more RFC
    compliant.
    "'

    Along with that...

    Alexey Khoroshilov fixes a use-after-free bug on at76c50x-usb.

    Hauke Mehrtens adds a PCI ID to bcma.

    Himangi Saraogi fixes a silly "A || A" test in rtlwifi.

    Larry Finger adds a device ID to rtl8192cu.

    Maks Naumov fixes a strncmp argument in ath9k.

    Álvaro Fernández Rojas adds a PCI ID to ssb.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller