<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/net, branch v2.6.15</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v2.6.15</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v2.6.15'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2005-12-27T22:03:00Z</updated>
<entry>
<title>[IPV6] mcast: Fix multiple issues in MLDv2 reports.</title>
<updated>2005-12-27T22:03:00Z</updated>
<author>
<name>David L Stevens</name>
<email>dlstevens@us.ibm.com</email>
</author>
<published>2005-12-27T22:03:00Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=5ab4a6c81eb3dbe32361791d1535f9153f79b0ed'/>
<id>urn:sha1:5ab4a6c81eb3dbe32361791d1535f9153f79b0ed</id>
<content type='text'>
The below "jumbo" patch fixes the following problems in MLDv2.

1) Add necessary "ntohs" to recent "pskb_may_pull" check [breaks
        all nonzero source queries on little-endian (!)]

2) Add locking to source filter list [resend of prior patch]

3) fix "mld_marksources()" to
        a) send nothing when all queried sources are excluded
        b) send full exclude report when source queried sources are
                not excluded
        c) don't schedule a timer when there's nothing to report

NOTE: RFC 3810 specifies the source list should be saved and each
  source reported individually as an IS_IN. This is an obvious DOS
  path, requiring the host to store and then multicast as many sources
  as are queried (e.g., millions...). This alternative sends a full, 
  relevant report that's limited to number of sources present on the
  machine.

4) fix "add_grec()" to send empty-source records when it should
        The original check doesn't account for a non-empty source
        list with all sources inactive; the new code keeps that
        short-circuit case, and also generates the group header
        with an empty list if needed.

5) fix mca_crcount decrement to be after add_grec(), which needs
        its original value

These issues (other than item #1 ;-) ) were all found by Yan Zheng,
much thanks!

Signed-off-by: David L Stevens &lt;dlstevens@us.ibm.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NET]: Validate socket filters against BPF_MAXINSNS in one spot.</title>
<updated>2005-12-27T21:57:59Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2005-12-27T21:57:59Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=1b93ae64cabe5e28dd5a1f35f96f938ca4f6ae20'/>
<id>urn:sha1:1b93ae64cabe5e28dd5a1f35f96f938ca4f6ae20</id>
<content type='text'>
Currently the checks are scattered all over and this leads
to inconsistencies and even cases where the check is not made.

Based upon a patch from Kris Katterjohn.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV6]: Fix addrconf dead lock.</title>
<updated>2005-12-27T21:35:15Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2005-12-27T21:35:15Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=6732badee0dad467fcc9dd0168af8677b2b1bc2f'/>
<id>urn:sha1:6732badee0dad467fcc9dd0168af8677b2b1bc2f</id>
<content type='text'>
We need to release idev-&gt;lcok before we call addrconf_dad_stop().
It calls ipv6_addr_del(), which will hold idev-&gt;lock.

Bug spotted by Yasuyuki KOZAKAI &lt;yasuyuki.kozakai@toshiba.co.jp&gt;.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[BR_NETFILTER]: Fix leak if skb traverses &gt; 1 bridge</title>
<updated>2005-12-27T01:27:10Z</updated>
<author>
<name>David Kimdon</name>
<email>david.kimdon@devicescape.com</email>
</author>
<published>2005-12-27T01:27:10Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=79cac2a221ce18642550a13bed0f0203514923ea'/>
<id>urn:sha1:79cac2a221ce18642550a13bed0f0203514923ea</id>
<content type='text'>
Call nf_bridge_put() before allocating a new nf_bridge structure and
potentially overwriting the pointer to a previously allocated one.
This fixes a memory leak which can occur when the bridge topology
allows for an skb to traverse more than one bridge.

Signed-off-by: David Kimdon &lt;david.kimdon@devicescape.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV6]: Increase default MLD_MAX_MSF to 64.</title>
<updated>2005-12-27T01:03:46Z</updated>
<author>
<name>David L Stevens</name>
<email>dlstevens@us.ibm.com</email>
</author>
<published>2005-12-27T01:03:46Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=6f4353d891b5e477528cd0b996e0263fecdf5d5f'/>
<id>urn:sha1:6f4353d891b5e477528cd0b996e0263fecdf5d5f</id>
<content type='text'>
The existing default of 10 is just way too low.

Signed-off-by: David L Stevens &lt;dlstevens@us.ibm.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV6]: Fix Temporary Address Generation</title>
<updated>2005-12-23T19:24:05Z</updated>
<author>
<name>Hiroyuki YAMAMORI</name>
<email>h-yamamo@db3.so-net.ne.jp</email>
</author>
<published>2005-12-23T19:24:05Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=291d809ba5c8d4d6d8812e3f185bdf57d539f594'/>
<id>urn:sha1:291d809ba5c8d4d6d8812e3f185bdf57d539f594</id>
<content type='text'>
From: Hiroyuki YAMAMORI &lt;h-yamamo@db3.so-net.ne.jp&gt;

Since regen_count is stored in the public address, we need to reset it
when we start renewing temporary address.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

</content>
</entry>
<entry>
<title>[IPV6]: Fix dead lock.</title>
<updated>2005-12-23T19:23:21Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2005-12-23T19:23:21Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=3dd3bf83574e38578fc9741c0e23e4fa7f7ff96e'/>
<id>urn:sha1:3dd3bf83574e38578fc9741c0e23e4fa7f7ff96e</id>
<content type='text'>
We need to relesae ifp-&gt;lock before we call addrconf_dad_stop(),
which will hold ifp-&gt;lock.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.skbuff.net/gitroot/yoshfuji/linux-2.6.14+git+ipv6-fix-20051221a</title>
<updated>2005-12-22T15:41:27Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2005-12-22T15:41:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=e6469297d4eecfd9f46929fe1f56a01141cb0791'/>
<id>urn:sha1:e6469297d4eecfd9f46929fe1f56a01141cb0791</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[IPSEC]: Fix policy updates missed by sockets</title>
<updated>2005-12-22T15:39:48Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@sunset.davemloft.net</email>
</author>
<published>2005-12-22T15:39:48Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=9b78a82c1cf19aa813bdaa184fa840a3ba811750'/>
<id>urn:sha1:9b78a82c1cf19aa813bdaa184fa840a3ba811750</id>
<content type='text'>
The problem is that when new policies are inserted, sockets do not see
the update (but all new route lookups do).

This bug is related to the SA insertion stale route issue solved
recently, and this policy visibility problem can be fixed in a similar
way.

The fix is to flush out the bundles of all policies deeper than the
policy being inserted.  Consider beginning state of "outgoing"
direction policy list:

	policy A --&gt; policy B --&gt; policy C --&gt; policy D

First, realize that inserting a policy into a list only potentially
changes IPSEC routes for that direction.  Therefore we need not bother
considering the policies for other directions.  We need only consider
the existing policies in the list we are doing the inserting.

Consider new policy "B'", inserted after B.

	policy A --&gt; policy B --&gt; policy B' --&gt; policy C --&gt; policy D

Two rules:

1) If policy A or policy B matched before the insertion, they
   appear before B' and thus would still match after inserting
   B'

2) Policy C and D, now "shadowed" and after policy B', potentially
   contain stale routes because policy B' might be selected
   instead of them.

Therefore we only need flush routes assosciated with policies
appearing after a newly inserted policy, if any.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[DCCP]: Comment typo</title>
<updated>2005-12-22T03:02:39Z</updated>
<author>
<name>Ian McDonald</name>
<email>imcdnzl@gmail.com</email>
</author>
<published>2005-12-22T03:02:39Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=4c7e6895027362889422e5dc437dc3238b6b4745'/>
<id>urn:sha1:4c7e6895027362889422e5dc437dc3238b6b4745</id>
<content type='text'>
I hope to actually change this behaviour shortly but this will help
anybody grepping code at present.

Signed-off-by: Ian McDonald &lt;imcdnzl@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
