[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20080620.224649.260163965.davem@davemloft.net>
Date: Fri, 20 Jun 2008 22:46:49 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: torvalds@...ux-foundation.org
CC: akpm@...ux-foundation.org, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: [GIT]: Networking
Several small fixes:
1) SCTP length overflow fix.
2) Dying network namespaces can be processed erroneously by
input packets, fix from Eric W. Biederman.
3) Prevent and warn about dead loops in mac80211 layer, from
Johannes Berg.
4) IPV6 socket option handling fix from Shan Wei.
5) pppoe build warning fix from Stephen Hemminger
6) Conformance tests show that ipv6 erroneously accepts external
packets with a source loopback address. Reported by Karsten
Keil and final fix by YOSHIFUJI Hideaki.
Please pull, thanks a lot!
The following changes since commit 6d1a3fb567a728d31474636e167c324702a0c38b:
Patrick McHardy (1):
netlink: genl: fix circular locking
are available in the git repository at:
master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6.git master
David S. Miller (1):
sctp: Make sure N * sizeof(union sctp_addr) does not overflow.
Eric W. Biederman (1):
netns: Don't receive new packets in a dead network namespace.
Johannes Berg (1):
mac80211: detect driver tx bugs
Shan Wei (1):
ipv6: Remove options header when setsockopt's optlen is 0
Stephen Hemminger (1):
pppoe: warning fix
YOSHIFUJI Hideaki (1):
ipv6: Drop packets for loopback address from outside of the box.
drivers/net/pppoe.c | 2 +-
include/net/ipv6.h | 6 ++++++
include/net/net_namespace.h | 11 +++++++++++
net/core/dev.c | 4 ++++
net/core/net_namespace.c | 3 +++
net/ipv6/ip6_input.c | 9 +++++++++
net/ipv6/ipv6_sockglue.c | 11 +++++++----
net/mac80211/tx.c | 9 ++++++++-
net/sctp/socket.c | 4 +++-
9 files changed, 52 insertions(+), 7 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists