1. 07 10月, 2009 1 次提交
  2. 01 10月, 2009 1 次提交
  3. 13 7月, 2009 1 次提交
  4. 18 6月, 2009 1 次提交
  5. 17 6月, 2009 1 次提交
  6. 16 6月, 2009 1 次提交
  7. 27 3月, 2009 1 次提交
  8. 14 3月, 2009 1 次提交
  9. 10 3月, 2009 1 次提交
  10. 01 2月, 2009 1 次提交
  11. 20 7月, 2008 1 次提交
  12. 17 6月, 2008 2 次提交
  13. 26 3月, 2008 2 次提交
  14. 01 2月, 2008 1 次提交
  15. 29 1月, 2008 1 次提交
    • E
      [X25]: Avoid divides and sparse warnings · 6bf1574e
      Eric Dumazet 提交于
         CHECK   net/x25/af_x25.c
      net/x25/af_x25.c:117:46: warning: expensive signed divide
         CHECK   net/x25/x25_facilities.c
      net/x25/x25_facilities.c:209:30: warning: expensive signed divide
         CHECK   net/x25/x25_in.c
      net/x25/x25_in.c:250:26: warning: expensive signed divide
         CHECK   net/x25/x25_proc.c
      net/x25/x25_proc.c:48:11: warning: context imbalance in 'x25_seq_route_start'
      - wrong count at exit
      net/x25/x25_proc.c:72:13: warning: context imbalance in 'x25_seq_route_stop' -
      unexpected unlock
      net/x25/x25_proc.c:112:11: warning: context imbalance in
      'x25_seq_socket_start' - wrong count at exit
      net/x25/x25_proc.c:129:13: warning: context imbalance in 'x25_seq_socket_stop'
      - unexpected unlock
      net/x25/x25_proc.c:190:11: warning: context imbalance in
      'x25_seq_forward_start' - wrong count at exit
      net/x25/x25_proc.c:215:13: warning: context imbalance in
      'x25_seq_forward_stop' - unexpected unlock
         CHECK   net/x25/x25_subr.c
      net/x25/x25_subr.c:362:57: warning: expensive signed divide
      Signed-off-by: NEric Dumazet <dada1@cosmosbay.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      6bf1574e
  16. 01 11月, 2007 1 次提交
  17. 11 10月, 2007 2 次提交
    • E
      [NET]: Make device event notification network namespace safe · e9dc8653
      Eric W. Biederman 提交于
      Every user of the network device notifiers is either a protocol
      stack or a pseudo device.  If a protocol stack that does not have
      support for multiple network namespaces receives an event for a
      device that is not in the initial network namespace it quite possibly
      can get confused and do the wrong thing.
      
      To avoid problems until all of the protocol stacks are converted
      this patch modifies all netdev event handlers to ignore events on
      devices that are not in the initial network namespace.
      
      As the rest of the code is made network namespace aware these
      checks can be removed.
      Signed-off-by: NEric W. Biederman <ebiederm@xmission.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      e9dc8653
    • E
      [NET]: Make socket creation namespace safe. · 1b8d7ae4
      Eric W. Biederman 提交于
      This patch passes in the namespace a new socket should be created in
      and has the socket code do the appropriate reference counting.  By
      virtue of this all socket create methods are touched.  In addition
      the socket create methods are modified so that they will fail if
      you attempt to create a socket in a non-default network namespace.
      
      Failing if we attempt to create a socket outside of the default
      network namespace ensures that as we incrementally make the network stack
      network namespace aware we will not export functionality that someone
      has not audited and made certain is network namespace safe.
      Allowing us to partially enable network namespaces before all of the
      exotic protocols are supported.
      
      Any protocol layers I have missed will fail to compile because I now
      pass an extra parameter into the socket creation code.
      
      [ Integrated AF_IUCV build fixes from Andrew Morton... -DaveM ]
      Signed-off-by: NEric W. Biederman <ebiederm@xmission.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      1b8d7ae4
  18. 09 5月, 2007 1 次提交
  19. 26 4月, 2007 4 次提交
  20. 11 2月, 2007 1 次提交
  21. 09 2月, 2007 2 次提交
  22. 04 1月, 2007 1 次提交
  23. 01 7月, 2006 1 次提交
  24. 22 3月, 2006 4 次提交
  25. 12 1月, 2006 1 次提交
  26. 07 1月, 2006 1 次提交
    • S
      [X25]: Fix for broken x25 module. · a20a8554
      Shaun Pereira 提交于
      When a user-space server application calls bind on a socket, then in kernel
      space this bound socket is considered 'x25-linked' and the SOCK_ZAPPED flag
      is unset.(As in x25_bind()/af_x25.c).
      
      Now when a user-space client application attempts to connect to the server
      on the listening socket, if the kernel accepts this in-coming call, then it
      returns a new socket to userland and attempts to reply to the caller.
      
      The reply/x25_sendmsg() will fail, because the new socket created on
      call-accept has its SOCK_ZAPPED flag set by x25_make_new().
      (sock_init_data() called by x25_alloc_socket() called by x25_make_new()
      sets the flag to SOCK_ZAPPED)).
      
      Fix: Using the sock_copy_flag() routine available in sock.h fixes this.
      
      Tested on 32 and 64 bit kernels with x25 over tcp.
      Signed-off-by: NShaun Pereira <pereira.shaun@gmail.com>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      a20a8554
  27. 04 1月, 2006 2 次提交
    • C
      [NET]: Add a dev_ioctl() fallback to sock_ioctl() · b5e5fa5e
      Christoph Hellwig 提交于
      Currently all network protocols need to call dev_ioctl as the default
      fallback in their ioctl implementations.  This patch adds a fallback
      to dev_ioctl to sock_ioctl if the protocol returned -ENOIOCTLCMD.
      This way all the procotol ioctl handlers can be simplified and we don't
      need to export dev_ioctl.
      Signed-off-by: NChristoph Hellwig <hch@lst.de>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      b5e5fa5e
    • E
      [NET]: move struct proto_ops to const · 90ddc4f0
      Eric Dumazet 提交于
      I noticed that some of 'struct proto_ops' used in the kernel may share
      a cache line used by locks or other heavily modified data. (default
      linker alignement is 32 bytes, and L1_CACHE_LINE is 64 or 128 at
      least)
      
      This patch makes sure a 'struct proto_ops' can be declared as const,
      so that all cpus can share all parts of it without false sharing.
      
      This is not mandatory : a driver can still use a read/write structure
      if it needs to (and eventually a __read_mostly)
      
      I made a global stubstitute to change all existing occurences to make
      them const.
      
      This should reduce the possibility of false sharing on SMP, and
      speedup some socket system calls.
      Signed-off-by: NEric Dumazet <dada1@cosmosbay.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      90ddc4f0
  28. 30 8月, 2005 1 次提交
  29. 23 6月, 2005 1 次提交
    • S
      [X25]: Fast select with no restriction on response · ebc3f64b
      Shaun Pereira 提交于
      This patch is a follow up to patch 1 regarding "Selective Sub Address
      matching with call user data".  It allows use of the Fast-Select-Acceptance
      optional user facility for X.25.
      
      This patch just implements fast select with no restriction on response
      (NRR).  What this means (according to ITU-T Recomendation 10/96 section
      6.16) is that if in an incoming call packet, the relevant facility bits are
      set for fast-select-NRR, then the called DTE can issue a direct response to
      the incoming packet using a call-accepted packet that contains
      call-user-data.  This patch allows such a response.  
      
      The called DTE can also respond with a clear-request packet that contains
      call-user-data.  However, this feature is currently not implemented by the
      patch.
      
      How is Fast Select Acceptance used?
      By default, the system does not allow fast select acceptance (as before).
      To enable a response to fast select acceptance,  
      After a listen socket in created and bound as follows
      	socket(AF_X25, SOCK_SEQPACKET, 0);
      	bind(call_soc, (struct sockaddr *)&locl_addr, sizeof(locl_addr));
      but before a listen system call is made, the following ioctl should be used.
      	ioctl(call_soc,SIOCX25CALLACCPTAPPRV);
      Now the listen system call can be made
      	listen(call_soc, 4);
      After this, an incoming-call packet will be accepted, but no call-accepted 
      packet will be sent back until the following system call is made on the socket
      that accepts the call
      	ioctl(vc_soc,SIOCX25SENDCALLACCPT);
      The network (or cisco xot router used for testing here) will allow the 
      application server's call-user-data in the call-accepted packet, 
      provided the call-request was made with Fast-select NRR.
      Signed-off-by: NShaun Pereira <spereira@tusc.com.au>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      ebc3f64b