1. 05 10月, 2015 3 次提交
    • P
      Merge tag 'ipvs3-for-v4.4' of https://git.kernel.org/pub/scm/linux/kernel/git/horms/ipvs-next · 2b5b1a01
      Pablo Neira Ayuso 提交于
      Simon Horman says:
      
      ====================
      Third Round of IPVS Updates for v4.4
      
      please consider this build fix from Eric Biederman which resolves
      a build problem introduced in is excellent work to cleanup IPVS which
      you recently pulled: its queued up for v4.4 so no need to worry
      about earlier kernel versions.
      
      I have another minor cleanup, to fix a build warning, pending.
      However, I wanted to send this one to you now as its hit nf-next,
      net-next and in turn next, and a slow trickle of bug reports are appearing.
      ====================
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      2b5b1a01
    • P
      netfilter: rename nfnetlink_queue_core.c to nfnetlink_queue.c · 32f40c5f
      Pablo Neira Ayuso 提交于
      Now that we have integrated the ct glue code into nfnetlink_queue without
      introducing dependencies with the conntrack code.
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      32f40c5f
    • P
      netfilter: nfnetlink_queue: get rid of nfnetlink_queue_ct.c · b7bd1809
      Pablo Neira Ayuso 提交于
      The original intention was to avoid dependencies between nfnetlink_queue and
      conntrack without ifdef pollution. However, we can achieve this by moving the
      conntrack dependent code into ctnetlink and keep some glue code to access the
      nfq_ct indirection from nfqueue.
      
      After this patch, the nfq_ct indirection is always compiled in the netfilter
      core to avoid polluting nfqueue with ifdefs. Thus, if nf_conntrack is not
      compiled this results in only 8-bytes of memory waste in x86_64.
      
      This patch also adds ctnetlink_nfqueue_seqadj() to avoid that the nf_conn
      structure layout if exposed to nf_queue, which creates another dependency with
      nf_conntrack at compilation time.
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      b7bd1809
  2. 04 10月, 2015 1 次提交
    • E
      tcp/dccp: add SLAB_DESTROY_BY_RCU flag for request sockets · e96f78ab
      Eric Dumazet 提交于
      Before letting request sockets being put in TCP/DCCP regular
      ehash table, we need to add either :
      
      - SLAB_DESTROY_BY_RCU flag to their kmem_cache
      - add RCU grace period before freeing them.
      
      Since we carefully respected the SLAB_DESTROY_BY_RCU protocol
      like ESTABLISH and TIMEWAIT sockets, use it here.
      
      req_prot_init() being only used by TCP and DCCP, I did not add
      a new slab_flags into their rsk_prot, but reuse prot->slab_flags
      
      Since all reqsk_alloc() users are correctly dealing with a failure,
      add the __GFP_NOWARN flag to avoid traces under pressure.
      
      Fixes: 079096f1 ("tcp/dccp: install syn_recv requests into ehash table")
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      e96f78ab
  3. 03 10月, 2015 35 次提交
  4. 02 10月, 2015 1 次提交