1. 31 8月, 2007 6 次提交
  2. 30 8月, 2007 3 次提交
  3. 02 8月, 2007 2 次提交
  4. 01 8月, 2007 7 次提交
  5. 20 7月, 2007 1 次提交
    • P
      mm: Remove slab destructors from kmem_cache_create(). · 20c2df83
      Paul Mundt 提交于
      Slab destructors were no longer supported after Christoph's
      c59def9f change. They've been
      BUGs for both slab and slub, and slob never supported them
      either.
      
      This rips out support for the dtor pointer from kmem_cache_create()
      completely and fixes up every single callsite in the kernel (there were
      about 224, not including the slab allocator definitions themselves,
      or the documentation references).
      Signed-off-by: NPaul Mundt <lethal@linux-sh.org>
      20c2df83
  6. 19 7月, 2007 1 次提交
  7. 11 7月, 2007 1 次提交
  8. 06 7月, 2007 3 次提交
  9. 26 6月, 2007 1 次提交
    • Z
      SCTP: lock_sock_nested in sctp_sock_migrate · 5131a184
      Zach Brown 提交于
      sctp_sock_migrate() grabs the socket lock on a newly allocated socket while
      holding the socket lock on an old socket.  lockdep worries that this might
      be a recursive lock attempt.
      
       task/3026 is trying to acquire lock:
        (sk_lock-AF_INET){--..}, at: [<ffffffff88105b8c>] sctp_sock_migrate+0x2e3/0x327 [sctp]
       but task is already holding lock:
        (sk_lock-AF_INET){--..}, at: [<ffffffff8810891f>] sctp_accept+0xdf/0x1e3 [sctp]
      
      This patch tells lockdep that this locking is safe by using
      lock_sock_nested().
      Signed-off-by: NZach Brown <zach.brown@oracle.com>
      Signed-off-by: NVlad Yasevich <vladislav.yasevich@hp.com>
      5131a184
  10. 19 6月, 2007 2 次提交
  11. 14 6月, 2007 6 次提交
  12. 04 6月, 2007 1 次提交
  13. 25 5月, 2007 1 次提交
  14. 11 5月, 2007 3 次提交
  15. 09 5月, 2007 1 次提交
  16. 05 5月, 2007 1 次提交
    • V
      [SCTP]: Set assoc_id correctly during INIT collision. · 07d93967
      Vlad Yasevich 提交于
      During the INIT/COOKIE-ACK collision cases, it's possible to get
      into a situation where the association id is not yet set at the time
      of the user event generation.  As a result, user events have an
      association id set to 0 which will confuse applications.
      
      This happens if we hit case B of duplicate cookie processing.
      In the particular example found and provided by Oscar Isaula
      <Oscar.Isaula@motorola.com>, flow looks like this:
      A				B
      ---- INIT------->  (lost)
      	    <---------INIT------
      ---- INIT-ACK--->
      	    <------ Cookie ECHO
      
      When the Cookie Echo is received, we end up trying to update the
      association that was created on A as a result of the (lost) INIT,
      but that association doesn't have the ID set yet.
      Signed-off-by: NVlad Yasevich <vladislav.yasevich@hp.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      07d93967