An error occurred fetching the project authors.
  1. 29 Nov, 2008 1 commit
  2. 22 Sep, 2008 1 commit
  3. 14 Aug, 2008 1 commit
    • Huang Weiyi's avatar
      [netdrvr] remove unnecessary #include · fde9403a
      Huang Weiyi authored
      The drivers below do not use LINUX_VERSION_CODE nor KERNEL_VERSION.
        drivers/net/acenic.c
        drivers/net/bnx2x_link.c
        drivers/net/bnx2x_main.c
        drivers/net/cpmac.c
        drivers/net/gianfar_sysfs.c
        drivers/net/ipg.h
        drivers/net/ppp_mppe.c
        drivers/net/pppol2tp.c
        drivers/net/r6040.c
        drivers/net/sh_eth.c
        drivers/net/sky2.c
        drivers/net/tehuti.h
        drivers/net/typhoon.c
      
      This patch removes the said #include <linux/version.h>.
      Signed-off-by: default avatarHuang Weiyi <hwy@cn.fujitsu.com>
      Signed-off-by: default avatarJeff Garzik <jgarzik@redhat.com>
      fde9403a
  4. 10 Jun, 2008 1 commit
  5. 04 Jun, 2008 2 commits
    • James Chapman's avatar
      l2tp: Fix possible oops if transmitting or receiving when tunnel goes down · 24b95685
      James Chapman authored
      Some problems have been experienced in the field which cause an oops
      in the pppol2tp driver if L2TP tunnels fail while passing data.
      
      The pppol2tp driver uses private data that is referenced via the
      sk->sk_user_data of its UDP and PPPoL2TP sockets. This patch makes
      sure that the driver uses sock_hold() when it holds a reference to the
      sk pointer. This affects its sendmsg(), recvmsg(), getname(),
      [gs]etsockopt() and ioctl() handlers.
      
      Tested by ISP where problem was seen. System has been up 10 days with
      no oops since running this patch. Without the patch, an oops would
      occur every 1-2 days.
      
      Signed-off-by: James Chapman <jchapman@katalix.com> 
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      24b95685
    • James Chapman's avatar
      lt2p: Fix possible WARN_ON from socket code when UDP socket is closed · 199f7d24
      James Chapman authored
      If an L2TP daemon closes a tunnel socket while packets are queued in
      the tunnel's reorder queue, a kernel warning is logged because the
      socket is closed while skbs are still referencing it. The fix is to
      purge the queue in the socket's release handler.
      
      WARNING: at include/net/sock.h:351 udp_lib_unhash+0x41/0x68()
      Pid: 12998, comm: openl2tpd Not tainted 2.6.25 #8
       [<c0423c58>] warn_on_slowpath+0x41/0x51
       [<c05d33a7>] udp_lib_unhash+0x41/0x68
       [<c059424d>] sk_common_release+0x23/0x90
       [<c05d16be>] udp_lib_close+0x8/0xa
       [<c05d8684>] inet_release+0x42/0x48
       [<c0592599>] sock_release+0x14/0x60
       [<c059299f>] sock_close+0x29/0x30
       [<c046ef52>] __fput+0xad/0x15b
       [<c046f1d9>] fput+0x17/0x19
       [<c046c8c4>] filp_close+0x50/0x5a
       [<c046da06>] sys_close+0x69/0x9f
       [<c04048ce>] syscall_call+0x7/0xb
      Signed-off-by: default avatarJames Chapman <jchapman@katalix.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      199f7d24
  6. 19 May, 2008 1 commit
    • James Chapman's avatar
      l2tp: avoid skb truesize bug if headroom is increased · 090c48d3
      James Chapman authored
      A user reported seeing occasional bugs such as the following when
      using the L2TP driver.
      
        SKB BUG: Invalid truesize (272) len=72, sizeof(sk_buff)=208
      
      When L2TP adds its header in the transmit path, it might need to
      increase the headroom of the skb. In some cases, the increased
      headroom trips a kernel bug when the skb is freed because the skb has
      grown beyond its truesize value. The fix is to increase the truesize
      by the amount of headroom added, after orphaning the skb.
      
      While here, fix a misleading comment.
      
      Thanks to Iouri Kharon <bc-info@styx.cabel.net> for the initial
      report and testing the fix.
      Signed-off-by: default avatarJames Chapman <jchapman@katalix.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      090c48d3
  7. 12 May, 2008 1 commit
    • Julia Lawall's avatar
      pppol2tp: Remove null pointer dereference. · 5dc474d6
      Julia Lawall authored
      If session is NULL, it is not possible to access its name field.  So I
      have split apart the printing of the error message to drop the
      printing of the name field in this case.
      
      The macro PRINTK actually only evaluates its arguments starting with
      the third one if the bitwise conjunction of the first two is non-zero.
      Normally, this conjunction would only be non-zero if debugging mode
      were turned on, but when session is NULL, the first argument in both
      the old and new code is -1, and thus the bitwise conjunction is true.
      Perhaps a different strategy is desired, such as using tunnel->debug,
      which session->debug is initialized to, but tunnel can also be NULL,
      so this does not completely solve the problem.
      
      
      This problem was found using the following semantic match
      (http://www.emn.fr/x-info/coccinelle/)
      
      // <smpl>
      @@
      expression E, E1;
      identifier f;
      statement S1,S2,S3;
      @@
      
      * if (E == NULL)
      {
        ... when != if (E == NULL) S1 else S2
            when != E = E1
      * E->f
        ... when any
        return ...;
      }
      else S3
      // </smpl>
      Signed-off-by: default avatarJulia Lawall <julia@diku.dk>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      5dc474d6
  8. 29 Apr, 2008 1 commit
  9. 06 Mar, 2008 2 commits
  10. 04 Mar, 2008 2 commits
  11. 10 Feb, 2008 1 commit
    • Andrew Morton's avatar
      pppol2tp: fix printk warnings · 0efeaa33
      Andrew Morton authored
      drivers/net/pppol2tp.c: In function `pppol2tp_seq_tunnel_show':
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 4)
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 5)
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 6)
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 7)
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 8)
      drivers/net/pppol2tp.c:2295: warning: long long unsigned int format, __u64 arg (arg 9)
      drivers/net/pppol2tp.c: In function `pppol2tp_seq_session_show':
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 5)
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 6)
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 7)
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 8)
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 9)
      drivers/net/pppol2tp.c:2328: warning: long long unsigned int format, __u64 arg (arg 10)
      
      Not all platforms implement u64 with unsigned long long.  eg: powerpc.
      
      Cc: Jeff Garzik <jeff@garzik.org>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      0efeaa33
  12. 06 Feb, 2008 1 commit
  13. 28 Jan, 2008 1 commit
  14. 07 Nov, 2007 1 commit
    • James Chapman's avatar
      [PPP]: L2TP: Fix oops in transmit and receive paths · 91781004
      James Chapman authored
      Changes made on 18-sep to fix skb handling in the pppol2tp driver
      broke the transmit and receive paths. Users are only running into this
      now because distros are now using 2.6.23 and I must have messed up
      when I tested the change.
      
      For receive, we now do our own calculation of how much to pull from
      the skb (variable length L2TP header) rather than using
      skb_transport_offset(). Also, if the skb isn't a data packet, it must
      be passed back to UDP with skb->data pointing to the UDP header.
      
      For transmit, make sure skb->sk is set up because ip_queue_xmit()
      needs it.
      Signed-off-by: default avatarJames Chapman <jchapman@katalix.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      91781004
  15. 01 Nov, 2007 1 commit
  16. 10 Oct, 2007 2 commits
    • Eric W. Biederman's avatar
      [NET]: Make socket creation namespace safe. · 1b8d7ae4
      Eric W. Biederman authored
      This patch passes in the namespace a new socket should be created in
      and has the socket code do the appropriate reference counting.  By
      virtue of this all socket create methods are touched.  In addition
      the socket create methods are modified so that they will fail if
      you attempt to create a socket in a non-default network namespace.
      
      Failing if we attempt to create a socket outside of the default
      network namespace ensures that as we incrementally make the network stack
      network namespace aware we will not export functionality that someone
      has not audited and made certain is network namespace safe.
      Allowing us to partially enable network namespaces before all of the
      exotic protocols are supported.
      
      Any protocol layers I have missed will fail to compile because I now
      pass an extra parameter into the socket creation code.
      
      [ Integrated AF_IUCV build fixes from Andrew Morton... -DaveM ]
      Signed-off-by: default avatarEric W. Biederman <ebiederm@xmission.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      1b8d7ae4
    • Eric W. Biederman's avatar
      [NET]: Make /proc/net per network namespace · 457c4cbc
      Eric W. Biederman authored
      This patch makes /proc/net per network namespace.  It modifies the global
      variables proc_net and proc_net_stat to be per network namespace.
      The proc_net file helpers are modified to take a network namespace argument,
      and all of their callers are fixed to pass &init_net for that argument.
      This ensures that all of the /proc/net files are only visible and
      usable in the initial network namespace until the code behind them
      has been updated to be handle multiple network namespaces.
      
      Making /proc/net per namespace is necessary as at least some files
      in /proc/net depend upon the set of network devices which is per
      network namespace, and even more files in /proc/net have contents
      that are relevant to a single network namespace.
      Signed-off-by: default avatarEric W. Biederman <ebiederm@xmission.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      457c4cbc
  17. 20 Sep, 2007 3 commits
    • Herbert Xu's avatar
      [PPP] L2TP: Fix skb handling in pppol2tp_xmit · f3d5e3a4
      Herbert Xu authored
      This patch makes pppol2tp_xmit call skb_cow_head so that we don't modify
      cloned skb data.  It also gets rid of skb2 we only need to preserve the
      original skb for congestion notification, which is only applicable for
      ppp_async and ppp_sync.
      
      The other semantic change made here is the removal of socket accounting
      for data tranmitted out of pppol2tp_xmit.  The original code leaked any
      existing socket skb accounting.  We could fix this by dropping the
      original skb owner.  However, this is undesirable as the packet has not
      physically left the host yet.
      
      In fact, all other tunnels in the kernel do not account skb's passing
      through to their own socket.  In partciular, ESP over UDP does not do
      so and it is the closest tunnel type to PPPoL2TP.  So this patch simply
      removes the socket accounting in pppol2tp_xmit.  The accounting still
      applies to control packets of course.
      
      I've also added a reminder that the outgoing checksum here doesn't work.
      I suppose existing deployments don't actually enable checksums.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      f3d5e3a4
    • Herbert Xu's avatar
      [PPP] L2TP: Fix skb handling in pppol2tp_recv_core · 7a70e39b
      Herbert Xu authored
      The function pppol2tp_recv_core doesn't handle non-linear packets properly.
      It also fails to check the remote offset field.
      
      This patch fixes these problems.  It also removes an unnecessary check on
      the UDP header which has already been performed by the UDP layer.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      7a70e39b
    • Herbert Xu's avatar
      [PPP] L2TP: Disallow non-UDP datagram sockets · a14d6abc
      Herbert Xu authored
      With the addition of UDP-Lite we need to refine the socket check so
      that only genuine UDP sockets are allowed through.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      a14d6abc
  18. 26 Jul, 2007 1 commit
  19. 18 Jul, 2007 2 commits
  20. 11 Jul, 2007 2 commits