diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2010-08-04 14:47:58 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2010-08-04 14:47:58 -0400 |
commit | 6ba74014c1ab0e37af7de6f64b4eccbbae3cb9e7 (patch) | |
tree | 8f3892fc44f1e403675a6d7e88fda5c70e56ee4c /kernel | |
parent | 5abd9ccced7a726c817dd6b5b96bc933859138d1 (diff) | |
parent | 3ff1c25927e3af61c6bf0e4ed959504058ae4565 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6: (1443 commits)
phy/marvell: add 88ec048 support
igb: Program MDICNFG register prior to PHY init
e1000e: correct MAC-PHY interconnect register offset for 82579
hso: Add new product ID
can: Add driver for esd CAN-USB/2 device
l2tp: fix export of header file for userspace
can-raw: Fix skb_orphan_try handling
Revert "net: remove zap_completion_queue"
net: cleanup inclusion
phy/marvell: add 88e1121 interface mode support
u32: negative offset fix
net: Fix a typo from "dev" to "ndev"
igb: Use irq_synchronize per vector when using MSI-X
ixgbevf: fix null pointer dereference due to filter being set for VLAN 0
e1000e: Fix irq_synchronize in MSI-X case
e1000e: register pm_qos request on hardware activation
ip_fragment: fix subtracting PPPOE_SES_HLEN from mtu twice
net: Add getsockopt support for TCP thin-streams
cxgb4: update driver version
cxgb4: add new PCI IDs
...
Manually fix up conflicts in:
- drivers/net/e1000e/netdev.c: due to pm_qos registration
infrastructure changes
- drivers/net/phy/marvell.c: conflict between adding 88ec048 support
and cleaning up the IDs
- drivers/net/wireless/ipw2x00/ipw2100.c: trivial ipw2100_pm_qos_req
conflict (registration change vs marking it static)
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/audit.c | 2 | ||||
-rw-r--r-- | kernel/cgroup.c | 23 | ||||
-rw-r--r-- | kernel/user_namespace.c | 44 |
3 files changed, 68 insertions, 1 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index c71bd26631a2..8296aa516c5a 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -407,7 +407,7 @@ static void kauditd_send_skb(struct sk_buff *skb) | |||
407 | audit_hold_skb(skb); | 407 | audit_hold_skb(skb); |
408 | } else | 408 | } else |
409 | /* drop the extra reference if sent ok */ | 409 | /* drop the extra reference if sent ok */ |
410 | kfree_skb(skb); | 410 | consume_skb(skb); |
411 | } | 411 | } |
412 | 412 | ||
413 | static int kauditd_thread(void *dummy) | 413 | static int kauditd_thread(void *dummy) |
diff --git a/kernel/cgroup.c b/kernel/cgroup.c index 3ac6f5b0a64b..a8ce09954404 100644 --- a/kernel/cgroup.c +++ b/kernel/cgroup.c | |||
@@ -1788,6 +1788,29 @@ out: | |||
1788 | return retval; | 1788 | return retval; |
1789 | } | 1789 | } |
1790 | 1790 | ||
1791 | /** | ||
1792 | * cgroup_attach_task_current_cg - attach task 'tsk' to current task's cgroup | ||
1793 | * @tsk: the task to be attached | ||
1794 | */ | ||
1795 | int cgroup_attach_task_current_cg(struct task_struct *tsk) | ||
1796 | { | ||
1797 | struct cgroupfs_root *root; | ||
1798 | struct cgroup *cur_cg; | ||
1799 | int retval = 0; | ||
1800 | |||
1801 | cgroup_lock(); | ||
1802 | for_each_active_root(root) { | ||
1803 | cur_cg = task_cgroup_from_root(current, root); | ||
1804 | retval = cgroup_attach_task(cur_cg, tsk); | ||
1805 | if (retval) | ||
1806 | break; | ||
1807 | } | ||
1808 | cgroup_unlock(); | ||
1809 | |||
1810 | return retval; | ||
1811 | } | ||
1812 | EXPORT_SYMBOL_GPL(cgroup_attach_task_current_cg); | ||
1813 | |||
1791 | /* | 1814 | /* |
1792 | * Attach task with pid 'pid' to cgroup 'cgrp'. Call with cgroup_mutex | 1815 | * Attach task with pid 'pid' to cgroup 'cgrp'. Call with cgroup_mutex |
1793 | * held. May take task_lock of task | 1816 | * held. May take task_lock of task |
diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c index b2d70d38dff4..25915832291a 100644 --- a/kernel/user_namespace.c +++ b/kernel/user_namespace.c | |||
@@ -9,6 +9,7 @@ | |||
9 | #include <linux/nsproxy.h> | 9 | #include <linux/nsproxy.h> |
10 | #include <linux/slab.h> | 10 | #include <linux/slab.h> |
11 | #include <linux/user_namespace.h> | 11 | #include <linux/user_namespace.h> |
12 | #include <linux/highuid.h> | ||
12 | #include <linux/cred.h> | 13 | #include <linux/cred.h> |
13 | 14 | ||
14 | /* | 15 | /* |
@@ -82,3 +83,46 @@ void free_user_ns(struct kref *kref) | |||
82 | schedule_work(&ns->destroyer); | 83 | schedule_work(&ns->destroyer); |
83 | } | 84 | } |
84 | EXPORT_SYMBOL(free_user_ns); | 85 | EXPORT_SYMBOL(free_user_ns); |
86 | |||
87 | uid_t user_ns_map_uid(struct user_namespace *to, const struct cred *cred, uid_t uid) | ||
88 | { | ||
89 | struct user_namespace *tmp; | ||
90 | |||
91 | if (likely(to == cred->user->user_ns)) | ||
92 | return uid; | ||
93 | |||
94 | |||
95 | /* Is cred->user the creator of the target user_ns | ||
96 | * or the creator of one of it's parents? | ||
97 | */ | ||
98 | for ( tmp = to; tmp != &init_user_ns; | ||
99 | tmp = tmp->creator->user_ns ) { | ||
100 | if (cred->user == tmp->creator) { | ||
101 | return (uid_t)0; | ||
102 | } | ||
103 | } | ||
104 | |||
105 | /* No useful relationship so no mapping */ | ||
106 | return overflowuid; | ||
107 | } | ||
108 | |||
109 | gid_t user_ns_map_gid(struct user_namespace *to, const struct cred *cred, gid_t gid) | ||
110 | { | ||
111 | struct user_namespace *tmp; | ||
112 | |||
113 | if (likely(to == cred->user->user_ns)) | ||
114 | return gid; | ||
115 | |||
116 | /* Is cred->user the creator of the target user_ns | ||
117 | * or the creator of one of it's parents? | ||
118 | */ | ||
119 | for ( tmp = to; tmp != &init_user_ns; | ||
120 | tmp = tmp->creator->user_ns ) { | ||
121 | if (cred->user == tmp->creator) { | ||
122 | return (gid_t)0; | ||
123 | } | ||
124 | } | ||
125 | |||
126 | /* No useful relationship so no mapping */ | ||
127 | return overflowgid; | ||
128 | } | ||