diff options
| author | Lachlan McIlroy <lachlan@redback.melbourne.sgi.com> | 2008-02-25 22:26:14 -0500 |
|---|---|---|
| committer | Lachlan McIlroy <lachlan@redback.melbourne.sgi.com> | 2008-02-25 22:26:14 -0500 |
| commit | 91e229bbad6524aabaac8717b2f559283670c37a (patch) | |
| tree | 84a55e4ac2dcf23add97bd9fde3e9cb232c12b30 /net | |
| parent | 6e5e93424dc66542c548dfaa3bfebe30d46d50dd (diff) | |
| parent | bfa274e2436fc7ef72ef51c878083647f1cfd429 (diff) | |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6 into for-linus
Diffstat (limited to 'net')
40 files changed, 232 insertions, 304 deletions
diff --git a/net/9p/trans_virtio.c b/net/9p/trans_virtio.c index 0117b9fb8480..de7a9f532edc 100644 --- a/net/9p/trans_virtio.c +++ b/net/9p/trans_virtio.c | |||
| @@ -110,7 +110,7 @@ static struct p9_req_t *p9_lookup_tag(struct virtio_chan *c, u16 tag) | |||
| 110 | } | 110 | } |
| 111 | for (count = old_max; count < c->max_tag; count++) { | 111 | for (count = old_max; count < c->max_tag; count++) { |
| 112 | c->reqs[count].status = REQ_STATUS_IDLE; | 112 | c->reqs[count].status = REQ_STATUS_IDLE; |
| 113 | c->reqs[count].wq = kmalloc(sizeof(wait_queue_t), | 113 | c->reqs[count].wq = kmalloc(sizeof(wait_queue_head_t), |
| 114 | GFP_ATOMIC); | 114 | GFP_ATOMIC); |
| 115 | if (!c->reqs[count].wq) { | 115 | if (!c->reqs[count].wq) { |
| 116 | printk(KERN_ERR "Couldn't grow tag array\n"); | 116 | printk(KERN_ERR "Couldn't grow tag array\n"); |
| @@ -183,8 +183,7 @@ pack_sg_list(struct scatterlist *sg, int start, int limit, char *data, | |||
| 183 | sg_set_buf(&sg[index++], data, s); | 183 | sg_set_buf(&sg[index++], data, s); |
| 184 | count -= s; | 184 | count -= s; |
| 185 | data += s; | 185 | data += s; |
| 186 | if (index > limit) | 186 | BUG_ON(index > limit); |
| 187 | BUG(); | ||
| 188 | } | 187 | } |
| 189 | 188 | ||
| 190 | return index-start; | 189 | return index-start; |
diff --git a/net/ax25/ax25_out.c b/net/ax25/ax25_out.c index 92b517af7260..bf706f83a5c9 100644 --- a/net/ax25/ax25_out.c +++ b/net/ax25/ax25_out.c | |||
| @@ -117,6 +117,12 @@ void ax25_output(ax25_cb *ax25, int paclen, struct sk_buff *skb) | |||
| 117 | unsigned char *p; | 117 | unsigned char *p; |
| 118 | int frontlen, len, fragno, ka9qfrag, first = 1; | 118 | int frontlen, len, fragno, ka9qfrag, first = 1; |
| 119 | 119 | ||
| 120 | if (paclen < 16) { | ||
| 121 | WARN_ON_ONCE(1); | ||
| 122 | kfree_skb(skb); | ||
| 123 | return; | ||
| 124 | } | ||
| 125 | |||
| 120 | if ((skb->len - 1) > paclen) { | 126 | if ((skb->len - 1) > paclen) { |
| 121 | if (*skb->data == AX25_P_TEXT) { | 127 | if (*skb->data == AX25_P_TEXT) { |
| 122 | skb_pull(skb, 1); /* skip PID */ | 128 | skb_pull(skb, 1); /* skip PID */ |
| @@ -251,8 +257,6 @@ void ax25_kick(ax25_cb *ax25) | |||
| 251 | if (start == end) | 257 | if (start == end) |
| 252 | return; | 258 | return; |
| 253 | 259 | ||
| 254 | ax25->vs = start; | ||
| 255 | |||
| 256 | /* | 260 | /* |
| 257 | * Transmit data until either we're out of data to send or | 261 | * Transmit data until either we're out of data to send or |
| 258 | * the window is full. Send a poll on the final I frame if | 262 | * the window is full. Send a poll on the final I frame if |
| @@ -261,8 +265,13 @@ void ax25_kick(ax25_cb *ax25) | |||
| 261 | 265 | ||
| 262 | /* | 266 | /* |
| 263 | * Dequeue the frame and copy it. | 267 | * Dequeue the frame and copy it. |
| 268 | * Check for race with ax25_clear_queues(). | ||
| 264 | */ | 269 | */ |
| 265 | skb = skb_dequeue(&ax25->write_queue); | 270 | skb = skb_dequeue(&ax25->write_queue); |
| 271 | if (!skb) | ||
| 272 | return; | ||
| 273 | |||
| 274 | ax25->vs = start; | ||
| 266 | 275 | ||
| 267 | do { | 276 | do { |
| 268 | if ((skbn = skb_clone(skb, GFP_ATOMIC)) == NULL) { | 277 | if ((skbn = skb_clone(skb, GFP_ATOMIC)) == NULL) { |
diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c index 5fc7be206f62..f8880261da0e 100644 --- a/net/bluetooth/hci_conn.c +++ b/net/bluetooth/hci_conn.c | |||
| @@ -260,7 +260,6 @@ int hci_conn_del(struct hci_conn *conn) | |||
| 260 | tasklet_enable(&hdev->tx_task); | 260 | tasklet_enable(&hdev->tx_task); |
| 261 | skb_queue_purge(&conn->data_q); | 261 | skb_queue_purge(&conn->data_q); |
| 262 | hci_conn_del_sysfs(conn); | 262 | hci_conn_del_sysfs(conn); |
| 263 | hci_dev_put(hdev); | ||
| 264 | 263 | ||
| 265 | return 0; | 264 | return 0; |
| 266 | } | 265 | } |
diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index 372b0d3b75a8..930b58e7149a 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c | |||
| @@ -24,6 +24,7 @@ | |||
| 24 | 24 | ||
| 25 | /* Bluetooth HCI core. */ | 25 | /* Bluetooth HCI core. */ |
| 26 | 26 | ||
| 27 | #include <linux/jiffies.h> | ||
| 27 | #include <linux/module.h> | 28 | #include <linux/module.h> |
| 28 | #include <linux/kmod.h> | 29 | #include <linux/kmod.h> |
| 29 | 30 | ||
| @@ -1321,7 +1322,7 @@ static inline void hci_sched_acl(struct hci_dev *hdev) | |||
| 1321 | if (!test_bit(HCI_RAW, &hdev->flags)) { | 1322 | if (!test_bit(HCI_RAW, &hdev->flags)) { |
| 1322 | /* ACL tx timeout must be longer than maximum | 1323 | /* ACL tx timeout must be longer than maximum |
| 1323 | * link supervision timeout (40.9 seconds) */ | 1324 | * link supervision timeout (40.9 seconds) */ |
| 1324 | if (!hdev->acl_cnt && (jiffies - hdev->acl_last_tx) > (HZ * 45)) | 1325 | if (!hdev->acl_cnt && time_after(jiffies, hdev->acl_last_tx + HZ * 45)) |
| 1325 | hci_acl_tx_to(hdev); | 1326 | hci_acl_tx_to(hdev); |
| 1326 | } | 1327 | } |
| 1327 | 1328 | ||
| @@ -1543,7 +1544,7 @@ static void hci_cmd_task(unsigned long arg) | |||
| 1543 | 1544 | ||
| 1544 | BT_DBG("%s cmd %d", hdev->name, atomic_read(&hdev->cmd_cnt)); | 1545 | BT_DBG("%s cmd %d", hdev->name, atomic_read(&hdev->cmd_cnt)); |
| 1545 | 1546 | ||
| 1546 | if (!atomic_read(&hdev->cmd_cnt) && (jiffies - hdev->cmd_last_tx) > HZ) { | 1547 | if (!atomic_read(&hdev->cmd_cnt) && time_after(jiffies, hdev->cmd_last_tx + HZ)) { |
| 1547 | BT_ERR("%s command tx timeout", hdev->name); | 1548 | BT_ERR("%s command tx timeout", hdev->name); |
| 1548 | atomic_set(&hdev->cmd_cnt, 1); | 1549 | atomic_set(&hdev->cmd_cnt, 1); |
| 1549 | } | 1550 | } |
diff --git a/net/bluetooth/hci_sysfs.c b/net/bluetooth/hci_sysfs.c index e13cf5ef144c..84360c117d4e 100644 --- a/net/bluetooth/hci_sysfs.c +++ b/net/bluetooth/hci_sysfs.c | |||
| @@ -320,28 +320,34 @@ void hci_conn_add_sysfs(struct hci_conn *conn) | |||
| 320 | queue_work(btaddconn, &conn->work); | 320 | queue_work(btaddconn, &conn->work); |
| 321 | } | 321 | } |
| 322 | 322 | ||
| 323 | /* | ||
| 324 | * The rfcomm tty device will possibly retain even when conn | ||
| 325 | * is down, and sysfs doesn't support move zombie device, | ||
| 326 | * so we should move the device before conn device is destroyed. | ||
| 327 | */ | ||
| 323 | static int __match_tty(struct device *dev, void *data) | 328 | static int __match_tty(struct device *dev, void *data) |
| 324 | { | 329 | { |
| 325 | /* The rfcomm tty device will possibly retain even when conn | 330 | return !strncmp(dev->bus_id, "rfcomm", 6); |
| 326 | * is down, and sysfs doesn't support move zombie device, | ||
| 327 | * so we should move the device before conn device is destroyed. | ||
| 328 | * Due to the only child device of hci_conn dev is rfcomm | ||
| 329 | * tty_dev, here just return 1 | ||
| 330 | */ | ||
| 331 | return 1; | ||
| 332 | } | 331 | } |
| 333 | 332 | ||
| 334 | static void del_conn(struct work_struct *work) | 333 | static void del_conn(struct work_struct *work) |
| 335 | { | 334 | { |
| 336 | struct device *dev; | ||
| 337 | struct hci_conn *conn = container_of(work, struct hci_conn, work); | 335 | struct hci_conn *conn = container_of(work, struct hci_conn, work); |
| 336 | struct hci_dev *hdev = conn->hdev; | ||
| 337 | |||
| 338 | while (1) { | ||
| 339 | struct device *dev; | ||
| 338 | 340 | ||
| 339 | while (dev = device_find_child(&conn->dev, NULL, __match_tty)) { | 341 | dev = device_find_child(&conn->dev, NULL, __match_tty); |
| 342 | if (!dev) | ||
| 343 | break; | ||
| 340 | device_move(dev, NULL); | 344 | device_move(dev, NULL); |
| 341 | put_device(dev); | 345 | put_device(dev); |
| 342 | } | 346 | } |
| 347 | |||
| 343 | device_del(&conn->dev); | 348 | device_del(&conn->dev); |
| 344 | put_device(&conn->dev); | 349 | put_device(&conn->dev); |
| 350 | hci_dev_put(hdev); | ||
| 345 | } | 351 | } |
| 346 | 352 | ||
| 347 | void hci_conn_del_sysfs(struct hci_conn *conn) | 353 | void hci_conn_del_sysfs(struct hci_conn *conn) |
diff --git a/net/bridge/netfilter/ebt_dnat.c b/net/bridge/netfilter/ebt_dnat.c index e700cbf634c2..ca64c1cc1b47 100644 --- a/net/bridge/netfilter/ebt_dnat.c +++ b/net/bridge/netfilter/ebt_dnat.c | |||
| @@ -20,8 +20,8 @@ static int ebt_target_dnat(struct sk_buff *skb, unsigned int hooknr, | |||
| 20 | { | 20 | { |
| 21 | const struct ebt_nat_info *info = data; | 21 | const struct ebt_nat_info *info = data; |
| 22 | 22 | ||
| 23 | if (skb_make_writable(skb, 0)) | 23 | if (!skb_make_writable(skb, 0)) |
| 24 | return NF_DROP; | 24 | return EBT_DROP; |
| 25 | 25 | ||
| 26 | memcpy(eth_hdr(skb)->h_dest, info->mac, ETH_ALEN); | 26 | memcpy(eth_hdr(skb)->h_dest, info->mac, ETH_ALEN); |
| 27 | return info->target; | 27 | return info->target; |
diff --git a/net/bridge/netfilter/ebt_redirect.c b/net/bridge/netfilter/ebt_redirect.c index bfdf2fb60b1f..b8afe850cf1e 100644 --- a/net/bridge/netfilter/ebt_redirect.c +++ b/net/bridge/netfilter/ebt_redirect.c | |||
| @@ -21,8 +21,8 @@ static int ebt_target_redirect(struct sk_buff *skb, unsigned int hooknr, | |||
| 21 | { | 21 | { |
| 22 | const struct ebt_redirect_info *info = data; | 22 | const struct ebt_redirect_info *info = data; |
| 23 | 23 | ||
| 24 | if (skb_make_writable(skb, 0)) | 24 | if (!skb_make_writable(skb, 0)) |
| 25 | return NF_DROP; | 25 | return EBT_DROP; |
| 26 | 26 | ||
| 27 | if (hooknr != NF_BR_BROUTING) | 27 | if (hooknr != NF_BR_BROUTING) |
| 28 | memcpy(eth_hdr(skb)->h_dest, | 28 | memcpy(eth_hdr(skb)->h_dest, |
diff --git a/net/bridge/netfilter/ebt_snat.c b/net/bridge/netfilter/ebt_snat.c index e252dabbb143..5425333dda03 100644 --- a/net/bridge/netfilter/ebt_snat.c +++ b/net/bridge/netfilter/ebt_snat.c | |||
| @@ -22,8 +22,8 @@ static int ebt_target_snat(struct sk_buff *skb, unsigned int hooknr, | |||
| 22 | { | 22 | { |
| 23 | const struct ebt_nat_info *info = data; | 23 | const struct ebt_nat_info *info = data; |
| 24 | 24 | ||
| 25 | if (skb_make_writable(skb, 0)) | 25 | if (!skb_make_writable(skb, 0)) |
| 26 | return NF_DROP; | 26 | return EBT_DROP; |
| 27 | 27 | ||
| 28 | memcpy(eth_hdr(skb)->h_source, info->mac, ETH_ALEN); | 28 | memcpy(eth_hdr(skb)->h_source, info->mac, ETH_ALEN); |
| 29 | if (!(info->target & NAT_ARP_BIT) && | 29 | if (!(info->target & NAT_ARP_BIT) && |
diff --git a/net/core/dev.c b/net/core/dev.c index 908f07c3bd7d..fcdf03cf3b3f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c | |||
| @@ -2900,7 +2900,7 @@ int __dev_addr_add(struct dev_addr_list **list, int *count, | |||
| 2900 | } | 2900 | } |
| 2901 | } | 2901 | } |
| 2902 | 2902 | ||
| 2903 | da = kmalloc(sizeof(*da), GFP_ATOMIC); | 2903 | da = kzalloc(sizeof(*da), GFP_ATOMIC); |
| 2904 | if (da == NULL) | 2904 | if (da == NULL) |
| 2905 | return -ENOMEM; | 2905 | return -ENOMEM; |
| 2906 | memcpy(da->da_addr, addr, alen); | 2906 | memcpy(da->da_addr, addr, alen); |
diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 7bb6a9a1256d..2328acbd16cd 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c | |||
| @@ -358,11 +358,12 @@ struct neighbour *neigh_lookup(struct neigh_table *tbl, const void *pkey, | |||
| 358 | { | 358 | { |
| 359 | struct neighbour *n; | 359 | struct neighbour *n; |
| 360 | int key_len = tbl->key_len; | 360 | int key_len = tbl->key_len; |
| 361 | u32 hash_val = tbl->hash(pkey, dev); | 361 | u32 hash_val; |
| 362 | 362 | ||
| 363 | NEIGH_CACHE_STAT_INC(tbl, lookups); | 363 | NEIGH_CACHE_STAT_INC(tbl, lookups); |
| 364 | 364 | ||
| 365 | read_lock_bh(&tbl->lock); | 365 | read_lock_bh(&tbl->lock); |
| 366 | hash_val = tbl->hash(pkey, dev); | ||
| 366 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { | 367 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { |
| 367 | if (dev == n->dev && !memcmp(n->primary_key, pkey, key_len)) { | 368 | if (dev == n->dev && !memcmp(n->primary_key, pkey, key_len)) { |
| 368 | neigh_hold(n); | 369 | neigh_hold(n); |
| @@ -379,11 +380,12 @@ struct neighbour *neigh_lookup_nodev(struct neigh_table *tbl, struct net *net, | |||
| 379 | { | 380 | { |
| 380 | struct neighbour *n; | 381 | struct neighbour *n; |
| 381 | int key_len = tbl->key_len; | 382 | int key_len = tbl->key_len; |
| 382 | u32 hash_val = tbl->hash(pkey, NULL); | 383 | u32 hash_val; |
| 383 | 384 | ||
| 384 | NEIGH_CACHE_STAT_INC(tbl, lookups); | 385 | NEIGH_CACHE_STAT_INC(tbl, lookups); |
| 385 | 386 | ||
| 386 | read_lock_bh(&tbl->lock); | 387 | read_lock_bh(&tbl->lock); |
| 388 | hash_val = tbl->hash(pkey, NULL); | ||
| 387 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { | 389 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { |
| 388 | if (!memcmp(n->primary_key, pkey, key_len) && | 390 | if (!memcmp(n->primary_key, pkey, key_len) && |
| 389 | (net == n->dev->nd_net)) { | 391 | (net == n->dev->nd_net)) { |
| @@ -507,6 +509,7 @@ struct pneigh_entry * pneigh_lookup(struct neigh_table *tbl, | |||
| 507 | if (tbl->pconstructor && tbl->pconstructor(n)) { | 509 | if (tbl->pconstructor && tbl->pconstructor(n)) { |
| 508 | if (dev) | 510 | if (dev) |
| 509 | dev_put(dev); | 511 | dev_put(dev); |
| 512 | release_net(net); | ||
| 510 | kfree(n); | 513 | kfree(n); |
| 511 | n = NULL; | 514 | n = NULL; |
| 512 | goto out; | 515 | goto out; |
| @@ -834,12 +837,18 @@ static void neigh_timer_handler(unsigned long arg) | |||
| 834 | } | 837 | } |
| 835 | if (neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) { | 838 | if (neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) { |
| 836 | struct sk_buff *skb = skb_peek(&neigh->arp_queue); | 839 | struct sk_buff *skb = skb_peek(&neigh->arp_queue); |
| 837 | 840 | /* keep skb alive even if arp_queue overflows */ | |
| 841 | if (skb) | ||
| 842 | skb_get(skb); | ||
| 843 | write_unlock(&neigh->lock); | ||
| 838 | neigh->ops->solicit(neigh, skb); | 844 | neigh->ops->solicit(neigh, skb); |
| 839 | atomic_inc(&neigh->probes); | 845 | atomic_inc(&neigh->probes); |
| 840 | } | 846 | if (skb) |
| 847 | kfree_skb(skb); | ||
| 848 | } else { | ||
| 841 | out: | 849 | out: |
| 842 | write_unlock(&neigh->lock); | 850 | write_unlock(&neigh->lock); |
| 851 | } | ||
| 843 | 852 | ||
| 844 | if (notify) | 853 | if (notify) |
| 845 | neigh_update_notify(neigh); | 854 | neigh_update_notify(neigh); |
diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index ecb02afd52dc..2bd9c5f7627d 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c | |||
| @@ -504,7 +504,7 @@ int rtnl_put_cacheinfo(struct sk_buff *skb, struct dst_entry *dst, u32 id, | |||
| 504 | 504 | ||
| 505 | EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo); | 505 | EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo); |
| 506 | 506 | ||
| 507 | static int set_operstate(struct net_device *dev, unsigned char transition, bool send_notification) | 507 | static void set_operstate(struct net_device *dev, unsigned char transition) |
| 508 | { | 508 | { |
| 509 | unsigned char operstate = dev->operstate; | 509 | unsigned char operstate = dev->operstate; |
| 510 | 510 | ||
| @@ -527,12 +527,8 @@ static int set_operstate(struct net_device *dev, unsigned char transition, bool | |||
| 527 | write_lock_bh(&dev_base_lock); | 527 | write_lock_bh(&dev_base_lock); |
| 528 | dev->operstate = operstate; | 528 | dev->operstate = operstate; |
| 529 | write_unlock_bh(&dev_base_lock); | 529 | write_unlock_bh(&dev_base_lock); |
| 530 | 530 | netdev_state_change(dev); | |
| 531 | if (send_notification) | 531 | } |
| 532 | netdev_state_change(dev); | ||
| 533 | return 1; | ||
| 534 | } else | ||
| 535 | return 0; | ||
| 536 | } | 532 | } |
| 537 | 533 | ||
| 538 | static void copy_rtnl_link_stats(struct rtnl_link_stats *a, | 534 | static void copy_rtnl_link_stats(struct rtnl_link_stats *a, |
| @@ -693,10 +689,12 @@ const struct nla_policy ifla_policy[IFLA_MAX+1] = { | |||
| 693 | [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN }, | 689 | [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN }, |
| 694 | [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) }, | 690 | [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) }, |
| 695 | [IFLA_MTU] = { .type = NLA_U32 }, | 691 | [IFLA_MTU] = { .type = NLA_U32 }, |
| 692 | [IFLA_LINK] = { .type = NLA_U32 }, | ||
| 696 | [IFLA_TXQLEN] = { .type = NLA_U32 }, | 693 | [IFLA_TXQLEN] = { .type = NLA_U32 }, |
| 697 | [IFLA_WEIGHT] = { .type = NLA_U32 }, | 694 | [IFLA_WEIGHT] = { .type = NLA_U32 }, |
| 698 | [IFLA_OPERSTATE] = { .type = NLA_U8 }, | 695 | [IFLA_OPERSTATE] = { .type = NLA_U8 }, |
| 699 | [IFLA_LINKMODE] = { .type = NLA_U8 }, | 696 | [IFLA_LINKMODE] = { .type = NLA_U8 }, |
| 697 | [IFLA_LINKINFO] = { .type = NLA_NESTED }, | ||
| 700 | [IFLA_NET_NS_PID] = { .type = NLA_U32 }, | 698 | [IFLA_NET_NS_PID] = { .type = NLA_U32 }, |
| 701 | }; | 699 | }; |
| 702 | 700 | ||
| @@ -724,6 +722,21 @@ static struct net *get_net_ns_by_pid(pid_t pid) | |||
| 724 | return net; | 722 | return net; |
| 725 | } | 723 | } |
| 726 | 724 | ||
| 725 | static int validate_linkmsg(struct net_device *dev, struct nlattr *tb[]) | ||
| 726 | { | ||
| 727 | if (dev) { | ||
| 728 | if (tb[IFLA_ADDRESS] && | ||
| 729 | nla_len(tb[IFLA_ADDRESS]) < dev->addr_len) | ||
| 730 | return -EINVAL; | ||
| 731 | |||
| 732 | if (tb[IFLA_BROADCAST] && | ||
| 733 | nla_len(tb[IFLA_BROADCAST]) < dev->addr_len) | ||
| 734 | return -EINVAL; | ||
| 735 | } | ||
| 736 | |||
| 737 | return 0; | ||
| 738 | } | ||
| 739 | |||
| 727 | static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | 740 | static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, |
| 728 | struct nlattr **tb, char *ifname, int modified) | 741 | struct nlattr **tb, char *ifname, int modified) |
| 729 | { | 742 | { |
| @@ -826,7 +839,6 @@ static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | |||
| 826 | if (tb[IFLA_BROADCAST]) { | 839 | if (tb[IFLA_BROADCAST]) { |
| 827 | nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len); | 840 | nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len); |
| 828 | send_addr_notify = 1; | 841 | send_addr_notify = 1; |
| 829 | modified = 1; | ||
| 830 | } | 842 | } |
| 831 | 843 | ||
| 832 | if (ifm->ifi_flags || ifm->ifi_change) { | 844 | if (ifm->ifi_flags || ifm->ifi_change) { |
| @@ -839,23 +851,16 @@ static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | |||
| 839 | dev_change_flags(dev, flags); | 851 | dev_change_flags(dev, flags); |
| 840 | } | 852 | } |
| 841 | 853 | ||
| 842 | if (tb[IFLA_TXQLEN]) { | 854 | if (tb[IFLA_TXQLEN]) |
| 843 | if (dev->tx_queue_len != nla_get_u32(tb[IFLA_TXQLEN])) { | 855 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); |
| 844 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); | ||
| 845 | modified = 1; | ||
| 846 | } | ||
| 847 | } | ||
| 848 | 856 | ||
| 849 | if (tb[IFLA_OPERSTATE]) | 857 | if (tb[IFLA_OPERSTATE]) |
| 850 | modified |= set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]), false); | 858 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE])); |
| 851 | 859 | ||
| 852 | if (tb[IFLA_LINKMODE]) { | 860 | if (tb[IFLA_LINKMODE]) { |
| 853 | if (dev->link_mode != nla_get_u8(tb[IFLA_LINKMODE])) { | 861 | write_lock_bh(&dev_base_lock); |
| 854 | write_lock_bh(&dev_base_lock); | 862 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); |
| 855 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); | 863 | write_unlock_bh(&dev_base_lock); |
| 856 | write_lock_bh(&dev_base_lock); | ||
| 857 | modified = 1; | ||
| 858 | } | ||
| 859 | } | 864 | } |
| 860 | 865 | ||
| 861 | err = 0; | 866 | err = 0; |
| @@ -869,10 +874,6 @@ errout: | |||
| 869 | 874 | ||
| 870 | if (send_addr_notify) | 875 | if (send_addr_notify) |
| 871 | call_netdevice_notifiers(NETDEV_CHANGEADDR, dev); | 876 | call_netdevice_notifiers(NETDEV_CHANGEADDR, dev); |
| 872 | |||
| 873 | if (modified) | ||
| 874 | netdev_state_change(dev); | ||
| 875 | |||
| 876 | return err; | 877 | return err; |
| 877 | } | 878 | } |
| 878 | 879 | ||
| @@ -908,12 +909,7 @@ static int rtnl_setlink(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg) | |||
| 908 | goto errout; | 909 | goto errout; |
| 909 | } | 910 | } |
| 910 | 911 | ||
| 911 | if (tb[IFLA_ADDRESS] && | 912 | if ((err = validate_linkmsg(dev, tb)) < 0) |
| 912 | nla_len(tb[IFLA_ADDRESS]) < dev->addr_len) | ||
| 913 | goto errout_dev; | ||
| 914 | |||
| 915 | if (tb[IFLA_BROADCAST] && | ||
| 916 | nla_len(tb[IFLA_BROADCAST]) < dev->addr_len) | ||
| 917 | goto errout_dev; | 913 | goto errout_dev; |
| 918 | 914 | ||
| 919 | err = do_setlink(dev, ifm, tb, ifname, 0); | 915 | err = do_setlink(dev, ifm, tb, ifname, 0); |
| @@ -990,7 +986,7 @@ struct net_device *rtnl_create_link(struct net *net, char *ifname, | |||
| 990 | if (tb[IFLA_TXQLEN]) | 986 | if (tb[IFLA_TXQLEN]) |
| 991 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); | 987 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); |
| 992 | if (tb[IFLA_OPERSTATE]) | 988 | if (tb[IFLA_OPERSTATE]) |
| 993 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]), true); | 989 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE])); |
| 994 | if (tb[IFLA_LINKMODE]) | 990 | if (tb[IFLA_LINKMODE]) |
| 995 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); | 991 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); |
| 996 | 992 | ||
| @@ -1034,6 +1030,9 @@ replay: | |||
| 1034 | else | 1030 | else |
| 1035 | dev = NULL; | 1031 | dev = NULL; |
| 1036 | 1032 | ||
| 1033 | if ((err = validate_linkmsg(dev, tb)) < 0) | ||
| 1034 | return err; | ||
| 1035 | |||
| 1037 | if (tb[IFLA_LINKINFO]) { | 1036 | if (tb[IFLA_LINKINFO]) { |
| 1038 | err = nla_parse_nested(linkinfo, IFLA_INFO_MAX, | 1037 | err = nla_parse_nested(linkinfo, IFLA_INFO_MAX, |
| 1039 | tb[IFLA_LINKINFO], ifla_info_policy); | 1038 | tb[IFLA_LINKINFO], ifla_info_policy); |
diff --git a/net/ipv4/arp.c b/net/ipv4/arp.c index c663fa5339ee..8e17f65f4002 100644 --- a/net/ipv4/arp.c +++ b/net/ipv4/arp.c | |||
| @@ -368,6 +368,7 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) | |||
| 368 | if (!(neigh->nud_state&NUD_VALID)) | 368 | if (!(neigh->nud_state&NUD_VALID)) |
| 369 | printk(KERN_DEBUG "trying to ucast probe in NUD_INVALID\n"); | 369 | printk(KERN_DEBUG "trying to ucast probe in NUD_INVALID\n"); |
| 370 | dst_ha = neigh->ha; | 370 | dst_ha = neigh->ha; |
| 371 | read_lock_bh(&neigh->lock); | ||
| 371 | } else if ((probes -= neigh->parms->app_probes) < 0) { | 372 | } else if ((probes -= neigh->parms->app_probes) < 0) { |
| 372 | #ifdef CONFIG_ARPD | 373 | #ifdef CONFIG_ARPD |
| 373 | neigh_app_ns(neigh); | 374 | neigh_app_ns(neigh); |
| @@ -377,6 +378,8 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) | |||
| 377 | 378 | ||
| 378 | arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr, | 379 | arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr, |
| 379 | dst_ha, dev->dev_addr, NULL); | 380 | dst_ha, dev->dev_addr, NULL); |
| 381 | if (dst_ha) | ||
| 382 | read_unlock_bh(&neigh->lock); | ||
| 380 | } | 383 | } |
| 381 | 384 | ||
| 382 | static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip) | 385 | static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip) |
diff --git a/net/ipv4/fib_hash.c b/net/ipv4/fib_hash.c index 76b9c684cccd..8d58d85dfac6 100644 --- a/net/ipv4/fib_hash.c +++ b/net/ipv4/fib_hash.c | |||
| @@ -372,7 +372,8 @@ static struct fib_node *fib_find_node(struct fn_zone *fz, __be32 key) | |||
| 372 | static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | 372 | static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) |
| 373 | { | 373 | { |
| 374 | struct fn_hash *table = (struct fn_hash *) tb->tb_data; | 374 | struct fn_hash *table = (struct fn_hash *) tb->tb_data; |
| 375 | struct fib_node *new_f, *f; | 375 | struct fib_node *new_f = NULL; |
| 376 | struct fib_node *f; | ||
| 376 | struct fib_alias *fa, *new_fa; | 377 | struct fib_alias *fa, *new_fa; |
| 377 | struct fn_zone *fz; | 378 | struct fn_zone *fz; |
| 378 | struct fib_info *fi; | 379 | struct fib_info *fi; |
| @@ -496,7 +497,6 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
| 496 | 497 | ||
| 497 | err = -ENOBUFS; | 498 | err = -ENOBUFS; |
| 498 | 499 | ||
| 499 | new_f = NULL; | ||
| 500 | if (!f) { | 500 | if (!f) { |
| 501 | new_f = kmem_cache_zalloc(fn_hash_kmem, GFP_KERNEL); | 501 | new_f = kmem_cache_zalloc(fn_hash_kmem, GFP_KERNEL); |
| 502 | if (new_f == NULL) | 502 | if (new_f == NULL) |
| @@ -512,7 +512,7 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
| 512 | if (new_fa->fa_info != NULL) { | 512 | if (new_fa->fa_info != NULL) { |
| 513 | new_fa = kmem_cache_alloc(fn_alias_kmem, GFP_KERNEL); | 513 | new_fa = kmem_cache_alloc(fn_alias_kmem, GFP_KERNEL); |
| 514 | if (new_fa == NULL) | 514 | if (new_fa == NULL) |
| 515 | goto out_free_new_f; | 515 | goto out; |
| 516 | } | 516 | } |
| 517 | new_fa->fa_info = fi; | 517 | new_fa->fa_info = fi; |
| 518 | new_fa->fa_tos = tos; | 518 | new_fa->fa_tos = tos; |
| @@ -540,9 +540,9 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
| 540 | &cfg->fc_nlinfo, 0); | 540 | &cfg->fc_nlinfo, 0); |
| 541 | return 0; | 541 | return 0; |
| 542 | 542 | ||
| 543 | out_free_new_f: | ||
| 544 | kmem_cache_free(fn_hash_kmem, new_f); | ||
| 545 | out: | 543 | out: |
| 544 | if (new_f) | ||
| 545 | kmem_cache_free(fn_hash_kmem, new_f); | ||
| 546 | fib_release_info(fi); | 546 | fib_release_info(fi); |
| 547 | return err; | 547 | return err; |
| 548 | } | 548 | } |
diff --git a/net/ipv4/ip_gre.c b/net/ipv4/ip_gre.c index 63f691719353..906cb1ada4c3 100644 --- a/net/ipv4/ip_gre.c +++ b/net/ipv4/ip_gre.c | |||
| @@ -259,16 +259,8 @@ static struct ip_tunnel * ipgre_tunnel_locate(struct ip_tunnel_parm *parms, int | |||
| 259 | 259 | ||
| 260 | if (parms->name[0]) | 260 | if (parms->name[0]) |
| 261 | strlcpy(name, parms->name, IFNAMSIZ); | 261 | strlcpy(name, parms->name, IFNAMSIZ); |
| 262 | else { | 262 | else |
| 263 | int i; | 263 | sprintf(name, "gre%%d"); |
| 264 | for (i=1; i<100; i++) { | ||
| 265 | sprintf(name, "gre%d", i); | ||
| 266 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
| 267 | break; | ||
| 268 | } | ||
| 269 | if (i==100) | ||
| 270 | goto failed; | ||
| 271 | } | ||
| 272 | 264 | ||
| 273 | dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup); | 265 | dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup); |
| 274 | if (!dev) | 266 | if (!dev) |
diff --git a/net/ipv4/ipconfig.c b/net/ipv4/ipconfig.c index a52b5853aaa8..10013ccee8dd 100644 --- a/net/ipv4/ipconfig.c +++ b/net/ipv4/ipconfig.c | |||
| @@ -1390,7 +1390,7 @@ static int __init ip_auto_config(void) | |||
| 1390 | * Clue in the operator. | 1390 | * Clue in the operator. |
| 1391 | */ | 1391 | */ |
| 1392 | printk("IP-Config: Complete:"); | 1392 | printk("IP-Config: Complete:"); |
| 1393 | printk("\n device=%s", ic_dev->name); | 1393 | printk("\n device=%s", ic_dev->name); |
| 1394 | printk(", addr=%u.%u.%u.%u", NIPQUAD(ic_myaddr)); | 1394 | printk(", addr=%u.%u.%u.%u", NIPQUAD(ic_myaddr)); |
| 1395 | printk(", mask=%u.%u.%u.%u", NIPQUAD(ic_netmask)); | 1395 | printk(", mask=%u.%u.%u.%u", NIPQUAD(ic_netmask)); |
| 1396 | printk(", gw=%u.%u.%u.%u", NIPQUAD(ic_gateway)); | 1396 | printk(", gw=%u.%u.%u.%u", NIPQUAD(ic_gateway)); |
diff --git a/net/ipv4/ipip.c b/net/ipv4/ipip.c index da281581692c..e77e3b855834 100644 --- a/net/ipv4/ipip.c +++ b/net/ipv4/ipip.c | |||
| @@ -221,16 +221,8 @@ static struct ip_tunnel * ipip_tunnel_locate(struct ip_tunnel_parm *parms, int c | |||
| 221 | 221 | ||
| 222 | if (parms->name[0]) | 222 | if (parms->name[0]) |
| 223 | strlcpy(name, parms->name, IFNAMSIZ); | 223 | strlcpy(name, parms->name, IFNAMSIZ); |
| 224 | else { | 224 | else |
| 225 | int i; | 225 | sprintf(name, "tunl%%d"); |
| 226 | for (i=1; i<100; i++) { | ||
| 227 | sprintf(name, "tunl%d", i); | ||
| 228 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
| 229 | break; | ||
| 230 | } | ||
| 231 | if (i==100) | ||
| 232 | goto failed; | ||
| 233 | } | ||
| 234 | 226 | ||
| 235 | dev = alloc_netdev(sizeof(*t), name, ipip_tunnel_setup); | 227 | dev = alloc_netdev(sizeof(*t), name, ipip_tunnel_setup); |
| 236 | if (dev == NULL) | 228 | if (dev == NULL) |
diff --git a/net/ipv4/netfilter/arpt_mangle.c b/net/ipv4/netfilter/arpt_mangle.c index 45fa4e20094a..3f4222b0a803 100644 --- a/net/ipv4/netfilter/arpt_mangle.c +++ b/net/ipv4/netfilter/arpt_mangle.c | |||
| @@ -19,7 +19,7 @@ target(struct sk_buff *skb, | |||
| 19 | unsigned char *arpptr; | 19 | unsigned char *arpptr; |
| 20 | int pln, hln; | 20 | int pln, hln; |
| 21 | 21 | ||
| 22 | if (skb_make_writable(skb, skb->len)) | 22 | if (!skb_make_writable(skb, skb->len)) |
| 23 | return NF_DROP; | 23 | return NF_DROP; |
| 24 | 24 | ||
| 25 | arp = arp_hdr(skb); | 25 | arp = arp_hdr(skb); |
diff --git a/net/ipv4/netfilter/ip_queue.c b/net/ipv4/netfilter/ip_queue.c index 6bda1102851b..fe05da41d6ba 100644 --- a/net/ipv4/netfilter/ip_queue.c +++ b/net/ipv4/netfilter/ip_queue.c | |||
| @@ -283,8 +283,8 @@ static int | |||
| 283 | ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | 283 | ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) |
| 284 | { | 284 | { |
| 285 | int diff; | 285 | int diff; |
| 286 | int err; | ||
| 287 | struct iphdr *user_iph = (struct iphdr *)v->payload; | 286 | struct iphdr *user_iph = (struct iphdr *)v->payload; |
| 287 | struct sk_buff *nskb; | ||
| 288 | 288 | ||
| 289 | if (v->data_len < sizeof(*user_iph)) | 289 | if (v->data_len < sizeof(*user_iph)) |
| 290 | return 0; | 290 | return 0; |
| @@ -296,14 +296,16 @@ ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | |||
| 296 | if (v->data_len > 0xFFFF) | 296 | if (v->data_len > 0xFFFF) |
| 297 | return -EINVAL; | 297 | return -EINVAL; |
| 298 | if (diff > skb_tailroom(e->skb)) { | 298 | if (diff > skb_tailroom(e->skb)) { |
| 299 | err = pskb_expand_head(e->skb, 0, | 299 | nskb = skb_copy_expand(e->skb, 0, |
| 300 | diff - skb_tailroom(e->skb), | 300 | diff - skb_tailroom(e->skb), |
| 301 | GFP_ATOMIC); | 301 | GFP_ATOMIC); |
| 302 | if (err) { | 302 | if (!nskb) { |
| 303 | printk(KERN_WARNING "ip_queue: error " | 303 | printk(KERN_WARNING "ip_queue: error " |
| 304 | "in mangle, dropping packet: %d\n", -err); | 304 | "in mangle, dropping packet\n"); |
| 305 | return err; | 305 | return -ENOMEM; |
| 306 | } | 306 | } |
| 307 | kfree_skb(e->skb); | ||
| 308 | e->skb = nskb; | ||
| 307 | } | 309 | } |
| 308 | skb_put(e->skb, diff); | 310 | skb_put(e->skb, diff); |
| 309 | } | 311 | } |
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index 63414ea427c5..00156bf421ca 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c | |||
| @@ -719,7 +719,7 @@ static void tcp_v4_reqsk_send_ack(struct sk_buff *skb, | |||
| 719 | } | 719 | } |
| 720 | 720 | ||
| 721 | /* | 721 | /* |
| 722 | * Send a SYN-ACK after having received an ACK. | 722 | * Send a SYN-ACK after having received a SYN. |
| 723 | * This still operates on a request_sock only, not on a big | 723 | * This still operates on a request_sock only, not on a big |
| 724 | * socket. | 724 | * socket. |
| 725 | */ | 725 | */ |
diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c index bddac0e8780f..f0aa97738746 100644 --- a/net/ipv6/af_inet6.c +++ b/net/ipv6/af_inet6.c | |||
| @@ -752,14 +752,6 @@ static int __init inet6_init(void) | |||
| 752 | 752 | ||
| 753 | BUILD_BUG_ON(sizeof(struct inet6_skb_parm) > sizeof(dummy_skb->cb)); | 753 | BUILD_BUG_ON(sizeof(struct inet6_skb_parm) > sizeof(dummy_skb->cb)); |
| 754 | 754 | ||
| 755 | #ifdef MODULE | ||
| 756 | #if 0 /* FIXME --RR */ | ||
| 757 | if (!mod_member_present(&__this_module, can_unload)) | ||
| 758 | return -EINVAL; | ||
| 759 | |||
| 760 | __this_module.can_unload = &ipv6_unload; | ||
| 761 | #endif | ||
| 762 | #endif | ||
| 763 | err = proto_register(&tcpv6_prot, 1); | 755 | err = proto_register(&tcpv6_prot, 1); |
| 764 | if (err) | 756 | if (err) |
| 765 | goto out; | 757 | goto out; |
diff --git a/net/ipv6/ip6_fib.c b/net/ipv6/ip6_fib.c index f93407cf6515..bab72b6f1444 100644 --- a/net/ipv6/ip6_fib.c +++ b/net/ipv6/ip6_fib.c | |||
| @@ -1151,7 +1151,7 @@ static void fib6_del_route(struct fib6_node *fn, struct rt6_info **rtp, | |||
| 1151 | fn = fn->parent; | 1151 | fn = fn->parent; |
| 1152 | } | 1152 | } |
| 1153 | /* No more references are possible at this point. */ | 1153 | /* No more references are possible at this point. */ |
| 1154 | if (atomic_read(&rt->rt6i_ref) != 1) BUG(); | 1154 | BUG_ON(atomic_read(&rt->rt6i_ref) != 1); |
| 1155 | } | 1155 | } |
| 1156 | 1156 | ||
| 1157 | inet6_rt_notify(RTM_DELROUTE, rt, info); | 1157 | inet6_rt_notify(RTM_DELROUTE, rt, info); |
diff --git a/net/ipv6/ip6_tunnel.c b/net/ipv6/ip6_tunnel.c index 9031e521c1df..2a124e9a1b2d 100644 --- a/net/ipv6/ip6_tunnel.c +++ b/net/ipv6/ip6_tunnel.c | |||
| @@ -229,18 +229,11 @@ static struct ip6_tnl *ip6_tnl_create(struct ip6_tnl_parm *p) | |||
| 229 | char name[IFNAMSIZ]; | 229 | char name[IFNAMSIZ]; |
| 230 | int err; | 230 | int err; |
| 231 | 231 | ||
| 232 | if (p->name[0]) { | 232 | if (p->name[0]) |
| 233 | strlcpy(name, p->name, IFNAMSIZ); | 233 | strlcpy(name, p->name, IFNAMSIZ); |
| 234 | } else { | 234 | else |
| 235 | int i; | 235 | sprintf(name, "ip6tnl%%d"); |
| 236 | for (i = 1; i < IP6_TNL_MAX; i++) { | 236 | |
| 237 | sprintf(name, "ip6tnl%d", i); | ||
| 238 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
| 239 | break; | ||
| 240 | } | ||
| 241 | if (i == IP6_TNL_MAX) | ||
| 242 | goto failed; | ||
| 243 | } | ||
| 244 | dev = alloc_netdev(sizeof (*t), name, ip6_tnl_dev_setup); | 237 | dev = alloc_netdev(sizeof (*t), name, ip6_tnl_dev_setup); |
| 245 | if (dev == NULL) | 238 | if (dev == NULL) |
| 246 | goto failed; | 239 | goto failed; |
| @@ -550,6 +543,7 @@ ip4ip6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, | |||
| 550 | ip_rt_put(rt); | 543 | ip_rt_put(rt); |
| 551 | goto out; | 544 | goto out; |
| 552 | } | 545 | } |
| 546 | skb2->dst = (struct dst_entry *)rt; | ||
| 553 | } else { | 547 | } else { |
| 554 | ip_rt_put(rt); | 548 | ip_rt_put(rt); |
| 555 | if (ip_route_input(skb2, eiph->daddr, eiph->saddr, eiph->tos, | 549 | if (ip_route_input(skb2, eiph->daddr, eiph->saddr, eiph->tos, |
diff --git a/net/ipv6/netfilter/ip6_queue.c b/net/ipv6/netfilter/ip6_queue.c index e869916b05f1..cc2f9afcf808 100644 --- a/net/ipv6/netfilter/ip6_queue.c +++ b/net/ipv6/netfilter/ip6_queue.c | |||
| @@ -285,8 +285,8 @@ static int | |||
| 285 | ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | 285 | ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) |
| 286 | { | 286 | { |
| 287 | int diff; | 287 | int diff; |
| 288 | int err; | ||
| 289 | struct ipv6hdr *user_iph = (struct ipv6hdr *)v->payload; | 288 | struct ipv6hdr *user_iph = (struct ipv6hdr *)v->payload; |
| 289 | struct sk_buff *nskb; | ||
| 290 | 290 | ||
| 291 | if (v->data_len < sizeof(*user_iph)) | 291 | if (v->data_len < sizeof(*user_iph)) |
| 292 | return 0; | 292 | return 0; |
| @@ -298,14 +298,16 @@ ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | |||
| 298 | if (v->data_len > 0xFFFF) | 298 | if (v->data_len > 0xFFFF) |
| 299 | return -EINVAL; | 299 | return -EINVAL; |
| 300 | if (diff > skb_tailroom(e->skb)) { | 300 | if (diff > skb_tailroom(e->skb)) { |
| 301 | err = pskb_expand_head(e->skb, 0, | 301 | nskb = skb_copy_expand(e->skb, 0, |
| 302 | diff - skb_tailroom(e->skb), | 302 | diff - skb_tailroom(e->skb), |
| 303 | GFP_ATOMIC); | 303 | GFP_ATOMIC); |
| 304 | if (err) { | 304 | if (!nskb) { |
| 305 | printk(KERN_WARNING "ip6_queue: OOM " | 305 | printk(KERN_WARNING "ip6_queue: OOM " |
| 306 | "in mangle, dropping packet\n"); | 306 | "in mangle, dropping packet\n"); |
| 307 | return err; | 307 | return -ENOMEM; |
| 308 | } | 308 | } |
| 309 | kfree_skb(e->skb); | ||
| 310 | e->skb = nskb; | ||
| 309 | } | 311 | } |
| 310 | skb_put(e->skb, diff); | 312 | skb_put(e->skb, diff); |
| 311 | } | 313 | } |
diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c index e77239d02bf5..dde7801abeff 100644 --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c | |||
| @@ -164,16 +164,8 @@ static struct ip_tunnel * ipip6_tunnel_locate(struct ip_tunnel_parm *parms, int | |||
| 164 | 164 | ||
| 165 | if (parms->name[0]) | 165 | if (parms->name[0]) |
| 166 | strlcpy(name, parms->name, IFNAMSIZ); | 166 | strlcpy(name, parms->name, IFNAMSIZ); |
| 167 | else { | 167 | else |
| 168 | int i; | 168 | sprintf(name, "sit%%d"); |
| 169 | for (i=1; i<100; i++) { | ||
| 170 | sprintf(name, "sit%d", i); | ||
| 171 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
| 172 | break; | ||
| 173 | } | ||
| 174 | if (i==100) | ||
| 175 | goto failed; | ||
| 176 | } | ||
| 177 | 169 | ||
| 178 | dev = alloc_netdev(sizeof(*t), name, ipip6_tunnel_setup); | 170 | dev = alloc_netdev(sizeof(*t), name, ipip6_tunnel_setup); |
| 179 | if (dev == NULL) | 171 | if (dev == NULL) |
diff --git a/net/mac80211/ieee80211.c b/net/mac80211/ieee80211.c index 67b7c75c430d..28bcdf9fc3df 100644 --- a/net/mac80211/ieee80211.c +++ b/net/mac80211/ieee80211.c | |||
| @@ -165,6 +165,7 @@ static int ieee80211_open(struct net_device *dev) | |||
| 165 | struct ieee80211_local *local = wdev_priv(dev->ieee80211_ptr); | 165 | struct ieee80211_local *local = wdev_priv(dev->ieee80211_ptr); |
| 166 | struct ieee80211_if_init_conf conf; | 166 | struct ieee80211_if_init_conf conf; |
| 167 | int res; | 167 | int res; |
| 168 | bool need_hw_reconfig = 0; | ||
| 168 | 169 | ||
| 169 | sdata = IEEE80211_DEV_TO_SUB_IF(dev); | 170 | sdata = IEEE80211_DEV_TO_SUB_IF(dev); |
| 170 | 171 | ||
| @@ -218,7 +219,7 @@ static int ieee80211_open(struct net_device *dev) | |||
| 218 | res = local->ops->start(local_to_hw(local)); | 219 | res = local->ops->start(local_to_hw(local)); |
| 219 | if (res) | 220 | if (res) |
| 220 | return res; | 221 | return res; |
| 221 | ieee80211_hw_config(local); | 222 | need_hw_reconfig = 1; |
| 222 | ieee80211_led_radio(local, local->hw.conf.radio_enabled); | 223 | ieee80211_led_radio(local, local->hw.conf.radio_enabled); |
| 223 | } | 224 | } |
| 224 | 225 | ||
| @@ -282,6 +283,8 @@ static int ieee80211_open(struct net_device *dev) | |||
| 282 | atomic_inc(&local->iff_promiscs); | 283 | atomic_inc(&local->iff_promiscs); |
| 283 | 284 | ||
| 284 | local->open_count++; | 285 | local->open_count++; |
| 286 | if (need_hw_reconfig) | ||
| 287 | ieee80211_hw_config(local); | ||
| 285 | 288 | ||
| 286 | netif_start_queue(dev); | 289 | netif_start_queue(dev); |
| 287 | 290 | ||
diff --git a/net/netfilter/nfnetlink_queue.c b/net/netfilter/nfnetlink_queue.c index a48b20fe9cd6..0043d3a9f87e 100644 --- a/net/netfilter/nfnetlink_queue.c +++ b/net/netfilter/nfnetlink_queue.c | |||
| @@ -443,8 +443,8 @@ err_out: | |||
| 443 | static int | 443 | static int |
| 444 | nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) | 444 | nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) |
| 445 | { | 445 | { |
| 446 | struct sk_buff *nskb; | ||
| 446 | int diff; | 447 | int diff; |
| 447 | int err; | ||
| 448 | 448 | ||
| 449 | diff = data_len - e->skb->len; | 449 | diff = data_len - e->skb->len; |
| 450 | if (diff < 0) { | 450 | if (diff < 0) { |
| @@ -454,14 +454,16 @@ nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) | |||
| 454 | if (data_len > 0xFFFF) | 454 | if (data_len > 0xFFFF) |
| 455 | return -EINVAL; | 455 | return -EINVAL; |
| 456 | if (diff > skb_tailroom(e->skb)) { | 456 | if (diff > skb_tailroom(e->skb)) { |
| 457 | err = pskb_expand_head(e->skb, 0, | 457 | nskb = skb_copy_expand(e->skb, 0, |
| 458 | diff - skb_tailroom(e->skb), | 458 | diff - skb_tailroom(e->skb), |
| 459 | GFP_ATOMIC); | 459 | GFP_ATOMIC); |
| 460 | if (err) { | 460 | if (!nskb) { |
| 461 | printk(KERN_WARNING "nf_queue: OOM " | 461 | printk(KERN_WARNING "nf_queue: OOM " |
| 462 | "in mangle, dropping packet\n"); | 462 | "in mangle, dropping packet\n"); |
| 463 | return err; | 463 | return -ENOMEM; |
| 464 | } | 464 | } |
| 465 | kfree_skb(e->skb); | ||
| 466 | e->skb = nskb; | ||
| 465 | } | 467 | } |
| 466 | skb_put(e->skb, diff); | 468 | skb_put(e->skb, diff); |
| 467 | } | 469 | } |
diff --git a/net/netfilter/xt_hashlimit.c b/net/netfilter/xt_hashlimit.c index 744c7f2ab0b1..5418ce59ac3a 100644 --- a/net/netfilter/xt_hashlimit.c +++ b/net/netfilter/xt_hashlimit.c | |||
| @@ -774,9 +774,6 @@ hashlimit_mt_check(const char *tablename, const void *inf, | |||
| 774 | return false; | 774 | return false; |
| 775 | } | 775 | } |
| 776 | mutex_unlock(&hlimit_mutex); | 776 | mutex_unlock(&hlimit_mutex); |
| 777 | |||
| 778 | /* Ugly hack: For SMP, we only want to use one set */ | ||
| 779 | info->master = info; | ||
| 780 | return true; | 777 | return true; |
| 781 | } | 778 | } |
| 782 | 779 | ||
diff --git a/net/netfilter/xt_iprange.c b/net/netfilter/xt_iprange.c index 4f984dc60319..500528d60cd7 100644 --- a/net/netfilter/xt_iprange.c +++ b/net/netfilter/xt_iprange.c | |||
| @@ -102,7 +102,7 @@ iprange_ipv6_sub(const struct in6_addr *a, const struct in6_addr *b) | |||
| 102 | int r; | 102 | int r; |
| 103 | 103 | ||
| 104 | for (i = 0; i < 4; ++i) { | 104 | for (i = 0; i < 4; ++i) { |
| 105 | r = (__force u32)a->s6_addr32[i] - (__force u32)b->s6_addr32[i]; | 105 | r = ntohl(a->s6_addr32[i]) - ntohl(b->s6_addr32[i]); |
| 106 | if (r != 0) | 106 | if (r != 0) |
| 107 | return r; | 107 | return r; |
| 108 | } | 108 | } |
diff --git a/net/netfilter/xt_u32.c b/net/netfilter/xt_u32.c index 9b8ed390a8e0..627e0f336d54 100644 --- a/net/netfilter/xt_u32.c +++ b/net/netfilter/xt_u32.c | |||
| @@ -26,7 +26,6 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
| 26 | u_int32_t pos; | 26 | u_int32_t pos; |
| 27 | u_int32_t val; | 27 | u_int32_t val; |
| 28 | u_int32_t at; | 28 | u_int32_t at; |
| 29 | int ret; | ||
| 30 | 29 | ||
| 31 | /* | 30 | /* |
| 32 | * Small example: "0 >> 28 == 4 && 8 & 0xFF0000 >> 16 = 6, 17" | 31 | * Small example: "0 >> 28 == 4 && 8 & 0xFF0000 >> 16 = 6, 17" |
| @@ -40,8 +39,8 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
| 40 | if (skb->len < 4 || pos > skb->len - 4) | 39 | if (skb->len < 4 || pos > skb->len - 4) |
| 41 | return false; | 40 | return false; |
| 42 | 41 | ||
| 43 | ret = skb_copy_bits(skb, pos, &n, sizeof(n)); | 42 | if (skb_copy_bits(skb, pos, &n, sizeof(n)) < 0) |
| 44 | BUG_ON(ret < 0); | 43 | BUG(); |
| 45 | val = ntohl(n); | 44 | val = ntohl(n); |
| 46 | nnums = ct->nnums; | 45 | nnums = ct->nnums; |
| 47 | 46 | ||
| @@ -67,9 +66,9 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
| 67 | pos > skb->len - at - 4) | 66 | pos > skb->len - at - 4) |
| 68 | return false; | 67 | return false; |
| 69 | 68 | ||
| 70 | ret = skb_copy_bits(skb, at + pos, &n, | 69 | if (skb_copy_bits(skb, at + pos, &n, |
| 71 | sizeof(n)); | 70 | sizeof(n)) < 0) |
| 72 | BUG_ON(ret < 0); | 71 | BUG(); |
| 73 | val = ntohl(n); | 72 | val = ntohl(n); |
| 74 | break; | 73 | break; |
| 75 | } | 74 | } |
diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index c7ad64d664ad..fdc14a0d21af 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c | |||
| @@ -718,36 +718,35 @@ static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info) | |||
| 718 | * NetLabel Generic NETLINK Command Definitions | 718 | * NetLabel Generic NETLINK Command Definitions |
| 719 | */ | 719 | */ |
| 720 | 720 | ||
| 721 | static struct genl_ops netlbl_cipsov4_genl_c_add = { | 721 | static struct genl_ops netlbl_cipsov4_ops[] = { |
| 722 | { | ||
| 722 | .cmd = NLBL_CIPSOV4_C_ADD, | 723 | .cmd = NLBL_CIPSOV4_C_ADD, |
| 723 | .flags = GENL_ADMIN_PERM, | 724 | .flags = GENL_ADMIN_PERM, |
| 724 | .policy = netlbl_cipsov4_genl_policy, | 725 | .policy = netlbl_cipsov4_genl_policy, |
| 725 | .doit = netlbl_cipsov4_add, | 726 | .doit = netlbl_cipsov4_add, |
| 726 | .dumpit = NULL, | 727 | .dumpit = NULL, |
| 727 | }; | 728 | }, |
| 728 | 729 | { | |
| 729 | static struct genl_ops netlbl_cipsov4_genl_c_remove = { | ||
| 730 | .cmd = NLBL_CIPSOV4_C_REMOVE, | 730 | .cmd = NLBL_CIPSOV4_C_REMOVE, |
| 731 | .flags = GENL_ADMIN_PERM, | 731 | .flags = GENL_ADMIN_PERM, |
| 732 | .policy = netlbl_cipsov4_genl_policy, | 732 | .policy = netlbl_cipsov4_genl_policy, |
| 733 | .doit = netlbl_cipsov4_remove, | 733 | .doit = netlbl_cipsov4_remove, |
| 734 | .dumpit = NULL, | 734 | .dumpit = NULL, |
| 735 | }; | 735 | }, |
| 736 | 736 | { | |
| 737 | static struct genl_ops netlbl_cipsov4_genl_c_list = { | ||
| 738 | .cmd = NLBL_CIPSOV4_C_LIST, | 737 | .cmd = NLBL_CIPSOV4_C_LIST, |
| 739 | .flags = 0, | 738 | .flags = 0, |
| 740 | .policy = netlbl_cipsov4_genl_policy, | 739 | .policy = netlbl_cipsov4_genl_policy, |
| 741 | .doit = netlbl_cipsov4_list, | 740 | .doit = netlbl_cipsov4_list, |
| 742 | .dumpit = NULL, | 741 | .dumpit = NULL, |
| 743 | }; | 742 | }, |
| 744 | 743 | { | |
| 745 | static struct genl_ops netlbl_cipsov4_genl_c_listall = { | ||
| 746 | .cmd = NLBL_CIPSOV4_C_LISTALL, | 744 | .cmd = NLBL_CIPSOV4_C_LISTALL, |
| 747 | .flags = 0, | 745 | .flags = 0, |
| 748 | .policy = netlbl_cipsov4_genl_policy, | 746 | .policy = netlbl_cipsov4_genl_policy, |
| 749 | .doit = NULL, | 747 | .doit = NULL, |
| 750 | .dumpit = netlbl_cipsov4_listall, | 748 | .dumpit = netlbl_cipsov4_listall, |
| 749 | }, | ||
| 751 | }; | 750 | }; |
| 752 | 751 | ||
| 753 | /* | 752 | /* |
| @@ -762,30 +761,20 @@ static struct genl_ops netlbl_cipsov4_genl_c_listall = { | |||
| 762 | * mechanism. Returns zero on success, negative values on failure. | 761 | * mechanism. Returns zero on success, negative values on failure. |
| 763 | * | 762 | * |
| 764 | */ | 763 | */ |
| 765 | int netlbl_cipsov4_genl_init(void) | 764 | int __init netlbl_cipsov4_genl_init(void) |
| 766 | { | 765 | { |
| 767 | int ret_val; | 766 | int ret_val, i; |
| 768 | 767 | ||
| 769 | ret_val = genl_register_family(&netlbl_cipsov4_gnl_family); | 768 | ret_val = genl_register_family(&netlbl_cipsov4_gnl_family); |
| 770 | if (ret_val != 0) | 769 | if (ret_val != 0) |
| 771 | return ret_val; | 770 | return ret_val; |
| 772 | 771 | ||
| 773 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | 772 | for (i = 0; i < ARRAY_SIZE(netlbl_cipsov4_ops); i++) { |
| 774 | &netlbl_cipsov4_genl_c_add); | 773 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, |
| 775 | if (ret_val != 0) | 774 | &netlbl_cipsov4_ops[i]); |
| 776 | return ret_val; | 775 | if (ret_val != 0) |
| 777 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | 776 | return ret_val; |
| 778 | &netlbl_cipsov4_genl_c_remove); | 777 | } |
| 779 | if (ret_val != 0) | ||
| 780 | return ret_val; | ||
| 781 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | ||
| 782 | &netlbl_cipsov4_genl_c_list); | ||
| 783 | if (ret_val != 0) | ||
| 784 | return ret_val; | ||
| 785 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | ||
| 786 | &netlbl_cipsov4_genl_c_listall); | ||
| 787 | if (ret_val != 0) | ||
| 788 | return ret_val; | ||
| 789 | 778 | ||
| 790 | return 0; | 779 | return 0; |
| 791 | } | 780 | } |
diff --git a/net/netlabel/netlabel_domainhash.c b/net/netlabel/netlabel_domainhash.c index fd462313471c..02c2f7c0b255 100644 --- a/net/netlabel/netlabel_domainhash.c +++ b/net/netlabel/netlabel_domainhash.c | |||
| @@ -171,7 +171,7 @@ static struct netlbl_dom_map *netlbl_domhsh_search_def(const char *domain) | |||
| 171 | * values on error. | 171 | * values on error. |
| 172 | * | 172 | * |
| 173 | */ | 173 | */ |
| 174 | int netlbl_domhsh_init(u32 size) | 174 | int __init netlbl_domhsh_init(u32 size) |
| 175 | { | 175 | { |
| 176 | u32 iter; | 176 | u32 iter; |
| 177 | struct netlbl_domhsh_tbl *hsh_tbl; | 177 | struct netlbl_domhsh_tbl *hsh_tbl; |
diff --git a/net/netlabel/netlabel_mgmt.c b/net/netlabel/netlabel_mgmt.c index e2258dc3c845..22c191267808 100644 --- a/net/netlabel/netlabel_mgmt.c +++ b/net/netlabel/netlabel_mgmt.c | |||
| @@ -517,68 +517,63 @@ version_failure: | |||
| 517 | * NetLabel Generic NETLINK Command Definitions | 517 | * NetLabel Generic NETLINK Command Definitions |
| 518 | */ | 518 | */ |
| 519 | 519 | ||
| 520 | static struct genl_ops netlbl_mgmt_genl_c_add = { | 520 | static struct genl_ops netlbl_mgmt_genl_ops[] = { |
| 521 | { | ||
| 521 | .cmd = NLBL_MGMT_C_ADD, | 522 | .cmd = NLBL_MGMT_C_ADD, |
| 522 | .flags = GENL_ADMIN_PERM, | 523 | .flags = GENL_ADMIN_PERM, |
| 523 | .policy = netlbl_mgmt_genl_policy, | 524 | .policy = netlbl_mgmt_genl_policy, |
| 524 | .doit = netlbl_mgmt_add, | 525 | .doit = netlbl_mgmt_add, |
| 525 | .dumpit = NULL, | 526 | .dumpit = NULL, |
| 526 | }; | 527 | }, |
| 527 | 528 | { | |
| 528 | static struct genl_ops netlbl_mgmt_genl_c_remove = { | ||
| 529 | .cmd = NLBL_MGMT_C_REMOVE, | 529 | .cmd = NLBL_MGMT_C_REMOVE, |
| 530 | .flags = GENL_ADMIN_PERM, | 530 | .flags = GENL_ADMIN_PERM, |
| 531 | .policy = netlbl_mgmt_genl_policy, | 531 | .policy = netlbl_mgmt_genl_policy, |
| 532 | .doit = netlbl_mgmt_remove, | 532 | .doit = netlbl_mgmt_remove, |
| 533 | .dumpit = NULL, | 533 | .dumpit = NULL, |
| 534 | }; | 534 | }, |
| 535 | 535 | { | |
| 536 | static struct genl_ops netlbl_mgmt_genl_c_listall = { | ||
| 537 | .cmd = NLBL_MGMT_C_LISTALL, | 536 | .cmd = NLBL_MGMT_C_LISTALL, |
| 538 | .flags = 0, | 537 | .flags = 0, |
| 539 | .policy = netlbl_mgmt_genl_policy, | 538 | .policy = netlbl_mgmt_genl_policy, |
| 540 | .doit = NULL, | 539 | .doit = NULL, |
| 541 | .dumpit = netlbl_mgmt_listall, | 540 | .dumpit = netlbl_mgmt_listall, |
| 542 | }; | 541 | }, |
| 543 | 542 | { | |
| 544 | static struct genl_ops netlbl_mgmt_genl_c_adddef = { | ||
| 545 | .cmd = NLBL_MGMT_C_ADDDEF, | 543 | .cmd = NLBL_MGMT_C_ADDDEF, |
| 546 | .flags = GENL_ADMIN_PERM, | 544 | .flags = GENL_ADMIN_PERM, |
| 547 | .policy = netlbl_mgmt_genl_policy, | 545 | .policy = netlbl_mgmt_genl_policy, |
| 548 | .doit = netlbl_mgmt_adddef, | 546 | .doit = netlbl_mgmt_adddef, |
| 549 | .dumpit = NULL, | 547 | .dumpit = NULL, |
| 550 | }; | 548 | }, |
| 551 | 549 | { | |
| 552 | static struct genl_ops netlbl_mgmt_genl_c_removedef = { | ||
| 553 | .cmd = NLBL_MGMT_C_REMOVEDEF, | 550 | .cmd = NLBL_MGMT_C_REMOVEDEF, |
| 554 | .flags = GENL_ADMIN_PERM, | 551 | .flags = GENL_ADMIN_PERM, |
| 555 | .policy = netlbl_mgmt_genl_policy, | 552 | .policy = netlbl_mgmt_genl_policy, |
| 556 | .doit = netlbl_mgmt_removedef, | 553 | .doit = netlbl_mgmt_removedef, |
| 557 | .dumpit = NULL, | 554 | .dumpit = NULL, |
| 558 | }; | 555 | }, |
| 559 | 556 | { | |
| 560 | static struct genl_ops netlbl_mgmt_genl_c_listdef = { | ||
| 561 | .cmd = NLBL_MGMT_C_LISTDEF, | 557 | .cmd = NLBL_MGMT_C_LISTDEF, |
| 562 | .flags = 0, | 558 | .flags = 0, |
| 563 | .policy = netlbl_mgmt_genl_policy, | 559 | .policy = netlbl_mgmt_genl_policy, |
| 564 | .doit = netlbl_mgmt_listdef, | 560 | .doit = netlbl_mgmt_listdef, |
| 565 | .dumpit = NULL, | 561 | .dumpit = NULL, |
| 566 | }; | 562 | }, |
| 567 | 563 | { | |
| 568 | static struct genl_ops netlbl_mgmt_genl_c_protocols = { | ||
| 569 | .cmd = NLBL_MGMT_C_PROTOCOLS, | 564 | .cmd = NLBL_MGMT_C_PROTOCOLS, |
| 570 | .flags = 0, | 565 | .flags = 0, |
| 571 | .policy = netlbl_mgmt_genl_policy, | 566 | .policy = netlbl_mgmt_genl_policy, |
| 572 | .doit = NULL, | 567 | .doit = NULL, |
| 573 | .dumpit = netlbl_mgmt_protocols, | 568 | .dumpit = netlbl_mgmt_protocols, |
| 574 | }; | 569 | }, |
| 575 | 570 | { | |
| 576 | static struct genl_ops netlbl_mgmt_genl_c_version = { | ||
| 577 | .cmd = NLBL_MGMT_C_VERSION, | 571 | .cmd = NLBL_MGMT_C_VERSION, |
| 578 | .flags = 0, | 572 | .flags = 0, |
| 579 | .policy = netlbl_mgmt_genl_policy, | 573 | .policy = netlbl_mgmt_genl_policy, |
| 580 | .doit = netlbl_mgmt_version, | 574 | .doit = netlbl_mgmt_version, |
| 581 | .dumpit = NULL, | 575 | .dumpit = NULL, |
| 576 | }, | ||
| 582 | }; | 577 | }; |
| 583 | 578 | ||
| 584 | /* | 579 | /* |
| @@ -593,46 +588,20 @@ static struct genl_ops netlbl_mgmt_genl_c_version = { | |||
| 593 | * mechanism. Returns zero on success, negative values on failure. | 588 | * mechanism. Returns zero on success, negative values on failure. |
| 594 | * | 589 | * |
| 595 | */ | 590 | */ |
| 596 | int netlbl_mgmt_genl_init(void) | 591 | int __init netlbl_mgmt_genl_init(void) |
| 597 | { | 592 | { |
| 598 | int ret_val; | 593 | int ret_val, i; |
| 599 | 594 | ||
| 600 | ret_val = genl_register_family(&netlbl_mgmt_gnl_family); | 595 | ret_val = genl_register_family(&netlbl_mgmt_gnl_family); |
| 601 | if (ret_val != 0) | 596 | if (ret_val != 0) |
| 602 | return ret_val; | 597 | return ret_val; |
| 603 | 598 | ||
| 604 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | 599 | for (i = 0; i < ARRAY_SIZE(netlbl_mgmt_genl_ops); i++) { |
| 605 | &netlbl_mgmt_genl_c_add); | 600 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, |
| 606 | if (ret_val != 0) | 601 | &netlbl_mgmt_genl_ops[i]); |
| 607 | return ret_val; | 602 | if (ret_val != 0) |
| 608 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | 603 | return ret_val; |
| 609 | &netlbl_mgmt_genl_c_remove); | 604 | } |
| 610 | if (ret_val != 0) | ||
| 611 | return ret_val; | ||
| 612 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 613 | &netlbl_mgmt_genl_c_listall); | ||
| 614 | if (ret_val != 0) | ||
| 615 | return ret_val; | ||
| 616 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 617 | &netlbl_mgmt_genl_c_adddef); | ||
| 618 | if (ret_val != 0) | ||
| 619 | return ret_val; | ||
| 620 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 621 | &netlbl_mgmt_genl_c_removedef); | ||
| 622 | if (ret_val != 0) | ||
| 623 | return ret_val; | ||
| 624 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 625 | &netlbl_mgmt_genl_c_listdef); | ||
| 626 | if (ret_val != 0) | ||
| 627 | return ret_val; | ||
| 628 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 629 | &netlbl_mgmt_genl_c_protocols); | ||
| 630 | if (ret_val != 0) | ||
| 631 | return ret_val; | ||
| 632 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
| 633 | &netlbl_mgmt_genl_c_version); | ||
| 634 | if (ret_val != 0) | ||
| 635 | return ret_val; | ||
| 636 | 605 | ||
| 637 | return 0; | 606 | return 0; |
| 638 | } | 607 | } |
diff --git a/net/netlabel/netlabel_unlabeled.c b/net/netlabel/netlabel_unlabeled.c index 3e745b72fded..4478f2f6079d 100644 --- a/net/netlabel/netlabel_unlabeled.c +++ b/net/netlabel/netlabel_unlabeled.c | |||
| @@ -1553,68 +1553,63 @@ unlabel_staticlistdef_return: | |||
| 1553 | * NetLabel Generic NETLINK Command Definitions | 1553 | * NetLabel Generic NETLINK Command Definitions |
| 1554 | */ | 1554 | */ |
| 1555 | 1555 | ||
| 1556 | static struct genl_ops netlbl_unlabel_genl_c_staticadd = { | 1556 | static struct genl_ops netlbl_unlabel_genl_ops[] = { |
| 1557 | { | ||
| 1557 | .cmd = NLBL_UNLABEL_C_STATICADD, | 1558 | .cmd = NLBL_UNLABEL_C_STATICADD, |
| 1558 | .flags = GENL_ADMIN_PERM, | 1559 | .flags = GENL_ADMIN_PERM, |
| 1559 | .policy = netlbl_unlabel_genl_policy, | 1560 | .policy = netlbl_unlabel_genl_policy, |
| 1560 | .doit = netlbl_unlabel_staticadd, | 1561 | .doit = netlbl_unlabel_staticadd, |
| 1561 | .dumpit = NULL, | 1562 | .dumpit = NULL, |
| 1562 | }; | 1563 | }, |
| 1563 | 1564 | { | |
| 1564 | static struct genl_ops netlbl_unlabel_genl_c_staticremove = { | ||
| 1565 | .cmd = NLBL_UNLABEL_C_STATICREMOVE, | 1565 | .cmd = NLBL_UNLABEL_C_STATICREMOVE, |
| 1566 | .flags = GENL_ADMIN_PERM, | 1566 | .flags = GENL_ADMIN_PERM, |
| 1567 | .policy = netlbl_unlabel_genl_policy, | 1567 | .policy = netlbl_unlabel_genl_policy, |
| 1568 | .doit = netlbl_unlabel_staticremove, | 1568 | .doit = netlbl_unlabel_staticremove, |
| 1569 | .dumpit = NULL, | 1569 | .dumpit = NULL, |
| 1570 | }; | 1570 | }, |
| 1571 | 1571 | { | |
| 1572 | static struct genl_ops netlbl_unlabel_genl_c_staticlist = { | ||
| 1573 | .cmd = NLBL_UNLABEL_C_STATICLIST, | 1572 | .cmd = NLBL_UNLABEL_C_STATICLIST, |
| 1574 | .flags = 0, | 1573 | .flags = 0, |
| 1575 | .policy = netlbl_unlabel_genl_policy, | 1574 | .policy = netlbl_unlabel_genl_policy, |
| 1576 | .doit = NULL, | 1575 | .doit = NULL, |
| 1577 | .dumpit = netlbl_unlabel_staticlist, | 1576 | .dumpit = netlbl_unlabel_staticlist, |
| 1578 | }; | 1577 | }, |
| 1579 | 1578 | { | |
| 1580 | static struct genl_ops netlbl_unlabel_genl_c_staticadddef = { | ||
| 1581 | .cmd = NLBL_UNLABEL_C_STATICADDDEF, | 1579 | .cmd = NLBL_UNLABEL_C_STATICADDDEF, |
| 1582 | .flags = GENL_ADMIN_PERM, | 1580 | .flags = GENL_ADMIN_PERM, |
| 1583 | .policy = netlbl_unlabel_genl_policy, | 1581 | .policy = netlbl_unlabel_genl_policy, |
| 1584 | .doit = netlbl_unlabel_staticadddef, | 1582 | .doit = netlbl_unlabel_staticadddef, |
| 1585 | .dumpit = NULL, | 1583 | .dumpit = NULL, |
| 1586 | }; | 1584 | }, |
| 1587 | 1585 | { | |
| 1588 | static struct genl_ops netlbl_unlabel_genl_c_staticremovedef = { | ||
| 1589 | .cmd = NLBL_UNLABEL_C_STATICREMOVEDEF, | 1586 | .cmd = NLBL_UNLABEL_C_STATICREMOVEDEF, |
| 1590 | .flags = GENL_ADMIN_PERM, | 1587 | .flags = GENL_ADMIN_PERM, |
| 1591 | .policy = netlbl_unlabel_genl_policy, | 1588 | .policy = netlbl_unlabel_genl_policy, |
| 1592 | .doit = netlbl_unlabel_staticremovedef, | 1589 | .doit = netlbl_unlabel_staticremovedef, |
| 1593 | .dumpit = NULL, | 1590 | .dumpit = NULL, |
| 1594 | }; | 1591 | }, |
| 1595 | 1592 | { | |
| 1596 | static struct genl_ops netlbl_unlabel_genl_c_staticlistdef = { | ||
| 1597 | .cmd = NLBL_UNLABEL_C_STATICLISTDEF, | 1593 | .cmd = NLBL_UNLABEL_C_STATICLISTDEF, |
| 1598 | .flags = 0, | 1594 | .flags = 0, |
| 1599 | .policy = netlbl_unlabel_genl_policy, | 1595 | .policy = netlbl_unlabel_genl_policy, |
| 1600 | .doit = NULL, | 1596 | .doit = NULL, |
| 1601 | .dumpit = netlbl_unlabel_staticlistdef, | 1597 | .dumpit = netlbl_unlabel_staticlistdef, |
| 1602 | }; | 1598 | }, |
| 1603 | 1599 | { | |
| 1604 | static struct genl_ops netlbl_unlabel_genl_c_accept = { | ||
| 1605 | .cmd = NLBL_UNLABEL_C_ACCEPT, | 1600 | .cmd = NLBL_UNLABEL_C_ACCEPT, |
| 1606 | .flags = GENL_ADMIN_PERM, | 1601 | .flags = GENL_ADMIN_PERM, |
| 1607 | .policy = netlbl_unlabel_genl_policy, | 1602 | .policy = netlbl_unlabel_genl_policy, |
| 1608 | .doit = netlbl_unlabel_accept, | 1603 | .doit = netlbl_unlabel_accept, |
| 1609 | .dumpit = NULL, | 1604 | .dumpit = NULL, |
| 1610 | }; | 1605 | }, |
| 1611 | 1606 | { | |
| 1612 | static struct genl_ops netlbl_unlabel_genl_c_list = { | ||
| 1613 | .cmd = NLBL_UNLABEL_C_LIST, | 1607 | .cmd = NLBL_UNLABEL_C_LIST, |
| 1614 | .flags = 0, | 1608 | .flags = 0, |
| 1615 | .policy = netlbl_unlabel_genl_policy, | 1609 | .policy = netlbl_unlabel_genl_policy, |
| 1616 | .doit = netlbl_unlabel_list, | 1610 | .doit = netlbl_unlabel_list, |
| 1617 | .dumpit = NULL, | 1611 | .dumpit = NULL, |
| 1612 | }, | ||
| 1618 | }; | 1613 | }; |
| 1619 | 1614 | ||
| 1620 | /* | 1615 | /* |
| @@ -1629,53 +1624,20 @@ static struct genl_ops netlbl_unlabel_genl_c_list = { | |||
| 1629 | * mechanism. Returns zero on success, negative values on failure. | 1624 | * mechanism. Returns zero on success, negative values on failure. |
| 1630 | * | 1625 | * |
| 1631 | */ | 1626 | */ |
| 1632 | int netlbl_unlabel_genl_init(void) | 1627 | int __init netlbl_unlabel_genl_init(void) |
| 1633 | { | 1628 | { |
| 1634 | int ret_val; | 1629 | int ret_val, i; |
| 1635 | 1630 | ||
| 1636 | ret_val = genl_register_family(&netlbl_unlabel_gnl_family); | 1631 | ret_val = genl_register_family(&netlbl_unlabel_gnl_family); |
| 1637 | if (ret_val != 0) | 1632 | if (ret_val != 0) |
| 1638 | return ret_val; | 1633 | return ret_val; |
| 1639 | 1634 | ||
| 1640 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | 1635 | for (i = 0; i < ARRAY_SIZE(netlbl_unlabel_genl_ops); i++) { |
| 1641 | &netlbl_unlabel_genl_c_staticadd); | 1636 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, |
| 1642 | if (ret_val != 0) | 1637 | &netlbl_unlabel_genl_ops[i]); |
| 1643 | return ret_val; | 1638 | if (ret_val != 0) |
| 1644 | 1639 | return ret_val; | |
| 1645 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | 1640 | } |
| 1646 | &netlbl_unlabel_genl_c_staticremove); | ||
| 1647 | if (ret_val != 0) | ||
| 1648 | return ret_val; | ||
| 1649 | |||
| 1650 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1651 | &netlbl_unlabel_genl_c_staticlist); | ||
| 1652 | if (ret_val != 0) | ||
| 1653 | return ret_val; | ||
| 1654 | |||
| 1655 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1656 | &netlbl_unlabel_genl_c_staticadddef); | ||
| 1657 | if (ret_val != 0) | ||
| 1658 | return ret_val; | ||
| 1659 | |||
| 1660 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1661 | &netlbl_unlabel_genl_c_staticremovedef); | ||
| 1662 | if (ret_val != 0) | ||
| 1663 | return ret_val; | ||
| 1664 | |||
| 1665 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1666 | &netlbl_unlabel_genl_c_staticlistdef); | ||
| 1667 | if (ret_val != 0) | ||
| 1668 | return ret_val; | ||
| 1669 | |||
| 1670 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1671 | &netlbl_unlabel_genl_c_accept); | ||
| 1672 | if (ret_val != 0) | ||
| 1673 | return ret_val; | ||
| 1674 | |||
| 1675 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
| 1676 | &netlbl_unlabel_genl_c_list); | ||
| 1677 | if (ret_val != 0) | ||
| 1678 | return ret_val; | ||
| 1679 | 1641 | ||
| 1680 | return 0; | 1642 | return 0; |
| 1681 | } | 1643 | } |
| @@ -1699,7 +1661,7 @@ static struct notifier_block netlbl_unlhsh_netdev_notifier = { | |||
| 1699 | * non-zero values on error. | 1661 | * non-zero values on error. |
| 1700 | * | 1662 | * |
| 1701 | */ | 1663 | */ |
| 1702 | int netlbl_unlabel_init(u32 size) | 1664 | int __init netlbl_unlabel_init(u32 size) |
| 1703 | { | 1665 | { |
| 1704 | u32 iter; | 1666 | u32 iter; |
| 1705 | struct netlbl_unlhsh_tbl *hsh_tbl; | 1667 | struct netlbl_unlhsh_tbl *hsh_tbl; |
| @@ -1803,7 +1765,7 @@ unlabel_getattr_nolabel: | |||
| 1803 | * and to send unlabeled network traffic by default. | 1765 | * and to send unlabeled network traffic by default. |
| 1804 | * | 1766 | * |
| 1805 | */ | 1767 | */ |
| 1806 | int netlbl_unlabel_defconf(void) | 1768 | int __init netlbl_unlabel_defconf(void) |
| 1807 | { | 1769 | { |
| 1808 | int ret_val; | 1770 | int ret_val; |
| 1809 | struct netlbl_dom_map *entry; | 1771 | struct netlbl_dom_map *entry; |
diff --git a/net/netlabel/netlabel_user.c b/net/netlabel/netlabel_user.c index 023fc8fe840d..b17d4203806e 100644 --- a/net/netlabel/netlabel_user.c +++ b/net/netlabel/netlabel_user.c | |||
| @@ -59,7 +59,7 @@ | |||
| 59 | * non-zero on failure. | 59 | * non-zero on failure. |
| 60 | * | 60 | * |
| 61 | */ | 61 | */ |
| 62 | int netlbl_netlink_init(void) | 62 | int __init netlbl_netlink_init(void) |
| 63 | { | 63 | { |
| 64 | int ret_val; | 64 | int ret_val; |
| 65 | 65 | ||
diff --git a/net/rfkill/rfkill.c b/net/rfkill/rfkill.c index 1a47f5d1be17..140a0a8c6b02 100644 --- a/net/rfkill/rfkill.c +++ b/net/rfkill/rfkill.c | |||
| @@ -232,7 +232,7 @@ static int rfkill_suspend(struct device *dev, pm_message_t state) | |||
| 232 | struct rfkill *rfkill = to_rfkill(dev); | 232 | struct rfkill *rfkill = to_rfkill(dev); |
| 233 | 233 | ||
| 234 | if (dev->power.power_state.event != state.event) { | 234 | if (dev->power.power_state.event != state.event) { |
| 235 | if (state.event == PM_EVENT_SUSPEND) { | 235 | if (state.event & PM_EVENT_SLEEP) { |
| 236 | mutex_lock(&rfkill->mutex); | 236 | mutex_lock(&rfkill->mutex); |
| 237 | 237 | ||
| 238 | if (rfkill->state == RFKILL_STATE_ON) | 238 | if (rfkill->state == RFKILL_STATE_ON) |
diff --git a/net/rxrpc/ar-accept.c b/net/rxrpc/ar-accept.c index 92a87fde8bfe..bdfb77417794 100644 --- a/net/rxrpc/ar-accept.c +++ b/net/rxrpc/ar-accept.c | |||
| @@ -156,8 +156,7 @@ static int rxrpc_accept_incoming_call(struct rxrpc_local *local, | |||
| 156 | false); | 156 | false); |
| 157 | spin_unlock(&call->lock); | 157 | spin_unlock(&call->lock); |
| 158 | notification = NULL; | 158 | notification = NULL; |
| 159 | if (ret < 0) | 159 | BUG_ON(ret < 0); |
| 160 | BUG(); | ||
| 161 | } | 160 | } |
| 162 | spin_unlock(&call->conn->state_lock); | 161 | spin_unlock(&call->conn->state_lock); |
| 163 | 162 | ||
diff --git a/net/rxrpc/ar-ack.c b/net/rxrpc/ar-ack.c index 657ee69f2133..3ac1672e1070 100644 --- a/net/rxrpc/ar-ack.c +++ b/net/rxrpc/ar-ack.c | |||
| @@ -814,8 +814,7 @@ static int rxrpc_post_message(struct rxrpc_call *call, u32 mark, u32 error, | |||
| 814 | spin_lock_bh(&call->lock); | 814 | spin_lock_bh(&call->lock); |
| 815 | ret = rxrpc_queue_rcv_skb(call, skb, true, fatal); | 815 | ret = rxrpc_queue_rcv_skb(call, skb, true, fatal); |
| 816 | spin_unlock_bh(&call->lock); | 816 | spin_unlock_bh(&call->lock); |
| 817 | if (ret < 0) | 817 | BUG_ON(ret < 0); |
| 818 | BUG(); | ||
| 819 | } | 818 | } |
| 820 | 819 | ||
| 821 | return 0; | 820 | return 0; |
diff --git a/net/sctp/socket.c b/net/sctp/socket.c index d47d5787e2e5..44797ad88a05 100644 --- a/net/sctp/socket.c +++ b/net/sctp/socket.c | |||
| @@ -6488,6 +6488,7 @@ struct proto sctp_prot = { | |||
| 6488 | .memory_pressure = &sctp_memory_pressure, | 6488 | .memory_pressure = &sctp_memory_pressure, |
| 6489 | .enter_memory_pressure = sctp_enter_memory_pressure, | 6489 | .enter_memory_pressure = sctp_enter_memory_pressure, |
| 6490 | .memory_allocated = &sctp_memory_allocated, | 6490 | .memory_allocated = &sctp_memory_allocated, |
| 6491 | .sockets_allocated = &sctp_sockets_allocated, | ||
| 6491 | REF_PROTO_INUSE(sctp) | 6492 | REF_PROTO_INUSE(sctp) |
| 6492 | }; | 6493 | }; |
| 6493 | 6494 | ||
| @@ -6521,6 +6522,7 @@ struct proto sctpv6_prot = { | |||
| 6521 | .memory_pressure = &sctp_memory_pressure, | 6522 | .memory_pressure = &sctp_memory_pressure, |
| 6522 | .enter_memory_pressure = sctp_enter_memory_pressure, | 6523 | .enter_memory_pressure = sctp_enter_memory_pressure, |
| 6523 | .memory_allocated = &sctp_memory_allocated, | 6524 | .memory_allocated = &sctp_memory_allocated, |
| 6525 | .sockets_allocated = &sctp_sockets_allocated, | ||
| 6524 | REF_PROTO_INUSE(sctpv6) | 6526 | REF_PROTO_INUSE(sctpv6) |
| 6525 | }; | 6527 | }; |
| 6526 | #endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */ | 6528 | #endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */ |
diff --git a/net/sunrpc/svcsock.c b/net/sunrpc/svcsock.c index 1d3e5fcc2cc4..c475977de05a 100644 --- a/net/sunrpc/svcsock.c +++ b/net/sunrpc/svcsock.c | |||
| @@ -175,7 +175,7 @@ static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr) | |||
| 175 | size_t base = xdr->page_base; | 175 | size_t base = xdr->page_base; |
| 176 | unsigned int pglen = xdr->page_len; | 176 | unsigned int pglen = xdr->page_len; |
| 177 | unsigned int flags = MSG_MORE; | 177 | unsigned int flags = MSG_MORE; |
| 178 | char buf[RPC_MAX_ADDRBUFLEN]; | 178 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
| 179 | 179 | ||
| 180 | slen = xdr->len; | 180 | slen = xdr->len; |
| 181 | 181 | ||
| @@ -716,7 +716,7 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt) | |||
| 716 | struct socket *newsock; | 716 | struct socket *newsock; |
| 717 | struct svc_sock *newsvsk; | 717 | struct svc_sock *newsvsk; |
| 718 | int err, slen; | 718 | int err, slen; |
| 719 | char buf[RPC_MAX_ADDRBUFLEN]; | 719 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
| 720 | 720 | ||
| 721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); | 721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); |
| 722 | if (!sock) | 722 | if (!sock) |
| @@ -1206,10 +1206,10 @@ static struct svc_xprt *svc_create_socket(struct svc_serv *serv, | |||
| 1206 | struct socket *sock; | 1206 | struct socket *sock; |
| 1207 | int error; | 1207 | int error; |
| 1208 | int type; | 1208 | int type; |
| 1209 | char buf[RPC_MAX_ADDRBUFLEN]; | ||
| 1210 | struct sockaddr_storage addr; | 1209 | struct sockaddr_storage addr; |
| 1211 | struct sockaddr *newsin = (struct sockaddr *)&addr; | 1210 | struct sockaddr *newsin = (struct sockaddr *)&addr; |
| 1212 | int newlen; | 1211 | int newlen; |
| 1212 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); | ||
| 1213 | 1213 | ||
| 1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", | 1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", |
| 1215 | serv->sv_program->pg_name, protocol, | 1215 | serv->sv_program->pg_name, protocol, |
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 47219f98053f..9fc4c315f6cd 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c | |||
| @@ -331,15 +331,31 @@ static void xfrm_dst_hash_transfer(struct hlist_head *list, | |||
| 331 | struct hlist_head *ndsttable, | 331 | struct hlist_head *ndsttable, |
| 332 | unsigned int nhashmask) | 332 | unsigned int nhashmask) |
| 333 | { | 333 | { |
| 334 | struct hlist_node *entry, *tmp; | 334 | struct hlist_node *entry, *tmp, *entry0 = NULL; |
| 335 | struct xfrm_policy *pol; | 335 | struct xfrm_policy *pol; |
| 336 | unsigned int h0 = 0; | ||
| 336 | 337 | ||
| 338 | redo: | ||
| 337 | hlist_for_each_entry_safe(pol, entry, tmp, list, bydst) { | 339 | hlist_for_each_entry_safe(pol, entry, tmp, list, bydst) { |
| 338 | unsigned int h; | 340 | unsigned int h; |
| 339 | 341 | ||
| 340 | h = __addr_hash(&pol->selector.daddr, &pol->selector.saddr, | 342 | h = __addr_hash(&pol->selector.daddr, &pol->selector.saddr, |
| 341 | pol->family, nhashmask); | 343 | pol->family, nhashmask); |
| 342 | hlist_add_head(&pol->bydst, ndsttable+h); | 344 | if (!entry0) { |
| 345 | hlist_del(entry); | ||
| 346 | hlist_add_head(&pol->bydst, ndsttable+h); | ||
| 347 | h0 = h; | ||
| 348 | } else { | ||
| 349 | if (h != h0) | ||
| 350 | continue; | ||
| 351 | hlist_del(entry); | ||
| 352 | hlist_add_after(entry0, &pol->bydst); | ||
| 353 | } | ||
| 354 | entry0 = entry; | ||
| 355 | } | ||
| 356 | if (!hlist_empty(list)) { | ||
| 357 | entry0 = NULL; | ||
| 358 | goto redo; | ||
| 343 | } | 359 | } |
| 344 | } | 360 | } |
| 345 | 361 | ||
