diff options
Diffstat (limited to 'net')
40 files changed, 232 insertions, 304 deletions
diff --git a/net/9p/trans_virtio.c b/net/9p/trans_virtio.c index 0117b9fb8480..de7a9f532edc 100644 --- a/net/9p/trans_virtio.c +++ b/net/9p/trans_virtio.c | |||
@@ -110,7 +110,7 @@ static struct p9_req_t *p9_lookup_tag(struct virtio_chan *c, u16 tag) | |||
110 | } | 110 | } |
111 | for (count = old_max; count < c->max_tag; count++) { | 111 | for (count = old_max; count < c->max_tag; count++) { |
112 | c->reqs[count].status = REQ_STATUS_IDLE; | 112 | c->reqs[count].status = REQ_STATUS_IDLE; |
113 | c->reqs[count].wq = kmalloc(sizeof(wait_queue_t), | 113 | c->reqs[count].wq = kmalloc(sizeof(wait_queue_head_t), |
114 | GFP_ATOMIC); | 114 | GFP_ATOMIC); |
115 | if (!c->reqs[count].wq) { | 115 | if (!c->reqs[count].wq) { |
116 | printk(KERN_ERR "Couldn't grow tag array\n"); | 116 | printk(KERN_ERR "Couldn't grow tag array\n"); |
@@ -183,8 +183,7 @@ pack_sg_list(struct scatterlist *sg, int start, int limit, char *data, | |||
183 | sg_set_buf(&sg[index++], data, s); | 183 | sg_set_buf(&sg[index++], data, s); |
184 | count -= s; | 184 | count -= s; |
185 | data += s; | 185 | data += s; |
186 | if (index > limit) | 186 | BUG_ON(index > limit); |
187 | BUG(); | ||
188 | } | 187 | } |
189 | 188 | ||
190 | return index-start; | 189 | return index-start; |
diff --git a/net/ax25/ax25_out.c b/net/ax25/ax25_out.c index 92b517af7260..bf706f83a5c9 100644 --- a/net/ax25/ax25_out.c +++ b/net/ax25/ax25_out.c | |||
@@ -117,6 +117,12 @@ void ax25_output(ax25_cb *ax25, int paclen, struct sk_buff *skb) | |||
117 | unsigned char *p; | 117 | unsigned char *p; |
118 | int frontlen, len, fragno, ka9qfrag, first = 1; | 118 | int frontlen, len, fragno, ka9qfrag, first = 1; |
119 | 119 | ||
120 | if (paclen < 16) { | ||
121 | WARN_ON_ONCE(1); | ||
122 | kfree_skb(skb); | ||
123 | return; | ||
124 | } | ||
125 | |||
120 | if ((skb->len - 1) > paclen) { | 126 | if ((skb->len - 1) > paclen) { |
121 | if (*skb->data == AX25_P_TEXT) { | 127 | if (*skb->data == AX25_P_TEXT) { |
122 | skb_pull(skb, 1); /* skip PID */ | 128 | skb_pull(skb, 1); /* skip PID */ |
@@ -251,8 +257,6 @@ void ax25_kick(ax25_cb *ax25) | |||
251 | if (start == end) | 257 | if (start == end) |
252 | return; | 258 | return; |
253 | 259 | ||
254 | ax25->vs = start; | ||
255 | |||
256 | /* | 260 | /* |
257 | * Transmit data until either we're out of data to send or | 261 | * Transmit data until either we're out of data to send or |
258 | * the window is full. Send a poll on the final I frame if | 262 | * the window is full. Send a poll on the final I frame if |
@@ -261,8 +265,13 @@ void ax25_kick(ax25_cb *ax25) | |||
261 | 265 | ||
262 | /* | 266 | /* |
263 | * Dequeue the frame and copy it. | 267 | * Dequeue the frame and copy it. |
268 | * Check for race with ax25_clear_queues(). | ||
264 | */ | 269 | */ |
265 | skb = skb_dequeue(&ax25->write_queue); | 270 | skb = skb_dequeue(&ax25->write_queue); |
271 | if (!skb) | ||
272 | return; | ||
273 | |||
274 | ax25->vs = start; | ||
266 | 275 | ||
267 | do { | 276 | do { |
268 | if ((skbn = skb_clone(skb, GFP_ATOMIC)) == NULL) { | 277 | if ((skbn = skb_clone(skb, GFP_ATOMIC)) == NULL) { |
diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c index 5fc7be206f62..f8880261da0e 100644 --- a/net/bluetooth/hci_conn.c +++ b/net/bluetooth/hci_conn.c | |||
@@ -260,7 +260,6 @@ int hci_conn_del(struct hci_conn *conn) | |||
260 | tasklet_enable(&hdev->tx_task); | 260 | tasklet_enable(&hdev->tx_task); |
261 | skb_queue_purge(&conn->data_q); | 261 | skb_queue_purge(&conn->data_q); |
262 | hci_conn_del_sysfs(conn); | 262 | hci_conn_del_sysfs(conn); |
263 | hci_dev_put(hdev); | ||
264 | 263 | ||
265 | return 0; | 264 | return 0; |
266 | } | 265 | } |
diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index 372b0d3b75a8..930b58e7149a 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c | |||
@@ -24,6 +24,7 @@ | |||
24 | 24 | ||
25 | /* Bluetooth HCI core. */ | 25 | /* Bluetooth HCI core. */ |
26 | 26 | ||
27 | #include <linux/jiffies.h> | ||
27 | #include <linux/module.h> | 28 | #include <linux/module.h> |
28 | #include <linux/kmod.h> | 29 | #include <linux/kmod.h> |
29 | 30 | ||
@@ -1321,7 +1322,7 @@ static inline void hci_sched_acl(struct hci_dev *hdev) | |||
1321 | if (!test_bit(HCI_RAW, &hdev->flags)) { | 1322 | if (!test_bit(HCI_RAW, &hdev->flags)) { |
1322 | /* ACL tx timeout must be longer than maximum | 1323 | /* ACL tx timeout must be longer than maximum |
1323 | * link supervision timeout (40.9 seconds) */ | 1324 | * link supervision timeout (40.9 seconds) */ |
1324 | if (!hdev->acl_cnt && (jiffies - hdev->acl_last_tx) > (HZ * 45)) | 1325 | if (!hdev->acl_cnt && time_after(jiffies, hdev->acl_last_tx + HZ * 45)) |
1325 | hci_acl_tx_to(hdev); | 1326 | hci_acl_tx_to(hdev); |
1326 | } | 1327 | } |
1327 | 1328 | ||
@@ -1543,7 +1544,7 @@ static void hci_cmd_task(unsigned long arg) | |||
1543 | 1544 | ||
1544 | BT_DBG("%s cmd %d", hdev->name, atomic_read(&hdev->cmd_cnt)); | 1545 | BT_DBG("%s cmd %d", hdev->name, atomic_read(&hdev->cmd_cnt)); |
1545 | 1546 | ||
1546 | if (!atomic_read(&hdev->cmd_cnt) && (jiffies - hdev->cmd_last_tx) > HZ) { | 1547 | if (!atomic_read(&hdev->cmd_cnt) && time_after(jiffies, hdev->cmd_last_tx + HZ)) { |
1547 | BT_ERR("%s command tx timeout", hdev->name); | 1548 | BT_ERR("%s command tx timeout", hdev->name); |
1548 | atomic_set(&hdev->cmd_cnt, 1); | 1549 | atomic_set(&hdev->cmd_cnt, 1); |
1549 | } | 1550 | } |
diff --git a/net/bluetooth/hci_sysfs.c b/net/bluetooth/hci_sysfs.c index e13cf5ef144c..84360c117d4e 100644 --- a/net/bluetooth/hci_sysfs.c +++ b/net/bluetooth/hci_sysfs.c | |||
@@ -320,28 +320,34 @@ void hci_conn_add_sysfs(struct hci_conn *conn) | |||
320 | queue_work(btaddconn, &conn->work); | 320 | queue_work(btaddconn, &conn->work); |
321 | } | 321 | } |
322 | 322 | ||
323 | /* | ||
324 | * The rfcomm tty device will possibly retain even when conn | ||
325 | * is down, and sysfs doesn't support move zombie device, | ||
326 | * so we should move the device before conn device is destroyed. | ||
327 | */ | ||
323 | static int __match_tty(struct device *dev, void *data) | 328 | static int __match_tty(struct device *dev, void *data) |
324 | { | 329 | { |
325 | /* The rfcomm tty device will possibly retain even when conn | 330 | return !strncmp(dev->bus_id, "rfcomm", 6); |
326 | * is down, and sysfs doesn't support move zombie device, | ||
327 | * so we should move the device before conn device is destroyed. | ||
328 | * Due to the only child device of hci_conn dev is rfcomm | ||
329 | * tty_dev, here just return 1 | ||
330 | */ | ||
331 | return 1; | ||
332 | } | 331 | } |
333 | 332 | ||
334 | static void del_conn(struct work_struct *work) | 333 | static void del_conn(struct work_struct *work) |
335 | { | 334 | { |
336 | struct device *dev; | ||
337 | struct hci_conn *conn = container_of(work, struct hci_conn, work); | 335 | struct hci_conn *conn = container_of(work, struct hci_conn, work); |
336 | struct hci_dev *hdev = conn->hdev; | ||
337 | |||
338 | while (1) { | ||
339 | struct device *dev; | ||
338 | 340 | ||
339 | while (dev = device_find_child(&conn->dev, NULL, __match_tty)) { | 341 | dev = device_find_child(&conn->dev, NULL, __match_tty); |
342 | if (!dev) | ||
343 | break; | ||
340 | device_move(dev, NULL); | 344 | device_move(dev, NULL); |
341 | put_device(dev); | 345 | put_device(dev); |
342 | } | 346 | } |
347 | |||
343 | device_del(&conn->dev); | 348 | device_del(&conn->dev); |
344 | put_device(&conn->dev); | 349 | put_device(&conn->dev); |
350 | hci_dev_put(hdev); | ||
345 | } | 351 | } |
346 | 352 | ||
347 | void hci_conn_del_sysfs(struct hci_conn *conn) | 353 | void hci_conn_del_sysfs(struct hci_conn *conn) |
diff --git a/net/bridge/netfilter/ebt_dnat.c b/net/bridge/netfilter/ebt_dnat.c index e700cbf634c2..ca64c1cc1b47 100644 --- a/net/bridge/netfilter/ebt_dnat.c +++ b/net/bridge/netfilter/ebt_dnat.c | |||
@@ -20,8 +20,8 @@ static int ebt_target_dnat(struct sk_buff *skb, unsigned int hooknr, | |||
20 | { | 20 | { |
21 | const struct ebt_nat_info *info = data; | 21 | const struct ebt_nat_info *info = data; |
22 | 22 | ||
23 | if (skb_make_writable(skb, 0)) | 23 | if (!skb_make_writable(skb, 0)) |
24 | return NF_DROP; | 24 | return EBT_DROP; |
25 | 25 | ||
26 | memcpy(eth_hdr(skb)->h_dest, info->mac, ETH_ALEN); | 26 | memcpy(eth_hdr(skb)->h_dest, info->mac, ETH_ALEN); |
27 | return info->target; | 27 | return info->target; |
diff --git a/net/bridge/netfilter/ebt_redirect.c b/net/bridge/netfilter/ebt_redirect.c index bfdf2fb60b1f..b8afe850cf1e 100644 --- a/net/bridge/netfilter/ebt_redirect.c +++ b/net/bridge/netfilter/ebt_redirect.c | |||
@@ -21,8 +21,8 @@ static int ebt_target_redirect(struct sk_buff *skb, unsigned int hooknr, | |||
21 | { | 21 | { |
22 | const struct ebt_redirect_info *info = data; | 22 | const struct ebt_redirect_info *info = data; |
23 | 23 | ||
24 | if (skb_make_writable(skb, 0)) | 24 | if (!skb_make_writable(skb, 0)) |
25 | return NF_DROP; | 25 | return EBT_DROP; |
26 | 26 | ||
27 | if (hooknr != NF_BR_BROUTING) | 27 | if (hooknr != NF_BR_BROUTING) |
28 | memcpy(eth_hdr(skb)->h_dest, | 28 | memcpy(eth_hdr(skb)->h_dest, |
diff --git a/net/bridge/netfilter/ebt_snat.c b/net/bridge/netfilter/ebt_snat.c index e252dabbb143..5425333dda03 100644 --- a/net/bridge/netfilter/ebt_snat.c +++ b/net/bridge/netfilter/ebt_snat.c | |||
@@ -22,8 +22,8 @@ static int ebt_target_snat(struct sk_buff *skb, unsigned int hooknr, | |||
22 | { | 22 | { |
23 | const struct ebt_nat_info *info = data; | 23 | const struct ebt_nat_info *info = data; |
24 | 24 | ||
25 | if (skb_make_writable(skb, 0)) | 25 | if (!skb_make_writable(skb, 0)) |
26 | return NF_DROP; | 26 | return EBT_DROP; |
27 | 27 | ||
28 | memcpy(eth_hdr(skb)->h_source, info->mac, ETH_ALEN); | 28 | memcpy(eth_hdr(skb)->h_source, info->mac, ETH_ALEN); |
29 | if (!(info->target & NAT_ARP_BIT) && | 29 | if (!(info->target & NAT_ARP_BIT) && |
diff --git a/net/core/dev.c b/net/core/dev.c index 908f07c3bd7d..fcdf03cf3b3f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c | |||
@@ -2900,7 +2900,7 @@ int __dev_addr_add(struct dev_addr_list **list, int *count, | |||
2900 | } | 2900 | } |
2901 | } | 2901 | } |
2902 | 2902 | ||
2903 | da = kmalloc(sizeof(*da), GFP_ATOMIC); | 2903 | da = kzalloc(sizeof(*da), GFP_ATOMIC); |
2904 | if (da == NULL) | 2904 | if (da == NULL) |
2905 | return -ENOMEM; | 2905 | return -ENOMEM; |
2906 | memcpy(da->da_addr, addr, alen); | 2906 | memcpy(da->da_addr, addr, alen); |
diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 7bb6a9a1256d..2328acbd16cd 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c | |||
@@ -358,11 +358,12 @@ struct neighbour *neigh_lookup(struct neigh_table *tbl, const void *pkey, | |||
358 | { | 358 | { |
359 | struct neighbour *n; | 359 | struct neighbour *n; |
360 | int key_len = tbl->key_len; | 360 | int key_len = tbl->key_len; |
361 | u32 hash_val = tbl->hash(pkey, dev); | 361 | u32 hash_val; |
362 | 362 | ||
363 | NEIGH_CACHE_STAT_INC(tbl, lookups); | 363 | NEIGH_CACHE_STAT_INC(tbl, lookups); |
364 | 364 | ||
365 | read_lock_bh(&tbl->lock); | 365 | read_lock_bh(&tbl->lock); |
366 | hash_val = tbl->hash(pkey, dev); | ||
366 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { | 367 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { |
367 | if (dev == n->dev && !memcmp(n->primary_key, pkey, key_len)) { | 368 | if (dev == n->dev && !memcmp(n->primary_key, pkey, key_len)) { |
368 | neigh_hold(n); | 369 | neigh_hold(n); |
@@ -379,11 +380,12 @@ struct neighbour *neigh_lookup_nodev(struct neigh_table *tbl, struct net *net, | |||
379 | { | 380 | { |
380 | struct neighbour *n; | 381 | struct neighbour *n; |
381 | int key_len = tbl->key_len; | 382 | int key_len = tbl->key_len; |
382 | u32 hash_val = tbl->hash(pkey, NULL); | 383 | u32 hash_val; |
383 | 384 | ||
384 | NEIGH_CACHE_STAT_INC(tbl, lookups); | 385 | NEIGH_CACHE_STAT_INC(tbl, lookups); |
385 | 386 | ||
386 | read_lock_bh(&tbl->lock); | 387 | read_lock_bh(&tbl->lock); |
388 | hash_val = tbl->hash(pkey, NULL); | ||
387 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { | 389 | for (n = tbl->hash_buckets[hash_val & tbl->hash_mask]; n; n = n->next) { |
388 | if (!memcmp(n->primary_key, pkey, key_len) && | 390 | if (!memcmp(n->primary_key, pkey, key_len) && |
389 | (net == n->dev->nd_net)) { | 391 | (net == n->dev->nd_net)) { |
@@ -507,6 +509,7 @@ struct pneigh_entry * pneigh_lookup(struct neigh_table *tbl, | |||
507 | if (tbl->pconstructor && tbl->pconstructor(n)) { | 509 | if (tbl->pconstructor && tbl->pconstructor(n)) { |
508 | if (dev) | 510 | if (dev) |
509 | dev_put(dev); | 511 | dev_put(dev); |
512 | release_net(net); | ||
510 | kfree(n); | 513 | kfree(n); |
511 | n = NULL; | 514 | n = NULL; |
512 | goto out; | 515 | goto out; |
@@ -834,12 +837,18 @@ static void neigh_timer_handler(unsigned long arg) | |||
834 | } | 837 | } |
835 | if (neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) { | 838 | if (neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) { |
836 | struct sk_buff *skb = skb_peek(&neigh->arp_queue); | 839 | struct sk_buff *skb = skb_peek(&neigh->arp_queue); |
837 | 840 | /* keep skb alive even if arp_queue overflows */ | |
841 | if (skb) | ||
842 | skb_get(skb); | ||
843 | write_unlock(&neigh->lock); | ||
838 | neigh->ops->solicit(neigh, skb); | 844 | neigh->ops->solicit(neigh, skb); |
839 | atomic_inc(&neigh->probes); | 845 | atomic_inc(&neigh->probes); |
840 | } | 846 | if (skb) |
847 | kfree_skb(skb); | ||
848 | } else { | ||
841 | out: | 849 | out: |
842 | write_unlock(&neigh->lock); | 850 | write_unlock(&neigh->lock); |
851 | } | ||
843 | 852 | ||
844 | if (notify) | 853 | if (notify) |
845 | neigh_update_notify(neigh); | 854 | neigh_update_notify(neigh); |
diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index ecb02afd52dc..2bd9c5f7627d 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c | |||
@@ -504,7 +504,7 @@ int rtnl_put_cacheinfo(struct sk_buff *skb, struct dst_entry *dst, u32 id, | |||
504 | 504 | ||
505 | EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo); | 505 | EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo); |
506 | 506 | ||
507 | static int set_operstate(struct net_device *dev, unsigned char transition, bool send_notification) | 507 | static void set_operstate(struct net_device *dev, unsigned char transition) |
508 | { | 508 | { |
509 | unsigned char operstate = dev->operstate; | 509 | unsigned char operstate = dev->operstate; |
510 | 510 | ||
@@ -527,12 +527,8 @@ static int set_operstate(struct net_device *dev, unsigned char transition, bool | |||
527 | write_lock_bh(&dev_base_lock); | 527 | write_lock_bh(&dev_base_lock); |
528 | dev->operstate = operstate; | 528 | dev->operstate = operstate; |
529 | write_unlock_bh(&dev_base_lock); | 529 | write_unlock_bh(&dev_base_lock); |
530 | 530 | netdev_state_change(dev); | |
531 | if (send_notification) | 531 | } |
532 | netdev_state_change(dev); | ||
533 | return 1; | ||
534 | } else | ||
535 | return 0; | ||
536 | } | 532 | } |
537 | 533 | ||
538 | static void copy_rtnl_link_stats(struct rtnl_link_stats *a, | 534 | static void copy_rtnl_link_stats(struct rtnl_link_stats *a, |
@@ -693,10 +689,12 @@ const struct nla_policy ifla_policy[IFLA_MAX+1] = { | |||
693 | [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN }, | 689 | [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN }, |
694 | [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) }, | 690 | [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) }, |
695 | [IFLA_MTU] = { .type = NLA_U32 }, | 691 | [IFLA_MTU] = { .type = NLA_U32 }, |
692 | [IFLA_LINK] = { .type = NLA_U32 }, | ||
696 | [IFLA_TXQLEN] = { .type = NLA_U32 }, | 693 | [IFLA_TXQLEN] = { .type = NLA_U32 }, |
697 | [IFLA_WEIGHT] = { .type = NLA_U32 }, | 694 | [IFLA_WEIGHT] = { .type = NLA_U32 }, |
698 | [IFLA_OPERSTATE] = { .type = NLA_U8 }, | 695 | [IFLA_OPERSTATE] = { .type = NLA_U8 }, |
699 | [IFLA_LINKMODE] = { .type = NLA_U8 }, | 696 | [IFLA_LINKMODE] = { .type = NLA_U8 }, |
697 | [IFLA_LINKINFO] = { .type = NLA_NESTED }, | ||
700 | [IFLA_NET_NS_PID] = { .type = NLA_U32 }, | 698 | [IFLA_NET_NS_PID] = { .type = NLA_U32 }, |
701 | }; | 699 | }; |
702 | 700 | ||
@@ -724,6 +722,21 @@ static struct net *get_net_ns_by_pid(pid_t pid) | |||
724 | return net; | 722 | return net; |
725 | } | 723 | } |
726 | 724 | ||
725 | static int validate_linkmsg(struct net_device *dev, struct nlattr *tb[]) | ||
726 | { | ||
727 | if (dev) { | ||
728 | if (tb[IFLA_ADDRESS] && | ||
729 | nla_len(tb[IFLA_ADDRESS]) < dev->addr_len) | ||
730 | return -EINVAL; | ||
731 | |||
732 | if (tb[IFLA_BROADCAST] && | ||
733 | nla_len(tb[IFLA_BROADCAST]) < dev->addr_len) | ||
734 | return -EINVAL; | ||
735 | } | ||
736 | |||
737 | return 0; | ||
738 | } | ||
739 | |||
727 | static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | 740 | static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, |
728 | struct nlattr **tb, char *ifname, int modified) | 741 | struct nlattr **tb, char *ifname, int modified) |
729 | { | 742 | { |
@@ -826,7 +839,6 @@ static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | |||
826 | if (tb[IFLA_BROADCAST]) { | 839 | if (tb[IFLA_BROADCAST]) { |
827 | nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len); | 840 | nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len); |
828 | send_addr_notify = 1; | 841 | send_addr_notify = 1; |
829 | modified = 1; | ||
830 | } | 842 | } |
831 | 843 | ||
832 | if (ifm->ifi_flags || ifm->ifi_change) { | 844 | if (ifm->ifi_flags || ifm->ifi_change) { |
@@ -839,23 +851,16 @@ static int do_setlink(struct net_device *dev, struct ifinfomsg *ifm, | |||
839 | dev_change_flags(dev, flags); | 851 | dev_change_flags(dev, flags); |
840 | } | 852 | } |
841 | 853 | ||
842 | if (tb[IFLA_TXQLEN]) { | 854 | if (tb[IFLA_TXQLEN]) |
843 | if (dev->tx_queue_len != nla_get_u32(tb[IFLA_TXQLEN])) { | 855 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); |
844 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); | ||
845 | modified = 1; | ||
846 | } | ||
847 | } | ||
848 | 856 | ||
849 | if (tb[IFLA_OPERSTATE]) | 857 | if (tb[IFLA_OPERSTATE]) |
850 | modified |= set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]), false); | 858 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE])); |
851 | 859 | ||
852 | if (tb[IFLA_LINKMODE]) { | 860 | if (tb[IFLA_LINKMODE]) { |
853 | if (dev->link_mode != nla_get_u8(tb[IFLA_LINKMODE])) { | 861 | write_lock_bh(&dev_base_lock); |
854 | write_lock_bh(&dev_base_lock); | 862 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); |
855 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); | 863 | write_unlock_bh(&dev_base_lock); |
856 | write_lock_bh(&dev_base_lock); | ||
857 | modified = 1; | ||
858 | } | ||
859 | } | 864 | } |
860 | 865 | ||
861 | err = 0; | 866 | err = 0; |
@@ -869,10 +874,6 @@ errout: | |||
869 | 874 | ||
870 | if (send_addr_notify) | 875 | if (send_addr_notify) |
871 | call_netdevice_notifiers(NETDEV_CHANGEADDR, dev); | 876 | call_netdevice_notifiers(NETDEV_CHANGEADDR, dev); |
872 | |||
873 | if (modified) | ||
874 | netdev_state_change(dev); | ||
875 | |||
876 | return err; | 877 | return err; |
877 | } | 878 | } |
878 | 879 | ||
@@ -908,12 +909,7 @@ static int rtnl_setlink(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg) | |||
908 | goto errout; | 909 | goto errout; |
909 | } | 910 | } |
910 | 911 | ||
911 | if (tb[IFLA_ADDRESS] && | 912 | if ((err = validate_linkmsg(dev, tb)) < 0) |
912 | nla_len(tb[IFLA_ADDRESS]) < dev->addr_len) | ||
913 | goto errout_dev; | ||
914 | |||
915 | if (tb[IFLA_BROADCAST] && | ||
916 | nla_len(tb[IFLA_BROADCAST]) < dev->addr_len) | ||
917 | goto errout_dev; | 913 | goto errout_dev; |
918 | 914 | ||
919 | err = do_setlink(dev, ifm, tb, ifname, 0); | 915 | err = do_setlink(dev, ifm, tb, ifname, 0); |
@@ -990,7 +986,7 @@ struct net_device *rtnl_create_link(struct net *net, char *ifname, | |||
990 | if (tb[IFLA_TXQLEN]) | 986 | if (tb[IFLA_TXQLEN]) |
991 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); | 987 | dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]); |
992 | if (tb[IFLA_OPERSTATE]) | 988 | if (tb[IFLA_OPERSTATE]) |
993 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]), true); | 989 | set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE])); |
994 | if (tb[IFLA_LINKMODE]) | 990 | if (tb[IFLA_LINKMODE]) |
995 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); | 991 | dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]); |
996 | 992 | ||
@@ -1034,6 +1030,9 @@ replay: | |||
1034 | else | 1030 | else |
1035 | dev = NULL; | 1031 | dev = NULL; |
1036 | 1032 | ||
1033 | if ((err = validate_linkmsg(dev, tb)) < 0) | ||
1034 | return err; | ||
1035 | |||
1037 | if (tb[IFLA_LINKINFO]) { | 1036 | if (tb[IFLA_LINKINFO]) { |
1038 | err = nla_parse_nested(linkinfo, IFLA_INFO_MAX, | 1037 | err = nla_parse_nested(linkinfo, IFLA_INFO_MAX, |
1039 | tb[IFLA_LINKINFO], ifla_info_policy); | 1038 | tb[IFLA_LINKINFO], ifla_info_policy); |
diff --git a/net/ipv4/arp.c b/net/ipv4/arp.c index c663fa5339ee..8e17f65f4002 100644 --- a/net/ipv4/arp.c +++ b/net/ipv4/arp.c | |||
@@ -368,6 +368,7 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) | |||
368 | if (!(neigh->nud_state&NUD_VALID)) | 368 | if (!(neigh->nud_state&NUD_VALID)) |
369 | printk(KERN_DEBUG "trying to ucast probe in NUD_INVALID\n"); | 369 | printk(KERN_DEBUG "trying to ucast probe in NUD_INVALID\n"); |
370 | dst_ha = neigh->ha; | 370 | dst_ha = neigh->ha; |
371 | read_lock_bh(&neigh->lock); | ||
371 | } else if ((probes -= neigh->parms->app_probes) < 0) { | 372 | } else if ((probes -= neigh->parms->app_probes) < 0) { |
372 | #ifdef CONFIG_ARPD | 373 | #ifdef CONFIG_ARPD |
373 | neigh_app_ns(neigh); | 374 | neigh_app_ns(neigh); |
@@ -377,6 +378,8 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) | |||
377 | 378 | ||
378 | arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr, | 379 | arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr, |
379 | dst_ha, dev->dev_addr, NULL); | 380 | dst_ha, dev->dev_addr, NULL); |
381 | if (dst_ha) | ||
382 | read_unlock_bh(&neigh->lock); | ||
380 | } | 383 | } |
381 | 384 | ||
382 | static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip) | 385 | static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip) |
diff --git a/net/ipv4/fib_hash.c b/net/ipv4/fib_hash.c index 76b9c684cccd..8d58d85dfac6 100644 --- a/net/ipv4/fib_hash.c +++ b/net/ipv4/fib_hash.c | |||
@@ -372,7 +372,8 @@ static struct fib_node *fib_find_node(struct fn_zone *fz, __be32 key) | |||
372 | static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | 372 | static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) |
373 | { | 373 | { |
374 | struct fn_hash *table = (struct fn_hash *) tb->tb_data; | 374 | struct fn_hash *table = (struct fn_hash *) tb->tb_data; |
375 | struct fib_node *new_f, *f; | 375 | struct fib_node *new_f = NULL; |
376 | struct fib_node *f; | ||
376 | struct fib_alias *fa, *new_fa; | 377 | struct fib_alias *fa, *new_fa; |
377 | struct fn_zone *fz; | 378 | struct fn_zone *fz; |
378 | struct fib_info *fi; | 379 | struct fib_info *fi; |
@@ -496,7 +497,6 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
496 | 497 | ||
497 | err = -ENOBUFS; | 498 | err = -ENOBUFS; |
498 | 499 | ||
499 | new_f = NULL; | ||
500 | if (!f) { | 500 | if (!f) { |
501 | new_f = kmem_cache_zalloc(fn_hash_kmem, GFP_KERNEL); | 501 | new_f = kmem_cache_zalloc(fn_hash_kmem, GFP_KERNEL); |
502 | if (new_f == NULL) | 502 | if (new_f == NULL) |
@@ -512,7 +512,7 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
512 | if (new_fa->fa_info != NULL) { | 512 | if (new_fa->fa_info != NULL) { |
513 | new_fa = kmem_cache_alloc(fn_alias_kmem, GFP_KERNEL); | 513 | new_fa = kmem_cache_alloc(fn_alias_kmem, GFP_KERNEL); |
514 | if (new_fa == NULL) | 514 | if (new_fa == NULL) |
515 | goto out_free_new_f; | 515 | goto out; |
516 | } | 516 | } |
517 | new_fa->fa_info = fi; | 517 | new_fa->fa_info = fi; |
518 | new_fa->fa_tos = tos; | 518 | new_fa->fa_tos = tos; |
@@ -540,9 +540,9 @@ static int fn_hash_insert(struct fib_table *tb, struct fib_config *cfg) | |||
540 | &cfg->fc_nlinfo, 0); | 540 | &cfg->fc_nlinfo, 0); |
541 | return 0; | 541 | return 0; |
542 | 542 | ||
543 | out_free_new_f: | ||
544 | kmem_cache_free(fn_hash_kmem, new_f); | ||
545 | out: | 543 | out: |
544 | if (new_f) | ||
545 | kmem_cache_free(fn_hash_kmem, new_f); | ||
546 | fib_release_info(fi); | 546 | fib_release_info(fi); |
547 | return err; | 547 | return err; |
548 | } | 548 | } |
diff --git a/net/ipv4/ip_gre.c b/net/ipv4/ip_gre.c index 63f691719353..906cb1ada4c3 100644 --- a/net/ipv4/ip_gre.c +++ b/net/ipv4/ip_gre.c | |||
@@ -259,16 +259,8 @@ static struct ip_tunnel * ipgre_tunnel_locate(struct ip_tunnel_parm *parms, int | |||
259 | 259 | ||
260 | if (parms->name[0]) | 260 | if (parms->name[0]) |
261 | strlcpy(name, parms->name, IFNAMSIZ); | 261 | strlcpy(name, parms->name, IFNAMSIZ); |
262 | else { | 262 | else |
263 | int i; | 263 | sprintf(name, "gre%%d"); |
264 | for (i=1; i<100; i++) { | ||
265 | sprintf(name, "gre%d", i); | ||
266 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
267 | break; | ||
268 | } | ||
269 | if (i==100) | ||
270 | goto failed; | ||
271 | } | ||
272 | 264 | ||
273 | dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup); | 265 | dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup); |
274 | if (!dev) | 266 | if (!dev) |
diff --git a/net/ipv4/ipconfig.c b/net/ipv4/ipconfig.c index a52b5853aaa8..10013ccee8dd 100644 --- a/net/ipv4/ipconfig.c +++ b/net/ipv4/ipconfig.c | |||
@@ -1390,7 +1390,7 @@ static int __init ip_auto_config(void) | |||
1390 | * Clue in the operator. | 1390 | * Clue in the operator. |
1391 | */ | 1391 | */ |
1392 | printk("IP-Config: Complete:"); | 1392 | printk("IP-Config: Complete:"); |
1393 | printk("\n device=%s", ic_dev->name); | 1393 | printk("\n device=%s", ic_dev->name); |
1394 | printk(", addr=%u.%u.%u.%u", NIPQUAD(ic_myaddr)); | 1394 | printk(", addr=%u.%u.%u.%u", NIPQUAD(ic_myaddr)); |
1395 | printk(", mask=%u.%u.%u.%u", NIPQUAD(ic_netmask)); | 1395 | printk(", mask=%u.%u.%u.%u", NIPQUAD(ic_netmask)); |
1396 | printk(", gw=%u.%u.%u.%u", NIPQUAD(ic_gateway)); | 1396 | printk(", gw=%u.%u.%u.%u", NIPQUAD(ic_gateway)); |
diff --git a/net/ipv4/ipip.c b/net/ipv4/ipip.c index da281581692c..e77e3b855834 100644 --- a/net/ipv4/ipip.c +++ b/net/ipv4/ipip.c | |||
@@ -221,16 +221,8 @@ static struct ip_tunnel * ipip_tunnel_locate(struct ip_tunnel_parm *parms, int c | |||
221 | 221 | ||
222 | if (parms->name[0]) | 222 | if (parms->name[0]) |
223 | strlcpy(name, parms->name, IFNAMSIZ); | 223 | strlcpy(name, parms->name, IFNAMSIZ); |
224 | else { | 224 | else |
225 | int i; | 225 | sprintf(name, "tunl%%d"); |
226 | for (i=1; i<100; i++) { | ||
227 | sprintf(name, "tunl%d", i); | ||
228 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
229 | break; | ||
230 | } | ||
231 | if (i==100) | ||
232 | goto failed; | ||
233 | } | ||
234 | 226 | ||
235 | dev = alloc_netdev(sizeof(*t), name, ipip_tunnel_setup); | 227 | dev = alloc_netdev(sizeof(*t), name, ipip_tunnel_setup); |
236 | if (dev == NULL) | 228 | if (dev == NULL) |
diff --git a/net/ipv4/netfilter/arpt_mangle.c b/net/ipv4/netfilter/arpt_mangle.c index 45fa4e20094a..3f4222b0a803 100644 --- a/net/ipv4/netfilter/arpt_mangle.c +++ b/net/ipv4/netfilter/arpt_mangle.c | |||
@@ -19,7 +19,7 @@ target(struct sk_buff *skb, | |||
19 | unsigned char *arpptr; | 19 | unsigned char *arpptr; |
20 | int pln, hln; | 20 | int pln, hln; |
21 | 21 | ||
22 | if (skb_make_writable(skb, skb->len)) | 22 | if (!skb_make_writable(skb, skb->len)) |
23 | return NF_DROP; | 23 | return NF_DROP; |
24 | 24 | ||
25 | arp = arp_hdr(skb); | 25 | arp = arp_hdr(skb); |
diff --git a/net/ipv4/netfilter/ip_queue.c b/net/ipv4/netfilter/ip_queue.c index 6bda1102851b..fe05da41d6ba 100644 --- a/net/ipv4/netfilter/ip_queue.c +++ b/net/ipv4/netfilter/ip_queue.c | |||
@@ -283,8 +283,8 @@ static int | |||
283 | ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | 283 | ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) |
284 | { | 284 | { |
285 | int diff; | 285 | int diff; |
286 | int err; | ||
287 | struct iphdr *user_iph = (struct iphdr *)v->payload; | 286 | struct iphdr *user_iph = (struct iphdr *)v->payload; |
287 | struct sk_buff *nskb; | ||
288 | 288 | ||
289 | if (v->data_len < sizeof(*user_iph)) | 289 | if (v->data_len < sizeof(*user_iph)) |
290 | return 0; | 290 | return 0; |
@@ -296,14 +296,16 @@ ipq_mangle_ipv4(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | |||
296 | if (v->data_len > 0xFFFF) | 296 | if (v->data_len > 0xFFFF) |
297 | return -EINVAL; | 297 | return -EINVAL; |
298 | if (diff > skb_tailroom(e->skb)) { | 298 | if (diff > skb_tailroom(e->skb)) { |
299 | err = pskb_expand_head(e->skb, 0, | 299 | nskb = skb_copy_expand(e->skb, 0, |
300 | diff - skb_tailroom(e->skb), | 300 | diff - skb_tailroom(e->skb), |
301 | GFP_ATOMIC); | 301 | GFP_ATOMIC); |
302 | if (err) { | 302 | if (!nskb) { |
303 | printk(KERN_WARNING "ip_queue: error " | 303 | printk(KERN_WARNING "ip_queue: error " |
304 | "in mangle, dropping packet: %d\n", -err); | 304 | "in mangle, dropping packet\n"); |
305 | return err; | 305 | return -ENOMEM; |
306 | } | 306 | } |
307 | kfree_skb(e->skb); | ||
308 | e->skb = nskb; | ||
307 | } | 309 | } |
308 | skb_put(e->skb, diff); | 310 | skb_put(e->skb, diff); |
309 | } | 311 | } |
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index 63414ea427c5..00156bf421ca 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c | |||
@@ -719,7 +719,7 @@ static void tcp_v4_reqsk_send_ack(struct sk_buff *skb, | |||
719 | } | 719 | } |
720 | 720 | ||
721 | /* | 721 | /* |
722 | * Send a SYN-ACK after having received an ACK. | 722 | * Send a SYN-ACK after having received a SYN. |
723 | * This still operates on a request_sock only, not on a big | 723 | * This still operates on a request_sock only, not on a big |
724 | * socket. | 724 | * socket. |
725 | */ | 725 | */ |
diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c index bddac0e8780f..f0aa97738746 100644 --- a/net/ipv6/af_inet6.c +++ b/net/ipv6/af_inet6.c | |||
@@ -752,14 +752,6 @@ static int __init inet6_init(void) | |||
752 | 752 | ||
753 | BUILD_BUG_ON(sizeof(struct inet6_skb_parm) > sizeof(dummy_skb->cb)); | 753 | BUILD_BUG_ON(sizeof(struct inet6_skb_parm) > sizeof(dummy_skb->cb)); |
754 | 754 | ||
755 | #ifdef MODULE | ||
756 | #if 0 /* FIXME --RR */ | ||
757 | if (!mod_member_present(&__this_module, can_unload)) | ||
758 | return -EINVAL; | ||
759 | |||
760 | __this_module.can_unload = &ipv6_unload; | ||
761 | #endif | ||
762 | #endif | ||
763 | err = proto_register(&tcpv6_prot, 1); | 755 | err = proto_register(&tcpv6_prot, 1); |
764 | if (err) | 756 | if (err) |
765 | goto out; | 757 | goto out; |
diff --git a/net/ipv6/ip6_fib.c b/net/ipv6/ip6_fib.c index f93407cf6515..bab72b6f1444 100644 --- a/net/ipv6/ip6_fib.c +++ b/net/ipv6/ip6_fib.c | |||
@@ -1151,7 +1151,7 @@ static void fib6_del_route(struct fib6_node *fn, struct rt6_info **rtp, | |||
1151 | fn = fn->parent; | 1151 | fn = fn->parent; |
1152 | } | 1152 | } |
1153 | /* No more references are possible at this point. */ | 1153 | /* No more references are possible at this point. */ |
1154 | if (atomic_read(&rt->rt6i_ref) != 1) BUG(); | 1154 | BUG_ON(atomic_read(&rt->rt6i_ref) != 1); |
1155 | } | 1155 | } |
1156 | 1156 | ||
1157 | inet6_rt_notify(RTM_DELROUTE, rt, info); | 1157 | inet6_rt_notify(RTM_DELROUTE, rt, info); |
diff --git a/net/ipv6/ip6_tunnel.c b/net/ipv6/ip6_tunnel.c index 9031e521c1df..2a124e9a1b2d 100644 --- a/net/ipv6/ip6_tunnel.c +++ b/net/ipv6/ip6_tunnel.c | |||
@@ -229,18 +229,11 @@ static struct ip6_tnl *ip6_tnl_create(struct ip6_tnl_parm *p) | |||
229 | char name[IFNAMSIZ]; | 229 | char name[IFNAMSIZ]; |
230 | int err; | 230 | int err; |
231 | 231 | ||
232 | if (p->name[0]) { | 232 | if (p->name[0]) |
233 | strlcpy(name, p->name, IFNAMSIZ); | 233 | strlcpy(name, p->name, IFNAMSIZ); |
234 | } else { | 234 | else |
235 | int i; | 235 | sprintf(name, "ip6tnl%%d"); |
236 | for (i = 1; i < IP6_TNL_MAX; i++) { | 236 | |
237 | sprintf(name, "ip6tnl%d", i); | ||
238 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
239 | break; | ||
240 | } | ||
241 | if (i == IP6_TNL_MAX) | ||
242 | goto failed; | ||
243 | } | ||
244 | dev = alloc_netdev(sizeof (*t), name, ip6_tnl_dev_setup); | 237 | dev = alloc_netdev(sizeof (*t), name, ip6_tnl_dev_setup); |
245 | if (dev == NULL) | 238 | if (dev == NULL) |
246 | goto failed; | 239 | goto failed; |
@@ -550,6 +543,7 @@ ip4ip6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, | |||
550 | ip_rt_put(rt); | 543 | ip_rt_put(rt); |
551 | goto out; | 544 | goto out; |
552 | } | 545 | } |
546 | skb2->dst = (struct dst_entry *)rt; | ||
553 | } else { | 547 | } else { |
554 | ip_rt_put(rt); | 548 | ip_rt_put(rt); |
555 | if (ip_route_input(skb2, eiph->daddr, eiph->saddr, eiph->tos, | 549 | if (ip_route_input(skb2, eiph->daddr, eiph->saddr, eiph->tos, |
diff --git a/net/ipv6/netfilter/ip6_queue.c b/net/ipv6/netfilter/ip6_queue.c index e869916b05f1..cc2f9afcf808 100644 --- a/net/ipv6/netfilter/ip6_queue.c +++ b/net/ipv6/netfilter/ip6_queue.c | |||
@@ -285,8 +285,8 @@ static int | |||
285 | ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | 285 | ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) |
286 | { | 286 | { |
287 | int diff; | 287 | int diff; |
288 | int err; | ||
289 | struct ipv6hdr *user_iph = (struct ipv6hdr *)v->payload; | 288 | struct ipv6hdr *user_iph = (struct ipv6hdr *)v->payload; |
289 | struct sk_buff *nskb; | ||
290 | 290 | ||
291 | if (v->data_len < sizeof(*user_iph)) | 291 | if (v->data_len < sizeof(*user_iph)) |
292 | return 0; | 292 | return 0; |
@@ -298,14 +298,16 @@ ipq_mangle_ipv6(ipq_verdict_msg_t *v, struct nf_queue_entry *e) | |||
298 | if (v->data_len > 0xFFFF) | 298 | if (v->data_len > 0xFFFF) |
299 | return -EINVAL; | 299 | return -EINVAL; |
300 | if (diff > skb_tailroom(e->skb)) { | 300 | if (diff > skb_tailroom(e->skb)) { |
301 | err = pskb_expand_head(e->skb, 0, | 301 | nskb = skb_copy_expand(e->skb, 0, |
302 | diff - skb_tailroom(e->skb), | 302 | diff - skb_tailroom(e->skb), |
303 | GFP_ATOMIC); | 303 | GFP_ATOMIC); |
304 | if (err) { | 304 | if (!nskb) { |
305 | printk(KERN_WARNING "ip6_queue: OOM " | 305 | printk(KERN_WARNING "ip6_queue: OOM " |
306 | "in mangle, dropping packet\n"); | 306 | "in mangle, dropping packet\n"); |
307 | return err; | 307 | return -ENOMEM; |
308 | } | 308 | } |
309 | kfree_skb(e->skb); | ||
310 | e->skb = nskb; | ||
309 | } | 311 | } |
310 | skb_put(e->skb, diff); | 312 | skb_put(e->skb, diff); |
311 | } | 313 | } |
diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c index e77239d02bf5..dde7801abeff 100644 --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c | |||
@@ -164,16 +164,8 @@ static struct ip_tunnel * ipip6_tunnel_locate(struct ip_tunnel_parm *parms, int | |||
164 | 164 | ||
165 | if (parms->name[0]) | 165 | if (parms->name[0]) |
166 | strlcpy(name, parms->name, IFNAMSIZ); | 166 | strlcpy(name, parms->name, IFNAMSIZ); |
167 | else { | 167 | else |
168 | int i; | 168 | sprintf(name, "sit%%d"); |
169 | for (i=1; i<100; i++) { | ||
170 | sprintf(name, "sit%d", i); | ||
171 | if (__dev_get_by_name(&init_net, name) == NULL) | ||
172 | break; | ||
173 | } | ||
174 | if (i==100) | ||
175 | goto failed; | ||
176 | } | ||
177 | 169 | ||
178 | dev = alloc_netdev(sizeof(*t), name, ipip6_tunnel_setup); | 170 | dev = alloc_netdev(sizeof(*t), name, ipip6_tunnel_setup); |
179 | if (dev == NULL) | 171 | if (dev == NULL) |
diff --git a/net/mac80211/ieee80211.c b/net/mac80211/ieee80211.c index 67b7c75c430d..28bcdf9fc3df 100644 --- a/net/mac80211/ieee80211.c +++ b/net/mac80211/ieee80211.c | |||
@@ -165,6 +165,7 @@ static int ieee80211_open(struct net_device *dev) | |||
165 | struct ieee80211_local *local = wdev_priv(dev->ieee80211_ptr); | 165 | struct ieee80211_local *local = wdev_priv(dev->ieee80211_ptr); |
166 | struct ieee80211_if_init_conf conf; | 166 | struct ieee80211_if_init_conf conf; |
167 | int res; | 167 | int res; |
168 | bool need_hw_reconfig = 0; | ||
168 | 169 | ||
169 | sdata = IEEE80211_DEV_TO_SUB_IF(dev); | 170 | sdata = IEEE80211_DEV_TO_SUB_IF(dev); |
170 | 171 | ||
@@ -218,7 +219,7 @@ static int ieee80211_open(struct net_device *dev) | |||
218 | res = local->ops->start(local_to_hw(local)); | 219 | res = local->ops->start(local_to_hw(local)); |
219 | if (res) | 220 | if (res) |
220 | return res; | 221 | return res; |
221 | ieee80211_hw_config(local); | 222 | need_hw_reconfig = 1; |
222 | ieee80211_led_radio(local, local->hw.conf.radio_enabled); | 223 | ieee80211_led_radio(local, local->hw.conf.radio_enabled); |
223 | } | 224 | } |
224 | 225 | ||
@@ -282,6 +283,8 @@ static int ieee80211_open(struct net_device *dev) | |||
282 | atomic_inc(&local->iff_promiscs); | 283 | atomic_inc(&local->iff_promiscs); |
283 | 284 | ||
284 | local->open_count++; | 285 | local->open_count++; |
286 | if (need_hw_reconfig) | ||
287 | ieee80211_hw_config(local); | ||
285 | 288 | ||
286 | netif_start_queue(dev); | 289 | netif_start_queue(dev); |
287 | 290 | ||
diff --git a/net/netfilter/nfnetlink_queue.c b/net/netfilter/nfnetlink_queue.c index a48b20fe9cd6..0043d3a9f87e 100644 --- a/net/netfilter/nfnetlink_queue.c +++ b/net/netfilter/nfnetlink_queue.c | |||
@@ -443,8 +443,8 @@ err_out: | |||
443 | static int | 443 | static int |
444 | nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) | 444 | nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) |
445 | { | 445 | { |
446 | struct sk_buff *nskb; | ||
446 | int diff; | 447 | int diff; |
447 | int err; | ||
448 | 448 | ||
449 | diff = data_len - e->skb->len; | 449 | diff = data_len - e->skb->len; |
450 | if (diff < 0) { | 450 | if (diff < 0) { |
@@ -454,14 +454,16 @@ nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e) | |||
454 | if (data_len > 0xFFFF) | 454 | if (data_len > 0xFFFF) |
455 | return -EINVAL; | 455 | return -EINVAL; |
456 | if (diff > skb_tailroom(e->skb)) { | 456 | if (diff > skb_tailroom(e->skb)) { |
457 | err = pskb_expand_head(e->skb, 0, | 457 | nskb = skb_copy_expand(e->skb, 0, |
458 | diff - skb_tailroom(e->skb), | 458 | diff - skb_tailroom(e->skb), |
459 | GFP_ATOMIC); | 459 | GFP_ATOMIC); |
460 | if (err) { | 460 | if (!nskb) { |
461 | printk(KERN_WARNING "nf_queue: OOM " | 461 | printk(KERN_WARNING "nf_queue: OOM " |
462 | "in mangle, dropping packet\n"); | 462 | "in mangle, dropping packet\n"); |
463 | return err; | 463 | return -ENOMEM; |
464 | } | 464 | } |
465 | kfree_skb(e->skb); | ||
466 | e->skb = nskb; | ||
465 | } | 467 | } |
466 | skb_put(e->skb, diff); | 468 | skb_put(e->skb, diff); |
467 | } | 469 | } |
diff --git a/net/netfilter/xt_hashlimit.c b/net/netfilter/xt_hashlimit.c index 744c7f2ab0b1..5418ce59ac3a 100644 --- a/net/netfilter/xt_hashlimit.c +++ b/net/netfilter/xt_hashlimit.c | |||
@@ -774,9 +774,6 @@ hashlimit_mt_check(const char *tablename, const void *inf, | |||
774 | return false; | 774 | return false; |
775 | } | 775 | } |
776 | mutex_unlock(&hlimit_mutex); | 776 | mutex_unlock(&hlimit_mutex); |
777 | |||
778 | /* Ugly hack: For SMP, we only want to use one set */ | ||
779 | info->master = info; | ||
780 | return true; | 777 | return true; |
781 | } | 778 | } |
782 | 779 | ||
diff --git a/net/netfilter/xt_iprange.c b/net/netfilter/xt_iprange.c index 4f984dc60319..500528d60cd7 100644 --- a/net/netfilter/xt_iprange.c +++ b/net/netfilter/xt_iprange.c | |||
@@ -102,7 +102,7 @@ iprange_ipv6_sub(const struct in6_addr *a, const struct in6_addr *b) | |||
102 | int r; | 102 | int r; |
103 | 103 | ||
104 | for (i = 0; i < 4; ++i) { | 104 | for (i = 0; i < 4; ++i) { |
105 | r = (__force u32)a->s6_addr32[i] - (__force u32)b->s6_addr32[i]; | 105 | r = ntohl(a->s6_addr32[i]) - ntohl(b->s6_addr32[i]); |
106 | if (r != 0) | 106 | if (r != 0) |
107 | return r; | 107 | return r; |
108 | } | 108 | } |
diff --git a/net/netfilter/xt_u32.c b/net/netfilter/xt_u32.c index 9b8ed390a8e0..627e0f336d54 100644 --- a/net/netfilter/xt_u32.c +++ b/net/netfilter/xt_u32.c | |||
@@ -26,7 +26,6 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
26 | u_int32_t pos; | 26 | u_int32_t pos; |
27 | u_int32_t val; | 27 | u_int32_t val; |
28 | u_int32_t at; | 28 | u_int32_t at; |
29 | int ret; | ||
30 | 29 | ||
31 | /* | 30 | /* |
32 | * Small example: "0 >> 28 == 4 && 8 & 0xFF0000 >> 16 = 6, 17" | 31 | * Small example: "0 >> 28 == 4 && 8 & 0xFF0000 >> 16 = 6, 17" |
@@ -40,8 +39,8 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
40 | if (skb->len < 4 || pos > skb->len - 4) | 39 | if (skb->len < 4 || pos > skb->len - 4) |
41 | return false; | 40 | return false; |
42 | 41 | ||
43 | ret = skb_copy_bits(skb, pos, &n, sizeof(n)); | 42 | if (skb_copy_bits(skb, pos, &n, sizeof(n)) < 0) |
44 | BUG_ON(ret < 0); | 43 | BUG(); |
45 | val = ntohl(n); | 44 | val = ntohl(n); |
46 | nnums = ct->nnums; | 45 | nnums = ct->nnums; |
47 | 46 | ||
@@ -67,9 +66,9 @@ static bool u32_match_it(const struct xt_u32 *data, | |||
67 | pos > skb->len - at - 4) | 66 | pos > skb->len - at - 4) |
68 | return false; | 67 | return false; |
69 | 68 | ||
70 | ret = skb_copy_bits(skb, at + pos, &n, | 69 | if (skb_copy_bits(skb, at + pos, &n, |
71 | sizeof(n)); | 70 | sizeof(n)) < 0) |
72 | BUG_ON(ret < 0); | 71 | BUG(); |
73 | val = ntohl(n); | 72 | val = ntohl(n); |
74 | break; | 73 | break; |
75 | } | 74 | } |
diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index c7ad64d664ad..fdc14a0d21af 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c | |||
@@ -718,36 +718,35 @@ static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info) | |||
718 | * NetLabel Generic NETLINK Command Definitions | 718 | * NetLabel Generic NETLINK Command Definitions |
719 | */ | 719 | */ |
720 | 720 | ||
721 | static struct genl_ops netlbl_cipsov4_genl_c_add = { | 721 | static struct genl_ops netlbl_cipsov4_ops[] = { |
722 | { | ||
722 | .cmd = NLBL_CIPSOV4_C_ADD, | 723 | .cmd = NLBL_CIPSOV4_C_ADD, |
723 | .flags = GENL_ADMIN_PERM, | 724 | .flags = GENL_ADMIN_PERM, |
724 | .policy = netlbl_cipsov4_genl_policy, | 725 | .policy = netlbl_cipsov4_genl_policy, |
725 | .doit = netlbl_cipsov4_add, | 726 | .doit = netlbl_cipsov4_add, |
726 | .dumpit = NULL, | 727 | .dumpit = NULL, |
727 | }; | 728 | }, |
728 | 729 | { | |
729 | static struct genl_ops netlbl_cipsov4_genl_c_remove = { | ||
730 | .cmd = NLBL_CIPSOV4_C_REMOVE, | 730 | .cmd = NLBL_CIPSOV4_C_REMOVE, |
731 | .flags = GENL_ADMIN_PERM, | 731 | .flags = GENL_ADMIN_PERM, |
732 | .policy = netlbl_cipsov4_genl_policy, | 732 | .policy = netlbl_cipsov4_genl_policy, |
733 | .doit = netlbl_cipsov4_remove, | 733 | .doit = netlbl_cipsov4_remove, |
734 | .dumpit = NULL, | 734 | .dumpit = NULL, |
735 | }; | 735 | }, |
736 | 736 | { | |
737 | static struct genl_ops netlbl_cipsov4_genl_c_list = { | ||
738 | .cmd = NLBL_CIPSOV4_C_LIST, | 737 | .cmd = NLBL_CIPSOV4_C_LIST, |
739 | .flags = 0, | 738 | .flags = 0, |
740 | .policy = netlbl_cipsov4_genl_policy, | 739 | .policy = netlbl_cipsov4_genl_policy, |
741 | .doit = netlbl_cipsov4_list, | 740 | .doit = netlbl_cipsov4_list, |
742 | .dumpit = NULL, | 741 | .dumpit = NULL, |
743 | }; | 742 | }, |
744 | 743 | { | |
745 | static struct genl_ops netlbl_cipsov4_genl_c_listall = { | ||
746 | .cmd = NLBL_CIPSOV4_C_LISTALL, | 744 | .cmd = NLBL_CIPSOV4_C_LISTALL, |
747 | .flags = 0, | 745 | .flags = 0, |
748 | .policy = netlbl_cipsov4_genl_policy, | 746 | .policy = netlbl_cipsov4_genl_policy, |
749 | .doit = NULL, | 747 | .doit = NULL, |
750 | .dumpit = netlbl_cipsov4_listall, | 748 | .dumpit = netlbl_cipsov4_listall, |
749 | }, | ||
751 | }; | 750 | }; |
752 | 751 | ||
753 | /* | 752 | /* |
@@ -762,30 +761,20 @@ static struct genl_ops netlbl_cipsov4_genl_c_listall = { | |||
762 | * mechanism. Returns zero on success, negative values on failure. | 761 | * mechanism. Returns zero on success, negative values on failure. |
763 | * | 762 | * |
764 | */ | 763 | */ |
765 | int netlbl_cipsov4_genl_init(void) | 764 | int __init netlbl_cipsov4_genl_init(void) |
766 | { | 765 | { |
767 | int ret_val; | 766 | int ret_val, i; |
768 | 767 | ||
769 | ret_val = genl_register_family(&netlbl_cipsov4_gnl_family); | 768 | ret_val = genl_register_family(&netlbl_cipsov4_gnl_family); |
770 | if (ret_val != 0) | 769 | if (ret_val != 0) |
771 | return ret_val; | 770 | return ret_val; |
772 | 771 | ||
773 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | 772 | for (i = 0; i < ARRAY_SIZE(netlbl_cipsov4_ops); i++) { |
774 | &netlbl_cipsov4_genl_c_add); | 773 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, |
775 | if (ret_val != 0) | 774 | &netlbl_cipsov4_ops[i]); |
776 | return ret_val; | 775 | if (ret_val != 0) |
777 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | 776 | return ret_val; |
778 | &netlbl_cipsov4_genl_c_remove); | 777 | } |
779 | if (ret_val != 0) | ||
780 | return ret_val; | ||
781 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | ||
782 | &netlbl_cipsov4_genl_c_list); | ||
783 | if (ret_val != 0) | ||
784 | return ret_val; | ||
785 | ret_val = genl_register_ops(&netlbl_cipsov4_gnl_family, | ||
786 | &netlbl_cipsov4_genl_c_listall); | ||
787 | if (ret_val != 0) | ||
788 | return ret_val; | ||
789 | 778 | ||
790 | return 0; | 779 | return 0; |
791 | } | 780 | } |
diff --git a/net/netlabel/netlabel_domainhash.c b/net/netlabel/netlabel_domainhash.c index fd462313471c..02c2f7c0b255 100644 --- a/net/netlabel/netlabel_domainhash.c +++ b/net/netlabel/netlabel_domainhash.c | |||
@@ -171,7 +171,7 @@ static struct netlbl_dom_map *netlbl_domhsh_search_def(const char *domain) | |||
171 | * values on error. | 171 | * values on error. |
172 | * | 172 | * |
173 | */ | 173 | */ |
174 | int netlbl_domhsh_init(u32 size) | 174 | int __init netlbl_domhsh_init(u32 size) |
175 | { | 175 | { |
176 | u32 iter; | 176 | u32 iter; |
177 | struct netlbl_domhsh_tbl *hsh_tbl; | 177 | struct netlbl_domhsh_tbl *hsh_tbl; |
diff --git a/net/netlabel/netlabel_mgmt.c b/net/netlabel/netlabel_mgmt.c index e2258dc3c845..22c191267808 100644 --- a/net/netlabel/netlabel_mgmt.c +++ b/net/netlabel/netlabel_mgmt.c | |||
@@ -517,68 +517,63 @@ version_failure: | |||
517 | * NetLabel Generic NETLINK Command Definitions | 517 | * NetLabel Generic NETLINK Command Definitions |
518 | */ | 518 | */ |
519 | 519 | ||
520 | static struct genl_ops netlbl_mgmt_genl_c_add = { | 520 | static struct genl_ops netlbl_mgmt_genl_ops[] = { |
521 | { | ||
521 | .cmd = NLBL_MGMT_C_ADD, | 522 | .cmd = NLBL_MGMT_C_ADD, |
522 | .flags = GENL_ADMIN_PERM, | 523 | .flags = GENL_ADMIN_PERM, |
523 | .policy = netlbl_mgmt_genl_policy, | 524 | .policy = netlbl_mgmt_genl_policy, |
524 | .doit = netlbl_mgmt_add, | 525 | .doit = netlbl_mgmt_add, |
525 | .dumpit = NULL, | 526 | .dumpit = NULL, |
526 | }; | 527 | }, |
527 | 528 | { | |
528 | static struct genl_ops netlbl_mgmt_genl_c_remove = { | ||
529 | .cmd = NLBL_MGMT_C_REMOVE, | 529 | .cmd = NLBL_MGMT_C_REMOVE, |
530 | .flags = GENL_ADMIN_PERM, | 530 | .flags = GENL_ADMIN_PERM, |
531 | .policy = netlbl_mgmt_genl_policy, | 531 | .policy = netlbl_mgmt_genl_policy, |
532 | .doit = netlbl_mgmt_remove, | 532 | .doit = netlbl_mgmt_remove, |
533 | .dumpit = NULL, | 533 | .dumpit = NULL, |
534 | }; | 534 | }, |
535 | 535 | { | |
536 | static struct genl_ops netlbl_mgmt_genl_c_listall = { | ||
537 | .cmd = NLBL_MGMT_C_LISTALL, | 536 | .cmd = NLBL_MGMT_C_LISTALL, |
538 | .flags = 0, | 537 | .flags = 0, |
539 | .policy = netlbl_mgmt_genl_policy, | 538 | .policy = netlbl_mgmt_genl_policy, |
540 | .doit = NULL, | 539 | .doit = NULL, |
541 | .dumpit = netlbl_mgmt_listall, | 540 | .dumpit = netlbl_mgmt_listall, |
542 | }; | 541 | }, |
543 | 542 | { | |
544 | static struct genl_ops netlbl_mgmt_genl_c_adddef = { | ||
545 | .cmd = NLBL_MGMT_C_ADDDEF, | 543 | .cmd = NLBL_MGMT_C_ADDDEF, |
546 | .flags = GENL_ADMIN_PERM, | 544 | .flags = GENL_ADMIN_PERM, |
547 | .policy = netlbl_mgmt_genl_policy, | 545 | .policy = netlbl_mgmt_genl_policy, |
548 | .doit = netlbl_mgmt_adddef, | 546 | .doit = netlbl_mgmt_adddef, |
549 | .dumpit = NULL, | 547 | .dumpit = NULL, |
550 | }; | 548 | }, |
551 | 549 | { | |
552 | static struct genl_ops netlbl_mgmt_genl_c_removedef = { | ||
553 | .cmd = NLBL_MGMT_C_REMOVEDEF, | 550 | .cmd = NLBL_MGMT_C_REMOVEDEF, |
554 | .flags = GENL_ADMIN_PERM, | 551 | .flags = GENL_ADMIN_PERM, |
555 | .policy = netlbl_mgmt_genl_policy, | 552 | .policy = netlbl_mgmt_genl_policy, |
556 | .doit = netlbl_mgmt_removedef, | 553 | .doit = netlbl_mgmt_removedef, |
557 | .dumpit = NULL, | 554 | .dumpit = NULL, |
558 | }; | 555 | }, |
559 | 556 | { | |
560 | static struct genl_ops netlbl_mgmt_genl_c_listdef = { | ||
561 | .cmd = NLBL_MGMT_C_LISTDEF, | 557 | .cmd = NLBL_MGMT_C_LISTDEF, |
562 | .flags = 0, | 558 | .flags = 0, |
563 | .policy = netlbl_mgmt_genl_policy, | 559 | .policy = netlbl_mgmt_genl_policy, |
564 | .doit = netlbl_mgmt_listdef, | 560 | .doit = netlbl_mgmt_listdef, |
565 | .dumpit = NULL, | 561 | .dumpit = NULL, |
566 | }; | 562 | }, |
567 | 563 | { | |
568 | static struct genl_ops netlbl_mgmt_genl_c_protocols = { | ||
569 | .cmd = NLBL_MGMT_C_PROTOCOLS, | 564 | .cmd = NLBL_MGMT_C_PROTOCOLS, |
570 | .flags = 0, | 565 | .flags = 0, |
571 | .policy = netlbl_mgmt_genl_policy, | 566 | .policy = netlbl_mgmt_genl_policy, |
572 | .doit = NULL, | 567 | .doit = NULL, |
573 | .dumpit = netlbl_mgmt_protocols, | 568 | .dumpit = netlbl_mgmt_protocols, |
574 | }; | 569 | }, |
575 | 570 | { | |
576 | static struct genl_ops netlbl_mgmt_genl_c_version = { | ||
577 | .cmd = NLBL_MGMT_C_VERSION, | 571 | .cmd = NLBL_MGMT_C_VERSION, |
578 | .flags = 0, | 572 | .flags = 0, |
579 | .policy = netlbl_mgmt_genl_policy, | 573 | .policy = netlbl_mgmt_genl_policy, |
580 | .doit = netlbl_mgmt_version, | 574 | .doit = netlbl_mgmt_version, |
581 | .dumpit = NULL, | 575 | .dumpit = NULL, |
576 | }, | ||
582 | }; | 577 | }; |
583 | 578 | ||
584 | /* | 579 | /* |
@@ -593,46 +588,20 @@ static struct genl_ops netlbl_mgmt_genl_c_version = { | |||
593 | * mechanism. Returns zero on success, negative values on failure. | 588 | * mechanism. Returns zero on success, negative values on failure. |
594 | * | 589 | * |
595 | */ | 590 | */ |
596 | int netlbl_mgmt_genl_init(void) | 591 | int __init netlbl_mgmt_genl_init(void) |
597 | { | 592 | { |
598 | int ret_val; | 593 | int ret_val, i; |
599 | 594 | ||
600 | ret_val = genl_register_family(&netlbl_mgmt_gnl_family); | 595 | ret_val = genl_register_family(&netlbl_mgmt_gnl_family); |
601 | if (ret_val != 0) | 596 | if (ret_val != 0) |
602 | return ret_val; | 597 | return ret_val; |
603 | 598 | ||
604 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | 599 | for (i = 0; i < ARRAY_SIZE(netlbl_mgmt_genl_ops); i++) { |
605 | &netlbl_mgmt_genl_c_add); | 600 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, |
606 | if (ret_val != 0) | 601 | &netlbl_mgmt_genl_ops[i]); |
607 | return ret_val; | 602 | if (ret_val != 0) |
608 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | 603 | return ret_val; |
609 | &netlbl_mgmt_genl_c_remove); | 604 | } |
610 | if (ret_val != 0) | ||
611 | return ret_val; | ||
612 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
613 | &netlbl_mgmt_genl_c_listall); | ||
614 | if (ret_val != 0) | ||
615 | return ret_val; | ||
616 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
617 | &netlbl_mgmt_genl_c_adddef); | ||
618 | if (ret_val != 0) | ||
619 | return ret_val; | ||
620 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
621 | &netlbl_mgmt_genl_c_removedef); | ||
622 | if (ret_val != 0) | ||
623 | return ret_val; | ||
624 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
625 | &netlbl_mgmt_genl_c_listdef); | ||
626 | if (ret_val != 0) | ||
627 | return ret_val; | ||
628 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
629 | &netlbl_mgmt_genl_c_protocols); | ||
630 | if (ret_val != 0) | ||
631 | return ret_val; | ||
632 | ret_val = genl_register_ops(&netlbl_mgmt_gnl_family, | ||
633 | &netlbl_mgmt_genl_c_version); | ||
634 | if (ret_val != 0) | ||
635 | return ret_val; | ||
636 | 605 | ||
637 | return 0; | 606 | return 0; |
638 | } | 607 | } |
diff --git a/net/netlabel/netlabel_unlabeled.c b/net/netlabel/netlabel_unlabeled.c index 3e745b72fded..4478f2f6079d 100644 --- a/net/netlabel/netlabel_unlabeled.c +++ b/net/netlabel/netlabel_unlabeled.c | |||
@@ -1553,68 +1553,63 @@ unlabel_staticlistdef_return: | |||
1553 | * NetLabel Generic NETLINK Command Definitions | 1553 | * NetLabel Generic NETLINK Command Definitions |
1554 | */ | 1554 | */ |
1555 | 1555 | ||
1556 | static struct genl_ops netlbl_unlabel_genl_c_staticadd = { | 1556 | static struct genl_ops netlbl_unlabel_genl_ops[] = { |
1557 | { | ||
1557 | .cmd = NLBL_UNLABEL_C_STATICADD, | 1558 | .cmd = NLBL_UNLABEL_C_STATICADD, |
1558 | .flags = GENL_ADMIN_PERM, | 1559 | .flags = GENL_ADMIN_PERM, |
1559 | .policy = netlbl_unlabel_genl_policy, | 1560 | .policy = netlbl_unlabel_genl_policy, |
1560 | .doit = netlbl_unlabel_staticadd, | 1561 | .doit = netlbl_unlabel_staticadd, |
1561 | .dumpit = NULL, | 1562 | .dumpit = NULL, |
1562 | }; | 1563 | }, |
1563 | 1564 | { | |
1564 | static struct genl_ops netlbl_unlabel_genl_c_staticremove = { | ||
1565 | .cmd = NLBL_UNLABEL_C_STATICREMOVE, | 1565 | .cmd = NLBL_UNLABEL_C_STATICREMOVE, |
1566 | .flags = GENL_ADMIN_PERM, | 1566 | .flags = GENL_ADMIN_PERM, |
1567 | .policy = netlbl_unlabel_genl_policy, | 1567 | .policy = netlbl_unlabel_genl_policy, |
1568 | .doit = netlbl_unlabel_staticremove, | 1568 | .doit = netlbl_unlabel_staticremove, |
1569 | .dumpit = NULL, | 1569 | .dumpit = NULL, |
1570 | }; | 1570 | }, |
1571 | 1571 | { | |
1572 | static struct genl_ops netlbl_unlabel_genl_c_staticlist = { | ||
1573 | .cmd = NLBL_UNLABEL_C_STATICLIST, | 1572 | .cmd = NLBL_UNLABEL_C_STATICLIST, |
1574 | .flags = 0, | 1573 | .flags = 0, |
1575 | .policy = netlbl_unlabel_genl_policy, | 1574 | .policy = netlbl_unlabel_genl_policy, |
1576 | .doit = NULL, | 1575 | .doit = NULL, |
1577 | .dumpit = netlbl_unlabel_staticlist, | 1576 | .dumpit = netlbl_unlabel_staticlist, |
1578 | }; | 1577 | }, |
1579 | 1578 | { | |
1580 | static struct genl_ops netlbl_unlabel_genl_c_staticadddef = { | ||
1581 | .cmd = NLBL_UNLABEL_C_STATICADDDEF, | 1579 | .cmd = NLBL_UNLABEL_C_STATICADDDEF, |
1582 | .flags = GENL_ADMIN_PERM, | 1580 | .flags = GENL_ADMIN_PERM, |
1583 | .policy = netlbl_unlabel_genl_policy, | 1581 | .policy = netlbl_unlabel_genl_policy, |
1584 | .doit = netlbl_unlabel_staticadddef, | 1582 | .doit = netlbl_unlabel_staticadddef, |
1585 | .dumpit = NULL, | 1583 | .dumpit = NULL, |
1586 | }; | 1584 | }, |
1587 | 1585 | { | |
1588 | static struct genl_ops netlbl_unlabel_genl_c_staticremovedef = { | ||
1589 | .cmd = NLBL_UNLABEL_C_STATICREMOVEDEF, | 1586 | .cmd = NLBL_UNLABEL_C_STATICREMOVEDEF, |
1590 | .flags = GENL_ADMIN_PERM, | 1587 | .flags = GENL_ADMIN_PERM, |
1591 | .policy = netlbl_unlabel_genl_policy, | 1588 | .policy = netlbl_unlabel_genl_policy, |
1592 | .doit = netlbl_unlabel_staticremovedef, | 1589 | .doit = netlbl_unlabel_staticremovedef, |
1593 | .dumpit = NULL, | 1590 | .dumpit = NULL, |
1594 | }; | 1591 | }, |
1595 | 1592 | { | |
1596 | static struct genl_ops netlbl_unlabel_genl_c_staticlistdef = { | ||
1597 | .cmd = NLBL_UNLABEL_C_STATICLISTDEF, | 1593 | .cmd = NLBL_UNLABEL_C_STATICLISTDEF, |
1598 | .flags = 0, | 1594 | .flags = 0, |
1599 | .policy = netlbl_unlabel_genl_policy, | 1595 | .policy = netlbl_unlabel_genl_policy, |
1600 | .doit = NULL, | 1596 | .doit = NULL, |
1601 | .dumpit = netlbl_unlabel_staticlistdef, | 1597 | .dumpit = netlbl_unlabel_staticlistdef, |
1602 | }; | 1598 | }, |
1603 | 1599 | { | |
1604 | static struct genl_ops netlbl_unlabel_genl_c_accept = { | ||
1605 | .cmd = NLBL_UNLABEL_C_ACCEPT, | 1600 | .cmd = NLBL_UNLABEL_C_ACCEPT, |
1606 | .flags = GENL_ADMIN_PERM, | 1601 | .flags = GENL_ADMIN_PERM, |
1607 | .policy = netlbl_unlabel_genl_policy, | 1602 | .policy = netlbl_unlabel_genl_policy, |
1608 | .doit = netlbl_unlabel_accept, | 1603 | .doit = netlbl_unlabel_accept, |
1609 | .dumpit = NULL, | 1604 | .dumpit = NULL, |
1610 | }; | 1605 | }, |
1611 | 1606 | { | |
1612 | static struct genl_ops netlbl_unlabel_genl_c_list = { | ||
1613 | .cmd = NLBL_UNLABEL_C_LIST, | 1607 | .cmd = NLBL_UNLABEL_C_LIST, |
1614 | .flags = 0, | 1608 | .flags = 0, |
1615 | .policy = netlbl_unlabel_genl_policy, | 1609 | .policy = netlbl_unlabel_genl_policy, |
1616 | .doit = netlbl_unlabel_list, | 1610 | .doit = netlbl_unlabel_list, |
1617 | .dumpit = NULL, | 1611 | .dumpit = NULL, |
1612 | }, | ||
1618 | }; | 1613 | }; |
1619 | 1614 | ||
1620 | /* | 1615 | /* |
@@ -1629,53 +1624,20 @@ static struct genl_ops netlbl_unlabel_genl_c_list = { | |||
1629 | * mechanism. Returns zero on success, negative values on failure. | 1624 | * mechanism. Returns zero on success, negative values on failure. |
1630 | * | 1625 | * |
1631 | */ | 1626 | */ |
1632 | int netlbl_unlabel_genl_init(void) | 1627 | int __init netlbl_unlabel_genl_init(void) |
1633 | { | 1628 | { |
1634 | int ret_val; | 1629 | int ret_val, i; |
1635 | 1630 | ||
1636 | ret_val = genl_register_family(&netlbl_unlabel_gnl_family); | 1631 | ret_val = genl_register_family(&netlbl_unlabel_gnl_family); |
1637 | if (ret_val != 0) | 1632 | if (ret_val != 0) |
1638 | return ret_val; | 1633 | return ret_val; |
1639 | 1634 | ||
1640 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | 1635 | for (i = 0; i < ARRAY_SIZE(netlbl_unlabel_genl_ops); i++) { |
1641 | &netlbl_unlabel_genl_c_staticadd); | 1636 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, |
1642 | if (ret_val != 0) | 1637 | &netlbl_unlabel_genl_ops[i]); |
1643 | return ret_val; | 1638 | if (ret_val != 0) |
1644 | 1639 | return ret_val; | |
1645 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | 1640 | } |
1646 | &netlbl_unlabel_genl_c_staticremove); | ||
1647 | if (ret_val != 0) | ||
1648 | return ret_val; | ||
1649 | |||
1650 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1651 | &netlbl_unlabel_genl_c_staticlist); | ||
1652 | if (ret_val != 0) | ||
1653 | return ret_val; | ||
1654 | |||
1655 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1656 | &netlbl_unlabel_genl_c_staticadddef); | ||
1657 | if (ret_val != 0) | ||
1658 | return ret_val; | ||
1659 | |||
1660 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1661 | &netlbl_unlabel_genl_c_staticremovedef); | ||
1662 | if (ret_val != 0) | ||
1663 | return ret_val; | ||
1664 | |||
1665 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1666 | &netlbl_unlabel_genl_c_staticlistdef); | ||
1667 | if (ret_val != 0) | ||
1668 | return ret_val; | ||
1669 | |||
1670 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1671 | &netlbl_unlabel_genl_c_accept); | ||
1672 | if (ret_val != 0) | ||
1673 | return ret_val; | ||
1674 | |||
1675 | ret_val = genl_register_ops(&netlbl_unlabel_gnl_family, | ||
1676 | &netlbl_unlabel_genl_c_list); | ||
1677 | if (ret_val != 0) | ||
1678 | return ret_val; | ||
1679 | 1641 | ||
1680 | return 0; | 1642 | return 0; |
1681 | } | 1643 | } |
@@ -1699,7 +1661,7 @@ static struct notifier_block netlbl_unlhsh_netdev_notifier = { | |||
1699 | * non-zero values on error. | 1661 | * non-zero values on error. |
1700 | * | 1662 | * |
1701 | */ | 1663 | */ |
1702 | int netlbl_unlabel_init(u32 size) | 1664 | int __init netlbl_unlabel_init(u32 size) |
1703 | { | 1665 | { |
1704 | u32 iter; | 1666 | u32 iter; |
1705 | struct netlbl_unlhsh_tbl *hsh_tbl; | 1667 | struct netlbl_unlhsh_tbl *hsh_tbl; |
@@ -1803,7 +1765,7 @@ unlabel_getattr_nolabel: | |||
1803 | * and to send unlabeled network traffic by default. | 1765 | * and to send unlabeled network traffic by default. |
1804 | * | 1766 | * |
1805 | */ | 1767 | */ |
1806 | int netlbl_unlabel_defconf(void) | 1768 | int __init netlbl_unlabel_defconf(void) |
1807 | { | 1769 | { |
1808 | int ret_val; | 1770 | int ret_val; |
1809 | struct netlbl_dom_map *entry; | 1771 | struct netlbl_dom_map *entry; |
diff --git a/net/netlabel/netlabel_user.c b/net/netlabel/netlabel_user.c index 023fc8fe840d..b17d4203806e 100644 --- a/net/netlabel/netlabel_user.c +++ b/net/netlabel/netlabel_user.c | |||
@@ -59,7 +59,7 @@ | |||
59 | * non-zero on failure. | 59 | * non-zero on failure. |
60 | * | 60 | * |
61 | */ | 61 | */ |
62 | int netlbl_netlink_init(void) | 62 | int __init netlbl_netlink_init(void) |
63 | { | 63 | { |
64 | int ret_val; | 64 | int ret_val; |
65 | 65 | ||
diff --git a/net/rfkill/rfkill.c b/net/rfkill/rfkill.c index 1a47f5d1be17..140a0a8c6b02 100644 --- a/net/rfkill/rfkill.c +++ b/net/rfkill/rfkill.c | |||
@@ -232,7 +232,7 @@ static int rfkill_suspend(struct device *dev, pm_message_t state) | |||
232 | struct rfkill *rfkill = to_rfkill(dev); | 232 | struct rfkill *rfkill = to_rfkill(dev); |
233 | 233 | ||
234 | if (dev->power.power_state.event != state.event) { | 234 | if (dev->power.power_state.event != state.event) { |
235 | if (state.event == PM_EVENT_SUSPEND) { | 235 | if (state.event & PM_EVENT_SLEEP) { |
236 | mutex_lock(&rfkill->mutex); | 236 | mutex_lock(&rfkill->mutex); |
237 | 237 | ||
238 | if (rfkill->state == RFKILL_STATE_ON) | 238 | if (rfkill->state == RFKILL_STATE_ON) |
diff --git a/net/rxrpc/ar-accept.c b/net/rxrpc/ar-accept.c index 92a87fde8bfe..bdfb77417794 100644 --- a/net/rxrpc/ar-accept.c +++ b/net/rxrpc/ar-accept.c | |||
@@ -156,8 +156,7 @@ static int rxrpc_accept_incoming_call(struct rxrpc_local *local, | |||
156 | false); | 156 | false); |
157 | spin_unlock(&call->lock); | 157 | spin_unlock(&call->lock); |
158 | notification = NULL; | 158 | notification = NULL; |
159 | if (ret < 0) | 159 | BUG_ON(ret < 0); |
160 | BUG(); | ||
161 | } | 160 | } |
162 | spin_unlock(&call->conn->state_lock); | 161 | spin_unlock(&call->conn->state_lock); |
163 | 162 | ||
diff --git a/net/rxrpc/ar-ack.c b/net/rxrpc/ar-ack.c index 657ee69f2133..3ac1672e1070 100644 --- a/net/rxrpc/ar-ack.c +++ b/net/rxrpc/ar-ack.c | |||
@@ -814,8 +814,7 @@ static int rxrpc_post_message(struct rxrpc_call *call, u32 mark, u32 error, | |||
814 | spin_lock_bh(&call->lock); | 814 | spin_lock_bh(&call->lock); |
815 | ret = rxrpc_queue_rcv_skb(call, skb, true, fatal); | 815 | ret = rxrpc_queue_rcv_skb(call, skb, true, fatal); |
816 | spin_unlock_bh(&call->lock); | 816 | spin_unlock_bh(&call->lock); |
817 | if (ret < 0) | 817 | BUG_ON(ret < 0); |
818 | BUG(); | ||
819 | } | 818 | } |
820 | 819 | ||
821 | return 0; | 820 | return 0; |
diff --git a/net/sctp/socket.c b/net/sctp/socket.c index d47d5787e2e5..44797ad88a05 100644 --- a/net/sctp/socket.c +++ b/net/sctp/socket.c | |||
@@ -6488,6 +6488,7 @@ struct proto sctp_prot = { | |||
6488 | .memory_pressure = &sctp_memory_pressure, | 6488 | .memory_pressure = &sctp_memory_pressure, |
6489 | .enter_memory_pressure = sctp_enter_memory_pressure, | 6489 | .enter_memory_pressure = sctp_enter_memory_pressure, |
6490 | .memory_allocated = &sctp_memory_allocated, | 6490 | .memory_allocated = &sctp_memory_allocated, |
6491 | .sockets_allocated = &sctp_sockets_allocated, | ||
6491 | REF_PROTO_INUSE(sctp) | 6492 | REF_PROTO_INUSE(sctp) |
6492 | }; | 6493 | }; |
6493 | 6494 | ||
@@ -6521,6 +6522,7 @@ struct proto sctpv6_prot = { | |||
6521 | .memory_pressure = &sctp_memory_pressure, | 6522 | .memory_pressure = &sctp_memory_pressure, |
6522 | .enter_memory_pressure = sctp_enter_memory_pressure, | 6523 | .enter_memory_pressure = sctp_enter_memory_pressure, |
6523 | .memory_allocated = &sctp_memory_allocated, | 6524 | .memory_allocated = &sctp_memory_allocated, |
6525 | .sockets_allocated = &sctp_sockets_allocated, | ||
6524 | REF_PROTO_INUSE(sctpv6) | 6526 | REF_PROTO_INUSE(sctpv6) |
6525 | }; | 6527 | }; |
6526 | #endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */ | 6528 | #endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */ |
diff --git a/net/sunrpc/svcsock.c b/net/sunrpc/svcsock.c index 1d3e5fcc2cc4..c475977de05a 100644 --- a/net/sunrpc/svcsock.c +++ b/net/sunrpc/svcsock.c | |||
@@ -175,7 +175,7 @@ static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr) | |||
175 | size_t base = xdr->page_base; | 175 | size_t base = xdr->page_base; |
176 | unsigned int pglen = xdr->page_len; | 176 | unsigned int pglen = xdr->page_len; |
177 | unsigned int flags = MSG_MORE; | 177 | unsigned int flags = MSG_MORE; |
178 | char buf[RPC_MAX_ADDRBUFLEN]; | 178 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
179 | 179 | ||
180 | slen = xdr->len; | 180 | slen = xdr->len; |
181 | 181 | ||
@@ -716,7 +716,7 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt) | |||
716 | struct socket *newsock; | 716 | struct socket *newsock; |
717 | struct svc_sock *newsvsk; | 717 | struct svc_sock *newsvsk; |
718 | int err, slen; | 718 | int err, slen; |
719 | char buf[RPC_MAX_ADDRBUFLEN]; | 719 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
720 | 720 | ||
721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); | 721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); |
722 | if (!sock) | 722 | if (!sock) |
@@ -1206,10 +1206,10 @@ static struct svc_xprt *svc_create_socket(struct svc_serv *serv, | |||
1206 | struct socket *sock; | 1206 | struct socket *sock; |
1207 | int error; | 1207 | int error; |
1208 | int type; | 1208 | int type; |
1209 | char buf[RPC_MAX_ADDRBUFLEN]; | ||
1210 | struct sockaddr_storage addr; | 1209 | struct sockaddr_storage addr; |
1211 | struct sockaddr *newsin = (struct sockaddr *)&addr; | 1210 | struct sockaddr *newsin = (struct sockaddr *)&addr; |
1212 | int newlen; | 1211 | int newlen; |
1212 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); | ||
1213 | 1213 | ||
1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", | 1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", |
1215 | serv->sv_program->pg_name, protocol, | 1215 | serv->sv_program->pg_name, protocol, |
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 47219f98053f..9fc4c315f6cd 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c | |||
@@ -331,15 +331,31 @@ static void xfrm_dst_hash_transfer(struct hlist_head *list, | |||
331 | struct hlist_head *ndsttable, | 331 | struct hlist_head *ndsttable, |
332 | unsigned int nhashmask) | 332 | unsigned int nhashmask) |
333 | { | 333 | { |
334 | struct hlist_node *entry, *tmp; | 334 | struct hlist_node *entry, *tmp, *entry0 = NULL; |
335 | struct xfrm_policy *pol; | 335 | struct xfrm_policy *pol; |
336 | unsigned int h0 = 0; | ||
336 | 337 | ||
338 | redo: | ||
337 | hlist_for_each_entry_safe(pol, entry, tmp, list, bydst) { | 339 | hlist_for_each_entry_safe(pol, entry, tmp, list, bydst) { |
338 | unsigned int h; | 340 | unsigned int h; |
339 | 341 | ||
340 | h = __addr_hash(&pol->selector.daddr, &pol->selector.saddr, | 342 | h = __addr_hash(&pol->selector.daddr, &pol->selector.saddr, |
341 | pol->family, nhashmask); | 343 | pol->family, nhashmask); |
342 | hlist_add_head(&pol->bydst, ndsttable+h); | 344 | if (!entry0) { |
345 | hlist_del(entry); | ||
346 | hlist_add_head(&pol->bydst, ndsttable+h); | ||
347 | h0 = h; | ||
348 | } else { | ||
349 | if (h != h0) | ||
350 | continue; | ||
351 | hlist_del(entry); | ||
352 | hlist_add_after(entry0, &pol->bydst); | ||
353 | } | ||
354 | entry0 = entry; | ||
355 | } | ||
356 | if (!hlist_empty(list)) { | ||
357 | entry0 = NULL; | ||
358 | goto redo; | ||
343 | } | 359 | } |
344 | } | 360 | } |
345 | 361 | ||