- 03 May, 2003 9 commits
-
-
ssh://master.kernel.org//home/hch/BK/xfs/linux-2.5/Linus Torvalds authored
into home.transmeta.com:/home/torvalds/v2.5/linux
-
Paul Fulghum authored
This patch adds new PCI IDs to the drivers/pci/pci.ids file.
-
Paul Fulghum authored
-
Linus Torvalds authored
-
bk://kernel.bkbits.net/davem/net-2.5Linus Torvalds authored
into home.transmeta.com:/home/torvalds/v2.5/linux
-
David S. Miller authored
into nuts.ninka.net:/home/davem/src/BK/net-2.5
-
David S. Miller authored
into nuts.ninka.net:/home/davem/src/BK/sparc-2.5
-
James Morris authored
- Consistent naming (i.e. jhash_xxx) - Reduces the 2&1 word variants to call jhash_3words() - Replaces __inline__ with inline.
-
Harald Welte authored
-
- 02 May, 2003 3 commits
-
-
David S. Miller authored
-
Nivedita Singhvi authored
-
bk://kernel.bkbits.net/acme/net_family-2.5David S. Miller authored
into nuts.ninka.net:/home/davem/src/BK/net-2.5
-
- 03 May, 2003 20 commits
-
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core. The sk_set_owner cases are in the callers of tp->af_specific->syn_recv_sock so as to not have spurious extra sk_set_owner calls in the ipv6 code that reuses ipv4 code.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core, also remove the MOD_{INC,DEC}_USE_COUNT, as they are not needed anymore with this new net module infrastructure for struct sock and struct socket. (well, see the netdev discussion :)
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using THIS_MODULE in the struct proto_ops registered with the core.
-
Arnaldo Carvalho de Melo authored
Using sk_set_owner and having THIS_MODULE in the struct proto_ops registered with the core.
-
- 02 May, 2003 8 commits
-
-
Arnaldo Carvalho de Melo authored
As per discussions in netdev we'll probably be moving to a brand new scheme, but this set of changesets have been discussed and are an improvement to the current situation and were already done prior to this thread happening.
-
David S. Miller authored
-
David S. Miller authored
-
David S. Miller authored
Several hash table implementations in the networking were remotely exploitable. Remote attackers could launch attacks whereby, using carefully choosen forged source addresses, make every routing cache entry get hashed into the same hash chain. Netfilter's IP conntrack module and the TCP syn-queue implementation had identical vulnerabilities and have been fixed too. The choosen solution to the problem involved using Bob's Jenkins hash along with a randomly choosen input. For the ipv4 routing cache we take things one step further and periodically choose a new random secret. By default this happens every 10 minutes, but this is configurable by the user via sysctl knobs.
-
bk://kernel.bkbits.net/acme/dev-2.5David S. Miller authored
into nuts.ninka.net:/home/davem/src/BK/net-2.5
-
Arnaldo Carvalho de Melo authored
With this one and 100 dummy interfaces everything now is working flawlessly, case closed :-)
-
Arnaldo Carvalho de Melo authored
This cures the problem reported in lkml when there are lots of net devices, tested with 50 dummy interfaces, there is still one glitch when there are more info produced than one page, where one entry is missed, I'm working on this one now. Ah, dev_seq_show needs only seq_puts, not the more expensive seq_printf.
-
Arnaldo Carvalho de Melo authored
Thanks to Randy Dunlap for spotting this one, now to study report about /proc/net/dev breakage with many interfaces.
-