<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/include/net/sock.h, branch v2.6.19</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/include/net/sock.h?h=v2.6.19</id>
<link rel='self' href='https://git.amat.us/linux/atom/include/net/sock.h?h=v2.6.19'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-11-25T23:16:51Z</updated>
<entry>
<title>[NET]: Re-fix of doc-comment in sock.h</title>
<updated>2006-11-25T23:16:51Z</updated>
<author>
<name>Paul Bonser</name>
<email>misterpib@gmail.com</email>
</author>
<published>2006-11-24T01:56:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=dc9b334622bff6d22456917a034c2e2d194b9328'/>
<id>urn:sha1:dc9b334622bff6d22456917a034c2e2d194b9328</id>
<content type='text'>
Restoring old, correct comment for sk_filter_release, moving it to
where it should actually be, and changing new comment into proper
comment for sk_filter_rcu_free, where it actually makes sense.

The original fix submitted for this on Oct 23 mistakenly documented
the wrong function.

Signed-off-by: Paul Bonser &lt;misterpib@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NET]: kernel-doc fix for sock.h</title>
<updated>2006-10-23T03:38:00Z</updated>
<author>
<name>Randy Dunlap</name>
<email>rdunlap@xenotime.net</email>
</author>
<published>2006-10-23T03:38:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6a43487f43fbd4e03c606dcb62b98374a3af88fc'/>
<id>urn:sha1:6a43487f43fbd4e03c606dcb62b98374a3af88fc</id>
<content type='text'>
Fix kernel-doc warning in include/net/sock.h:
Warning(/var/linsrc/linux-2619-rc1-pv//include/net/sock.h:894): No description found for parameter 'rcu'

Signed-off-by: Randy Dunlap &lt;rdunlap@xenotime.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] Vectorize aio_read/aio_write fileop methods</title>
<updated>2006-10-01T07:39:28Z</updated>
<author>
<name>Badari Pulavarty</name>
<email>pbadari@us.ibm.com</email>
</author>
<published>2006-10-01T06:28:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=027445c37282bc1ed26add45e573ad2d3e4860a5'/>
<id>urn:sha1:027445c37282bc1ed26add45e573ad2d3e4860a5</id>
<content type='text'>
This patch vectorizes aio_read() and aio_write() methods to prepare for
collapsing all aio &amp; vectored operations into one interface - which is
aio_read()/aio_write().

Signed-off-by: Badari Pulavarty &lt;pbadari@us.ibm.com&gt;
Signed-off-by: Christoph Hellwig &lt;hch@lst.de&gt;
Cc: Michael Holzheu &lt;HOLZHEU@de.ibm.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[NET]: Fix sk-&gt;sk_filter field access</title>
<updated>2006-09-22T22:18:47Z</updated>
<author>
<name>Dmitry Mishin</name>
<email>dim@openvz.org</email>
</author>
<published>2006-08-31T22:28:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fda9ef5d679b07c9d9097aaf6ef7f069d794a8f9'/>
<id>urn:sha1:fda9ef5d679b07c9d9097aaf6ef7f069d794a8f9</id>
<content type='text'>
Function sk_filter() is called from tcp_v{4,6}_rcv() functions with arg
needlock = 0, while socket is not locked at that moment. In order to avoid
this and similar issues in the future, use rcu for sk-&gt;sk_filter field read
protection.

Signed-off-by: Dmitry Mishin &lt;dim@openvz.org&gt;
Signed-off-by: Alexey Kuznetsov &lt;kuznet@ms2.inr.ac.ru&gt;
Signed-off-by: Kirill Korotaev &lt;dev@openvz.org&gt;
</content>
</entry>
<entry>
<title>[MLSXFRM]: Auto-labeling of child sockets</title>
<updated>2006-09-22T21:53:29Z</updated>
<author>
<name>Venkat Yekkirala</name>
<email>vyekkirala@TrustedCS.com</email>
</author>
<published>2006-07-25T06:32:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4237c75c0a35535d7f9f2bfeeb4b4df1e068a0bf'/>
<id>urn:sha1:4237c75c0a35535d7f9f2bfeeb4b4df1e068a0bf</id>
<content type='text'>
This automatically labels the TCP, Unix stream, and dccp child sockets
as well as openreqs to be at the same MLS level as the peer. This will
result in the selection of appropriately labeled IPSec Security
Associations.

This also uses the sock's sid (as opposed to the isec sid) in SELinux
enforcement of secmark in rcv_skb and postroute_last hooks.

Signed-off-by: Venkat Yekkirala &lt;vyekkirala@TrustedCS.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[MLSXFRM]: Add security sid to sock</title>
<updated>2006-09-22T21:53:22Z</updated>
<author>
<name>Venkat Yekkirala</name>
<email>vyekkirala@TrustedCS.com</email>
</author>
<published>2006-08-05T06:08:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=892c141e62982272b9c738b5520ad0e5e1ad7b42'/>
<id>urn:sha1:892c141e62982272b9c738b5520ad0e5e1ad7b42</id>
<content type='text'>
This adds security for IP sockets at the sock level. Security at the
sock level is needed to enforce the SELinux security policy for
security associations even when a sock is orphaned (such as in the TCP
LAST_ACK state).

This will also be used to enforce SELinux controls over data arriving
at or leaving a child socket while it's still waiting to be accepted.

Signed-off-by: Venkat Yekkirala &lt;vyekkirala@TrustedCS.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] lockdep: annotate sk_locks</title>
<updated>2006-07-03T22:27:10Z</updated>
<author>
<name>Ingo Molnar</name>
<email>mingo@elte.hu</email>
</author>
<published>2006-07-03T07:25:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a5b5bb9a053a973c23b867738c074acb3e80c0a0'/>
<id>urn:sha1:a5b5bb9a053a973c23b867738c074acb3e80c0a0</id>
<content type='text'>
Teach sk_lock semantics to the lock validator.  In the softirq path the
slock has mutex_trylock()+mutex_unlock() semantics, in the process context
sock_lock() case it has mutex_lock()/mutex_unlock() semantics.

Thus we treat sock_owned_by_user() flagged areas as an exclusion area too,
not just those areas covered by a held sk_lock.slock.

Effect on non-lockdep kernels: minimal, sk_lock_sock_init() has been turned
into an inline function.

Signed-off-by: Ingo Molnar &lt;mingo@elte.hu&gt;
Cc: Arjan van de Ven &lt;arjan@linux.intel.com&gt;
Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Cc: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] lockdep: annotate bh_lock_sock()</title>
<updated>2006-07-03T22:27:08Z</updated>
<author>
<name>Ingo Molnar</name>
<email>mingo@elte.hu</email>
</author>
<published>2006-07-03T07:25:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c63661848581a9842dfc72d9a400285dd284fc47'/>
<id>urn:sha1:c63661848581a9842dfc72d9a400285dd284fc47</id>
<content type='text'>
Teach special (recursive) locking code to the lock validator.  Has no effect
on non-lockdep kernels.

Signed-off-by: Ingo Molnar &lt;mingo@elte.hu&gt;
Signed-off-by: Arjan van de Ven &lt;arjan@linux.intel.com&gt;
Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] lockdep: annotate sock_lock_init()</title>
<updated>2006-07-03T22:27:07Z</updated>
<author>
<name>Ingo Molnar</name>
<email>mingo@elte.hu</email>
</author>
<published>2006-07-03T07:25:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=da21f24dd73954c2ed0cd39a698e2c9916c05d71'/>
<id>urn:sha1:da21f24dd73954c2ed0cd39a698e2c9916c05d71</id>
<content type='text'>
Teach special (multi-initialized, per-address-family) locking code to the lock
validator.  Has no effect on non-lockdep kernels.

Signed-off-by: Ingo Molnar &lt;mingo@elte.hu&gt;
Signed-off-by: Arjan van de Ven &lt;arjan@linux.intel.com&gt;
Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[NET]: Generalise TSO-specific bits from skb_setup_caps</title>
<updated>2006-06-30T21:12:08Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-06-30T20:36:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=bcd76111178ebccedd46a9b3eaff65c78e5a70af'/>
<id>urn:sha1:bcd76111178ebccedd46a9b3eaff65c78e5a70af</id>
<content type='text'>
This patch generalises the TSO-specific bits from sk_setup_caps by adding
the sk_gso_type member to struct sock.  This makes sk_setup_caps generic
so that it can be used by TCPv6 or UFO.

The only catch is that whoever uses this must provide a GSO implementation
for their protocol which I think is a fair deal :) For now UFO continues to
live without a GSO implementation which is OK since it doesn't use the sock
caps field at the moment.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
