13 Feb, 2014

6 commits

  • IPX doesn't implement shutdown, which poses a problem to some users:

    https://bugzilla.kernel.org/show_bug.cgi?id=67841

    This patch is heavily based on the shutdown implementation for unix
    sockets.

    Reported-by: Bruno Jesus
    Signed-off-by: Sabrina Dubroca
    Signed-off-by: David S. Miller

    Sabrina Dubroca
     
  • We could allocate tc_action on stack in tca_action_flush(),
    since it is not large.

    Also, we could use create_a() in tcf_action_get_1().

    Cc: Jamal Hadi Salim
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Signed-off-by: Jamal Hadi Salim
    Signed-off-by: David S. Miller

    WANG Cong
     
  • When an action is bonnd to a filter, there is no point to
    remove it outside. Currently we just silently decrease the refcnt,
    we should reject this explicitly with EPERM.

    Cc: Jamal Hadi Salim
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Signed-off-by: Jamal Hadi Salim
    Signed-off-by: David S. Miller

    WANG Cong
     
  • Cc: Jamal Hadi Salim
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Signed-off-by: Jamal Hadi Salim
    Signed-off-by: David S. Miller

    WANG Cong
     
  • For bindcnt and refcnt etc., they are common for all actions,
    not need to repeat such operations for their own, they can be unified
    now. Actions just need to do its specific cleanup if needed.

    Cc: Jamal Hadi Salim
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Signed-off-by: Jamal Hadi Salim
    Signed-off-by: David S. Miller

    WANG Cong
     
  • Now we can totally hide it from modules. tcf_hash_*() API's
    will operate on struct tc_action, modules don't need to care about
    the details.

    Cc: Jamal Hadi Salim
    Cc: David S. Miller
    Signed-off-by: Cong Wang
    Signed-off-by: Jamal Hadi Salim
    Signed-off-by: David S. Miller

    WANG Cong
     

12 Feb, 2014

1 commit

  • Pull networking updates from David Miller:

    1) Fix flexcan build on big endian, from Arnd Bergmann

    2) Correctly attach cpsw to GPIO bitbang MDIO drive, from Stefan Roese

    3) udp_add_offload has to use GFP_ATOMIC since it can be invoked from
    non-sleepable contexts. From Or Gerlitz

    4) vxlan_gro_receive() does not iterate over all possible flows
    properly, fix also from Or Gerlitz

    5) CAN core doesn't use a proper SKB destructor when it hooks up
    sockets to SKBs. Fix from Oliver Hartkopp

    6) ip_tunnel_xmit() can use an uninitialized route pointer, fix from
    Eric Dumazet

    7) Fix address family assignment in IPVS, from Michal Kubecek

    8) Fix ath9k build on ARM, from Sujith Manoharan

    9) Make sure fail_over_mac only applies for the correct bonding modes,
    from Ding Tianhong

    10) The udp offload code doesn't use RCU correctly, from Shlomo Pongratz

    11) Handle gigabit features properly in generic PHY code, from Florian
    Fainelli

    12) Don't blindly invoke link operations in
    rtnl_link_get_slave_info_data_size, they are optional. Fix from
    Fernando Luis Vazquez Cao

    13) Add USB IDs for Netgear Aircard 340U, from Bjørn Mork

    14) Handle netlink packet padding properly in openvswitch, from Thomas
    Graf

    15) Fix oops when deleting chains in nf_tables, from Patrick McHardy

    16) Fix RX stalls in xen-netback driver, from Zoltan Kiss

    17) Fix deadlock in mac80211 stack, from Emmanuel Grumbach

    18) inet_nlmsg_size() forgets to consider ifa_cacheinfo, fix from Geert
    Uytterhoeven

    19) tg3_change_mtu() can deadlock, fix from Nithin Sujir

    20) Fix regression in setting SCTP local source addresses on accepted
    sockets, caused by some generic ipv6 socket changes. Fix from
    Matija Glavinic Pecotic

    21) IPPROTO_* must be pure defines, otherwise module aliases don't get
    constructed properly. Fix from Jan Moskyto

    22) IPV6 netconsole setup doesn't work properly unless an explicit
    source address is specified, fix from Sabrina Dubroca

    23) Use __GFP_NORETRY for high order skb page allocations in
    sock_alloc_send_pskb and skb_page_frag_refill. From Eric Dumazet

    24) Fix a regression added in netconsole over bridging, from Cong Wang

    25) TCP uses an artificial offset of 1ms for SRTT, but this doesn't jive
    well with TCP pacing which needs the SRTT to be accurate. Fix from
    Eric Dumazet

    26) Several cases of missing header file includes from Rashika Kheria

    27) Add ZTE MF667 device ID to qmi_wwan driver, from Raymond Wanyoike

    28) TCP Small Queues doesn't handle nonagle properly in some corner
    cases, fix from Eric Dumazet

    29) Remove extraneous read_unlock in bond_enslave, whoops. From Ding
    Tianhong

    30) Fix 9p trans_virtio handling of vmalloc buffers, from Richard Yao

    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (136 commits)
    6lowpan: fix lockdep splats
    alx: add missing stats_lock spinlock init
    9p/trans_virtio.c: Fix broken zero-copy on vmalloc() buffers
    bonding: remove unwanted bond lock for enslave processing
    USB2NET : SR9800 : One chip USB2.0 USB2NET SR9800 Device Driver Support
    tcp: tsq: fix nonagle handling
    bridge: Prevent possible race condition in br_fdb_change_mac_address
    bridge: Properly check if local fdb entry can be deleted when deleting vlan
    bridge: Properly check if local fdb entry can be deleted in br_fdb_delete_by_port
    bridge: Properly check if local fdb entry can be deleted in br_fdb_change_mac_address
    bridge: Fix the way to check if a local fdb entry can be deleted
    bridge: Change local fdb entries whenever mac address of bridge device changes
    bridge: Fix the way to find old local fdb entries in br_fdb_change_mac_address
    bridge: Fix the way to insert new local fdb entries in br_fdb_changeaddr
    bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
    tcp: correct code comment stating 3 min timeout for FIN_WAIT2, we only do 1 min
    net: vxge: Remove unused device pointer
    net: qmi_wwan: add ZTE MF667
    3c59x: Remove unused pointer in vortex_eisa_cleanup()
    net: fix 'ip rule' iif/oif device rename
    ...

    Linus Torvalds
     

11 Feb, 2014

12 commits

  • When a device ndo_start_xmit() calls again dev_queue_xmit(),
    lockdep can complain because dev_queue_xmit() is re-entered and the
    spinlocks protecting tx queues share a common lockdep class.

    Same issue was fixed for bonding/l2tp/ppp in commits

    0daa2303028a6 ("[PATCH] bonding: lockdep annotation")
    49ee49202b4ac ("bonding: set qdisc_tx_busylock to avoid LOCKDEP splat")
    23d3b8bfb8eb2 ("net: qdisc busylock needs lockdep annotations ")
    303c07db487be ("ppp: set qdisc_tx_busylock to avoid LOCKDEP splat ")

    Reported-by: Alexander Aring
    Signed-off-by: Eric Dumazet
    Tested-by: Alexander Aring
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • The 9p-virtio transport does zero copy on things larger than 1024 bytes
    in size. It accomplishes this by returning the physical addresses of
    pages to the virtio-pci device. At present, the translation is usually a
    bit shift.

    That approach produces an invalid page address when we read/write to
    vmalloc buffers, such as those used for Linux kernel modules. Any
    attempt to load a Linux kernel module from 9p-virtio produces the
    following stack.

    [] p9_virtio_zc_request+0x45e/0x510
    [] p9_client_zc_rpc.constprop.16+0xfd/0x4f0
    [] p9_client_read+0x15d/0x240
    [] v9fs_fid_readn+0x50/0xa0
    [] v9fs_file_readn+0x10/0x20
    [] v9fs_file_read+0x37/0x70
    [] vfs_read+0x9b/0x160
    [] kernel_read+0x41/0x60
    [] copy_module_from_fd.isra.34+0xfb/0x180

    Subsequently, QEMU will die printing:

    qemu-system-x86_64: virtio: trying to map MMIO memory

    This patch enables 9p-virtio to correctly handle this case. This not
    only enables us to load Linux kernel modules off virtfs, but also
    enables ZFS file-based vdevs on virtfs to be used without killing QEMU.

    Special thanks to both Avi Kivity and Alexander Graf for their
    interpretation of QEMU backtraces. Without their guidence, tracking down
    this bug would have taken much longer. Also, special thanks to Linus
    Torvalds for his insightful explanation of why this should use
    is_vmalloc_addr() instead of is_vmalloc_or_module_addr():

    https://lkml.org/lkml/2014/2/8/272

    Signed-off-by: Richard Yao
    Signed-off-by: David S. Miller

    Richard Yao
     
  • Commit 46d3ceabd8d9 ("tcp: TCP Small Queues") introduced a possible
    regression for applications using TCP_NODELAY.

    If TCP session is throttled because of tsq, we should consult
    tp->nonagle when TX completion is done and allow us to send additional
    segment, especially if this segment is not a full MSS.
    Otherwise this segment is sent after an RTO.

    [edumazet] : Cooked the changelog, added another fix about testing
    sk_wmem_alloc twice because TX completion can happen right before
    setting TSQ_THROTTLED bit.

    This problem is particularly visible with recent auto corking,
    but might also be triggered with low tcp_limit_output_bytes
    values or NIC drivers delaying TX completion by hundred of usec,
    and very low rtt.

    Thomas Glanzmann for example reported an iscsi regression, caused
    by tcp auto corking making this bug quite visible.

    Fixes: 46d3ceabd8d9 ("tcp: TCP Small Queues")
    Signed-off-by: John Ogness
    Signed-off-by: Eric Dumazet
    Reported-by: Thomas Glanzmann
    Signed-off-by: David S. Miller

    John Ogness
     
  • br_fdb_change_mac_address() calls fdb_insert()/fdb_delete() without
    br->hash_lock.

    These hash list updates are racy with br_fdb_update()/br_fdb_cleanup().

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • Vlan codes unconditionally delete local fdb entries.
    We should consider the possibility that other ports have the same
    address and vlan.

    Example of problematic case:
    ip link set eth0 address 12:34:56:78:90:ab
    ip link set eth1 address aa:bb:cc:dd:ee:ff
    brctl addif br0 eth0
    brctl addif br0 eth1 # br0 will have mac address 12:34:56:78:90:ab
    bridge vlan add dev eth0 vid 10
    bridge vlan add dev eth1 vid 10
    bridge vlan add dev br0 vid 10 self
    We will have fdb entry such that f->dst == eth0, f->vlan_id == 10 and
    f->addr == 12:34:56:78:90:ab at this time.
    Next, delete eth0 vlan 10.
    bridge vlan del dev eth0 vid 10
    In this case, we still need the entry for br0, but it will be deleted.

    Note that br0 needs the entry even though its mac address is not set
    manually. To delete the entry with proper condition checking,
    fdb_delete_local() is suitable to use.

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • br_fdb_delete_by_port() doesn't care about vlan and mac address of the
    bridge device.

    As the check is almost the same as mac address changing, slightly modify
    fdb_delete_local() and use it.

    Note that we can always set added_by_user to 0 in fdb_delete_local() because
    - br_fdb_delete_by_port() calls fdb_delete_local() for local entries
    regardless of its added_by_user. In this case, we have to check if another
    port has the same address and vlan, and if found, we have to create the
    entry (by changing dst). This is kernel-added entry, not user-added.
    - br_fdb_changeaddr() doesn't call fdb_delete_local() for user-added entry.

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • br_fdb_change_mac_address() doesn't check if the local entry has the
    same address as any of bridge ports.
    Although I'm not sure when it is beneficial, current implementation allow
    the bridge device to receive any mac address of its ports.
    To preserve this behavior, we have to check if the mac address of the
    entry being deleted is identical to that of any port.

    As this check is almost the same as that in br_fdb_changeaddr(), create
    a common function fdb_delete_local() and call it from
    br_fdb_changeadddr() and br_fdb_change_mac_address().

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • We should take into account the followings when deleting a local fdb
    entry.

    - nbp_vlan_find() can be used only when vid != 0 to check if an entry is
    deletable, because a fdb entry with vid 0 can exist at any time while
    nbp_vlan_find() always return false with vid 0.

    Example of problematic case:
    ip link set eth0 address 12:34:56:78:90:ab
    ip link set eth1 address 12:34:56:78:90:ab
    brctl addif br0 eth0
    brctl addif br0 eth1
    ip link set eth0 address aa:bb:cc:dd:ee:ff
    Then, the fdb entry 12:34:56:78:90:ab will be deleted even though the
    bridge port eth1 still has that address.

    - The port to which the bridge device is attached might needs a local entry
    if its mac address is set manually.

    Example of problematic case:
    ip link set eth0 address 12:34:56:78:90:ab
    brctl addif br0 eth0
    ip link set br0 address 12:34:56:78:90:ab
    ip link set eth0 address aa:bb:cc:dd:ee:ff
    Then, the fdb still must have the entry 12:34:56:78:90:ab, but it will be
    deleted.

    We can use br->dev->addr_assign_type to check if the address is manually
    set or not, but I propose another approach.

    Since we delete and insert local entries whenever changing mac address
    of the bridge device, we can change dst of the entry to NULL regardless of
    addr_assign_type when deleting an entry associated with a certain port,
    and if it is found to be unnecessary later, then delete it.
    That is, if changing mac address of a port, the entry might be changed
    to its dst being NULL first, but is eventually deleted when recalculating
    and changing bridge id.

    This approach is especially useful when we want to share the code with
    deleting vlan in which the bridge device might want such an entry regardless
    of addr_assign_type, and makes things easy because we don't have to consider
    if mac address of the bridge device will be changed or not at the time we
    delete a local entry of a port, which means fdb code will not be bothered
    even if the bridge id calculating logic is changed in the future.

    Also, this change reduces inconsistent state, where frames whose dst is the
    mac address of the bridge, can't reach the bridge because of premature fdb
    entry deletion. This change reduces the possibility that the bridge device
    replies unreachable mac address to arp requests, which could occur during
    the short window between calling del_nbp() and br_stp_recalculate_bridge_id()
    in br_del_if(). This will effective after br_fdb_delete_by_port() starts to
    use the same code by following patch.

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • Vlan code may need fdb change when changing mac address of bridge device
    even if it is caused by the mac address changing of a bridge port.

    Example configuration:
    ip link set eth0 address 12:34:56:78:90:ab
    ip link set eth1 address aa:bb:cc:dd:ee:ff
    brctl addif br0 eth0
    brctl addif br0 eth1 # br0 will have mac address 12:34:56:78:90:ab
    bridge vlan add dev br0 vid 10 self
    bridge vlan add dev eth0 vid 10
    We will have fdb entry such that f->dst == NULL, f->vlan_id == 10 and
    f->addr == 12:34:56:78:90:ab at this time.
    Next, change the mac address of eth0 to greater value.
    ip link set eth0 address ee:ff:12:34:56:78
    Then, mac address of br0 will be recalculated and set to aa:bb:cc:dd:ee:ff.
    However, an entry aa:bb:cc:dd:ee:ff will not be created and we will be not
    able to communicate using br0 on vlan 10.

    Address this issue by deleting and adding local entries whenever
    changing the mac address of the bridge device.

    If there already exists an entry that has the same address, for example,
    in case that br_fdb_changeaddr() has already inserted it,
    br_fdb_change_mac_address() will simply fail to insert it and no
    duplicated entry will be made, as it was.

    This approach also needs br_add_if() to call br_fdb_insert() before
    br_stp_recalculate_bridge_id() so that we don't create an entry whose
    dst == NULL in this function to preserve previous behavior.

    Note that this is a slight change in behavior where the bridge device can
    receive the traffic to the new address before calling
    br_stp_recalculate_bridge_id() in br_add_if().
    However, it is not a problem because we have already the address on the
    new port and such a way to insert new one before recalculating bridge id
    is taken in br_device_event() as well.

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • We have been always failed to delete the old entry at
    br_fdb_change_mac_address() because br_set_mac_address() updates
    dev->dev_addr before calling br_fdb_change_mac_address() and
    br_fdb_change_mac_address() uses dev->dev_addr to find the old entry.

    That update of dev_addr is completely unnecessary because the same work
    is done in br_stp_change_bridge_id() which is called right away after
    calling br_fdb_change_mac_address().

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • Since commit bc9a25d21ef8 ("bridge: Add vlan support for local fdb entries"),
    br_fdb_changeaddr() has inserted a new local fdb entry only if it can
    find old one. But if we have two ports where they have the same address
    or user has deleted a local entry, there will be no entry for one of the
    ports.

    Example of problematic case:
    ip link set eth0 address aa:bb:cc:dd:ee:ff
    ip link set eth1 address aa:bb:cc:dd:ee:ff
    brctl addif br0 eth0
    brctl addif br0 eth1 # eth1 will not have a local entry due to dup.
    ip link set eth1 address 12:34:56:78:90:ab
    Then, the new entry for the address 12:34:56:78:90:ab will not be
    created, and the bridge device will not be able to communicate.

    Insert new entries regardless of whether we can find old entries or not.

    Signed-off-by: Toshiaki Makita
    Acked-by: Vlad Yasevich
    Signed-off-by: David S. Miller

    Toshiaki Makita
     
  • br_fdb_changeaddr() assumes that there is at most one local entry per port
    per vlan. It used to be true, but since commit 36fd2b63e3b4 ("bridge: allow
    creating/deleting fdb entries via netlink"), it has not been so.
    Therefore, the function might fail to search a correct previous address
    to be deleted and delete an arbitrary local entry if user has added local
    entries manually.

    Example of problematic case:
    ip link set eth0 address ee:ff:12:34:56:78
    brctl addif br0 eth0
    bridge fdb add 12:34:56:78:90:ab dev eth0 master
    ip link set eth0 address aa:bb:cc:dd:ee:ff
    Then, the address 12:34:56:78:90:ab might be deleted instead of
    ee:ff:12:34:56:78, the original mac address of eth0.

    Address this issue by introducing a new flag, added_by_user, to struct
    net_bridge_fdb_entry.

    Note that br_fdb_delete_by_port() has to set added_by_user to 0 in cases
    like:
    ip link set eth0 address 12:34:56:78:90:ab
    ip link set eth1 address aa:bb:cc:dd:ee:ff
    brctl addif br0 eth0
    bridge fdb add aa:bb:cc:dd:ee:ff dev eth0 master
    brctl addif br0 eth1
    brctl delif br0 eth0
    In this case, kernel should delete the user-added entry aa:bb:cc:dd:ee:ff,
    but it also should have been added by "brctl addif br0 eth1" originally,
    so we don't delete it and treat it a new kernel-created entry.

    Signed-off-by: Toshiaki Makita
    Signed-off-by: David S. Miller

    Toshiaki Makita
     

10 Feb, 2014

18 commits

  • As far as I can tell we have used a default of 60 seconds for
    FIN_WAIT2 timeout for ages (since 2.x times??).

    In any case, the timeout these days is 60 seconds, so the 3 min
    comment is wrong (and cost me a few minutes of my life when I was
    debugging a FIN_WAIT2 related problem in a userspace application and
    checked the kernel source for details).

    Signed-off-by: Jesper Juhl
    Signed-off-by: David S. Miller

    Jesper Juhl
     
  • ip rules with iif/oif references do not update:
    (detach/attach) across interface renames.

    Signed-off-by: Maciej Żenczykowski
    CC: Willem de Bruijn
    CC: Eric Dumazet
    CC: Chris Davis
    CC: Carlo Contavalli

    Google-Bug-Id: 12936021
    Acked-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Maciej Żenczykowski
     
  • Commit 8df8c56a (6lowpan: Moving generic compression code into 6lowpan_iphc.c)
    left pointer 'hdr' unused - remove it.

    Detected by Coverity: CID 1164868.

    Signed-off-by: Christian Engelmayer
    Signed-off-by: David S. Miller

    Christian Engelmayer
     
  • The patch 446fab59333dea91e54688f033dd8d788d0486fb ("ipv6: enable anycast addresses
    as source addresses in ICMPv6 error messages") causes an Oops when pinging a not
    set up IPv6 peer on a sit tunnel.

    The problem is that ipv6_anycast_destination() uses unconditionally skb_dst(skb),
    which is NULL in this case.

    The solution is to use instead the ipv6_chk_acast_addr_src() function.

    Here are the steps to reproduce it:
    modprobe sit
    ip link add sit1 type sit remote 10.16.0.121 local 10.16.0.249
    ip l s sit1 up
    ip -6 a a dev sit1 2001:1234::123 remote 2001:1234::121
    ping6 2001:1234::121

    Reported-by: Nicolas Dichtel
    Tested-by: Nicolas Dichtel
    Signed-off-by: Francois-Xavier Le Bail
    Signed-off-by: David S. Miller

    FX Le Bail
     
  • Mark functions as static in net/sunrpc/svc_xprt.c because they are not
    used outside this file.

    This eliminates the following warning in net/sunrpc/svc_xprt.c:
    net/sunrpc/svc_xprt.c:574:5: warning: no previous prototype for ‘svc_alloc_arg’ [-Wmissing-prototypes]
    net/sunrpc/svc_xprt.c:615:18: warning: no previous prototype for ‘svc_get_next_xprt’ [-Wmissing-prototypes]
    net/sunrpc/svc_xprt.c:694:6: warning: no previous prototype for ‘svc_add_new_temp_xprt’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Include appropriate header file net/netfilter/nf_tables_core.h in
    net/netfilter/nft_lookup.c because it has prototype declaration of
    functions defined in net/netfilter/nft_lookup.c.

    This eliminates the following warning in net/netfilter/nft_lookup.c:
    net/netfilter/nft_lookup.c:133:12: warning: no previous prototype for ‘nft_lookup_module_init’ [-Wmissing-prototypes]
    net/netfilter/nft_lookup.c:138:6: warning: no previous prototype for ‘nft_lookup_module_exit’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype declaration of function to header file
    include/net/net_namespace.h from net/ipx/af_ipx.c because they are used
    by more than one file.

    This eliminates the following warning in net/ipx/sysctl_net_ipx.c:
    net/ipx/sysctl_net_ipx.c:33:6: warning: no previous prototype for ‘ipx_register_sysctl’ [-Wmissing-prototypes]
    net/ipx/sysctl_net_ipx.c:38:6: warning: no previous prototype for ‘ipx_unregister_sysctl’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype declarations of function to header file
    include/net/datalink.h from net/ipx/af_ipx.c because they are used by
    more than one file.

    This eliminates the following warning in net/ipx/pe2.c:
    net/ipx/pe2.c:20:24: warning: no previous prototype for ‘make_EII_client’ [-Wmissing-prototypes]
    net/ipx/pe2.c:32:6: warning: no previous prototype for ‘destroy_EII_client’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype declaration of functions to header file include/net/ipx.h
    from net/ipx/af_ipx.c because they are used by more than one file.

    This eliminates the following warning in
    net/ipx/ipx_route.c:33:19: warning: no previous prototype for ‘ipxrtr_lookup’ [-Wmissing-prototypes]
    net/ipx/ipx_route.c:52:5: warning: no previous prototype for ‘ipxrtr_add_route’ [-Wmissing-prototypes]
    net/ipx/ipx_route.c:94:6: warning: no previous prototype for ‘ipxrtr_del_routes’ [-Wmissing-prototypes]
    net/ipx/ipx_route.c:149:5: warning: no previous prototype for ‘ipxrtr_route_skb’ [-Wmissing-prototypes]
    net/ipx/ipx_route.c:171:5: warning: no previous prototype for ‘ipxrtr_route_packet’ [-Wmissing-prototypes]
    net/ipx/ipx_route.c:261:5: warning: no previous prototype for ‘ipxrtr_ioctl’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype definition of function to header file include/net/ipx.h
    from net/ipx/ipx_route.c because they are used by more than one file.

    This eliminates the following warning from net/ipx/af_ipx.c:
    net/ipx/af_ipx.c:193:23: warning: no previous prototype for ‘ipxitf_find_using_net’ [-Wmissing-prototypes]
    net/ipx/af_ipx.c:577:5: warning: no previous prototype for ‘ipxitf_send’ [-Wmissing-prototypes]
    net/ipx/af_ipx.c:1219:8: warning: no previous prototype for ‘ipx_cksum’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype declaration of functions to header file include/net/dn.h
    from net/decnet/af_decnet.c because they are used by more than one file.

    This eliminates the following warning in net/decnet/af_decnet.c:
    net/decnet/sysctl_net_decnet.c:354:6: warning: no previous prototype for ‘dn_register_sysctl’ [-Wmissing-prototypes]
    net/decnet/sysctl_net_decnet.c:359:6: warning: no previous prototype for ‘dn_unregister_sysctl’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Move prototype declaration of functions to header file include/net/dn_route.h
    from net/decnet/af_decnet.c because it is used by more than one file.

    This eliminates the following warning in net/decnet/dn_route.c:
    net/decnet/dn_route.c:629:5: warning: no previous prototype for ‘dn_route_rcv’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Mark functions as static in core/dev.c because they are not used outside
    this file.

    This eliminates the following warning in core/dev.c:
    net/core/dev.c:2806:5: warning: no previous prototype for ‘__dev_queue_xmit’ [-Wmissing-prototypes]
    net/core/dev.c:4640:5: warning: no previous prototype for ‘netdev_adjacent_sysfs_add’ [-Wmissing-prototypes]
    net/core/dev.c:4650:6: warning: no previous prototype for ‘netdev_adjacent_sysfs_del’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Reviewed-by: Veaceslav Falico
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Include appropriate header file net/caif/caif_dev.h in caif/cfsrvl.c
    because it has prototype declaration of functions defined in
    caif/cfsrvl.c.

    This eliminates the following warning in caif/cfsrvl.c:
    net/caif/cfsrvl.c:198:6: warning: no previous prototype for ‘caif_free_client’ [-Wmissing-prototypes]
    net/caif/cfsrvl.c:208:6: warning: no previous prototype for ‘caif_client_register_refcnt’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Include appropriate header file net/caif/caif_dev.h in caif/caif_dev.c
    because it has prototype declarations of function defined in
    caif/caif_dev.c.

    This eliminates the following file in caif/caif_dev.c:
    net/caif/caif_dev.c:303:6: warning: no previous prototype for ‘caif_enroll_dev’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • Mark function as static in net/9p/client.c because it is not used
    outside this file.

    This eliminates the following warning in net/9p/client.c:
    net/9p/client.c:207:18: warning: no previous prototype for ‘p9_fcall_alloc’ [-Wmissing-prototypes]

    Signed-off-by: Rashika Kheria
    Reviewed-by: Josh Triplett
    Signed-off-by: David S. Miller

    Rashika Kheria
     
  • John W. Linville says:

    ====================
    Please pull this batch of fixes intended for the 3.14 stream!

    For the mac80211 bits, Johannes says:

    "This is just a collection of small fixes, the commit logs explain the
    details. The only thing that isn't strictly a fix is the 5/10 MHz
    enabling, I had forgotten this and there's little point in waiting
    longer. The patch simply removes the force-disable code that I put in
    when there was a problem with the userspace API (that has long been
    fixed.)"

    For the iwlwifi bits, Emmanuel says:

    "I have an important fix that disables A band in case the driver thought
    it was enabled, and the firmware disagreed. We ended up making the
    firmware unhappy. I also fix the station table in AP mode and fix the
    scan while we have BT working.
    Johannes removes a static variable that could potentially lead to to
    issues on multi-device setups and disables scheduled scan to avoid
    issues with old versions of wpa_supplicant.
    A small fix from David on scan and a few new device IDs for 7265."

    On top of that...

    Oleksij Rempel adds a USB ID to the ar5523 driver and changes the
    default powersave setting for ath9k_htc to "off", due to observed
    stability issues (based on an equivalent ath9k patch).

    Stanislaw Gruszka similarly disables powersave for a couple of rt2x00
    drivers. He also fixes a couple of scheduling while atomic issues
    in ath9k_htc.

    Sujith Manoharan rounds-out the powersave disables with one for ath9k.
    He also fixes a build prolem with ath9k on ARM and fixes an ath9k Tx
    power calculation.

    Finally, Andrea Merello fixes a couple of lingering DMA mapping
    problems in the rtl8180 driver.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • Pablo Neira Ayuso says:

    ====================
    Netfilter/nftables/IPVS fixes for net

    The following patchset contains Netfilter/IPVS fixes, mostly nftables
    fixes, most relevantly they are:

    * Fix a crash in the h323 conntrack NAT helper due to expectation list
    corruption, from Alexey Dobriyan.

    * A couple of RCU race fixes for conntrack, one manifests by hitting BUG_ON
    in nf_nat_setup_info() and the destroy path, patches from Andrey Vagin and
    me.

    * Dump direction attribute in nft_ct only if it is set, from Arturo
    Borrero.

    * Fix IPVS bug in its own connection tracking system that may lead to
    copying only 4 bytes of the IPv6 address when initializing the
    ip_vs_conn object, from Michal Kubecek.

    * Fix -EBUSY errors in nftables when deleting the rules, chain and tables
    in a row due mixture of asynchronous and synchronous object releasing,
    from me.

    * Three fixes for the nf_tables set infrastructure when using intervals and
    mappings, from me.

    * Four patches to fixing the nf_tables log, reject and ct expressions from
    the new inet table, from Patrick McHardy.

    * Fix memory overrun in the map that is used to dynamically allocate names
    from anonymous sets, also from Patrick.

    * Fix a potential oops if you dump a set with NFPROTO_UNSPEC and a table
    name, from Patrick McHardy.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     

08 Feb, 2014

3 commits