26 Sep, 2007

1 commit


20 Jul, 2007

1 commit

  • Transform some calls to kmalloc/memset to a single kzalloc (or kcalloc).

    Here is a short excerpt of the semantic patch performing
    this transformation:

    @@
    type T2;
    expression x;
    identifier f,fld;
    expression E;
    expression E1,E2;
    expression e1,e2,e3,y;
    statement S;
    @@

    x =
    - kmalloc
    + kzalloc
    (E1,E2)
    ... when != \(x->fld=E;\|y=f(...,x,...);\|f(...,x,...);\|x=E;\|while(...) S\|for(e1;e2;e3) S\)
    - memset((T2)x,0,E1);

    @@
    expression E1,E2,E3;
    @@

    - kzalloc(E1 * E2,E3)
    + kcalloc(E1,E2,E3)

    [akpm@linux-foundation.org: get kcalloc args the right way around]
    Signed-off-by: Yoann Padioleau
    Cc: Richard Henderson
    Cc: Ivan Kokshaysky
    Acked-by: Russell King
    Cc: Bryan Wu
    Acked-by: Jiri Slaby
    Cc: Dave Airlie
    Acked-by: Roland Dreier
    Cc: Jiri Kosina
    Acked-by: Dmitry Torokhov
    Cc: Benjamin Herrenschmidt
    Acked-by: Mauro Carvalho Chehab
    Acked-by: Pierre Ossman
    Cc: Jeff Garzik
    Cc: "David S. Miller"
    Acked-by: Greg KH
    Cc: James Bottomley
    Cc: "Antonino A. Daplas"
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Yoann Padioleau
     

24 Jun, 2007

1 commit


13 Jun, 2007

1 commit

  • Prevent mppe_decompress() from generating "osize too small" errors when
    checking for output buffer size. When receiving a packet of mru size the
    output buffer for decrypted data is 1 byte too small since
    mppe_decompress() tries to account for possible PFC, however later in code
    it is assumed no PFC.

    Adjusting the check prevented these errors from occurring.

    Signed-off-by: Konstantin Sharlaimov
    Signed-off-by: Andrew Morton
    Signed-off-by: David S. Miller

    Konstantin Sharlaimov
     

14 Dec, 2006

1 commit

  • Run this:

    #!/bin/sh
    for f in $(grep -Erl "\([^\)]*\) *k[cmz]alloc" *) ; do
    echo "De-casting $f..."
    perl -pi -e "s/ ?= ?\([^\)]*\) *(k[cmz]alloc) *\(/ = \1\(/" $f
    done

    And then go through and reinstate those cases where code is casting pointers
    to non-pointers.

    And then drop a few hunks which conflicted with outstanding work.

    Cc: Russell King , Ian Molton
    Cc: Mikael Starvik
    Cc: Yoshinori Sato
    Cc: Roman Zippel
    Cc: Geert Uytterhoeven
    Cc: Ralf Baechle
    Cc: Paul Mackerras
    Cc: Kyle McMartin
    Cc: Benjamin Herrenschmidt
    Cc: Martin Schwidefsky
    Cc: "David S. Miller"
    Cc: Jeff Dike
    Cc: Greg KH
    Cc: Jens Axboe
    Cc: Paul Fulghum
    Cc: Alan Cox
    Cc: Karsten Keil
    Cc: Mauro Carvalho Chehab
    Cc: Jeff Garzik
    Cc: James Bottomley
    Cc: Ian Kent
    Cc: Steven French
    Cc: David Woodhouse
    Cc: Neil Brown
    Cc: Jaroslav Kysela
    Cc: Takashi Iwai
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Robert P. J. Day
     

21 Sep, 2006

3 commits


01 Jul, 2006

1 commit


09 Nov, 2005

1 commit

  • From: Matt Domsch

    The patch below implements the Microsoft Point-to-Point Encryption method
    as a PPP compressor/decompressor. This is necessary for Linux clients and
    servers to interoperate with Microsoft Point-to-Point Tunneling Protocol
    (PPTP) servers (either Microsoft PPTP servers or the poptop project) which
    use MPPE to encrypt data when creating a VPN.

    This patch differs from the kernel_ppp_mppe DKMS pacakge at
    pptpclient.sourceforge.net by utilizing the kernel crypto routines rather
    than providing its own SHA1 and arcfour implementations.

    Minor changes to ppp_generic.c try to prevent a link from disabling
    compression (in our case, the encryption) after it has started using
    compression (encryption).

    Feedback to please.

    Signed-off-by: Matt Domsch
    Cc: James Cameron
    Cc: "David S. Miller"
    Signed-off-by: Brice Goglin
    Acked-by: Paul Mackerras
    Signed-off-by: Andrew Morton
    Signed-off-by: David S. Miller

    Matt Domsch