summaryrefslogtreecommitdiffstats
path: root/net/unix
AgeCommit message (Expand)AuthorFilesLines
2008-03-26[NET] NETNS: Omit namespace comparision without CONFIG_NET_NS.YOSHIFUJI Hideaki1-2/+2
2008-03-26[NET] NETNS: Omit seq_net_private->net without CONFIG_NET_NS.YOSHIFUJI Hideaki1-5/+5
2008-03-26[NET] NETNS: Omit sock->sk_net without CONFIG_NET_NS.YOSHIFUJI Hideaki1-10/+10
2008-03-05net: replace remaining __FUNCTION__ occurrencesHarvey Harrison1-1/+1
2008-02-14Introduce path_put()Jan Blunck1-3/+3
2008-02-14Embed a struct path into struct nameidata instead of nd->{dentry,mnt}Jan Blunck1-10/+10
2008-01-28[NET]: Add some acquires/releases sparse annotations.Eric Dumazet1-0/+2
2008-01-28[NETNS]: struct net content re-work (v3)Denis V. Lunev2-8/+8
2008-01-28[UNIX]: Make the unix sysctl tables per-namespacePavel Emelyanov2-8/+28
2008-01-28[UNIX]: Use ctl paths to register unix ctl tablesPavel Emelyanov1-19/+5
2008-01-28[UNIX]: Move the sysctl_unix_max_dgram_qlenPavel Emelyanov2-4/+4
2008-01-28[UNIX]: Extend unix_sysctl_(un)register prototypesPavel Emelyanov2-4/+5
2008-01-28[NET]: Name magic constants in sock_wake_async()Pavel Emelyanov1-4/+4
2008-01-28[UNIX] Move the unix sock iterators in to proper placePavel Emelyanov1-26/+23
2008-01-28[NET]: Consolidate net namespace related proc files creation.Denis V. Lunev1-25/+6
2008-01-28[NET]: Make AF_UNIX per network namespace safe [v2]Denis V. Lunev1-26/+92
2007-11-29[UNIX]: EOF on non-blocking SOCK_SEQPACKETFlorian Zumbiehl1-1/+8
2007-11-10[UNIX]: The unix_nr_socks limit can be exceededPavel Emelyanov1-3/+4
2007-11-10[AF_UNIX]: Convert socks to unix_socks in scan_inflight, not in callbacksPavel Emelyanov1-11/+9
2007-11-10[AF_UNIX]: Make unix_tot_inflight counter non-atomicPavel Emelyanov2-4/+4
2007-11-01[NET]: Forget the zero_it argument of sk_alloc()Pavel Emelyanov1-1/+1
2007-10-19pid namespaces: changes to show virtual ids to userPavel Emelyanov1-3/+3
2007-10-15sched: affine sync wakeupsIngo Molnar1-2/+2
2007-10-10[NET]: Make core networking code use seq_open_privatePavel Emelyanov1-19/+1
2007-10-10[NET]: Make socket creation namespace safe.Eric W. Biederman1-5/+8
2007-10-10[NET]: Make /proc/net per network namespaceEric W. Biederman1-2/+3
2007-07-31[AF_UNIX]: Make code static.Adrian Bunk1-2/+28
2007-07-11[AF_UNIX]: Rewrite garbage collector, fixes race.Miklos Szeredi2-143/+188
2007-07-10[NET]: Make all initialized struct seq_operations const.Philippe De Muyter1-1/+1
2007-06-07[AF_UNIX]: Fix stream recvmsg() race.Miklos Szeredi1-3/+10
2007-06-03[AF_UNIX]: Fix datagram connect race causing an OOPS.David S. Miller1-5/+38
2007-06-03[AF_UNIX]: Make socket locking much less confusing.David S. Miller1-47/+47
2007-05-08header cleaning: don't include smp_lock.h when not usedRandy Dunlap1-1/+0
2007-04-25[SK_BUFF]: Introduce skb_reset_transport_header(skb)Arnaldo Carvalho de Melo1-1/+1
2007-03-06[NET]: Revert incorrect accept queue backlog changes.David S. Miller1-3/+3
2007-03-02[AF_UNIX]: Test against sk_max_ack_backlog properly.David S. Miller1-3/+3
2007-02-14[PATCH] sysctl: remove insert_at_head from register_sysctlEric W. Biederman1-1/+1
2007-02-14[PATCH] remove many unneeded #includes of sched.hTim Schmielau1-1/+0
2007-02-12[PATCH] mark struct file_operations const 8Arjan van de Ven1-1/+1
2007-02-10[NET] UNIX: Fix whitespace errors.YOSHIFUJI Hideaki2-30/+30
2006-12-08[PATCH] struct path: convert unixJosef Sipek1-1/+1
2006-12-02[NET]: Annotate csum_partial() callers in net/*Al Viro1-1/+2
2006-09-22[AF_UNIX]: Change max_dgram_qlen sysctl to __read_mostlyBrian Haley1-1/+1
2006-09-22[NET]: Use BUILD_BUG_ON() for checking size of skb->cb.YOSHIFUJI Hideaki1-4/+1
2006-08-02[AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec patchCatherine Zhang1-12/+5
2006-07-21[NET]: Conversions from kmalloc+memset to k(z|c)alloc.Panagiotis Issaris1-2/+1
2006-07-03[AF_UNIX]: datagram getpeersec fixAndrew Morton1-1/+1
2006-07-03[PATCH] lockdep: annotate af_unix lockingIngo Molnar1-1/+11
2006-06-30Remove obsolete #include <linux/config.h>Jörn Engel1-1/+0
2006-06-29[AF_UNIX]: Datagram getpeersecCatherine Zhang1-0/+27