linux-stable-rt/net/core
Herbert Xu 4ead443163 netpoll: Add drop checks to all entry points
The netpoll entry checks are required to ensure that we don't
receive normal packets when invoked via netpoll.  Unfortunately
it only ever worked for the netif_receive_skb/netif_rx entry
points.  The VLAN (and subsequently GRO) entry point didn't
have the check and therefore can trigger all sorts of weird
problems.

This patch adds the netpoll check to all entry points.

I'm still uneasy with receiving at all under netpoll (which
apparently is only used by the out-of-tree kdump code).  The
reason is it is perfectly legal to receive all data including
headers into highmem if netpoll is off, but if you try to do
that with netpoll on and someone gets a printk in an IRQ handler                                             
you're going to get a nice BUG_ON.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-03-01 00:11:52 -08:00
..
Makefile
datagram.c
dev.c netpoll: Add drop checks to all entry points 2009-03-01 00:11:52 -08:00
dev_mcast.c
dst.c
ethtool.c
fib_rules.c
filter.c
flow.c
gen_estimator.c
gen_stats.c
iovec.c
kmap_skb.h
link_watch.c Revert "net: Fix for initial link state in 2.6.28" 2009-01-05 16:01:51 -08:00
neighbour.c neigh: some entries can be skipped during dumping 2009-02-06 00:52:04 -08:00
net-sysfs.c
net-sysfs.h
net_namespace.c netns: build fix for net_alloc_generic 2009-02-23 15:37:35 -08:00
netevent.c
netpoll.c
pktgen.c
request_sock.c
rtnetlink.c
scm.c
skb_dma_map.c
skbuff.c net: Kill skb_truesize_check(), it only catches false-positives. 2009-02-17 21:24:05 -08:00
sock.c net: amend the fix for SO_BSDCOMPAT gsopt infoleak 2009-02-23 15:38:41 -08:00
stream.c
sysctl_net_core.c
user_dma.c
utils.c