First  |  Prev |  Next  |  Last
Pages: 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346
Get interface MAC address in sys_accept4() syscall
Hi all, in net/socket.c is syscall sys_accept4(). In it syscall I need to get MAC address of interface, from connection is come. For example it is two interfaces eth0 and eth1. I want to know, from what interface connection is come to sys_accept4(). Please help me, how I can do it. Thank's for attention for... 30 Jul 2010 12:59
ext4 performance regression 2.6.27-stable versus 2.6.32 and later
On Wed, Jul 28, 2010 at 09:51:48PM +0200, Kay Diederichs wrote: Dear all, we reproducibly find significantly worse ext4 performance when our fileservers run 2.6.32 or later kernels, when compared to the 2.6.27-stable series. The hardware is RAID5 of 5 1TB WD10EACS disks (giving almost 4TB) in an ... 2 Aug 2010 12:33
Remaining work for userns (WAS Re: [PATCH 3/3] cgroup : remove the ns_cgroup)
On Thu, Jul 29, 2010 at 05:39:57PM -0500, Serge E. Hallyn wrote: Quoting Matt Helsley (matthltc(a)us.ibm.com): On Thu, Jul 29, 2010 at 02:58:12PM -0500, Serge E. Hallyn wrote: <snip> BTW in the past the only reason I saw for keeping ns cgroup was to lock tasks into a devices cgroup. Until that laz... 29 Jul 2010 19:36
2.6.29.6: nfsd: non-standard errno: -9
On Tue, Dec 22, 2009 at 12:50:24PM +0100, Harald Dunkel wrote: Hi folks, I get billions of error messages in kern.log syaing : : Dec 22 10:44:55 nasl002a kernel: [ 3676.852579] nfsd: non-standard errno: -9 Dec 22 10:44:55 nasl002a kernel: [ 3676.906972] nfsd: non-standard errno: -9 Dec 22 1... 29 Jul 2010 19:36
Provide a zero-copy method on KVM virtio-net.
Hello Xiaohui, On Thu, 2010-07-29 at 19:14 +0800, xiaohui.xin(a)intel.com wrote: The idea is simple, just to pin the guest VM user space and then let host NIC driver has the chance to directly DMA to it. The patches are based on vhost-net backend driver. We add a device which provides proto_ops as sendmsg... 11 Aug 2010 03:51
[PATCH 05/13] AppArmor: dfa match engine
A basic dfa matching engine based off the dfa engine in the Dragon Book. It uses simple row comb compression with a check field. This allows AppArmor to do pattern matching in linear time, and also avoids stack issues that an nfa based engine may have. The dfa engine uses a byte based comparison, with all value... 29 Jul 2010 18:30
[PATCH 12/13] AppArmor: Enable configuring and building of the AppArmor security module
Kconfig and Makefiles to enable configuration and building of AppArmor. Signed-off-by: John Johansen <john.johansen(a)canonical.com> --- security/Kconfig | 6 ++++++ security/Makefile | 2 ++ security/apparmor/.gitignore | 5 +++++ security/apparmor/Kconfig | 31 +++++++++++++... 29 Jul 2010 18:30
[PATCH 10/13] AppArmor: functions for domain transitions
AppArmor routines for controling domain transitions, which can occur at exec or through self directed change_profile/change_hat calls. Unconfined tasks are checked at exec against the profiles in the confining profile namespace to determine if a profile should be attached to the task. Confined tasks execs are c... 29 Jul 2010 18:30
[PATCH 07/13] AppArmor: userspace interfaces
The /proc/<pid>/attr/* interface is used for process introspection and commands. While the apparmorfs interface is used for global introspection and loading and removing policy. The interface currently only contains the files necessary for loading policy, and will be extended in the future to include sysfs style... 29 Jul 2010 18:30
[PATCH 03/13] AppArmor: contexts used in attaching policy to system objects
AppArmor contexts attach profiles and state to tasks, files, etc. when a direct profile reference is not sufficient. Signed-off-by: John Johansen <john.johansen(a)canonical.com> --- security/apparmor/context.c | 216 +++++++++++++++++++++++++++++++++++ security/apparmor/include/context.h | 154 +++++++++... 29 Jul 2010 18:29
First  |  Prev |  Next  |  Last
Pages: 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346