License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 22:07:57 +08:00
|
|
|
# SPDX-License-Identifier: GPL-2.0
|
2005-04-17 06:20:36 +08:00
|
|
|
#
|
|
|
|
# Makefile for the linux networking.
|
|
|
|
#
|
|
|
|
# 2 Sep 2000, Christoph Hellwig <hch@infradead.org>
|
|
|
|
# Rewritten to use lists instead of if-statements.
|
|
|
|
#
|
|
|
|
|
2021-01-26 07:16:55 +08:00
|
|
|
obj-y := devres.o socket.o core/
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2021-01-26 07:16:55 +08:00
|
|
|
obj-$(CONFIG_COMPAT) += compat.o
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
# LLC has to be linked before the files in net/802/
|
|
|
|
obj-$(CONFIG_LLC) += llc/
|
2021-01-26 07:16:55 +08:00
|
|
|
obj-y += ethernet/ 802/ sched/ netlink/ bpf/ ethtool/
|
2005-08-10 10:30:24 +08:00
|
|
|
obj-$(CONFIG_NETFILTER) += netfilter/
|
2005-11-15 07:25:59 +08:00
|
|
|
obj-$(CONFIG_INET) += ipv4/
|
2017-06-15 02:37:39 +08:00
|
|
|
obj-$(CONFIG_TLS) += tls/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_XFRM) += xfrm/
|
2024-01-30 03:04:35 +08:00
|
|
|
obj-$(CONFIG_UNIX) += unix/
|
2021-01-26 07:16:55 +08:00
|
|
|
obj-y += ipv6/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_PACKET) += packet/
|
|
|
|
obj-$(CONFIG_NET_KEY) += key/
|
|
|
|
obj-$(CONFIG_BRIDGE) += bridge/
|
2023-01-05 12:05:17 +08:00
|
|
|
obj-$(CONFIG_NET_DEVLINK) += devlink/
|
net: dsa: replace NETDEV_PRE_CHANGE_HWTSTAMP notifier with a stub
There was a sort of rush surrounding commit 88c0a6b503b7 ("net: create a
netdev notifier for DSA to reject PTP on DSA master"), due to a desire
to convert DSA's attempt to deny TX timestamping on a DSA master to
something that doesn't block the kernel-wide API conversion from
ndo_eth_ioctl() to ndo_hwtstamp_set().
What was required was a mechanism that did not depend on ndo_eth_ioctl(),
and what was provided was a mechanism that did not depend on
ndo_eth_ioctl(), while at the same time introducing something that
wasn't absolutely necessary - a new netdev notifier.
There have been objections from Jakub Kicinski that using notifiers in
general when they are not absolutely necessary creates complications to
the control flow and difficulties to maintainers who look at the code.
So there is a desire to not use notifiers.
In addition to that, the notifier chain gets called even if there is no
DSA in the system and no one is interested in applying any restriction.
Take the model of udp_tunnel_nic_ops and introduce a stub mechanism,
through which net/core/dev_ioctl.c can call into DSA even when
CONFIG_NET_DSA=m.
Compared to the code that existed prior to the notifier conversion, aka
what was added in commits:
- 4cfab3566710 ("net: dsa: Add wrappers for overloaded ndo_ops")
- 3369afba1e46 ("net: Call into DSA netdevice_ops wrappers")
this is different because we are not overloading any struct
net_device_ops of the DSA master anymore, but rather, we are exposing a
rather specific functionality which is orthogonal to which API is used
to enable it - ndo_eth_ioctl() or ndo_hwtstamp_set().
Also, what is similar is that both approaches use function pointers to
get from built-in code to DSA.
There is no point in replicating the function pointers towards
__dsa_master_hwtstamp_validate() once for every CPU port (dev->dsa_ptr).
Instead, it is sufficient to introduce a singleton struct dsa_stubs,
built into the kernel, which contains a single function pointer to
__dsa_master_hwtstamp_validate().
I find this approach preferable to what we had originally, because
dev->dsa_ptr->netdev_ops->ndo_do_ioctl() used to require going through
struct dsa_port (dev->dsa_ptr), and so, this was incompatible with any
attempts to add any data encapsulation and hide DSA data structures from
the outside world.
Link: https://lore.kernel.org/netdev/20230403083019.120b72fd@kernel.org/
Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
Reviewed-by: Florian Fainelli <f.fainelli@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2023-04-06 19:42:46 +08:00
|
|
|
obj-y += dsa/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_ATALK) += appletalk/
|
|
|
|
obj-$(CONFIG_X25) += x25/
|
|
|
|
obj-$(CONFIG_LAPB) += lapb/
|
|
|
|
obj-$(CONFIG_NETROM) += netrom/
|
|
|
|
obj-$(CONFIG_ROSE) += rose/
|
|
|
|
obj-$(CONFIG_AX25) += ax25/
|
2007-11-17 07:52:17 +08:00
|
|
|
obj-$(CONFIG_CAN) += can/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_BT) += bluetooth/
|
|
|
|
obj-$(CONFIG_SUNRPC) += sunrpc/
|
2007-04-27 06:48:28 +08:00
|
|
|
obj-$(CONFIG_AF_RXRPC) += rxrpc/
|
2016-03-08 06:11:06 +08:00
|
|
|
obj-$(CONFIG_AF_KCM) += kcm/
|
strparser: Stream parser for messages
This patch introduces a utility for parsing application layer protocol
messages in a TCP stream. This is a generalization of the mechanism
implemented of Kernel Connection Multiplexor.
The API includes a context structure, a set of callbacks, utility
functions, and a data ready function.
A stream parser instance is defined by a strparse structure that
is bound to a TCP socket. The function to initialize the structure
is:
int strp_init(struct strparser *strp, struct sock *csk,
struct strp_callbacks *cb);
csk is the TCP socket being bound to and cb are the parser callbacks.
The upper layer calls strp_tcp_data_ready when data is ready on the lower
socket for strparser to process. This should be called from a data_ready
callback that is set on the socket:
void strp_tcp_data_ready(struct strparser *strp);
A parser is bound to a TCP socket by setting data_ready function to
strp_tcp_data_ready so that all receive indications on the socket
go through the parser. This is assumes that sk_user_data is set to
the strparser structure.
There are four callbacks.
- parse_msg is called to parse the message (returns length or error).
- rcv_msg is called when a complete message has been received
- read_sock_done is called when data_ready function exits
- abort_parser is called to abort the parser
The input to parse_msg is an skbuff which contains next message under
construction. The backend processing of parse_msg will parse the
application layer protocol headers to determine the length of
the message in the stream. The possible return values are:
>0 : indicates length of successfully parsed message
0 : indicates more data must be received to parse the message
-ESTRPIPE : current message should not be processed by the
kernel, return control of the socket to userspace which
can proceed to read the messages itself
other < 0 : Error is parsing, give control back to userspace
assuming that synchronzation is lost and the stream
is unrecoverable (application expected to close TCP socket)
In the case of error return (< 0) strparse will stop the parser
and report and error to userspace. The application must deal
with the error. To handle the error the strparser is unbound
from the TCP socket. If the error indicates that the stream
TCP socket is at recoverable point (ESTRPIPE) then the application
can read the TCP socket to process the stream. Once the application
has dealt with the exceptions in the stream, it may again bind the
socket to a strparser to continue data operations.
Note that ENODATA may be returned to the application. In this case
parse_msg returned -ESTRPIPE, however strparser was unable to maintain
synchronization of the stream (i.e. some of the message in question
was already read by the parser).
strp_pause and strp_unpause are used to provide flow control. For
instance, if rcv_msg is called but the upper layer can't immediately
consume the message it can hold the message and pause strparser.
Signed-off-by: Tom Herbert <tom@herbertland.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-16 05:51:01 +08:00
|
|
|
obj-$(CONFIG_STREAM_PARSER) += strparser/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_ATM) += atm/
|
2010-04-02 14:18:33 +08:00
|
|
|
obj-$(CONFIG_L2TP) += l2tp/
|
2008-09-23 11:03:00 +08:00
|
|
|
obj-$(CONFIG_PHONET) += phonet/
|
2008-07-08 18:23:36 +08:00
|
|
|
ifneq ($(CONFIG_VLAN_8021Q),)
|
|
|
|
obj-y += 8021q/
|
|
|
|
endif
|
2005-08-10 11:14:34 +08:00
|
|
|
obj-$(CONFIG_IP_DCCP) += dccp/
|
2005-04-17 06:20:36 +08:00
|
|
|
obj-$(CONFIG_IP_SCTP) += sctp/
|
2009-02-24 23:30:39 +08:00
|
|
|
obj-$(CONFIG_RDS) += rds/
|
2010-06-27 08:00:25 +08:00
|
|
|
obj-$(CONFIG_WIRELESS) += wireless/
|
2007-05-06 02:45:53 +08:00
|
|
|
obj-$(CONFIG_MAC80211) += mac80211/
|
2006-01-03 02:04:38 +08:00
|
|
|
obj-$(CONFIG_TIPC) += tipc/
|
2006-08-04 07:48:37 +08:00
|
|
|
obj-$(CONFIG_NETLABEL) += netlabel/
|
2007-02-09 05:37:42 +08:00
|
|
|
obj-$(CONFIG_IUCV) += iucv/
|
2017-01-09 23:55:13 +08:00
|
|
|
obj-$(CONFIG_SMC) += smc/
|
2007-05-07 15:34:20 +08:00
|
|
|
obj-$(CONFIG_RFKILL) += rfkill/
|
2007-07-11 06:57:28 +08:00
|
|
|
obj-$(CONFIG_NET_9P) += 9p/
|
2010-03-30 21:56:28 +08:00
|
|
|
obj-$(CONFIG_CAIF) += caif/
|
2021-01-26 07:16:56 +08:00
|
|
|
obj-$(CONFIG_DCB) += dcb/
|
2014-07-11 16:24:18 +08:00
|
|
|
obj-$(CONFIG_6LOWPAN) += 6lowpan/
|
|
|
|
obj-$(CONFIG_IEEE802154) += ieee802154/
|
2012-05-16 04:50:20 +08:00
|
|
|
obj-$(CONFIG_MAC802154) += mac802154/
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
obj-$(CONFIG_SYSCTL) += sysctl_net.o
|
2010-08-04 22:16:33 +08:00
|
|
|
obj-$(CONFIG_DNS_RESOLVER) += dns_resolver/
|
2010-04-07 06:14:15 +08:00
|
|
|
obj-$(CONFIG_CEPH_LIB) += ceph/
|
2010-12-13 19:19:28 +08:00
|
|
|
obj-$(CONFIG_BATMAN_ADV) += batman-adv/
|
2011-07-02 06:31:33 +08:00
|
|
|
obj-$(CONFIG_NFC) += nfc/
|
net: Introduce psample, a new genetlink channel for packet sampling
Add a general way for kernel modules to sample packets, without being tied
to any specific subsystem. This netlink channel can be used by tc,
iptables, etc. and allow to standardize packet sampling in the kernel.
For every sampled packet, the psample module adds the following metadata
fields:
PSAMPLE_ATTR_IIFINDEX - the packets input ifindex, if applicable
PSAMPLE_ATTR_OIFINDEX - the packet output ifindex, if applicable
PSAMPLE_ATTR_ORIGSIZE - the packet's original size, in case it has been
truncated during sampling
PSAMPLE_ATTR_SAMPLE_GROUP - the packet's sample group, which is set by the
user who initiated the sampling. This field allows the user to
differentiate between several samplers working simultaneously and
filter packets relevant to him
PSAMPLE_ATTR_GROUP_SEQ - sequence counter of last sent packet. The
sequence is kept for each group
PSAMPLE_ATTR_SAMPLE_RATE - the sampling rate used for sampling the packets
PSAMPLE_ATTR_DATA - the actual packet bits
The sampled packets are sent to the PSAMPLE_NL_MCGRP_SAMPLE multicast
group. In addition, add the GET_GROUPS netlink command which allows the
user to see the current sample groups, their refcount and sequence number.
This command currently supports only netlink dump mode.
Signed-off-by: Yotam Gigi <yotamg@mellanox.com>
Signed-off-by: Jiri Pirko <jiri@mellanox.com>
Reviewed-by: Jamal Hadi Salim <jhs@mojatatu.com>
Reviewed-by: Simon Horman <simon.horman@netronome.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-01-23 18:07:08 +08:00
|
|
|
obj-$(CONFIG_PSAMPLE) += psample/
|
2017-02-01 21:30:02 +08:00
|
|
|
obj-$(CONFIG_NET_IFE) += ife/
|
2011-10-26 10:26:31 +08:00
|
|
|
obj-$(CONFIG_OPENVSWITCH) += openvswitch/
|
VSOCK: Introduce VM Sockets
VM Sockets allows communication between virtual machines and the hypervisor.
User level applications both in a virtual machine and on the host can use the
VM Sockets API, which facilitates fast and efficient communication between
guest virtual machines and their host. A socket address family, designed to be
compatible with UDP and TCP at the interface level, is provided.
Today, VM Sockets is used by various VMware Tools components inside the guest
for zero-config, network-less access to VMware host services. In addition to
this, VMware's users are using VM Sockets for various applications, where
network access of the virtual machine is restricted or non-existent. Examples
of this are VMs communicating with device proxies for proprietary hardware
running as host applications and automated testing of applications running
within virtual machines.
The VMware VM Sockets are similar to other socket types, like Berkeley UNIX
socket interface. The VM Sockets module supports both connection-oriented
stream sockets like TCP, and connectionless datagram sockets like UDP. The VM
Sockets protocol family is defined as "AF_VSOCK" and the socket operations
split for SOCK_DGRAM and SOCK_STREAM.
For additional information about the use of VM Sockets, please refer to the
VM Sockets Programming Guide available at:
https://www.vmware.com/support/developer/vmci-sdk/
Signed-off-by: George Zhang <georgezhang@vmware.com>
Signed-off-by: Dmitry Torokhov <dtor@vmware.com>
Signed-off-by: Andy king <acking@vmware.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-02-06 22:23:56 +08:00
|
|
|
obj-$(CONFIG_VSOCKETS) += vmw_vsock/
|
2015-03-04 09:10:23 +08:00
|
|
|
obj-$(CONFIG_MPLS) += mpls/
|
2017-08-29 03:43:24 +08:00
|
|
|
obj-$(CONFIG_NET_NSH) += nsh/
|
2013-10-31 04:10:47 +08:00
|
|
|
obj-$(CONFIG_HSR) += hsr/
|
2021-01-26 07:16:57 +08:00
|
|
|
obj-$(CONFIG_NET_SWITCHDEV) += switchdev/
|
2021-01-26 07:16:58 +08:00
|
|
|
obj-$(CONFIG_NET_L3_MASTER_DEV) += l3mdev/
|
2016-05-06 22:09:08 +08:00
|
|
|
obj-$(CONFIG_QRTR) += qrtr/
|
net/ncsi: Resource management
NCSI spec (DSP0222) defines several objects: package, channel, mode,
filter, version and statistics etc. This introduces the data structs
to represent those objects and implement functions to manage them.
Also, this introduces CONFIG_NET_NCSI for the newly implemented NCSI
stack.
* The user (e.g. netdev driver) dereference NCSI device by
"struct ncsi_dev", which is embedded to "struct ncsi_dev_priv".
The later one is used by NCSI stack internally.
* Every NCSI device can have multiple packages simultaneously, up
to 8 packages. It's represented by "struct ncsi_package" and
identified by 3-bits ID.
* Every NCSI package can have multiple channels, up to 32. It's
represented by "struct ncsi_channel" and identified by 5-bits ID.
* Every NCSI channel has version, statistics, various modes and
filters. They are represented by "struct ncsi_channel_version",
"struct ncsi_channel_stats", "struct ncsi_channel_mode" and
"struct ncsi_channel_filter" separately.
* Apart from AEN (Asynchronous Event Notification), the NCSI stack
works in terms of command and response. This introduces "struct
ncsi_req" to represent a complete NCSI transaction made of NCSI
request and response.
link: https://www.dmtf.org/sites/default/files/standards/documents/DSP0222_1.1.0.pdf
Signed-off-by: Gavin Shan <gwshan@linux.vnet.ibm.com>
Acked-by: Joel Stanley <joel@jms.id.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-07-19 09:54:16 +08:00
|
|
|
obj-$(CONFIG_NET_NCSI) += ncsi/
|
2018-05-02 19:01:23 +08:00
|
|
|
obj-$(CONFIG_XDP_SOCKETS) += xdp/
|
2020-01-22 08:56:15 +08:00
|
|
|
obj-$(CONFIG_MPTCP) += mptcp/
|
2021-07-29 10:20:39 +08:00
|
|
|
obj-$(CONFIG_MCTP) += mctp/
|
net/handshake: Create a NETLINK service for handling handshake requests
When a kernel consumer needs a transport layer security session, it
first needs a handshake to negotiate and establish a session. This
negotiation can be done in user space via one of the several
existing library implementations, or it can be done in the kernel.
No in-kernel handshake implementations yet exist. In their absence,
we add a netlink service that can:
a. Notify a user space daemon that a handshake is needed.
b. Once notified, the daemon calls the kernel back via this
netlink service to get the handshake parameters, including an
open socket on which to establish the session.
c. Once the handshake is complete, the daemon reports the
session status and other information via a second netlink
operation. This operation marks that it is safe for the
kernel to use the open socket and the security session
established there.
The notification service uses a multicast group. Each handshake
mechanism (eg, tlshd) adopts its own group number so that the
handshake services are completely independent of one another. The
kernel can then tell via netlink_has_listeners() whether a handshake
service is active and prepared to handle a handshake request.
A new netlink operation, ACCEPT, acts like accept(2) in that it
instantiates a file descriptor in the user space daemon's fd table.
If this operation is successful, the reply carries the fd number,
which can be treated as an open and ready file descriptor.
While user space is performing the handshake, the kernel keeps its
muddy paws off the open socket. A second new netlink operation,
DONE, indicates that the user space daemon is finished with the
socket and it is safe for the kernel to use again. The operation
also indicates whether a session was established successfully.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2023-04-17 22:32:26 +08:00
|
|
|
obj-$(CONFIG_NET_HANDSHAKE) += handshake/
|