Joy Latten <[EMAIL PROTECTED]> wrote:
> I installed 2.6.17 + patch-2.6.18-rc4 + 2.6.18-rc4-mm2
> onto two pSeries power 5 (ppc64 lpars) machines. I configured
> IPSec using the configuration listed below.
Could you try straight 2.6.17? If that crashes too, then at least we
can be sure that it isn
Andrew Morton <[EMAIL PROTECTED]> wrote:
>
> Using a fwmark as a key for selecting among multiple routing tables (via "ip
> rule" command) breaks the rp_filter functionality since the fwmark field is
> not
> initialized in function fib_validate_source. Because of this there is no way
> to
> assur
Alexey Kuznetsov wrote:
Hello!
I'm thinking that David definitely has a point about having a usability
problem, though. All other kind of tunnels have endpoint devices
associated with them, and that would make all these kinds of problems go
away,
Yes, when you deal with sane practical set
> /* Check if this were the first socks: */
> if (nr_socks - socks == 0)
> reserve += RX_RESERVE_PAGES;
Can of course be:
if (nr_socks == socks)
reserve += RX_RESERVE_PAGES;
Grumble,
Indan
-
To unsubscribe from this list: send the line "unsubs
On Fri, August 25, 2006 17:39, Peter Zijlstra said:
> @@ -282,7 +282,8 @@ struct sk_buff {
> nfctinfo:3;
> __u8pkt_type:3,
> fclone:2,
> - ipvs_property:1;
> +
On Fri, Aug 25, 2006 at 04:03:16PM -0700, Greg KH wrote:
>
> This patch doesn't apply at all to the latest 2.6.17-stable kernel tree.
> Care to rediff it?
Hmm, I just rebased and it actually applied as is to 2.6.17.11 :)
Anyway, here is the result:
[INET]: Use pskb_trim_unique when trimming page
On Fri, 25 Aug 2006, Jeff Kirsher wrote:
> On 8/25/06, Bill Fink <[EMAIL PROTECTED]> wrote:
> >
> > I agree. Something like:
> >
> > ethtool -s ethx auto on advertise mode1+mode2+...+moden
> >
> > For example:
> >
> > ethtool -s ethx auto on advertise 100-half+100-full
> >
> > to
On 8/25/06, Bill Fink <[EMAIL PROTECTED]> wrote:
On Thu, 24 Aug 2006, Michael Chan wrote:
> Jeff Kirsher wrote:
>
> > The old way of setting autonegotiation was using the
> > following command:
> > ethtool -s ethx speed 100 duplex full auto on
> > now the command would be
> > ethtool -s ethx aut
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Sat, 26 Aug 2006 03:57:41 +0400
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied, thanks.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vg
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Cc: Jeff Garzik <[EMAIL PROTECTED]>
---
drivers/net/tulip/winbond-840.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
--- linux-2.6.18-rc4-mm1.orig/drivers/net/tulip/winbond-840.c
+++ linux-2.6.18-rc4-mm1/drivers/net/tulip/winbond
From: Francois Romieu <[EMAIL PROTECTED]>
Move tulip_select_media() processing to a workqueue, instead of
delaying in interrupt context, edited by Kyle McMartin to use kevent
thread, instead of creating its own workqueue.
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valerie Hen
On Wed, 2006-08-23 at 20:38 -0700, Piet Delaney wrote:
I was right, at least for 2.6.12, when we free the
socket the timer should have list poison in them.
retransmit_timer = {
entry = {
next = 0x100100,
prev = 0x200200
},
expires = 44563,
lock = {
slock = 1,
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Cc: Jeff Garzik <[EMAIL PROTECTED]>
---
drivers/net/tulip/tulip_core.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
--- linux-2.6.18-rc4-mm1.orig/drivers/net/tulip/tulip_core.c
+++ linux-2.6.18-rc4-mm1/drivers/net/tulip/tulip_c
From: Thibaut Varene <[EMAIL PROTECTED]>
Signed-off-by: Thibaut Varene <[EMAIL PROTECTED]>
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Signed-off-by: Jeff Garzik <[EMAIL PROTECTED]>
---
drivers/net/tulip/tulip_core.c |2 +-
1 files chang
From: Grant Grundler <[EMAIL PROTECTED]>
Include "tulip.h" in winbond-840.c and clean up lots of redundant
definitions.
Signed-off-by: Grant Grundler <[EMAIL PROTECTED]>
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Signed-off-by: Jeff Garzik <
This patch set includes all the non-controversial tulip patches from
the parisc tree, plus a few extra cleanups. The major highlight is
the patch moving tulip_select_media() and its associated delay to a
work queue, a nice piece of work from Francois Romieu, with some
tweaks by Kyle McMartin.
-VA
From: Grant Grundler <[EMAIL PROTECTED]>
Update/cleanup some definitions in tulip.h and tulip_core.c.
Signed-off-by: Grant Grundler <[EMAIL PROTECTED]>
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Signed-off-by: Jeff Garzik <[EMAIL PROTECTED]>
From: Grant Grundler <[EMAIL PROTECTED]>
The obvious safe registers to read is one from PCI config space.
Signed-off-by: Grant Grundler <[EMAIL PROTECTED]>
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Signed-off-by: Jeff Garzik <[EMAIL PROTECT
From: Grant Grundler <[EMAIL PROTECTED]>
As the cookie returned by pci_iomap() is fairly useless...
[Compile warning on pci_resource_start() format fixed up by Valerie
Henson.]
Signed-off-by: Grant Grundler <[EMAIL PROTECTED]>
Signed-off-by: Kyle McMartin <[EMAIL PROTECTED]>
Signed-off-by: Valer
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Cc: Jeff Garzik <[EMAIL PROTECTED]>
MAINTAINERS|4 ++--
drivers/net/tulip/21142.c |2 +-
drivers/net/tulip/eeprom.c |2 +-
drivers/net/tulip/interrupt.c |2 +-
drivers/net/tulip/media.c |2 +-
Signed-off-by: Valerie Henson <[EMAIL PROTECTED]>
Cc: Jeff Garzik <[EMAIL PROTECTED]>
---
drivers/net/tulip/de2104x.c | 16 ++--
drivers/net/tulip/tulip_core.c |5 -
drivers/net/tulip/winbond-840.c | 10 +++---
3 files changed, 21 insertions(+), 10 deletions(-)
-
On Fri, 2006-08-25 at 16:48 -0700, Marc Bevand wrote:
>
> But I was able to turn TSO on via ethtool -K. This is exactly the behavior I
> would like to see in tg3. So are you saying the patch I applied actually
> breaks ASF ?
>
Yes, the TSO firmware code that tg3 downloads to the chip using your
On Fri, Aug 25, 2006 at 03:43:53PM -0700, Stephen Hemminger wrote:
> TCP over IPV6 would incorrectly inherit the GSO settings.
> This would cause kernel to send Tcp Segmentation Offload packets for
> IPV6 data to devices that can't handle it. It caused the sky2 driver
> to lock http://bugzilla.kern
Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
---
net/ipv4/tcp_cubic.c |2 +-
net/ipv4/tcp_highspeed.c |2 +-
net/ipv4/tcp_htcp.c |2 +-
net/ipv4/tcp_hybla.c |2 +-
net/ipv4/tcp_vegas.c |2 +-
net/ipv4/tcp_veno.c |2 +-
net/ipv4/tcp_westwood.c |
On 8/25/06, Michael Chan <[EMAIL PROTECTED]> wrote:
The reason is that TSO on 5704 and older chips is done by firmware. ASF
is also implemented by firmware. If ASF is enabled, there is no room to
do TSO and ASF at the same time.
Just for test purpose, I have applied the following patch to my
On Thu, 24 Aug 2006, Michael Chan wrote:
> Jeff Kirsher wrote:
>
> > The old way of setting autonegotiation was using the
> > following command:
> > ethtool -s ethx speed 100 duplex full auto on
> > now the command would be
> > ethtool -s ethx auto on advertise 0x08
> > both commands would resul
On Sat, 26 Aug 2006 01:06:26 +0200
Thomas Glanzmann <[EMAIL PROTECTED]> wrote:
> Hello Stephen,
> thanks for the fix, it fixes the problem for me. I closed the bug. On
> which hardware did you reproduce the bug and how did you found it? Did
> you use git bisect?
>
> Thomas
Finding the li
Please fix the other variants as well htcp, cubic, veno, vegas, ...
Just one patch is necessary with all the files.
--
Stephen Hemminger <[EMAIL PROTECTED]>
All non-trivial abstractions, to some degree, are leaky.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of
Stephen Hemminger wrote:
> I think this the problem. Does it fix e1000? I am testing now.
>
> TCP over IPV6 would incorrectly inherit the GSO settings on accepted
> children.
>
> --- linux-2.6.orig/net/ipv6/tcp_ipv6.c2006-08-03
09:09:16.0
> -0700 +++ linux-2.6/net/ipv6/tcp_ipv6.c
On Sat, 26 Aug 2006 01:06:26 +0200
Thomas Glanzmann <[EMAIL PROTECTED]> wrote:
> Hello Stephen,
> thanks for the fix, it fixes the problem for me. I closed the bug. On
> which hardware did you reproduce the bug and how did you found it? Did
> you use git bisect?
>
> Thomas
Using sky2 on
From: James Morris <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 19:15:57 -0400 (EDT)
> On Fri, 25 Aug 2006, Joy Latten wrote:
>
> > I installed 2.6.17 + patch-2.6.18-rc4 + 2.6.18-rc4-mm2
> > onto two pSeries power 5 (ppc64 lpars) machines. I configured
> > IPSec using the configuration listed below
On Fri, 25 Aug 2006, Joy Latten wrote:
> I installed 2.6.17 + patch-2.6.18-rc4 + 2.6.18-rc4-mm2
> onto two pSeries power 5 (ppc64 lpars) machines. I configured
> IPSec using the configuration listed below.
Confirming that this does not crash on i686 or x86_64.
- james
--
James Morris
<[EMAIL
From: Patrick McHardy <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 14:14:18 +0200
> [NET_SCHED]: Add mask support to fwmark classifier
>
> Support masking the nfmark value before the search. The mask value is
> global for all filters contained in one instance. It can only be set
> when a new instan
From: Patrick McHardy <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 14:14:12 +0200
> [DECNET]: Add support for fwmark masks in routing rules
>
> Add support for fwmark masks. For compatibility a mask of 0x is used
> when a mark value != 0 is sent without a mask.
>
> Signed-off-by: Patrick M
From: Patrick McHardy <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 14:14:05 +0200
> [IPV4]: Add support for fwmark masks in routing rules
>
> Add a FRA_FWMASK attributes for fwmark masks. For compatibility a mask of
> 0x is used when a mark value != 0 is sent without a mask.
>
> Signed-off
In article <[EMAIL PROTECTED]> (at Fri, 25 Aug 2006 16:06:58 -0700 (PDT)),
David Miller <[EMAIL PROTECTED]> says:
> > > > + .fwmark = skb->nfmark,
:
> It seems to make better sense to protect this with
> IPV6_ROUTE_FWMARK instead of NETFILTER. And it is
> consistent
From: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Date: Sat, 26 Aug 2006 07:44:38 +0900 (JST)
> In article <[EMAIL PROTECTED]> (at Fri, 25 Aug 2006 15:29:25 -0400), Brian
> Haley <[EMAIL PROTECTED]> says:
>
> > > .saddr = iph->saddr,
> > > + .fwmark =
From: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Date: Sat, 26 Aug 2006 00:09:19 +0900 (JST)
> [IPV6] ROUTE: Fix size of fib6_rule_policy.
>
> It should not be RTA_MAX+1 but FRA_MAX+1.
>
> Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Applied.
-
To unsubscribe from this list: send the line "u
From: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Date: Sat, 26 Aug 2006 00:09:37 +0900 (JST)
> [IPV6] ROUTE: Add support for fwmask in routing rules.
>
> Add support for fwmark masks.
> A mask of 0x is used when a mark value != 0 is sent without a mask.
>
> Based on patch for net/ipv4/fib_rul
Hello Stephen,
thanks for the fix, it fixes the problem for me. I closed the bug. On
which hardware did you reproduce the bug and how did you found it? Did
you use git bisect?
Thomas
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROT
On Sun, Aug 13, 2006 at 10:59:11PM +1000, Herbert Xu wrote:
> On Sat, Aug 12, 2006 at 09:19:19PM +, Nix wrote:
> >
> > The kernel log showed a heap of BUGs from somewhere inside the skb
> > management layer, somewhere in UDP fragment processing while
> > handling NFS requests. It starts like t
From: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Date: Sat, 26 Aug 2006 00:08:54 +0900 (JST)
> [IPV6] ROUTE: Fix FWMARK support.
>
> - Add missing nla_policy entry.
> - type of fwmark is u32, not u8.
>
> Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
Applied, thanks.
-
To unsubscribe from this
On Fri, 2006-08-25 at 22:33 +, Marc Bevand wrote:
> Still, it would be great if ASF could be disabled, because I have
> noticed that when ASF is enabled, the tg3 driver automatically disables
> TSO (TCP Segmentation Offloading). Here is a dmesg output from a server
> where I am seeing that beh
From: Stephen Hemminger <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 15:43:53 -0700
> TCP over IPV6 would incorrectly inherit the GSO settings.
> This would cause kernel to send Tcp Segmentation Offload packets for
> IPV6 data to devices that can't handle it. It caused the sky2 driver
> to lock http
From: Masahide NAKAMURA <[EMAIL PROTECTED]>
Date: Fri, 25 Aug 2006 23:29:05 +0900
> Thank you for providing it quickly.
> It works!
Thank you for testing. I have pushed this bug fix into the
net-2.6.19 tree.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a me
TCP over IPV6 would incorrectly inherit the GSO settings.
This would cause kernel to send Tcp Segmentation Offload packets for
IPV6 data to devices that can't handle it. It caused the sky2 driver
to lock http://bugzilla.kernel.org/show_bug.cgi?id=7050
and the e1000 would generate bogus packets. I c
In article <[EMAIL PROTECTED]> (at Fri, 25 Aug 2006 15:29:25 -0400), Brian
Haley <[EMAIL PROTECTED]> says:
> > .saddr = iph->saddr,
> > + .fwmark = skb->nfmark,
> > .flowlabel = (* (u32 *) iph)&IPV6_FLOWINFO_MASK,
:
Michael Chan broadcom.com> writes:
>
> Turning off ASF is just a matter of changing some bits in NVRAM
> and recalculating the checksum. If you need the tool to do this,
> I'll have someone send it to you.
>
> Note that on some of the blade servers, I believe ASF is vital
> and should not be disa
I installed 2.6.17 + patch-2.6.18-rc4 + 2.6.18-rc4-mm2
onto two pSeries power 5 (ppc64 lpars) machines. I configured
IPSec using the configuration listed below.
A ping from one machine to the other, hangs.
No packets leave the machine issuing the ping.
When I tried sftp, I received following oop
On Tue, Aug 22, 2006 at 05:19:28PM -0700, Stephen Hemminger wrote:
> The bridge netfilter code needs to check for space at the
> front of the skb before overwriting; otherwise if skb from
> device doesn't have headroom, then it will cause random
> memory corruption.
>
> Signed-off-by: Stephen Hemm
subscribe netdev
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
This fixes a crash at ieee80211.c line 3461, ieee80211_rx_michael_mic_report()
(rx->sdata->type == IEEE80211_IF_TYPE_AP). rx.sdata needs to be set before
calling ieee80211_rx_michael_mic_report().
Signed-off-by: Elliot Schwartz <[EMAIL PROTECTED]>
Signed-off-by: David Kimdon <[EMAIL PROTECTED]>
Begin forwarded message:
Date: Fri, 25 Aug 2006 13:29:52 -0700
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Bugme-new] [Bug 7058] New: CONFIG_IP_ROUTE_FWMARK breaks rp_filter
checks
http://bugzilla.kernel.org/show_bug.cgi?id=7058
Summary: CONFIG_IP_ROUTE_FWMARK breaks r
On Fri, 2006-08-25 at 16:14 -0400, Trond Myklebust wrote:
> Grumble... If your patches are targetting NFS, could you please at the
> very least Cc [EMAIL PROTECTED] and/or myself.
Sorry, will make sure you're on the CC list next round.
> On Fri, 2006-08-25 at 17:40 +0200, Peter Zijlstra wrote:
>
Stephen Hemminger wrote:
> On Fri, 25 Aug 2006 11:13:48 -0700
> "Brandeburg, Jesse" <[EMAIL PROTECTED]> wrote:
>
>> I'm enabling e1000 to offload IPv6 since the 2.6.18+ kernels support
>> it. The kernel I'm testing is 2.6.18-rc4.
>
> Yes, something is wrong with the GSO code. I am bisecting this
Grumble... If your patches are targetting NFS, could you please at the
very least Cc [EMAIL PROTECTED] and/or myself.
On Fri, 2006-08-25 at 17:40 +0200, Peter Zijlstra wrote:
> Provide a proper a_ops->swapfile() implementation for NFS. This will
> set the NFS socket to SOCK_VMIO and put the socke
diff --git a/net/ipv6/route.c b/net/ipv6/route.c
index c9f74c1..9b50e0c 100644
--- a/net/ipv6/route.c
+++ b/net/ipv6/route.c
@@ -703,6 +703,7 @@ void ip6_route_input(struct sk_buff *skb
.ip6_u = {
.daddr = iph->daddr,
Darren Salt <[EMAIL PROTECTED]> :
> In case you don't yet have an lspci dump for an RTL8136, here's one for a
> device which is working with the r1000 driver which is supplied with Ubuntu
> dapper (though the machine in question - a Toshiba Equium A110-233 - is
> actually running Debian testing.)
On Fri, 25 Aug 2006 11:13:48 -0700
"Brandeburg, Jesse" <[EMAIL PROTECTED]> wrote:
> I'm enabling e1000 to offload IPv6 since the 2.6.18+ kernels support it.
> The kernel I'm testing is 2.6.18-rc4.
Yes, something is wrong with the GSO code. I am bisecting this bug
http://bugzilla.kernel.
On Mon, Aug 21, 2006 at 05:30:22PM -0700, Mohamed Abbas wrote:
> the attached patch will add support to handle these iw_handle
> SIOC[S/G]IWRATE, SIOC[S/G]IWTXPOW and SIOC[S/G]IWPOWER. It also added
> some changes in ieee80211_ioctl_giwrange function to report supported
> channels and rates.
In case you don't yet have an lspci dump for an RTL8136, here's one for a
device which is working with the r1000 driver which is supplied with Ubuntu
dapper (though the machine in question - a Toshiba Equium A110-233 - is
actually running Debian testing.)
I _should_ be able to test your patches on
I will separate each pair of S/G in separate patch so it will be easier
to discuss each set separately. I will provide the patch this weekend
taking into account the comments provided
Thanks
Mohamed
Jouni Malinen wrote:
On Mon, Aug 21, 2006 at 05:30:22PM -0700, Mohamed Abbas wrote:
the at
On Mon, 2006-08-21 at 07:03 -0700, Stephen Hemminger wrote:
> On Mon, 21 Aug 2006 13:57:23 +0530
> "Amit S. Kale" <[EMAIL PROTECTED]> wrote:
>
> > We can certainly create a table for all error messages. It'll hurt
> > readability
> > of code in many of the other places where printks are used to
I'm enabling e1000 to offload IPv6 since the 2.6.18+ kernels support it.
The kernel I'm testing is 2.6.18-rc4.
Everything with the hardware offload is working fine, but it appears
that the GSO code may not correctly segment frames sometimes for IPv6
traffic.
I did a tcpdump on both ends with all
* YOSHIFUJI Hideaki / ?$B5HF#1QL@ <[EMAIL PROTECTED]> 2006-08-26 00:08
> Hello.
>
> Here's some IPv6 policy rouging fixes on top of net-2.6.19 tree.
>
> [PATCH 1/3] [IPV6] ROUTE: Fix FWMARK support.
> [PATCH 2/3] [IPV6] ROUTE: Fix size of fib6_rule_policy.
>
> If we accept Patrick's IPv4 fwm
* YOSHIFUJI Hideaki / ?$B5HF#1QL@ <[EMAIL PROTECTED]> 2006-08-25 17:21
> commit 10204d532f5f8bb379009ba0bee2113bafda72be
> Author: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
> Date: Mon Aug 21 19:22:01 2006 +0900
>
> [IPV6] ROUTE: Routing by FWMARK.
>
> Based on patch by Jean Lorchat <[E
Christoph Lameter wrote:
On Fri, 25 Aug 2006, Peter Zijlstra wrote:
The basic premises is that network sockets serving the VM need undisturbed
functionality in the face of severe memory shortage.
This patch-set provides the framework to provide this.
Hmmm.. Is it not possible to avoid the me
On Fri, 2006-08-25 at 08:51 -0700, Christoph Lameter wrote:
> On Fri, 25 Aug 2006, Peter Zijlstra wrote:
>
> > The basic premises is that network sockets serving the VM need undisturbed
> > functionality in the face of severe memory shortage.
> >
> > This patch-set provides the framework to provi
The core of the VM deadlock avoidance framework.
In order to provide robust networked block devices there must be a guarantee
of progress. That is, the block device must never stall because of OOM because
the device itself might be needed to get out of OOM (reclaim pageout).
This means that the
On Fri, 25 Aug 2006, Peter Zijlstra wrote:
> The basic premises is that network sockets serving the VM need undisturbed
> functionality in the face of severe memory shortage.
>
> This patch-set provides the framework to provide this.
Hmmm.. Is it not possible to avoid the memory pools by
guaran
Provide a proper a_ops->swapfile() implementation for NFS. This will
set the NFS socket to SOCK_VMIO and put the socket reconnection under
PF_MEMALLOC (I hope this is enough, otherwise more work needs to be done).
Signed-off-by: Peter Zijlstra <[EMAIL PROTECTED]>
---
fs/nfs/file.c
Hi,
The latest version of the VM deadlock prevention work.
The basic premises is that network sockets serving the VM need undisturbed
functionality in the face of severe memory shortage.
This patch-set provides the framework to provide this.
-
To unsubscribe from this list: send the line "unsubs
Use sk_set_vmio() on the nbd socket.
Limit each request to 1 page, so that the request throttling also limits the
number of in-flight pages and force the IO scheduler to NOOP as anything else
doesn't make sense anyway.
Signed-off-by: Peter Zijlstra <[EMAIL PROTECTED]>
Signed-off-by: Daniel Phill
Provide an block queue init function that allows to set an elevator.
And a function to pin the current elevator.
Signed-off-by: Peter Zijlstra <[EMAIL PROTECTED]>
Signed-off-by: Daniel Phillips <[EMAIL PROTECTED]>
---
block/elevator.c |5 +
block/ll_rw_blk.c | 12 ++-
[IPV6] ROUTE: Fix size of fib6_rule_policy.
It should not be RTA_MAX+1 but FRA_MAX+1.
Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
---
net/ipv6/fib6_rules.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/net/ipv6/fib6_rules.c b/net/ipv6/fib6_rules.c
index b4cd5
Hello.
Here's some IPv6 policy rouging fixes on top of net-2.6.19 tree.
[PATCH 1/3] [IPV6] ROUTE: Fix FWMARK support.
[PATCH 2/3] [IPV6] ROUTE: Fix size of fib6_rule_policy.
If we accept Patrick's IPv4 fwmask patch, here's the one for IPv6.
[PATCH 3/3] [IPV6] ROUTE: Add support for fwmask
[IPV6] ROUTE: Fix FWMARK support.
- Add missing nla_policy entry.
- type of fwmark is u32, not u8.
Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
---
net/ipv6/fib6_rules.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/net/ipv6/fib6_rules.c b/net/ipv6/fib6_rules
[IPV6] ROUTE: Add support for fwmask in routing rules.
Add support for fwmark masks.
A mask of 0x is used when a mark value != 0 is sent without a mask.
Based on patch for net/ipv4/fib_rules.c by Patrick McHardy <[EMAIL PROTECTED]>.
Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]>
--
On Fri, 2006-25-08 at 14:02 +0200, Patrick McHardy wrote:
> Thomas Graf wrote:
> > * Patrick McHardy <[EMAIL PROTECTED]> 2006-08-25 12:29
> >
> >>The problem is that in order to avoid walking through all filters
> >>contained in one instance, we need to mask the value before the
> >>lookup. This m
On Fri, 25 Aug 2006 03:16:51 -0700 (PDT)
David Miller <[EMAIL PROTECTED]> wrote:
> From: Masahide NAKAMURA <[EMAIL PROTECTED]>
> Date: Fri, 25 Aug 2006 19:06:40 +0900
>
> > I've found a problem about MIPv6 CN with the patch below.
>
> We just need to search by priority in the inexact list, even
On Fri, 25 Aug 2006, Venkat Yekkirala wrote:
> > I like these changes, but wondering why you haven't supplied
> > code for the
> > outbound case ?
> >
> >
> > - James
>
> The code for the outbound is still in the works. I hope to have it
> out in a week or so.
Ok, I guess we should wait unti
> I like these changes, but wondering why you haven't supplied
> code for the
> outbound case ?
>
>
> - James
The code for the outbound is still in the works. I hope to have it
out in a week or so.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to
Hi Don,
Thanks. We'll lindent the sources and post an update asap.
-Amit
On Thursday 24 August 2006 05:34, Don Fry wrote:
> It looks like you have not run the source throught Lindent as previously
> requested. Before you submit the code again, please use the Lindent
> script.
>
> I can get the c
On 8/24/06, Ian McDonald <[EMAIL PROTECTED]> wrote:
> I spent all of today on USAGI's IPSEC/MIPV6 patches and related
> issues, so I'll look into this tomorrow.
>
> Thanks Ian.
>
Yes I saw that. Take your time as this is nowhere near as important!
Sigh, I'm still busy indeed, gave a quick look
Wendy, Michael, Ueimor,
Thanks for the patch and feedback. We'll integrate these into our driver and
post an update asap.
-Amit
On Friday 25 August 2006 03:10, Francois Romieu wrote:
> wen xiong <[EMAIL PROTECTED]> :
> [...]
>
> > diff -Nuar old/drivers/net/netxen/netxen_nic_hw.c
> > new/driver
On Fri, 2006-25-08 at 14:02 +0200, Patrick McHardy wrote:
> Thomas Graf wrote:
> > * Patrick McHardy <[EMAIL PROTECTED]> 2006-08-25 12:29
> >
> >>The problem is that in order to avoid walking through all filters
> >>contained in one instance, we need to mask the value before the
> >>lookup. This m
Hi,
On Fri, Aug 25, 2006 at 02:14:12PM +0200, Patrick McHardy wrote:
> [DECNET]: Add support for fwmark masks in routing rules
>
> Add support for fwmark masks. For compatibility a mask of 0x is used
> when a mark value != 0 is sent without a mask.
>
> Signed-off-by: Patrick McHardy <[E
Hi Dave,
these three patches add support for masking the nfmark value
in a few spots where it would be useful in an attempt to make
life easier for users using it for multiple unrelated things.
[IPV4]: Add support for fwmark masks in routing rules
Add a FRA_FWMASK attributes for fwmark masks. Fo
[DECNET]: Add support for fwmark masks in routing rules
Add support for fwmark masks. For compatibility a mask of 0x is used
when a mark value != 0 is sent without a mask.
Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]>
---
commit bcd4f6996453aaf0a8d5515dcc533115621c961f
tree 62909d3d
[NET_SCHED]: Add mask support to fwmark classifier
Support masking the nfmark value before the search. The mask value is
global for all filters contained in one instance. It can only be set
when a new instance is created, all filters must specify the same mask.
Signed-off-by: Patrick McHardy <[EM
Thomas Graf wrote:
> * Patrick McHardy <[EMAIL PROTECTED]> 2006-08-25 12:29
>
>>The problem is that in order to avoid walking through all filters
>>contained in one instance, we need to mask the value before the
>>lookup. This means all filters share the same mask, which is
>>taken from the first
Hi Jeff,
the IBM eHEA Device Driver has been discussed on the netdev, linux-ppc and
kernel mailing list for some time. The latest patch set we posted can be
found at:
http://www.spinics.net/lists/netdev/msg12820.html
As the discussion seems to have settled, please consider our driver for
upstre
This patch adds nl80211, a netlink based configuration
system for wireless hardware.
It currently features a few helper commands and commands to
add and remove virtual interfaces and to inject packets.
Support for nl80211 in d80211 is in a follow-up patch.
There should be support for notification
This patch makes d80211 partially configurable using the
infrastructure that nl80211 provides. So far, it allows
packet injection and adding/removing virtual interfaces.
Signed-off-by: Johannes Berg <[EMAIL PROTECTED]>
--- wireless-dev.orig/net/d80211/Kconfig2006-08-25 11:31:01.0
* Patrick McHardy <[EMAIL PROTECTED]> 2006-08-25 12:29
> This patch adds support to mask the nfmark value before the lookup
> the the fw classifier. Unfortunately it has some drawbacks, so I'd
> be interested if anyone can think of a better way.
>
> The problem is that in order to avoid walking th
This patch removes the 'value' argument from NLA_PUT_FLAG which is
unused anyway. The documentation comment was already correct so it
doesn't need an update :)
Signed-off-by: Johannes Berg <[EMAIL PROTECTED]>
--- wireless-dev.orig/include/net/netlink.h 2006-08-25 12:46:30.0
+0200
+++
Hi!
> > - We expect that the lots-of-dirty-anon-memory-over-swap-over-network
> > scenario might still cause deadlocks.
> >
> > I assert that this can be solved by putting swap on local disks. Peter
> > asserts that this isn't acceptable due to disk unreliability. I point
> > out that
On Fri, 2006-08-25 at 12:30 +0200, Thomas Graf wrote:
> That's exactly what I would have done as well.
Alright. Changing it, then I'll repost. Again :)
johannes
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info a
* Johannes Berg <[EMAIL PROTECTED]> 2006-08-25 11:04
> I completely reworked that now so it will:
> * create a nested NL80211_ATTR_INTERFACE_LIST with nested {
>* 1..N attributes, with nested {
> * ATTR_IFINDEX and
> * ATTR_IFNAME
>}
> }
>
> how does that sound? Maybe I should
This patch adds support to mask the nfmark value before the lookup
the the fw classifier. Unfortunately it has some drawbacks, so I'd
be interested if anyone can think of a better way.
The problem is that in order to avoid walking through all filters
contained in one instance, we need to mask the
1 - 100 of 124 matches
Mail list logo