Incorporated Auke's comments
ioremap must be balanced by an iounmap and failing to do so can result
in a memory leak.
Tested (compilation only) with:
- allmodconfig
- Modifying drivers/net/Kconfig to make sure that the changed file is
compiling without warning
Signed-off-by: Amol Lad [EMAIL
On Sat, Sep 23, 2006 at 04:35:35PM -0700, David Miller wrote:
First, the only mentioned real use of EtherIP I've seen anywhere is to
tunnel old LAN based games that used protocols other than IP :-)
Thats an important use case for EtherIP, thats right :-)
But people often use Ethernet over IP
On Sat, Sep 23, 2006 at 09:01:12PM -0700, Stephen Hemminger wrote:
If the device looks like a duck (Ethernet), then why does it need
a separate ARP type. There are other tools that might work without
modification if it just fully pretended to be an ether device.
This solves the problem of
On Sun, Sep 24, 2006 at 09:07:43PM -0400, [EMAIL PROTECTED] wrote:
On Sat, 23 Sep 2006 15:27:36 +0200, Joerg Roedel said:
(I assume you are speaking of the position of the 3 in the header). The
RFC is not clear at this point. It defines that the first 4 bits in the
16 bit Ethernet header
On Fri, 2006-09-22 at 08:54 -0500, Larry Finger wrote:
That sounds perfect as nl80211 seems to be the coming userspace client. Let
me know how to help.
I'll have to read up on what it actually needs to provide first :)
johannes
-
To unsubscribe from this list: send the line unsubscribe
On Sun, 2006-09-24 at 23:43 +0100, Daniel Drake wrote:
This patch adds a host_strip_iv_icv flag to ieee80211 which indicates that
ieee80211_rx should strip the IV/ICV/other security features from the payload.
This saves on some memmove() calls in the driver and seems like something that
On Fri, 2006-09-22 at 17:48 +0200, Jiri Benc wrote:
On Thu, 14 Sep 2006 12:49:23 +0200, Johannes Berg wrote:
There should be support for notifications, but we need to figure
out if we remove the sysfs based add/remove virtual interface
thing completely or allow the driver to create a
* [EMAIL PROTECTED] [EMAIL PROTECTED] 2006-09-21 12:57
-int netlbl_netlink_snd_multicast(struct sk_buff *skb, u32 pid, u32 group)
+int netlbl_netlink_snd_multicast(struct sk_buff *skb,
+ void *buf,
+ u32 pid,
+
* [EMAIL PROTECTED] [EMAIL PROTECTED] 2006-09-21 12:57
At the suggestion of Thomas Graf, rewrite NetLabel's use of Netlink attributes
to better follow the common Netlink attribute usage.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
net/netlabel/netlabel_cipso_v4.c | 593
In message [EMAIL PROTECTED],David Miller writes:
Chas, as a subsystem maintainer, if you change a submitter's patch in
a significant and non-trivial way, you should at least mention a brief
reason why you did that. In this case, why did you delete all of
Roland's __init/__devinit transformations
David Miller [EMAIL PROTECTED] writes:
First, the only mentioned real use of EtherIP I've seen anywhere is to
tunnel old LAN based games that used protocols other than IP :-)
How would you convince those old LAN games to use a MTU 1500 which
is needed for the tunnel? I bet they have the
On Mon, Sep 25, 2006 at 02:38:36PM +0400, Evgeniy Polyakov wrote:
I ran two times the same 'telnet 192.168.4.79 22' and got unencrypted
packets and very long timeout. After some magic initial process things
started to work as expected - only ESP encrypted packets can be found in
tcpdump,
On Mon, Sep 25, 2006 at 09:27:54PM +1000, Herbert Xu ([EMAIL PROTECTED]) wrote:
On Mon, Sep 25, 2006 at 02:38:36PM +0400, Evgeniy Polyakov wrote:
I ran two times the same 'telnet 192.168.4.79 22' and got unencrypted
packets and very long timeout. After some magic initial process things
On Fri, Sep 01, 2006 at 06:22:48PM +0200, cagri coltekin wrote:
The second causes the system to give the bug a couple of seconds
after bind starts, and loads the zones, without any traffic going
on. BTW, patch applied with some offset difference (3 for the
first -48 for the other two
On 24-09-2006 23:29, Dave Jones wrote:
=
[ INFO: inconsistent lock state ]
-
inconsistent {softirq-on-R} - {in-softirq-W} usage.
swapper/0 [HC0[0]:SC1[2]:HE1:SE0] takes:
(police_lock){-+--}, at: [f8d304fd]
On Mon, 2006-25-09 at 14:43 +0200, Jarek Poplawski wrote:
It's probably 2.6.18 and should change a little now (git4) but
IMHO main problem stays: it looks tcf_act_police_locate in
act_police.c was preempted in read_lock (tcf_police_lookup)
- now the same is possible in tcf_hash_lookup. So
On Mon, 2006-25-09 at 16:05 +0400, Evgeniy Polyakov wrote:
On Mon, Sep 25, 2006 at 09:27:54PM +1000, Herbert Xu ([EMAIL PROTECTED])
wrote:
Please run ip x p once every second and the post what it shows
before, during and after the period when unecrypted packets show
up on the wire.
On 25-09-2006 14:47, jamal wrote:
On Mon, 2006-25-09 at 14:43 +0200, Jarek Poplawski wrote:
It's probably 2.6.18 and should change a little now (git4) but
IMHO main problem stays: it looks tcf_act_police_locate in
act_police.c was preempted in read_lock (tcf_police_lookup)
- now the same is
jamal wrote:
On Mon, 2006-25-09 at 14:43 +0200, Jarek Poplawski wrote:
It's probably 2.6.18 and should change a little now (git4) but
IMHO main problem stays: it looks tcf_act_police_locate in
act_police.c was preempted in read_lock (tcf_police_lookup)
- now the same is possible in
On Mon, Sep 25, 2006 at 12:22:41PM +0200, Andi Kleen wrote:
How would you convince those old LAN games to use a MTU 1500 which
is needed for the tunnel? I bet they have the size hardcoded.
The tunnel provides an MTU of 1500. To guarantee this, it never sets the
DF flag in outgoing packets.
On Sun, 2006-09-24 at 16:18 +1000, Benjamin Herrenschmidt wrote:
So what are the chances of getting this dscape stack merged, let's
say... for 2.6.19 ?
0
Or we'll get yet another full release with barely
working wireless ?
yes. Many locking issues in d80211 to still sort out. Basically,
yes. Many locking issues in d80211 to still sort out. Basically, there
are next to no useful locks in it and most data structures are not
protected at all.
Doh ! Scary... locking is hard ... if the stuff was written without
locking in mind in the first place, it might end up being a
On Mon, 2006-09-25 at 19:58 +1000, Benjamin Herrenschmidt wrote:
Doh ! Scary... locking is hard ... if the stuff was written without
locking in mind in the first place, it might end up being a nightmare...
Yeah, I've actually suggested rewriting it from its own pieces :) But
Jiri says he
On Monday 25 September 2006 13:57, Joerg Roedel wrote:
On Mon, Sep 25, 2006 at 12:22:41PM +0200, Andi Kleen wrote:
How would you convince those old LAN games to use a MTU 1500 which
is needed for the tunnel? I bet they have the size hardcoded.
The tunnel provides an MTU of 1500. To
On Mon, Sep 25, 2006 at 02:16:15PM +0200, Andi Kleen wrote:
On Monday 25 September 2006 13:57, Joerg Roedel wrote:
On Mon, Sep 25, 2006 at 12:22:41PM +0200, Andi Kleen wrote:
How would you convince those old LAN games to use a MTU 1500 which
is needed for the tunnel? I bet they have
Thomas Graf wrote:
* [EMAIL PROTECTED] [EMAIL PROTECTED] 2006-09-21 12:57
At the suggestion of Thomas Graf, rewrite NetLabel's use of Netlink attributes
to better follow the common Netlink attribute usage.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
net/netlabel/netlabel_cipso_v4.c |
On Monday 25 September 2006 00:43, Daniel Drake wrote:
This patch adds a host_strip_iv_icv flag to ieee80211 which indicates that
ieee80211_rx should strip the IV/ICV/other security features from the payload.
This saves on some memmove() calls in the driver and seems like something that
On Sun, Sep 24, 2006 at 12:40:53PM +0200, Elimar Riesebieter wrote:
My sylog is filled up with thousands of:
Sep 21 18:18:00 aragorn kernel: TKIP: replay detected: \
STA=XX:XX:BB:LL:KK:00 previous TSC BLAa received TSC BLAa
Sep 21 18:18:29 aragorn kernel: printk: 62 messages
* Paul Moore [EMAIL PROTECTED] 2006-09-25 10:13
- ret_val = netlbl_netlink_snd(ans_skb, info-snd_pid);
+ switch (doi_def-type) {
+ case CIPSO_V4_MAP_STD:
+ nla_a = nla_nest_start(ans_skb, NLBL_CIPSOV4_A_MLSLVLLST);
+ if (nla_a == NULL) {
+ ret_val
Thomas Graf wrote:
* Paul Moore [EMAIL PROTECTED] 2006-09-25 10:13
- ret_val = netlbl_netlink_snd(ans_skb, info-snd_pid);
+ switch (doi_def-type) {
+ case CIPSO_V4_MAP_STD:
+ nla_a = nla_nest_start(ans_skb, NLBL_CIPSOV4_A_MLSLVLLST);
+ if (nla_a == NULL) {
+
When using TKIP and CCMP for wireless encryption with ieee80211, the logs get
filled with useless
replay messages where the previous and received TSC are identical. This change
deletes
the log message for this case, but still prints the message when there are
major differences
in the TSC's.
On Mon, 25 Sep 2006 15:35:34 +0200, Savin Zlobec wrote:
while testing the rt2x00 driver I've found a
problem in d80211 stack which results in kernel panic.
I experienced kernel panic every time I unloaded the
rt2x00 driver module after associating with my AP.
The problem traced down to
On Wed, 2006-09-20 at 08:24 +0200, Thomas Graf wrote:
I think its best to use your patch for now and see where this leads to.
Alright, should I repost with a proper [PATCH] subject or is it good to
take as-is? :)
johannes
-
To unsubscribe from this list: send the line unsubscribe netdev in
the
Hello Jeff,
this eHEA patch reflects changes according to Anton's new hvcall interface
which has been commited in Paul's git tree:
git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc.git
Thanks to this change our pHYP interface needs less lines of code.
In addition to the above changes
On Mon, 25 Sep 2006 10:24:45 +0200
Joerg Roedel [EMAIL PROTECTED] wrote:
On Sat, Sep 23, 2006 at 09:01:12PM -0700, Stephen Hemminger wrote:
If the device looks like a duck (Ethernet), then why does it need
a separate ARP type. There are other tools that might work without
modification
On Mon, Sep 25, 2006 at 07:40:09AM -0700, Stephen Hemminger wrote:
To get a list of all EtherIP devices, just maintain a linked list
in the private device information. Use list macros, it isn't hard.
I use lists in the driver to maintain the list. The problem is to get
such a list in
actaully we dont even need local-conf.channel. rx_status-channel holds
the channel
we physically received the frame on. channel hold the value from ds. if
they are not equal then
adjust freq. Attached is the modified patch
Signed-off-by: Mohamed Abbas [EMAIL PROTECTED]
diff --git
This is an updated patchset which takes into account Thomas' comments. This
includes the addition of two new patches in the patchset which add a new
Netlink interface as well as correct the list of interfaces in the large
comment block at the top of include/net/netlink.h.
Please consider these
The CIPSOv4 cache traversal routines are triggered both the userspace events
(cache invalidation due to DOI removal or updated SELinux policy) and network
packet processing events. As a result there is a problem with the existing
CIPSOv4 cache spinlocks as they are not bottom-half/softirq safe.
Fix a problem where NetLabel would always set the value of
sk_security_struct-peer_sid in selinux_netlbl_sock_graft() to the context of
the socket, causing problems when users would query the context of the
connection. This patch fixes this so that the value in
sk_security_struct-peer_sid is
At the suggestion of Thomas Graf, rewrite NetLabel's use of Netlink attributes
to better follow the common Netlink attribute usage.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
include/net/cipso_ipv4.h | 16 +-
include/net/netlabel.h | 49
Now that all of the supporting pieces of NetLabel have a home at SourceForge
update the Kconfig help text and add an entry to the MAINTAINERS file.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
MAINTAINERS |7 +++
net/netlabel/Kconfig |5 -
2 files changed, 11
At the top of include/net/netlink.h is a list of Netlink interfaces, however,
the nla_for_each_nested() macro was not listed. This patch adds this interface
to the list at the top of the header file.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
include/net/netlink.h |1 +
1 files
Change NetLabel to use the 'recvfrom' socket permission and the
SECINITSID_NETMSG SELinux SID as the NetLabel base SID for incoming packets.
This patch effectively makes the old, and currently unused, SELinux NETMSG
permissions NetLabel permissions.
Signed-of-by: Paul Moore [EMAIL PROTECTED]
---
Add a new function, nla_validate_nested(), to validate nested Netlink
attributes.
Signed-off-by: Paul Moore [EMAIL PROTECTED]
---
include/net/netlink.h | 19 +++
1 files changed, 19 insertions(+)
Index: net-2.6.19/include/net/netlink.h
Hi,
On Mon, 25 Sep 2006 10:50:00 -0400, John W. Linville wrote:
On Sun, Sep 24, 2006 at 12:40:53PM +0200, Elimar Riesebieter wrote:
My sylog is filled up with thousands of:
Sep 21 18:18:00 aragorn kernel: TKIP: replay detected: \
STA=XX:XX:BB:LL:KK:00 previous TSC BLAa received TSC
So why a special mtu handler is not implemented in 802.11 stack :
- 802.11 stack doesn't support bigger packet
- 802.11 stack doesn't support very bigger packet (with
802.11 fragmentation)
- 802.11 writers were lazy
Matthieu
-
To unsubscribe from this list: send the line unsubscribe netdev in
On Mon, Sep 25, 2006 at 07:17:31PM +, Matthieu CASTET wrote:
So why a special mtu handler is not implemented in 802.11 stack :
- 802.11 stack doesn't support bigger packet
- 802.11 stack doesn't support very bigger packet (with
802.11 fragmentation)
- 802.11 writers were lazy
I suspect
Matthieu CASTET wrote:
Hi,
On Mon, 25 Sep 2006 10:50:00 -0400, John W. Linville wrote:
On Sun, Sep 24, 2006 at 12:40:53PM +0200, Elimar Riesebieter wrote:
My sylog is filled up with thousands of:
Sep 21 18:18:00 aragorn kernel: TKIP: replay detected: \
STA=XX:XX:BB:LL:KK:00 previous TSC
On Sun, 2006-09-24 at 18:41 -0700, David Miller wrote:
From: Michal Ostrowski [EMAIL PROTECTED]
Date: Sun, 24 Sep 2006 07:29:25 -0500
I think the call path via dev-hard_start_xmit, if it fails, may result
in an skb not being freed. This appears to be the case with the e100.c
driver.
Some changes:
1. need to select CONFIGFS into configuration
2. don't add declarations after code.
3. use unsigned not int for counters and mask.
4. don't return a structure (ie pkt_delay)
5. use enum for magic values
6. don't use GFP_ATOMIC unless you have to
7. check error values on
* [EMAIL PROTECTED] [EMAIL PROTECTED] 2006-09-25 14:04
This is an updated patchset which takes into account Thomas' comments. This
includes the addition of two new patches in the patchset which add a new
Netlink interface as well as correct the list of interfaces in the large
comment block at
The following changes since commit 7c250413e5b7c3dfae89354725b70c76d7621395:
Al Viro:
pata_pdc2027x iomem annotations
are found in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6.git
upstream
Daniel Drake:
WE-21 for zd1211rw
On Mon, Sep 25, 2006 at 05:50:43PM -0400, John W. Linville wrote:
The following changes since commit 7c250413e5b7c3dfae89354725b70c76d7621395:
Al Viro:
pata_pdc2027x iomem annotations
are found in the git repository at:
Resending a minor janitorial patch from long ago that seems to have
fallen through the cracks. Its not in 2.6.18-git4 nor in 2.6.18-mm1.
Please apply and forward upstream.
--linas
[PATCH]: e1000: Janitor: Use #defined values for literals
Minor janitorial patch: use #defines for literal
From: [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 14:04:12 -0400
This is an updated patchset which takes into account Thomas' comments. This
includes the addition of two new patches in the patchset which add a new
Netlink interface as well as correct the list of interfaces in the large
comment
Joerg Roedel wrote:
Is there something in the RFC that suggests that a byte order other than
'network order' is possible/acceptable there?
No. The RFC states nothing at all about byte- or bitorder. That is why
the RFC is ambigious at this point.
RFC 791 (IPv4) Appendix B does give
Hi all,
I'm posting this from a hotel which has a wireless AP (B+G) for guests.
It took me several hours to figure out how to get the connection working
with my 2.6.18 notebook -- works just fine with other guests' mswin machines.
WEP is used, and is set up and working just fine: I can access
Linas Vepstas wrote:
Resending a minor janitorial patch from long ago that seems to have
fallen through the cracks. Its not in 2.6.18-git4 nor in 2.6.18-mm1.
Please apply and forward upstream.
--linas
[PATCH]: e1000: Janitor: Use #defined values for literals
Minor janitorial patch: use
From: Jeff Garzik [EMAIL PROTECTED]
The driver wrongly claimed I/O ports at an address returned by pci_iomap()
-- even if it was passed an MMIO address. Fix this by claiming/releasing
all PCI resources in the PCI driver probe/remove handlers instead and get
rid of the must_free_region flag
From: Michal Piotrowski [EMAIL PROTECTED]
Signed-off-by: Michal Piotrowski [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/tokenring/lanstreamer.h | 12
1 file changed, 12 deletions(-)
diff -puN
From: Peter Zijlstra [EMAIL PROTECTED]
BUG: warning at kernel/lockdep.c:1816/trace_hardirqs_on() (Not tainted)
Call Trace:
show_trace
dump_stack
trace_hardirqs_on
:forcedeth:nv_nic_irq_other
handle_IRQ_event
__do_IRQ
do_IRQ
ret_from_intr
DWARF2 barf
default_idle
cpu_idle
rest_init
From: Michal Piotrowski [EMAIL PROTECTED]
Signed-off-by: Michal Piotrowski [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/tokenring/lanstreamer.c | 59 --
1 file changed, 59 deletions(-)
diff -puN
From: Michael Buesch [EMAIL PROTECTED]
This fixes eeprom read on big-endian architectures.
Signed-off-by: Michael Buesch [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/b44.c |2 +-
1 file changed, 1 insertion(+), 1
From: Michal Piotrowski [EMAIL PROTECTED]
Signed-off-by: Michal Piotrowski [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/typhoon.c |4
1 file changed, 4 deletions(-)
diff -puN
From: Jesper Juhl [EMAIL PROTECTED]
There seems to be a possible NULL pointer deref bug in
drivers/net/forcedeth.c::nv_loopback_test(). If dev_alloc_skb() fails, the
next line will call skb_put() with a NULL first argument which it'll then
try to deref - kaboom: a NULL pointer deref. Found by
From: Jim Gifford [EMAIL PROTECTED],
Grant Grundler [EMAIL PROTECTED],
Peter Horton [EMAIL PROTECTED]
With Grant's help I was able to get the tulip driver to work with 64 bit
MIPS.
Cc: Valerie Henson [EMAIL PROTECTED]
[akpm: this is a previously-nacked patch, but the problem is
From: Vasily Averin [EMAIL PROTECTED]
Memory leak was found in 2.6.18-rc4 and e1000 7.2.7 from sourceforge:
Memory allocated for new tx_ring and rx_ring leaks if
e1000_setup_XX_resources() fails.c Also this patch reduces stack usage
(removed tx_new and rx_new) and uses kzalloc instead
From: Eric Sesterhenn [EMAIL PROTECTED]
While checking gcc 4.1 -Wextra warnings, I stumbled across the following
two warnings:
drivers/net/phy/phy_device.c:528: warning: comparison of unsigned expression
0 is always false
drivers/net/phy/phy_device.c:546: warning: comparison of unsigned
From: Michal Piotrowski [EMAIL PROTECTED]
Signed-off-by: Michal Piotrowski [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Cc: Jes Sorensen [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/acenic.c |4
1 file changed, 4 deletions(-)
diff -puN
From: Fabio Olive Leite [EMAIL PROTECTED]
A while ago Ingo patched tcp_v4_rcv on net/ipv4/tcp_ipv4.c to use
bh_lock_sock_nested and silence a lock validator warning. This fixed
it for IPv4, but recently I saw a report of the same warning on IPv6.
Cc: Herbert Xu [EMAIL PROTECTED]
Cc: David S.
From: Chuck Short [EMAIL PROTECTED]
Fix memory leak.
Coverity id# 653
patch location:
http://www.kernel.org/git/?p=linux/kernel/git/bcollins/ubuntu-dapper.git;a=commitdiff;h=a1f34cb68b16807ed9d5ebb0f6a6ec5ff8a5fc78
Signed-off-by: Chuck Short [EMAIL PROTECTED]
Signed-off-by: Ben Collins [EMAIL
From: Thibaut VARENE [EMAIL PROTECTED]
Fix a problem with Tulip 21142 HP branded PCI cards (PN#: B5509-66001),
which feature a NatSemi DP83840A PHY.
Without that patch, it is impossible to properly initialize the card's PHY,
and it's thus impossible to monitor/configure it.
It's a
From: Jesper Juhl [EMAIL PROTECTED]
I recently tried running netconsole via a vlan interface without luck,
and decided to do something about it (see patch below).
My interfaces look like this:
eth0 Link encap:Ethernet HWaddr 00:14:5E:28:3C:2E
UP BROADCAST RUNNING MULTICAST
From: Grant Grundler [EMAIL PROTECTED]
IRQs are racing with tulip_down(). DMA can be restarted by the interrupt
handler _after_ we call tulip_stop_rxtx() and the DMA buffers are unmapped.
The result is an MCA (hard crash on ia64) because of an IO TLB miss. The
long-term fix is to make the
I've been sitting on this patch because afaik the problem which it purports
to fix remains unfixed.
Should I drop it??
Thanks.
From: Jari Takkala [EMAIL PROTECTED]
Fix a problem where output from /proc/net/arp skips a record when the full
output does not fit into the users read() buffer.
From: Andrew Morton [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:45:35 -0700
I've been sitting on this patch because afaik the problem which it purports
to fix remains unfixed.
Should I drop it??
Thanks.
Please drop it, the patch submitted didn't give us the feedback
and test results we
From: Johannes Berg [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:58:28 +0200
On Wed, 2006-09-20 at 08:24 +0200, Thomas Graf wrote:
I think its best to use your patch for now and see where this leads to.
Alright, should I repost with a proper [PATCH] subject or is it good to
take as-is? :)
[EMAIL PROTECTED] wrote:
From: Michael Buesch [EMAIL PROTECTED]
This fixes eeprom read on big-endian architectures.
Signed-off-by: Michael Buesch [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
---
drivers/net/b44.c |2 +-
1 file
applied patches 3-8, and patch 10
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
[EMAIL PROTECTED] wrote:
From: Jeff Garzik [EMAIL PROTECTED]
The driver wrongly claimed I/O ports at an address returned by pci_iomap()
-- even if it was passed an MMIO address. Fix this by claiming/releasing
all PCI resources in the PCI driver probe/remove handlers instead and get
rid of the
[EMAIL PROTECTED] wrote:
From: Vasily Averin [EMAIL PROTECTED]
Memory leak was found in 2.6.18-rc4 and e1000 7.2.7 from sourceforge:
Memory allocated for new tx_ring and rx_ring leaks if
e1000_setup_XX_resources() fails.c Also this patch reduces stack usage
(removed tx_new and rx_new) and uses
[EMAIL PROTECTED] wrote:
From: Peter Zijlstra [EMAIL PROTECTED]
BUG: warning at kernel/lockdep.c:1816/trace_hardirqs_on() (Not tainted)
Call Trace:
show_trace
dump_stack
trace_hardirqs_on
:forcedeth:nv_nic_irq_other
handle_IRQ_event
__do_IRQ
do_IRQ
ret_from_intr
DWARF2 barf
applied
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
applied 1-10
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
pulled
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, 25 Sep 2006 16:47:31 -0700 (PDT)
David Miller [EMAIL PROTECTED] wrote:
From: Andrew Morton [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:45:35 -0700
I've been sitting on this patch because afaik the problem which it purports
to fix remains unfixed.
Should I drop it??
The bcm43xx-softmac driver fails to set two quantities needed for
iwlist to compute wireless quality when scanning. As a result, userland
programs using the quality to determine the best connection fail.
Signed-off-by: Larry Finger [EMAIL PROTECTED]
---
This patch is intended for wireless-2.6.
On Mon, 2006-09-25 at 20:07 -0400, Jeff Garzik wrote:
patch does not apply.
also, it would seem like varargs would be appropriate here.
Not really... these are hypervisor calls, their calling convention is
not varargs, thus we would need some conversion layer if using them,
with possible
iNexQ UR055g: Tested by Todor T Zviskov
zd1211 chip 1435:0711 v4330 high 00-10-a7 AL2230_RF pa0 g--
ZyXEL AG-225, FCC ID SI5WUB410: Tested by Nathan
zd1211 chip 0586:3409 v4810 full 00-13-49 AL7230B_RF pa0 g---
Yakumo QuickWLAN USB: Tested by EdB
zd1211 chip 0b3b:1630 v4330 high 00-01-36
On Mon, 2006-09-25 at 16:39 -0700, [EMAIL PROTECTED] wrote:
From: Michal Piotrowski [EMAIL PROTECTED]
Signed-off-by: Michal Piotrowski [EMAIL PROTECTED]
Cc: Jeff Garzik [EMAIL PROTECTED]
Signed-off-by: Andrew Morton [EMAIL PROTECTED]
Signed-off-by: Dave Dillow [EMAIL PROTECTED]
---
Jeff Garzik wrote:
[EMAIL PROTECTED] wrote:
From: Vasily Averin [EMAIL PROTECTED]
Memory leak was found in 2.6.18-rc4 and e1000 7.2.7 from sourceforge:
Memory allocated for new tx_ring and rx_ring leaks if
e1000_setup_XX_resources() fails.c Also this patch reduces stack usage
(removed tx_new
From: [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:43:07 -0700
From: Fabio Olive Leite [EMAIL PROTECTED]
A while ago Ingo patched tcp_v4_rcv on net/ipv4/tcp_ipv4.c to use
bh_lock_sock_nested and silence a lock validator warning. This fixed
it for IPv4, but recently I saw a report of the same
From: [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:43:08 -0700
From: Chuck Short [EMAIL PROTECTED]
Fix memory leak.
Coverity id# 653
patch location:
http://www.kernel.org/git/?p=linux/kernel/git/bcollins/ubuntu-dapper.git;a=commitdiff;h=a1f34cb68b16807ed9d5ebb0f6a6ec5ff8a5fc78
From: [EMAIL PROTECTED]
Date: Mon, 25 Sep 2006 16:43:10 -0700
+#ifdef CONFIG_NET_POLL_CONTROLLER
+ new_dev-poll_controller = real_dev-poll_controller;
+#endif
+
I don't see how this part can be correct. If netpoll actually
calls new_dev-poll_controller it will pass new_dev in
(ie. the
95 matches
Mail list logo