This is the changed version of the patch making the sit driver
configurable as a seperate module.
Changes:
- spelling fixes in Kconfig
- changed If unsure, say N to If unsure, say Y for consistency
diff -upr -X linux-2.6.18/Documentation/dontdiff
linux-2.6.18-vanilla/net/ipv6/af_inet6.c
Decond part of the patch. It contains changes to to net/ipv6/addrconf.c
to remove sit specific code if the sit driver it not selected.
There are no changes to previous sumbit. This patch is resubmitted for
completeness.
diff -upr -X linux-2.6.18/Documentation/dontdiff
On Fri, 6 Oct 2006, Vivek Goyal wrote:
On Fri, Oct 06, 2006 at 01:03:50PM -0500, Steve Fox wrote:
On Fri, 2006-10-06 at 18:11 +0100, Mel Gorman wrote:
On (06/10/06 11:36), Vivek Goyal didst pronounce:
Where is bss placed in physical memory? I guess bss_start and bss_stop
from System.map will
Hi,
We appear to have encountered a bug with kernel routing table updates.
If an interface (+ associated IP network) loses its IF_RUNNING flag, it is
still used for routing.
More details below:
Flavour: Debian
Quagga: ii quagga 0.96.5-11 Unoff. successor of the Zebra
BGP/OSPF/RIP
Am Freitag, 6. Oktober 2006 16:59 schrieben Sie:
anyway, it's getting large, so... straight from quilt:
http://johannes.sipsolutions.net/files/cfg80211/
nice work! Is there any possibility to limit the card to a specific band (e.g.
802.11 a/b/g) using cfg80211? I'm asking because I haven't
The change removes the 'manual' schedule_timeout and replaces it with
schedule_timeout_uninterruptible
Tested compile only with allmodconfig
Signed-off-by: Amol Lad [EMAIL PROTECTED]
---
depca.c |6 ++
1 files changed, 2 insertions(+), 4 deletions(-)
---
---
On Mon, 2006-10-09 at 13:22 +0200, Stefan Rompf wrote:
nice work! Is there any possibility to limit the card to a specific band
(e.g.
802.11 a/b/g) using cfg80211? I'm asking because I haven't seen code to
accomplish this in cfg80211, but I maybe wrong.
Never really thought about that, so
Am Montag, 9. Oktober 2006 13:49 schrieb Johannes Berg:
Yeah, probably makes sense. Though, maybe not just the band but a set of
channels instead?
Yes, this would allow us to keep the definition of a band out of kernel. But
to distinguish between 802.11 b and g, we'd need a set of channels
Jay Vosburgh wrote:
After some reflection, I suspect it wouldn't be all that awful.
The main concern is going to be whether or not the existing ifenslave
binaries supplied with distros will run with the new version of bonding.
Since the new version of bonding that you're proposing is
Stefan Rompf wrote:
Am Montag, 9. Oktober 2006 13:49 schrieb Johannes Berg:
Yeah, probably makes sense. Though, maybe not just the band but a set of
channels instead?
Yes, this would allow us to keep the definition of a band out of kernel. But
to distinguish between 802.11 b and g, we'd
On Sat, 2006-10-07 at 23:46 +0200, Adrian Bunk wrote:
Subject: oops in xfrm_register_mode
References : http://lkml.org/lkml/2006/10/4/170
Submitter : Steve Fox [EMAIL PROTECTED]
Status : unknown
Status: Vivek and Mel have both created patches which fix the boot
issue, but it is not
Hi all,
I am wondering what exactly the rx_bytes and tx_bytes values exported
under statistics/ in sysfs are supposed to represent.
Most popular ethernet drivers (8139too, e100, 3c59x) count the bytes in
software, so they only take into account the bytes they actually send and
receive. This
My apologies. The second one is also numbered 1, but has the
following distinct subject line:
[PATCH 1/3] Fix for IPsec leakage with SELinux enabled -
V.03: Fix xfrm code
I definitely deleted one of them, since I usually get N copies
of very single patch posting and two of them looked
This is a bug fix for the MLSXFRM patchset already queued for 2.6.19.
This version is just a repost of V.03 with the subject titles
fixed up, and the patches ported to davem's net-2.6.git as of today.
include/linux/security.h| 24 ++-
include/net/flow.h |2
This treats the security errors encountered in the case of
socket policy matching, the same as how these are treated in
the case of main/sub policies, which is to return a full lookup
failure.
Signed-off-by: Venkat Yekkirala [EMAIL PROTECTED]
---
net/xfrm/xfrm_policy.c | 26
On Mon, 9 Oct 2006, Venkat Yekkirala wrote:
This is a bug fix for the MLSXFRM patchset already queued for 2.6.19.
This version is just a repost of V.03 with the subject titles
fixed up, and the patches ported to davem's net-2.6.git as of today.
These are already queued here:
Currently when an IPSec policy rule doesn't specify a security
context, it is assumed to be unlabeled by SELinux, and so
the IPSec policy rule fails to match to a flow that it would
otherwise match to, unless one has explicitly added an SELinux
policy rule allowing the flow to polmatch to the
From: James Morris [EMAIL PROTECTED]
When a security module is loaded (in this case, SELinux), the
security_xfrm_policy_lookup() hook can return an access denied permission
(or other error). We were not handling that correctly, and in fact
inverting the return logic and propagating a false ok
On Mon, 9 Oct 2006 15:27:32 +0200
TiVi [EMAIL PROTECTED] wrote:
Hello Stephen,
thanks for response. Sorry for lag in posting. I was ill.
Short description of my problem:
My machine has an onboard NIC (Marvell 88E8001).
I am running Debian Sarge (Kernel 2.6.16).
skge is loaded. I use
Signed-off-by: David Kimdon [EMAIL PROTECTED]
Index: wireless-dev/net/d80211/ieee80211.c
===
--- wireless-dev.orig/net/d80211/ieee80211.c
+++ wireless-dev/net/d80211/ieee80211.c
@@ -451,7 +451,7 @@ ieee80211_tx_h_fragment(struct
On Fri, 29 Sep 2006 10:59:45 +0900
Masahide NAKAMURA [EMAIL PROTECTED] wrote:
David Miller wrote:
commit 0844565fb8a9418f5a860aa480c1aef70319c9a2
Author: Thomas Graf [EMAIL PROTECTED]
Date: Fri Aug 4 23:05:56 2006 -0700
[NET]: Move netlink interface bits to linux/if.h
On Mon, 9 Oct 2006 17:39:02 +0200
Jean Delvare [EMAIL PROTECTED] wrote:
Hi all,
I am wondering what exactly the rx_bytes and tx_bytes values exported
under statistics/ in sysfs are supposed to represent.
Most popular ethernet drivers (8139too, e100, 3c59x) count the bytes in
software,
On Mon, 9 Oct 2006, Steve Fox wrote:
On Sat, 2006-10-07 at 23:46 +0200, Adrian Bunk wrote:
Subject: oops in xfrm_register_mode
References : http://lkml.org/lkml/2006/10/4/170
Submitter : Steve Fox [EMAIL PROTECTED]
Status : unknown
Status: Vivek and Mel have both created patches
FYI, all three patches mentioned as possibly required by the nl80211
patchset in the header of nl80211.patch are already in wireless-dev:
http://marc.theaimsgroup.com/?l=linux-netdevm=115625436628696w=2
(Introduces NLA_NUL_STRING)
From: Venkat Yekkirala [EMAIL PROTECTED]
Add skb_policy_check and skb_netfilter_check hooks to LSM to enable
reconciliation of the various security identifiers as well as enforce
flow control on inbound (PREROUTING/INPUT) and outbound
(OUTPUT/FORWARD/POSTROUTING)
traffic.
Signed-off-by: Venkat
From: Venkat Yekkirala [EMAIL PROTECTED]
Invoke the skb_flow_out LSM hook for outbound
traffic for secid reconciliation and flow control.
Signed-off-by: Venkat Yekkirala [EMAIL PROTECTED]
---
net/netfilter/xt_CONNSECMARK.c | 72 ---
net/netfilter/xt_SECMARK.c |
From: Venkat Yekkirala [EMAIL PROTECTED]
Invoke the skb_flow_in LSM hook for inbound
traffic for secid reconciliation and flow control.
Signed-off-by: Venkat Yekkirala [EMAIL PROTECTED]
---
include/net/xfrm.h | 45 +--
1 file changed, 22 insertions(+),
From: Paul Moore [EMAIL PROTECTED]
This patch provides the missing NetLabel support to the secid reconciliation
patchset.
This includes a change to the security_skb_flow_in() LSM hook to indicate if
the hook is in the forwarding path and a change to netlbl_skbuff_err() to carry
the forwarding
From: Venkat Yekkirala [EMAIL PROTECTED]
This patchset helps with leveraging secmark in defining fine-grained security
check points with support for a. a default place holder domain defined using
secmark for each of the check points and b. flow control and reconciliation
of domains
From: Venkat Yekkirala [EMAIL PROTECTED]
This tracks the peer's secid at connection establishment time
for clients, for later retrieval using SO_PEERSEC.
Signed-off-by: Venkat Yekkirala [EMAIL PROTECTED]
---
include/linux/security.h | 14 ++
net/ipv4/tcp_input.c |2 ++
From: Venkat Yekkirala [EMAIL PROTECTED]
This defines SELinux enforcement of the 2 new LSM hooks as well
as related changes elsewhere in the SELinux code.
This also now keeps track of the peersid thru the establishment
of a connection on the server (tracking peersid on the client
is covered
From: Venkat Yekkirala [EMAIL PROTECTED]
This beings secmark into the picture when classifying flows
using an skb.
Signed-off-by: Venkat Yekkirala [EMAIL PROTECTED]
---
include/linux/security.h | 10 --
include/linux/skbuff.h | 20
2 files changed, 20
From: Venkat Yekkirala [EMAIL PROTECTED]
This labels the skb(s) for locally generated IPv6 traffic. This will
be used in pertinent flow control checks on the outbound later in the
LSM hook.
NOTE: Forwarded traffic is already labeled with the reconciled
secmark on the inbound.
Signed-off-by:
From: Venkat Yekkirala [EMAIL PROTECTED]
This fixes the secid reconciliation code in the following ways:
1. Null-out secmark on an outgoing packet after we are done with all
the checks. This has been necessitated by the fact that some packets
sent to a multicast address could arrive back
Update to use ARRAY_SIZE, based on comment from Joe Perches.
d80211: silence sparse warning: 'bad constant expression'
Sparse does not figure out that algs[] isn't really a variable length array.
The message is:
net/d80211/ieee80211_sta.c:934:12: error: bad constant expression
This switches
On Mon, 9 Oct 2006, [EMAIL PROTECTED] wrote:
Please consider this for inclusion into 2.6.20. If it's too soon to be
thinking of 2.6.20 let me know and I'll rebase/resend this patchset once I see
notice of David's net-2.6.20 git tree.
From an initial review of this patchset, it doesn't look
Please pull from tag 'jg-20061009-00' in repository
git://electric-eye.fr.zoreil.com/home/romieu/linux-2.6.git jg-20061009-00
to get the changes below.
Distance from 'upstream-fixes'
-
$ git rev-list 2f614fe04f4463ff22234133319067d7361f54e5..jg-20061009-00
James Morris wrote:
On Mon, 9 Oct 2006, [EMAIL PROTECTED] wrote:
Please consider this for inclusion into 2.6.20. If it's too soon to be
thinking of 2.6.20 let me know and I'll rebase/resend this patchset once I see
notice of David's net-2.6.20 git tree.
From an initial review of this
On Mon, 9 Oct 2006, Paul Moore wrote:
I'll keep the patchset up to date and keep tracking the secid patches (I know
there has been discussion around the IGMP hook this morning). Once everything
looks okay I'll resend the patchset (with any updates/corrections/etc.) again.
Thanks. I think
The pci express error handling extensions don't work unless PCI access is via
mmconfig. Otherwise, all accesses to pci config registers greater than 256 fail.
Since the sky2 driver has other ways of getting to PCI config space, it works
around this short coming, but the pci_find_ext_capablity
On Mon, 2006-10-09 at 11:38 -0700, David Kimdon wrote:
FYI, all three patches mentioned as possibly required by the nl80211
patchset in the header of nl80211.patch are already in wireless-dev:
Oh, nice, I must have missed the merge :)
I also updated the patchset a bit to apply to current
Adjust the pause threshold on slower systems to keep from getting overrun.
Since FIFO is 2K bytes, don't send XON pause until there is space for a full
frame.
---
drivers/net/sky2.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- sky2.orig/drivers/net/sky2.c2006-10-09
Signed-off-by: Al Viro [EMAIL PROTECTED]
---
drivers/net/arm/etherh.c | 20 ++--
1 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/drivers/net/arm/etherh.c b/drivers/net/arm/etherh.c
index 747a71f..f3faa4f 100644
--- a/drivers/net/arm/etherh.c
+++
The rest of 8390 conversions; ifdef cascade in 8390.h is gone now.
Signed-off-by: Al Viro [EMAIL PROTECTED]
---
drivers/net/8390.h |4
drivers/net/Makefile |2 +-
drivers/net/ne-h8300.c | 23 +++
3 files changed, 16 insertions(+), 13 deletions(-)
diff
more 8390 conversions - mac8390, zorro8390 and hydra got the same treatment
as arm etherh; one more case in 8390.h ifdef cascade is gone.
Signed-off-by: Al Viro [EMAIL PROTECTED]
---
drivers/net/8390.h | 16 +---
drivers/net/Makefile|6 +++---
drivers/net/hydra.c
Hello Stephen,
Am Montag, den 09.10.2006, 14:40 -0700 schrieb Stephen Hemminger:
The pci express error handling extensions don't work unless PCI access is via
mmconfig. Otherwise, all accesses to pci config registers greater than 256
fail.
Since the sky2 driver has other ways of getting to
Hi!
I'm trying to build a network device driver supporting a very large MTU (around
64K)
on top of an infiniband connection, and I've hit a couple of issues I'd
appreciate some feedback on:
1. On the send side,
I've set NETIF_F_SG, but hardware does not support checksum offloading,
and I
On Mon, 9 Oct 2006 19:47:05 +0200
Michael S. Tsirkin [EMAIL PROTECTED] wrote:
Hi!
I'm trying to build a network device driver supporting a very large MTU
(around 64K)
on top of an infiniband connection, and I've hit a couple of issues I'd
appreciate some feedback on:
1. On the send side,
Le Sun, 8 Oct 2006 09:20:01 -0700, Stephen Hemminger
[EMAIL PROTECTED] a écrit :
On Sun, 08 Oct 2006 15:41:45 +0200
Matthias Hentges [EMAIL PROTECTED] wrote:
Hi Stephen,
I believe I have identified the problem. The freeze only happens when
your debug patch to work around sky2 PCIe
[SCTP]: Fix the RX queue size shown in /proc/net/sctp/assocs output.
Show the true receive buffer usage.
Signed-off-by: Vlad Yasevich [EMAIL PROTECTED]
Signed-off-by: Sridhar Samudrala [EMAIL PROTECTED]
---
net/sctp/proc.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Dave,
Please consider the following 2 SCTP bug fixes for 2.6.19.
Thanks
Sridhar
[SCTP]: Fix receive buffer accounting.
When doing receiver buffer accounting, we always used skb-truesize.
This is problematic when processing bundled DATA chunks because for
every DATA chunk that could be small
From: Harald Welte [EMAIL PROTECTED]
Date: Sat, 30 Sep 2006 22:20:40 +0200
Kernel unaligned access at TPC[10022cf0] ipv6_rcv+0xb8/0x320 [ipv6]
Kernel unaligned access at TPC[10023800] __ipv6_addr_type+0x8/0x140 [ipv6]
Kernel unaligned access at TPC[1002fd64] fib6_lookup_1+0x2c/0x120 [ipv6]
(gdb) list *bcm43xx_dma_handle_xmitstatus+0xbd
0x3ad is in bcm43xx_dma_handle_xmitstatus (include/asm/dma-mapping.h:91).
86static inline void
87dma_unmap_single(struct device *dev, dma_addr_t addr,size_t size,
88 int direction)
89{
90
From: Sridhar Samudrala [EMAIL PROTECTED]
Date: Mon, 09 Oct 2006 17:43:09 -0700
[SCTP]: Fix receive buffer accounting.
When doing receiver buffer accounting, we always used skb-truesize.
This is problematic when processing bundled DATA chunks because for
every DATA chunk that could be small
From: Sridhar Samudrala [EMAIL PROTECTED]
Date: Mon, 09 Oct 2006 17:43:12 -0700
[SCTP]: Fix the RX queue size shown in /proc/net/sctp/assocs output.
Show the true receive buffer usage.
Signed-off-by: Vlad Yasevich [EMAIL PROTECTED]
Signed-off-by: Sridhar Samudrala [EMAIL PROTECTED]
Also
From: Miklos Szeredi [EMAIL PROTECTED]
Date: Sun, 08 Oct 2006 12:53:11 +0200
If more than one file descriptor was sent with an SCM_RIGHTS message,
and on the receiving end, after installing a nonzero (but not all)
file descritpors the process runs out of fds, then the already
installed fds
From: Joerg Roedel [EMAIL PROTECTED]
Date: Mon, 9 Oct 2006 11:34:16 +0200
This is the changed version of the patch making the sit driver
configurable as a seperate module.
Changes:
- spelling fixes in Kconfig
- changed If unsure, say N to If unsure, say Y for consistency
Joerg, when you
- fix: toshoboe_invalid_dev() was recently removed, but not all callers
were updated, causing the obvious linker error. Remove caller,
because the check (like the one removed) isn't used.
- fix: propagate request_irq() return value
- cleanup: remove void* casts
- cleanup: remove
58 matches
Mail list logo