Re: [2.6 patch] net/ipv4/ipvs/: remove unused exports

2007-11-12 Thread David Miller
From: Adrian Bunk [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 08:58:36 +0100 On Sun, Nov 11, 2007 at 04:09:40PM +0900, Simon Horman wrote: On Sun, Nov 11, 2007 at 07:48:40AM +0100, Adrian Bunk wrote: This patch removes the following unused EXPORT_SYMBOL's: - ip_vs_try_bind_dest -

Re: [PATCH] Use list_head-s in inetpeer.c

2007-11-12 Thread Pavel Emelyanov
David Miller wrote: From: Pavel Emelyanov [EMAIL PROTECTED] Date: Sat, 10 Nov 2007 17:32:58 +0300 The inetpeer.c tracks the LRU list of inet_perr-s, but makes it by hands. Use the list_head-s for this. Signed-off-by: Pavel Emelyanov [EMAIL PROTECTED] This makes every inetpeer struct

Re: [PATCH] Use list_head-s in inetpeer.c

2007-11-12 Thread David Miller
From: Pavel Emelyanov [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 11:57:23 +0300 No. I remove _two_ pointers unused_next and unused_prevp, and add the list_head, which is _two_ pointers as well. I've even checked the compilation on both i386 and x86_64 - the sizeof(struct inet_peer) is not

Re: [PATCH] NET: Add the helper kernel_sock_shutdown()

2007-11-12 Thread David Howells
Trond Myklebust [EMAIL PROTECTED] wrote: take a SHUT_RD/SHUT_WR/SHUT_RDWR argument instead of the Hmmm... Why SHUT_*? Why not SHUTDOWN_*? David - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: [PATCH] NET: Add the helper kernel_sock_shutdown()

2007-11-12 Thread Trond Myklebust
On Mon, 2007-11-12 at 12:22 +, David Howells wrote: Trond Myklebust [EMAIL PROTECTED] wrote: take a SHUT_RD/SHUT_WR/SHUT_RDWR argument instead of the Hmmm... Why SHUT_*? Why not SHUTDOWN_*? SHUT_RD/SHUT_WR/SHUT_RDWR are the traditional names for these constants (see 'man 3

[PATCH] (resubmit) Use list_head-s in inetpeer.c

2007-11-12 Thread Pavel Emelyanov
The inetpeer.c tracks the LRU list of inet_perr-s, but makes it by hands. Use the list_head-s for this. Signed-off-by: Pavel Emelyanov [EMAIL PROTECTED] --- diff --git a/include/net/inetpeer.h b/include/net/inetpeer.h index aa10a81..ad8404b 100644 --- a/include/net/inetpeer.h +++

Re: [PATCH] NET: Add the helper kernel_sock_shutdown()

2007-11-12 Thread David Howells
Trond Myklebust [EMAIL PROTECTED] wrote: SHUT_RD/SHUT_WR/SHUT_RDWR are the traditional names for these constants (see 'man 3 shutdown') and so should be easier to remember. Good point. David - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL

Re: [Lksctp-developers] [PATCH] Fix memory leak in discard case of sctp_sf_abort_violation()

2007-11-12 Thread Vlad Yasevich
Jesper Juhl wrote: From: Jesper Juhl [EMAIL PROTECTED] In net/sctp/sm_statefuns.c::sctp_sf_abort_violation() we may leak the storage allocated for 'abort' by returning from the function without using or freeing it. This happens in case sctp_auth_recv_cid(SCTP_CID_ABORT, asoc) is true and

[patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Daniel Lezcano
The loopback is now dynamically allocated. The ipv6 code was written considering the loopback is allocated before the ipv6 protocol initialization. This is still the case when we don't use multiple network namespaces. In the case of the network namespaces, ipv6 notification handler is already

Problem with frame time stamping

2007-11-12 Thread Antoine Zen-Ruffinen
Dear all, I'm writing a network analyzer software using Linux and I need a VERY precise frame time stamping. Therefor I am planing to add my own time stamping algorithm on a modified network driver. For test purpose I did so : skb-tstamp.tv64 = 0x00010002; netif_rx(skb); On the

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Denis V. Lunev
Daniel Lezcano wrote: The loopback is now dynamically allocated. The ipv6 code was written considering the loopback is allocated before the ipv6 protocol initialization. This is still the case when we don't use multiple network namespaces. In the case of the network namespaces, ipv6

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Daniel Lezcano
Denis V. Lunev wrote: Daniel Lezcano wrote: The loopback is now dynamically allocated. The ipv6 code was written considering the loopback is allocated before the ipv6 protocol initialization. This is still the case when we don't use multiple network namespaces. In the case of the network

Possible bug in bonding

2007-11-12 Thread Moni Shoua
Hi, As reported last week by Or Gerlitz and confirmed by me, there is a kernel crash when trying to unenslave all ib slaves (which leads to bonding master destruction). I also found that it happens with Ethernet slaves if following the steps: 1. unenslaving all slaves via sysfs 2. deleting

[GIT PATCHES v2] SCTP bug fixes

2007-11-12 Thread Vlad Yasevich
Hi David I've updated the series of SCTP bugfixes. These pass all of the regression tests. You can pull the changes from: master.kernel.org:/pub/scm/linux/kernel/git/vxy/lksctp-dev.git pending Summary of changes: Jesper Juhl (1): Fix memory leak in discard case of

[PATCH 01/14] SCTP : Fix bad formatted comment in outqueue.c

2007-11-12 Thread Vlad Yasevich
From: Wei Yongjun [EMAIL PROTECTED] Just fix the bad format of the comment in outqueue.c. Signed-off-by: Wei Yongjun [EMAIL PROTECTED] Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] --- net/sctp/outqueue.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git

[PATCH 04/14] SCTP: Update RCU handling during the ADD-IP case

2007-11-12 Thread Vlad Yasevich
After learning more about rcu, it looks like the ADD-IP hadling doesn't need to call call_rcu_bh. All the rcu critical sections use rcu_read_lock, so using call_rcu_bh is wrong here. Now, restore the local_bh_disable() code blocks and use normal call_rcu() calls. Also restore the missing return

[PATCH 03/14] SCTP: Fix difference cases of retransmit.

2007-11-12 Thread Vlad Yasevich
Commit d0ce92910bc04e107b2f3f2048f07e94f570035d broke several retransmit cases including fast retransmit. The reason is that we should only delay by rto while doing retranmists as a result of a timeout. Retransmit as a result of path mtu discover, fast retransmit, or other evernts that should

[PATCH 07/14] SCTP: Fix a potential race between timers and receive path.

2007-11-12 Thread Vlad Yasevich
There is a possible race condition where the timer code will free the association and the next packet in the queue will also attempt to free the same association. The example is, when we receive an ABORT at about the same time as the retransmission timer fires. If the timer wins the race, it

[PATCH 06/14] SCTP: Allow ADD_IP to work with AUTH for backward compatibility.

2007-11-12 Thread Vlad Yasevich
This patch adds a tunable that will allow ADD_IP to work without AUTH for backward compatibility. The default value is off since the default value for ADD_IP is off as well. People who need to use ADD-IP with older implementations take risks of connection hijacking and should consider upgrading

[PATCH 05/14] SCTP: Correctly disable ADD-IP when AUTH is not supported.

2007-11-12 Thread Vlad Yasevich
Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] --- include/net/sctp/structs.h |1 - net/sctp/associola.c |2 +- net/sctp/sm_make_chunk.c |5 +++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/include/net/sctp/structs.h b/include/net/sctp/structs.h index

[PATCH 08/14] SCTP: Use hashed lookup when looking for an association.

2007-11-12 Thread Vlad Yasevich
A SCTP endpoint may have a lot of associations on them and walking the list is fairly inefficient. Instead, use a hashed lookup, and filter out the hash list based on the endopoing we already have. Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] --- net/sctp/endpointola.c | 34

[PATCH 02/14] SCTP : Fix to process bundled ASCONF chunk correctly

2007-11-12 Thread Vlad Yasevich
From: Wei Yongjun [EMAIL PROTECTED] If ASCONF chunk is bundled with other chunks as the first chunk, when process the ASCONF parameters, full packet data will be process as the parameters of the ASCONF chunk, not only the real parameters. So if you send a ASCONF chunk bundled with other chunks,

[PATCH 09/14] SCTP: Convert custom hash lists to use hlist.

2007-11-12 Thread Vlad Yasevich
Convert the custom hash list traversals to use hlist functions. Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] --- include/net/sctp/sctp.h|3 +++ include/net/sctp/structs.h | 10 -- net/sctp/endpointola.c |3 ++- net/sctp/input.c | 43

[PATCH 11/14] SCTP: Fix PR-SCTP to deliver all the accumulated ordered chunks

2007-11-12 Thread Vlad Yasevich
There is a small bug when we process a FWD-TSN. We'll deliver anything upto the current next expected SSN. However, if the next expected is already in the queue, it will take another chunk to trigger its delivery. The fix is to simply check the current queued SSN is the next expected one.

[PATCH 13/14] SCTP: Always flush the queue when uncorcking.

2007-11-12 Thread Vlad Yasevich
When the code calls uncork, trigger a queue flush, even if the queue was not corked. Most callers that explicitely cork the queue will have additinal checks to see if they corked it. Callers who do not cork the queue expect packets to flow when they call uncork. The scneario that showcased this

[PATCH 14/14] Fix memory leak in discard case of sctp_sf_abort_violation()

2007-11-12 Thread Vlad Yasevich
From: Jesper Juhl [EMAIL PROTECTED] In net/sctp/sm_statefuns.c::sctp_sf_abort_violation() we may leak the storage allocated for 'abort' by returning from the function without using or freeing it. This happens in case sctp_auth_recv_cid(SCTP_CID_ABORT, asoc) is true and we jump to the 'discard'

[PATCH 12/14] SCTP: Clean-up some defines for regressions tests.

2007-11-12 Thread Vlad Yasevich
Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] --- include/net/sctp/sctp.h |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/include/net/sctp/sctp.h b/include/net/sctp/sctp.h index 67c997c..34318a3 100644 --- a/include/net/sctp/sctp.h +++ b/include/net/sctp/sctp.h @@ -65,7

[PATCH 10/14] SCTP: Make sctp_verify_param return multiple indications.

2007-11-12 Thread Vlad Yasevich
SCTP-AUTH and future ADD-IP updates have a requirement to do additional verification of parameters and an ability to ABORT the association if verification fails. So, introduce additional return code so that we can clear signal a required action. Signed-off-by: Vlad Yasevich [EMAIL PROTECTED] ---

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: The loopback is now dynamically allocated. The ipv6 code was written considering the loopback is allocated before the ipv6 protocol initialization. This is still the case when we don't use multiple network namespaces. You do know that

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Denis V. Lunev
why should we care on down? we are destroying the device. It should gone. All references to it should also gone. So, we should perform the cleaning and remove all IPv6 addresses, so notifier should also work. We need to take care of netdev down, someone can put the loopback down if he

Re: Problem with frame time stamping

2007-11-12 Thread Eric Dumazet
On Mon, 12 Nov 2007 16:42:34 +0100 Antoine Zen-Ruffinen [EMAIL PROTECTED] wrote: Dear all, I'm writing a network analyzer software using Linux and I need a VERY precise frame time stamping. Therefor I am planing to add my own time stamping algorithm on a modified network driver. For test

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Index: linux-2.6-netns/net/ipv6/addrconf.c === --- linux-2.6-netns.orig/net/ipv6/addrconf.c +++ linux-2.6-netns/net/ipv6/addrconf.c @@ -2272,7 +2272,8 @@ static int addrconf_notify(struct

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: why should we care on down? we are destroying the device. It should gone. All references to it should also gone. So, we should perform the cleaning and remove all IPv6 addresses, so notifier should also work. We need to take care of netdev down,

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Daniel Lezcano
Eric W. Biederman wrote: Denis V. Lunev [EMAIL PROTECTED] writes: Index: linux-2.6-netns/net/ipv6/addrconf.c === --- linux-2.6-netns.orig/net/ipv6/addrconf.c +++ linux-2.6-netns/net/ipv6/addrconf.c @@ -2272,7 +2272,8 @@ static int

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Kok, Auke
Joonwoo Park wrote: IMHO even though netdevice is in the promiscuous mode, we should receive all of ingress packets. This disable the vlan filtering feature when a vlan hw accel configured e1000 device goes into promiscuous mode. This make packets visible to sniffers though it's not vlan id

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Patrick McHardy
Kok, Auke wrote: Joonwoo Park wrote: IMHO even though netdevice is in the promiscuous mode, we should receive all of ingress packets. This disable the vlan filtering feature when a vlan hw accel configured e1000 device goes into promiscuous mode. This make packets visible to sniffers though

[PATCH] sungem: fix suspend regression due to NAPI changes

2007-11-12 Thread Johannes Berg
Commit bea3348e (the NAPI changes) made sungem unconditionally enable NAPI when resuming and unconditionally disable when suspending, this, however, makes napi_disable() hang when suspending when the interface was taken down before suspend because taking the interface down also disables NAPI. This

[PATCH 05/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This message attaches the combined diffs from messages 01/05 through 04/05. This file should be suitable for use with the patch utility. Signed-off-by: Fred L. Templin [EMAIL PROTECTED] --- linux-2.6.24-rc2/include/linux/if.h.orig2007-11-08

[PATCH 04/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

[PATCH 03/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

[PATCH 01/01] iproute2-2.6.23: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. The attached file includes diffs that are specific to the iproute2-2.6.23 software distribution. Signed-off-by: Fred L. Templin [EMAIL PROTECTED] ---

Re: [E1000-devel] [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Kok, Auke
Patrick McHardy wrote: Kok, Auke wrote: Joonwoo Park wrote: IMHO even though netdevice is in the promiscuous mode, we should receive all of ingress packets. This disable the vlan filtering feature when a vlan hw accel configured e1000 device goes into promiscuous mode. This make packets

Re: 2.6.24-rc1-gb4f5550 oops

2007-11-12 Thread Peter Zijlstra
On Thu, 2007-11-08 at 23:49 +0100, Rafael J. Wysocki wrote: On Thursday, 8 of November 2007, Grant Wilson wrote: On Thu, 8 Nov 2007 22:42:21 +0100 Rafael J. Wysocki [EMAIL PROTECTED] wrote: On Thursday, 8 of November 2007, Grant Wilson wrote: On Thu, 8 Nov 2007 16:53:10 +0100

[PATCH 02/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

[PATCH 01/01] iproute2-2.6.23: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

[PATCH] ethtool: Fix coalesce settings copy+paste typo

2007-11-12 Thread Auke Kok
Coalesce setting errors use the same error messages as the descriptor ring errors. Signed-off-by: Auke Kok [EMAIL PROTECTED] --- ethtool.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/ethtool.c b/ethtool.c index 6c7a2e3..bb9dd59 100644 --- a/ethtool.c +++

Re: 2.6.24-rc1-gb4f5550 oops

2007-11-12 Thread Grant Wilson
On Mon, 12 Nov 2007 19:05:49 +0100 Peter Zijlstra [EMAIL PROTECTED] wrote: On Thu, 2007-11-08 at 23:49 +0100, Rafael J. Wysocki wrote: On Thursday, 8 of November 2007, Grant Wilson wrote: On Thu, 8 Nov 2007 22:42:21 +0100 Rafael J. Wysocki [EMAIL PROTECTED] wrote: On Thursday,

[PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

Problems with ULI 526x driver

2007-11-12 Thread Timur Tabi
Hi, I'm trying to get the ULI 526x driver working on a Freescale 8610 reference board, and it can't connect. When I turn on debug, I see this: Configuring network interfaces...uli526x: uli526x_open 0 uli526x: uli526x_init() 0 uli526x: uli526x_descriptor_init() 0 uli526x: send_filter_frame()

Re: Problems with ULI 526x driver

2007-11-12 Thread Timur Tabi
Timur Tabi wrote: Hi, I'm trying to get the ULI 526x driver working on a Freescale 8610 reference board, and it can't connect. When I turn on debug, I see this: Update: I can ping anything on my subnet, but nothing else. Also, it looks like my MAC address is hosed: eth0 Link

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Denis V. Lunev [EMAIL PROTECTED] writes: Index: linux-2.6-netns/net/ipv6/addrconf.c === --- linux-2.6-netns.orig/net/ipv6/addrconf.c +++

[PATCH 05/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread osprey67
From: Fred L. Templin [EMAIL PROTECTED] This message attaches the combined diffs from messages 01/05 through 04/05. This file should be suitable for use with the patch utility. Signed-off-by: Fred L. Templin [EMAIL PROTECTED] --- --- linux-2.6.24-rc2/include/linux/if.h.orig2007-11-08

[PATCH][RESEND] NET: Add the helper kernel_sock_shutdown()

2007-11-12 Thread Trond Myklebust
...and fix a couple of bugs in the NBD, CIFS and OCFS2 socket handlers. Looking at the sock-op-shutdown() handlers, it looks as if all of them take a SHUT_RD/SHUT_WR/SHUT_RDWR argument instead of the RCV_SHUTDOWN/SEND_SHUTDOWN arguments. Add a helper, and then define the SHUT_* enum to ensure

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Denis V. Lunev
Let me try to clarify: * when the init network namespace is created, the loopback is created first, before ipv6, and the notifier call chain for ipv6 is not setup, so the protocol does not receive the REGISTER event * when the init network namespace is destroyed during shutdown, the

[Resend][PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
-Original Message- From: osprey67 [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2007 7:54 AM To: netdev@vger.kernel.org Subject: [PATCH 01/05] ipv6: RFC4214 Support (4) From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel

[Resend] [PATCH 03/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
-Original Message- From: osprey67 [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2007 7:55 AM To: netdev@vger.kernel.org Subject: [PATCH 03/05] ipv6: RFC4214 Support (4) From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel

[Resend] [PATCH 02/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
-Original Message- From: osprey67 [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2007 7:55 AM To: netdev@vger.kernel.org Subject: [PATCH 02/05] ipv6: RFC4214 Support (4) From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel

[Resend] [PATCH 01/01] iproute2-2.6.23: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
-Original Message- From: osprey67 [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2007 7:58 AM To: netdev@vger.kernel.org Subject: [PATCH 01/01] iproute2-2.6.23: RFC4214 Support (4) From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic

[Resend(2)] [PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
-Original Message- From: osprey67 [mailto:[EMAIL PROTECTED] Sent: Monday, November 12, 2007 7:54 AM To: netdev@vger.kernel.org Subject: [PATCH 01/05] ipv6: RFC4214 Support (4) From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel

[PATCH 01/04] ipv6: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

[PATCH 03/05] ipv6: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

[PATCH 04/04] ipv6: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

[PATCH 02/04] ipv6: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

[PATCH 01/01] iproute2-2.6.23: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using the unmodified ip utility with device names beginning with: isatap. The following diffs are specific

Re: [Resend][PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Vlad Yasevich
Hi Fred First, are you breaking up the functionality into multiple patches _only_ to ease review and plan to submit the final version as a big patch? The reason I ask, is that you Patch 02, which adds Kconfig pieces could break compilations if the functionality is enabled. Templin, Fred L

RE: [Resend][PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
Vlad, Yes, I was breaking into multiples to ease review only. The [PATCH 01/04] ... (5) thread includes the complete reviewable and patchable final text in 4 files. In my next message, I will put the entire patchfile as inline text. (The [PATCH 01/01] ... (5) for 'iproute2' is already complete.)

[PATCH 05/05] ipv6: RFC4214 Support (5)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This is experimental support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

Re: [Resend][PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Vlad Yasevich
Hi Fred Templin, Fred L wrote: Vlad, Yes, I was breaking into multiples to ease review only. The [PATCH 01/04] ... (5) thread includes the complete reviewable and patchable final text in 4 files. In my next message, I will put the entire patchfile as inline text. (The [PATCH 01/01] ...

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread David Miller
From: Denis V. Lunev [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 19:49:03 +0300 Unregister for a loopback in !init_net is a _valid_ operation and should be clean, i.e. without kludges in the path. This is the only way to check the ref-counting. For ipv6 the stack really wants to pin down the

RE: [Resend][PATCH 01/05] ipv6: RFC4214 Support (4)

2007-11-12 Thread Templin, Fred L
Ok, thanks for the explanation. One questions is though why do we need all the #if defines() throughout the file? Was just trying to follow what I thought was convention, but I'm willing to be educated... Most distros end up enabled almost everything anyway. Looking at the code, there is

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread David Miller
From: Kok, Auke [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 09:12:40 -0800 Actually I think this patch removes a choice from the user. Before this patch, the user can sniff all traffic by disabling vlans, or a specific vlan only by leaving vlans on when going into promisc mode. After this

Re: [PATCH] sungem: fix suspend regression due to NAPI changes

2007-11-12 Thread Benjamin Herrenschmidt
On Mon, 2007-11-12 at 18:45 +0100, Johannes Berg wrote: Commit bea3348e (the NAPI changes) made sungem unconditionally enable NAPI when resuming and unconditionally disable when suspending, this, however, makes napi_disable() hang when suspending when the interface was taken down before

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread David Miller
From: Patrick McHardy [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 18:21:35 +0100 Do you really consider that a realistic choice? Who is going to remove interfaces that are in use just to see traffic for other VLANs? Sniffing specific VLANs can always be done on the VLAN device itself. Change

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Chris Friesen
David Miller wrote: When you select VLAN, you by definition are asking for non-VLAN traffic to be elided. It is like plugging the ethernet cable into one switch or another. For max functionality it seems like the raw eth device should show everything on the wire in promiscuous mode. If we

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Kok, Auke
Chris Friesen wrote: David Miller wrote: When you select VLAN, you by definition are asking for non-VLAN traffic to be elided. It is like plugging the ethernet cable into one switch or another. For max functionality it seems like the raw eth device should show everything on the wire in

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread David Miller
From: Chris Friesen [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 16:43:24 -0600 David Miller wrote: When you select VLAN, you by definition are asking for non-VLAN traffic to be elided. It is like plugging the ethernet cable into one switch or another. For max functionality it seems like

Re: [RFC][BNX2X] .h files rewrite

2007-11-12 Thread Ram Pai
On Sun, 2007-11-04 at 09:47 +0200, Eliezer Tamir wrote: On Fri, 2007-11-02 at 16:35 -0700, Max Asbock wrote: I built the newest bnx2x code against the net-2.6 kernel and ran a number of stress tests with netperf and pktgen. I did not encounter any errors. Max Thanks,

Re: [RFC][BNX2X] .h files rewrite

2007-11-12 Thread David Miller
From: Ram Pai [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 15:13:23 -0800 On Sun, 2007-11-04 at 09:47 +0200, Eliezer Tamir wrote: On Fri, 2007-11-02 at 16:35 -0700, Max Asbock wrote: I built the newest bnx2x code against the net-2.6 kernel and ran a number of stress tests with netperf

[PATCH 01/01] ipv6: RFC4214 Support (v2.0)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This patch includes support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. It uses the SIT module, and is configured using extensions to the iproute2 utility. The following diffs are specific to the Linux 2.6.24-rc2 kernel

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Willy Tarreau
On Mon, Nov 12, 2007 at 02:57:16PM -0800, David Miller wrote: From: Chris Friesen [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 16:43:24 -0600 David Miller wrote: When you select VLAN, you by definition are asking for non-VLAN traffic to be elided. It is like plugging the ethernet cable

[PATCH 01/01] iproute2-2.6.23: RFC4214 Support (v2.0)

2007-11-12 Thread Templin, Fred L
From: Fred L. Templin [EMAIL PROTECTED] This patch includes support for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) per RFC4214. The following diffs are specific to the iproute2-2.6.23 software distribution. This message includes the full and patchable diff text; please use this

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread David Miller
From: Willy Tarreau [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 00:15:16 +0100 I can say that sometimes you'd like to be aware that one of your VLANs is wrong and you'd simply like to sniff the wire to guess the correct tag. And on production, you simply cannot remove other VLANs, otherwise you

[PATCH] Add support for the RDC R6040 Fast Ethernet controller

2007-11-12 Thread Florian Fainelli
This patch adds support for the RDC R6040 MAC we can find in the RDC R-321x System-on-chips. Signed-off-by: Sten Wang [EMAIL PROTECTED] Signed-off-by: Daniel Gimpelevich [EMAIL PROTECTED] Signed-off-by: Florian Fainelli [EMAIL PROTECTED] -- diff --git a/drivers/net/Kconfig b/drivers/net/Kconfig

[PATCH] - drivers/net/ppp_* - remove ptr comparisons to 0

2007-11-12 Thread Joe Perches
fix sparse warnings Using plain integer as NULL pointer Signed-off-by: Joe Perches [EMAIL PROTECTED] --- drivers/net/ppp_async.c | 34 ++-- drivers/net/ppp_generic.c | 126 ++-- drivers/net/ppp_synctty.c | 27 +- 3 files changed,

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Kok, Auke
Willy Tarreau wrote: On Mon, Nov 12, 2007 at 03:19:23PM -0800, David Miller wrote: From: Willy Tarreau [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 00:15:16 +0100 I can say that sometimes you'd like to be aware that one of your VLANs is wrong and you'd simply like to sniff the wire to guess the

Re: [Bugme-new] [Bug 9349] New: RTNLGRP_ND_USEROPT does not report ifindex

2007-11-12 Thread Pierre Ynard
On Sun, 11 Nov 2007 10:52:41 -0800 (PST) [EMAIL PROTECTED] wrote: The RTNLGRP_ND_USEROPT NetLink message introduced in 2.6.24 does not seem to include any information as to which netif the user options come from. Considering this is meant to carry data that is heavily link-layer involved, this

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Willy Tarreau
On Mon, Nov 12, 2007 at 03:19:23PM -0800, David Miller wrote: From: Willy Tarreau [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 00:15:16 +0100 I can say that sometimes you'd like to be aware that one of your VLANs is wrong and you'd simply like to sniff the wire to guess the correct tag. And

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread David Miller
From: Willy Tarreau [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 00:32:57 +0100 At least, being able to disable the feature at module load time would be acceptable. Many people who often need to sniff on decent machines would always keep it disabled. I'm willing to accept the feature, in whatever

[PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread Pierre Ynard
Userland neighbor discovery options are typically heavily involved with the interface on which thay are received: add a missing ifindex field to the original struct. Thanks to Rémi Denis-Courmont. Signed-off-by: Pierre Ynard [EMAIL PROTECTED] diff --git a/include/linux/rtnetlink.h

Re: [PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread David Miller
From: Pierre Ynard [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 01:54:13 +0100 Userland neighbor discovery options are typically heavily involved with the interface on which thay are received: add a missing ifindex field to the original struct. Thanks to Rémi Denis-Courmont. Signed-off-by:

Re: Re : [PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread David Miller
From: Pierre Ynard [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 01:08:26 + (GMT) Unfortunately you cannot change the layout of a structure already exported to userspace, it is part of the ABI. Well, I thought it would not be a problem, as it is not exactly released yet. We are also

Re : [PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread Pierre Ynard
Unfortunately you cannot change the layout of a structure already exported to userspace, it is part of the ABI. Well, I thought it would not be a problem, as it is not exactly released yet. We are also currently developping the corresponding RDNSS daemon and would be totally ready to handle

Re : Re : [PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread Pierre Ynard
Unfortunately you cannot change the layout of a structure already exported to userspace, it is part of the ABI. Well, I thought it would not be a problem, as it is not exactly released yet. We are also currently developping the corresponding RDNSS daemon and would be totally ready

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Joonwoo Park
2007/11/13, Willy Tarreau [EMAIL PROTECTED]: On Mon, Nov 12, 2007 at 02:57:16PM -0800, David Miller wrote: From: Chris Friesen [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 16:43:24 -0600 David Miller wrote: When you select VLAN, you by definition are asking for non-VLAN traffic to

Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode

2007-11-12 Thread Joonwoo Park
2007/11/13, David Miller [EMAIL PROTECTED]: From: Willy Tarreau [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 00:32:57 +0100 At least, being able to disable the feature at module load time would be acceptable. Many people who often need to sniff on decent machines would always keep it

Hello!!

2007-11-12 Thread THUNDERBALL END OF YEAR BONANZA
You won the sum of 250,000,GBP by the Thunderball promotions. contact this email for further instructions: [EMAIL PROTECTED] TEL:+447045708596 Thank you. - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: Re : Re : [PATCH][IPv6] Add ifindex field in ND user option messages

2007-11-12 Thread David Miller
From: Pierre Ynard [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 01:19:47 + (GMT) Unfortunately you cannot change the layout of a structure already exported to userspace, it is part of the ABI. Well, I thought it would not be a problem, as it is not exactly released yet. We are

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread YOSHIFUJI Hideaki / 吉藤英明
In article [EMAIL PROTECTED] (at Mon, 12 Nov 2007 12:50:53 -0700), [EMAIL PROTECTED] (Eric W. Biederman) says: My opinion is that both your analysis is slightly off (as to the cause of your problems) and that your approach to fix your problem is wrong because you don't untangle the knot you

Re: [PATCH] - drivers/net/ppp_* - remove ptr comparisons to 0

2007-11-12 Thread David Miller
From: Joe Perches [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 15:33:51 -0800 fix sparse warnings Using plain integer as NULL pointer Signed-off-by: Joe Perches [EMAIL PROTECTED] Applied, thanks Joe. - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to

Re: [PATCH] sungem: fix suspend regression due to NAPI changes

2007-11-12 Thread David Miller
From: Benjamin Herrenschmidt [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 09:32:46 +1100 On Mon, 2007-11-12 at 18:45 +0100, Johannes Berg wrote: Commit bea3348e (the NAPI changes) made sungem unconditionally enable NAPI when resuming and unconditionally disable when suspending, this,

  1   2   >