[PATCH 2.6.20 1/5] s2io: updates for s2io driver.

2007-01-10 Thread Ananda Raju
Hello, List of changes in this patch: This patch adds two load parameters napi and ufo. Previously NAPI was compilation option with these changes wan enable disable NAPI using load parameter. Also we are introducing ufo load parameter to enable/disable ufo feature Signed-off-by: Sivakum

[PATCH 2.6.20 4/5] s2io: updates fro s2io driver.

2007-01-10 Thread Ananda Raju
Hello, List of changes in this patch: 1. Removed unused code in en_dis_able_nic_intrs(), TX_DMA_INTR, RX_DMA_INTR, TX_XGXS_INTR, MC_INTR Signed-off-by: Sivakumar Subramani <[EMAIL PROTECTED]> --- diff -urpN patch3/drivers/net/s2io.c patch4/drivers/net/s2io.c --- patch3/drivers/net/s2io.c 2

[PATCH 2.6.20 3/5] s2io: updates for s2io driver.

2007-01-10 Thread Ananda Raju
Hello, List of changes in this patch: 1. Fix for updating skb->truesize properly. 2. Disable NAPI only if more than one ring configured in case of MSI/MSI-X interrupts. Previously we were disabling NAPI irrespective of number of rings when MSI/MSI-X interrupts were used. 3. Code cleanup.

[PATCH 2.6.20 2/5] s2io: updates for s2io driver.

2007-01-10 Thread Ananda Raju
Hello, List of changes in this patch: 1. Fix for reset and link handling. 2. Allow for promiscuos mode and multicast state be maintained through ifconfig up and down. 3. Support to print adapter serial number. Signed-off-by: Sivakumar Subramani <[EMAIL PROTECTED]> --- diff -urpN patch1/drive

Re: BUG: soft lockup detected on CPU#0! (2.6.18.2 plus hacks)

2007-01-10 Thread David Miller
From: Jarek Poplawski <[EMAIL PROTECTED]> Date: Thu, 11 Jan 2007 08:24:28 +0100 > Yesterday I did what I should do earlier - checked > this simple way, with printk, and now I have no doubts > it's a bug: if you add or remove vlan devices with > vconfig, register_vlan_device and unregister_vlan_dev

Re: BUG: soft lockup detected on CPU#0! (2.6.18.2 plus hacks)

2007-01-10 Thread Jarek Poplawski
On Wed, Jan 10, 2007 at 12:01:23PM -0800, Stephen Hemminger wrote: ... > Don't rely on books too heavily, they can get out of date > with a simple code change. I've tried to find this in the code at the beginning and got mislead by the path with PREEMPT_BKL. I think the books are necessary to get

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread David Miller
From: Herbert Xu <[EMAIL PROTECTED]> Date: Thu, 11 Jan 2007 10:27:13 +1100 > On Wed, Jan 10, 2007 at 03:08:55PM -0600, Venkat Yekkirala wrote: > > > > I was talking about this (the latter) as well. Currently, on a proper > > "negative", -ESRCH is returned by security_xfrm_policy_lookup(), and > >

[PATCH 0/4] atl1: Attansic L1 ethernet driver

2007-01-10 Thread Jay Cliburn
This is the latest submittal of the patchset providing support for the Attansic L1 gigabit ethernet adapter. This patchset is built against kernel version 2.6.20-rc4 current git as of 20070109. The monolithic version of this patchset may be found at: ftp://hogchain.net/pub/linux/m2v/attansic/k

[PATCH 4/4] atl1: Ancillary C files for Attansic L1 driver

2007-01-10 Thread Jay Cliburn
From: Jay Cliburn <[EMAIL PROTECTED]> From: Chris Snook <[EMAIL PROTECTED]> This patch contains auxiliary C files for the Attansic L1 gigabit ethernet adapter driver. Signed-off-by: Jay Cliburn <[EMAIL PROTECTED]> Signed-off-by: Chris Snook <[EMAIL PROTECTED]> --- atl1_ethtool.c | 528 +++

[PATCH 1/4] atl1: Build files for Attansic L1 driver

2007-01-10 Thread Jay Cliburn
From: Jay Cliburn <[EMAIL PROTECTED]> From: Chris Snook <[EMAIL PROTECTED]> This patch contains the build files for the Attansic L1 gigabit ethernet adapter driver. Signed-off-by: Jay Cliburn <[EMAIL PROTECTED]> Signed-off-by: Chris Snook <[EMAIL PROTECTED]> --- Kconfig | 11 ++

[PATCH 2/4] atl1: Header files for Attansic L1 driver

2007-01-10 Thread Jay Cliburn
From: Jay Cliburn <[EMAIL PROTECTED]> From: Chris Snook <[EMAIL PROTECTED]> This patch contains the header files needed by the Attansic L1 gigabit ethernet adapter driver. Signed-off-by: Jay Cliburn <[EMAIL PROTECTED]> Signed-off-by: Chris Snook <[EMAIL PROTECTED]> --- atl1.h| 266 +++

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread Herbert Xu
Hi Paul: On Wed, Jan 10, 2007 at 11:11:43AM -0500, Paul Moore wrote: > > I'm far from a flow cache expert (David, James, and Venkat will probably be > able to give you much better feedback) I did notice a few things which may or > may not be issues ... comments below. FWIW, I believe Venkat is

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread Herbert Xu
On Wed, Jan 10, 2007 at 03:08:55PM -0600, Venkat Yekkirala wrote: > > I was talking about this (the latter) as well. Currently, on a proper > "negative", -ESRCH is returned by security_xfrm_policy_lookup(), and > this comes back up as a 0 from resolver(), correctly indicating NO > applicable > xfr

Re: IrDA spams logfiles - since 2.6.19

2007-01-10 Thread David Miller
From: Andreas Leitgeb <[EMAIL PROTECTED]> Date: Sun, 7 Jan 2007 01:51:50 +0100 > As soon as I load the irda-usb module with the device plugged, > I get lots of messages of following kind into the logs: > irda_usb_hard_xmit(), Insuficient skb headroom. > (the "Insuficient"-typo is original) > abo

[PATCH] MAINTAINERS, use the correct "Orphan" rather than "Orphaned"

2007-01-10 Thread Leonard Norrgard
Simplify automatic parsing of MAINTAINERS, by using the correct "Orphan" rather than "Orphaned". Signed-off-by: Leonard NorrgÄrd <[EMAIL PROTECTED]> diff --git a/MAINTAINERS b/MAINTAINERS index 4ccc5fa..7595bc8 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -1031,13 +1031,13 @@ P: Digi Internatio

RE: [IPSEC] flow: Cache negative results

2007-01-10 Thread Venkat Yekkirala
> > Only, on a security policy denial (-ESRCH from the LSM hook), a 0 > > is returned by the resolver to signify no applicable policy since > > a negative result is akin to no policy. And I see the "no policy" > > case is already cached. > > I'm not talking about an xfrm policy lookup failure, that

Re: Fw: Intermittent SCTP multihoming breakage

2007-01-10 Thread Vlad Yasevich
Steve Hill wrote: > On Wed, 3 Jan 2007, Sridhar Samudrala wrote: > > Sorry for the delay in replying. > >> No. lksctp-developers mailing list is still the best place for SCTP related >> discussions. You can subscribe and look in the archives at >> http://lists.sourceforge.net/lists/listinfo/lks

Re: [PATCH] [SCTP]: Fix err_hdr assignment in sctp_init_cause.

2007-01-10 Thread David Miller
From: Sridhar Samudrala <[EMAIL PROTECTED]> Date: Wed, 10 Jan 2007 11:29:24 -0800 > On Tue, 2007-01-09 at 14:36 -0800, David Miller wrote: > > From: Sridhar Samudrala <[EMAIL PROTECTED]> > > Date: Tue, 09 Jan 2007 11:26:49 -0800 > > > > > [SCTP]: Fix err_hdr assignment in sctp_init_cause. > > > >

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread Herbert Xu
On Wed, Jan 10, 2007 at 11:41:07AM -0600, Venkat Yekkirala wrote: > > Only, on a security policy denial (-ESRCH from the LSM hook), a 0 > is returned by the resolver to signify no applicable policy since > a negative result is akin to no policy. And I see the "no policy" > case is already cached.

[PATCH] d80211: fix default key symlink creation/cleanup

2007-01-10 Thread Jan Kiszka
Hi Jiri, here is the revised version of 'don't symlink empty default keys'. Run-tested and diff'ed against your repos. Jan -- This gets rid of annoying wlan0: cannot create symlink to default key in my syslog with latest rt2x00. The patch takes care to always delete an existing symli

Re: [PATCH] d80211: Fix __ieee80211_if_del on live interfaces

2007-01-10 Thread Jiri Benc
On Wed, 10 Jan 2007 01:19:14 -0500, Michael Wu wrote: > This patch fixes that by setting dev->uninit to ieee80211_if_reinit and > eliminating the call to ieee80211_if_reinit in __ieee80211_if_del. This > allows ieee80211_if_reinit to be called at a safer time. It also allows > the removal of the ca

Re: [PATCH] d80211: Only free WEP crypto ciphers when they have been allocated correctly.

2007-01-10 Thread Jiri Benc
On Sat, 6 Jan 2007 12:29:11 -0500, Michael Wu wrote: > On Saturday 06 January 2007 12:00, Gertjan van Wingerde wrote: > > The d80211 stack still tries to free the WEP crypto ciphers, even when > > allocating them previously has failed. > Actually, the code might not even have tried to allocate the

Re: [PATCH] d80211: Fix inconsistent sta_lock usage

2007-01-10 Thread Jiri Benc
On Sat, 6 Jan 2007 20:09:36 +0100, Ivo Van Doorn wrote: > [...] > @@ -359,7 +361,7 @@ static int ieee80211_ioctl_remove_sta(struct > net_device *dev, The patch is line-wrapped here. Applied, but please try to fix your mail client settings. Thanks for the patch, Jiri -- Jiri Benc SUSE Labs - T

Re: [PATCH] d80211: Select CRYPTO_ECB when enabler d80211.

2007-01-10 Thread Jiri Benc
On Sat, 06 Jan 2007 18:00:50 +0100, Gertjan van Wingerde wrote: > The d80211 stack uses ECB mode block ciphers for the WEP implementation. > Make sure that support for CRYPTO_ECB is in the kernel when the d80211 > stack is enabled (just like the other crypto algorithms). Applied to my tree, thanks

Re: [PATCH] d80211: don't symlink empty default keys

2007-01-10 Thread Jiri Benc
On Wed, 10 Jan 2007 21:05:28 +0100, Jan Kiszka wrote: > Hmm, is this required? Will sysfs_remove_link panic on non-existent > nodes? No, it won't. > If yes or if it's considered better style, I consider it a better style as it's more tolerant to possible changes in sysfs_remove_link. > are you

Re: [PATCH] d80211: Fix __ieee80211_if_del on live interfaces

2007-01-10 Thread Michael Buesch
On Wednesday 10 January 2007 07:19, Michael Wu wrote: > d80211: Fix __ieee80211_if_del on live interfaces > > ieee80211_if_reinit is called in __ieee80211_if_del, which clears the > contents of sdata->u. After that, unregister_netdevice is called. If the > interface is still up, unregister_netdevi

Re: Fw: Intermittent SCTP multihoming breakage

2007-01-10 Thread Sridhar Samudrala
On Wed, 2007-01-10 at 11:55 +, Steve Hill wrote: > On Wed, 3 Jan 2007, Sridhar Samudrala wrote: > > Sorry for the delay in replying. > > > No. lksctp-developers mailing list is still the best place for SCTP related > > discussions. You can subscribe and look in the archives at > > http://li

Re: 2.6.20-rc4 sky2 unsupported chip type 0xff / phy write timeout

2007-01-10 Thread Stephen Hemminger
On Wed, 10 Jan 2007 10:55:28 +0100 Florian Lohoff <[EMAIL PROTECTED]> wrote: > > Hi, > i have random problems after fresh boot with the onboard sky2 on an > Fujitsu Siemens Lifebook E8110. With 2.6.18-686-3 from the Debian repository > i see > random crashes on boot - see > http://bugs.debian.o

Re: [PATCH] d80211: don't symlink empty default keys

2007-01-10 Thread Jan Kiszka
Jiri Benc wrote: > On Tue, 09 Jan 2007 23:33:34 +0100, Jan Kiszka wrote: >> This gets rid of annoying >> >> wlan0: cannot create symlink to default key >> >> in my syslog with latest rt2x00. The patch takes care that in case of >> (key/old_key == NULL && set_tx_key) the existing default key symlink

Re: [PATCH 1/1] bonding: eliminate RTNL assertion spew

2007-01-10 Thread Stephen Hemminger
On Wed, 10 Jan 2007 14:33:58 -0500 Andy Gospodarek <[EMAIL PROTECTED]> wrote: > On Tue, Jan 09, 2007 at 03:09:35PM -0800, Stephen Hemminger wrote: > > On Tue, 9 Jan 2007 17:59:01 -0500 > > Andy Gospodarek <[EMAIL PROTECTED]> wrote: > > > > > > > > These changes eliminate the messages indicating

Re: BUG: soft lockup detected on CPU#0! (2.6.18.2 plus hacks)

2007-01-10 Thread Stephen Hemminger
On Wed, 10 Jan 2007 13:50:48 +0100 Jarek Poplawski <[EMAIL PROTECTED]> wrote: > On Wed, Jan 10, 2007 at 10:04:11AM +0100, Jarek Poplawski wrote: > ... > > It looks like you're talking about the right thing > > and I'm a fool again! Now I try to find why I even > > had to pay for this. I read agai

Re: [PATCH] d80211: don't symlink empty default keys

2007-01-10 Thread Jiri Benc
On Tue, 09 Jan 2007 23:33:34 +0100, Jan Kiszka wrote: > This gets rid of annoying > > wlan0: cannot create symlink to default key > > in my syslog with latest rt2x00. The patch takes care that in case of > (key/old_key == NULL && set_tx_key) the existing default key symlink is > removed correctly

Re: [PATCH 1/1] bonding: eliminate RTNL assertion spew

2007-01-10 Thread Andy Gospodarek
On Tue, Jan 09, 2007 at 03:09:35PM -0800, Stephen Hemminger wrote: > On Tue, 9 Jan 2007 17:59:01 -0500 > Andy Gospodarek <[EMAIL PROTECTED]> wrote: > > > > > These changes eliminate the messages indicating that the rtnetlink lock > > isn't held when bonding tries to change the MAC address of an i

Re: [PATCH] [SCTP]: Fix err_hdr assignment in sctp_init_cause.

2007-01-10 Thread Sridhar Samudrala
On Tue, 2007-01-09 at 14:36 -0800, David Miller wrote: > From: Sridhar Samudrala <[EMAIL PROTECTED]> > Date: Tue, 09 Jan 2007 11:26:49 -0800 > > > [SCTP]: Fix err_hdr assignment in sctp_init_cause. > > > > The subh->err_hdr should point to the error header, not the data. > > > > Signed-off-by: Vla

RE: d80211: How does TX flow control work?

2007-01-10 Thread Simon Barber
Scratches head -- this is from memory when I was thinking about this problem a long time ago... I think we can return an error in the qdisc destructor function - making sure legitimate interface removal is not the cause of the qdisc deletion first of course. Simon -Original Message- From

Re: d80211: How does TX flow control work?

2007-01-10 Thread Jiri Benc
On Mon, 08 Jan 2007 21:18:48 +0100, Jan Kiszka wrote: > The actual problem was meanwhile identified: shorewall happened to > overwrite the queueing discipline of wmaster0 with pfifo_fast. I found > the magic knob to tell shorewall to no longer do this (at least until I > want to manage traffic cont

RE: [IPSEC] flow: Cache negative results

2007-01-10 Thread Venkat Yekkirala
> > This patch causes security policy denials to be cached instead of > > causing a relookup every time. Only, on a security policy denial (-ESRCH from the LSM hook), a 0 is returned by the resolver to signify no applicable policy since a negative result is akin to no policy. And I see the "no pol

[PATCH] Broadcom 4400 resume small fix (v2)

2007-01-10 Thread Dmitriy Monakhov
Changes from v1: - Fix according to Francois Romieu comments. LOG: Some issues in b44_resume(). - Return value of pci_enable_device() was ignored. - If request_irq() has failed we have to just disable device and exit. Signed-off-by: Dmitriy Monakhov <[EMAIL PROTECTED]> --- diff --git a/driver

Re: kernel BUG in eth_alloc_tx_desc_index at drivers/net/mv643xx_eth.c:1069!

2007-01-10 Thread Thibaut VARENE
On 1/9/07, Thibaut VARENE <[EMAIL PROTECTED]> wrote: On 1/9/07, Dale Farnsworth <[EMAIL PROTECTED]> wrote: > > Thank you Thibaut. Please try the following patch: > > From: Dale Farnsworth <[EMAIL PROTECTED]> > > Reserve one unused descriptor in the TX ring > to facilitate testing for when the ri

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread Paul Moore
On Wednesday, January 10 2007 2:22 am, Herbert Xu wrote: > Hi: > > [IPSEC] flow: Cache negative security checks Hi Herbert, I'm far from a flow cache expert (David, James, and Venkat will probably be able to give you much better feedback) I did notice a few things which may or may not be issues

RE: [IPSEC] flow: Cache negative results

2007-01-10 Thread Venkat Yekkirala
> > So if the security folks actually care about this, they'd need to > > flush the flow cache whenever a relevant change is made to the > > security database. I do not believe we are doing this. I will look into this ASAP. - To unsubscribe from this list: send the line "unsubscribe netdev" in the

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread James Morris
On Wed, 10 Jan 2007, Herbert Xu wrote: > Hi: > > [IPSEC] flow: Cache negative security checks We did some work in this part of the code a few months back -- IIRC it was resolved correctly from a security point of view. (cc'ing Venkat & Paul for review). > > This patch causes security policy

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread Patrick McHardy
Ingo Oeser wrote: > Patrick McHardy schrieb: > >>We support bitwise use of the mark everywhere in current kernels, so >>that shouldn't be a problem anymore. > > > For firewall mark based policy routing to work, one must still disable > rp_filter, because this lookup doesn't take the mark into a

Re: [PATCH] INET: fix incorrect "inet_sock->is_icsk" assignment

2007-01-10 Thread Jarek Poplawski
On Wed, Jan 10, 2007 at 08:13:57AM -0500, Paul Moore wrote: > On Wednesday 10 January 2007 5:01 am, Jarek Poplawski wrote: > > On Tue, Jan 09, 2007 at 09:26:46AM -0500, Paul Moore wrote: > > > On Tuesday 09 January 2007 3:43 am, Jarek Poplawski wrote: > > > > ... But if you consider this code will

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread Ingo Oeser
Patrick McHardy schrieb: > We support bitwise use of the mark everywhere in current kernels, so > that shouldn't be a problem anymore. For firewall mark based policy routing to work, one must still disable rp_filter, because this lookup doesn't take the mark into account[1]. So this statement is

Re: [PATCH] INET: fix incorrect "inet_sock->is_icsk" assignment

2007-01-10 Thread Paul Moore
On Wednesday 10 January 2007 5:01 am, Jarek Poplawski wrote: > On Tue, Jan 09, 2007 at 09:26:46AM -0500, Paul Moore wrote: > > On Tuesday 09 January 2007 3:43 am, Jarek Poplawski wrote: > > > ... But if you consider this code will probably become classical > > > and will be read, quoted and teached

Re: BUG: soft lockup detected on CPU#0! (2.6.18.2 plus hacks)

2007-01-10 Thread Jarek Poplawski
On Wed, Jan 10, 2007 at 10:04:11AM +0100, Jarek Poplawski wrote: ... > It looks like you're talking about the right thing > and I'm a fool again! Now I try to find why I even > had to pay for this. I read again and again adequate > chapters from R. Love and C. Benvenuti's books, see > a lot about

Re: [PATCH/RFC 09/10] iptables TPROXY target

2007-01-10 Thread Patrick McHardy
KOVACS Krisztian wrote: > diff --git a/net/ipv4/netfilter/ipt_TPROXY.c b/net/ipv4/netfilter/ipt_TPROXY.c > new file mode 100644 > index 000..6f64717 > --- /dev/null > +++ b/net/ipv4/netfilter/ipt_TPROXY.c > +static unsigned int > +target(struct sk_buff **pskb, > + const struct net_devic

Re: [PATCH/RFC 08/10] iptables tproxy table

2007-01-10 Thread Patrick McHardy
KOVACS Krisztian wrote: > diff --git a/net/ipv4/netfilter/iptable_tproxy.c > b/net/ipv4/netfilter/iptable_tproxy.c > new file mode 100644 > index 000..6049c83 > --- /dev/null > +++ b/net/ipv4/netfilter/iptable_tproxy.c > @@ -0,0 +1,253 @@ > +/* > + * Transparent proxy support for Linux/iptabl

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread Patrick McHardy
Balazs Scheidler wrote: > On Wed, 2007-01-10 at 07:46 +0100, Patrick McHardy wrote: > >>I'm wondering if it would be possible to use normal input routing >>combined with netfilter marks to do the diversion .. > > > The problem is that userspace proxies open ports dynamically (think of > FTP data

[2.4 PATCH] ethernet (net/ethernet/eth.c): eth_header() may produce invalid packets (with dest. addr. = 00:00:00:00:00:00)

2007-01-10 Thread Christian Praehauser
Hello, and sorry for bothering you with a patch you've already seen ;-). From: Christian Praehauser, Department of Computer Sciences, University of Salzburg This patch fixes a problem which has already been corrected in Linux-2.6.16 but was not back-ported to the 2.4 series. It is essentially t

Kevent bonus: epoll implementaion over kevent.

2007-01-10 Thread Evgeniy Polyakov
As a usage scenario, compile-tested only. Replace fs/eventpoll.c with this code and see, how your kernel crashes. Or works. :) Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> #include #include #include #include #include #include #include #include #include #include asmlinkage long

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread Patrick McHardy
KOVACS Krisztian wrote: > On Wednesday 10 January 2007 07:46, Patrick McHardy wrote: > >>>+if (sk) { >>>+sock_hold(sk); >>>+skb->sk = sk; >> >>This looks racy, the socket could be closed between the lookup and >>the actual

Re: [take32 0/10] kevent: Generic event handling mechanism.

2007-01-10 Thread Evgeniy Polyakov
On Wed, Jan 10, 2007 at 06:56:40AM -0500, Jeff Garzik ([EMAIL PROTECTED]) wrote: > >It was there, but Andrew dropped it somewhere about take25 :) > > Probably because it was a moving target with a high rate of change, > requiring time that Andrew did not have just to keep in sync and fix > build

Re: Fw: Intermittent SCTP multihoming breakage

2007-01-10 Thread Steve Hill
On Wed, 3 Jan 2007, Sridhar Samudrala wrote: Sorry for the delay in replying. > No. lksctp-developers mailing list is still the best place for SCTP related > discussions. You can subscribe and look in the archives at > http://lists.sourceforge.net/lists/listinfo/lksctp-developers Hmm, I had a

Re: [take32 0/10] kevent: Generic event handling mechanism.

2007-01-10 Thread Jeff Garzik
Evgeniy Polyakov wrote: On Wed, Jan 10, 2007 at 06:11:26AM -0500, Jeff Garzik ([EMAIL PROTECTED]) wrote: Once the rate of change slows, Andrew should IMO definitely pick this up. There are _tons_ of ideas to implement with kevent - so if we want, rate will not slow down. As you can see, from t

Re: [take32 0/10] kevent: Generic event handling mechanism.

2007-01-10 Thread Evgeniy Polyakov
On Wed, Jan 10, 2007 at 06:11:26AM -0500, Jeff Garzik ([EMAIL PROTECTED]) wrote: > Once the rate of change slows, Andrew should IMO definitely pick this up. There are _tons_ of ideas to implement with kevent - so if we want, rate will not slow down. As you can see, from take26 I only send new feat

Re: [PATCH 1/5] fixing errors handling during pci_driver resume stage [net]

2007-01-10 Thread Dmitriy Monakhov
Stephen Hemminger <[EMAIL PROTECTED]> writes: > On Tue, 09 Jan 2007 12:01:14 +0300 > Dmitriy Monakhov <[EMAIL PROTECTED]> wrote: > >> network pci drivers have to return correct error code during resume stage in >> case of errors. >> Signed-off-by: Dmitriy Monakhov <[EMAIL PROTECTED]> >> - > >

Re: [take32 0/10] kevent: Generic event handling mechanism.

2007-01-10 Thread Jeff Garzik
Evgeniy Polyakov wrote: Generic event handling mechanism. Kevent is a generic subsytem which allows to handle event notifications. It supports both level and edge triggered events. It is similar to poll/epoll in some cases, but it is more scalable, it is faster and allows to work with essentiall

Re: [RFC][PATCH -mm take2 3/5] add interface for netconsole using sysfs

2007-01-10 Thread Keiichi KII
>> create a sysfs entry for netconsole in /sys/class/misc. >> This entry has elements related to netconsole as follows. >> You can change configuration of netconsole(writable attributes such as IP >> address, port number and so on) and check current configuration of >> netconsole. >> >> -+- /sys/c

2.6.20-rc4 sky2 unsupported chip type 0xff / phy write timeout

2007-01-10 Thread Florian Lohoff
Hi, i have random problems after fresh boot with the onboard sky2 on an Fujitsu Siemens Lifebook E8110. With 2.6.18-686-3 from the Debian repository i see random crashes on boot - see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=404107 With a Linux machine 2.6.20-rc4 #0 SMP PREEMP

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread KOVACS Krisztian
Hi, On Wednesday 10 January 2007 07:46, Patrick McHardy wrote: > > + rcu_read_lock(); > > + for (rth = rcu_dereference(rt_hash_table[hash].chain); rth; > > +rth = rcu_dereference(rth->u.rt_next)) { > > + if (rth->fl.fl4_dst == iph->daddr && > > + rth->fl.fl4_

Re: [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs

2007-01-10 Thread Balazs Scheidler
On Wed, 2007-01-10 at 07:46 +0100, Patrick McHardy wrote: > KOVACS Krisztian wrote: > > + rth->u.dst.lastuse = jiffies; > > + dst_hold(&rth->u.dst); > > + rth->u.dst.__use++; > > + RT_CACHE_STAT_INC(in_hit); > > +

[IPROUTE 04/05]: Replace "usec" by "time" in function names

2007-01-10 Thread Patrick McHardy
[IPROUTE]: Replace "usec" by "time" in function names Rename functions containing "usec" since they don't necessarily return usec units anymore. Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]> --- commit d1980613b2921fcc288858f4c63727f28ca49607 tree b67f63e36a80cad46173635c5c7ba65305fa8aed pa

[IPROUTE 03/05]: Introduce TIME_UNITS_PER_SEC to represent internal clock resolution

2007-01-10 Thread Patrick McHardy
[IPROUTE]: Introduce TIME_UNITS_PER_SEC to represent internal clock resolution Introduce TIME_UNITS_PER_SEC and conversion functions between internal resolution and resolution expected by the kernel (currently implemented as NOPs, only needed by HFSC, which currently always uses microseconds). Si

[IPROUTE 05/05]: Add sprint_ticks() function and use in CBQ

2007-01-10 Thread Patrick McHardy
[IPROUTE]: Add sprint_ticks() function and use in CBQ Add helper function to print ticks to avoid assumptions about clock resolution in CBQ. Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]> --- commit 408fb739030c2667bbc02187018c9e504384cdec tree 21d2f5117d7f6f1fe18b5e7b5fa1a0627d1b7efc parent

[IPROUTE 02/05]: Introduce tc_calc_xmitsize and use where appropriate

2007-01-10 Thread Patrick McHardy
[IPROUTE]: Introduce tc_calc_xmitsize and use where appropriate Add tc_calc_xmitsize() as complement to tc_calc_xmittime(), which calculates the size that can be transmitted at a given rate during a given time. Replace all expressions of the form "size = rate*tc_core_tick2usec(time))/100" by

[IPROUTE 01/05]: Use tc_calc_xmittime where appropriate

2007-01-10 Thread Patrick McHardy
[IPROUTE]: Use tc_calc_xmittime where appropriate Replace expressions of the form "100 * size/rate" by tc_calc_xmittime(). The CBQ case deserves an extra comment: when called with bnwd=rate tc_cbq_calc_maxidle behaves identical to tc_calc_xmittime, so use it for clarity. Signed-off-by: Patric

[IPROUTE 00/05]: Time cleanups

2007-01-10 Thread Patrick McHardy
These patches clean up the tc time handling a bit, with the goal of making it easier to audit for integer overflows when increasing the internal clock resolution, which is necessary for all token bucket based schedulers to take advantage of a higher kernel clock resolution (ktime) because the kerne

Re: [PATCH/RFC 05/10] Remove local address check on IP output

2007-01-10 Thread KOVACS Krisztian
Hi, On Wednesday 10 January 2007 07:47, Patrick McHardy wrote: > > diff --git a/net/ipv4/route.c b/net/ipv4/route.c > > index 537b976..bb1158a 100644 > > --- a/net/ipv4/route.c > > +++ b/net/ipv4/route.c > > @@ -2498,11 +2498,6 @@ #endif > > ZERONET(oldflp->fl4_src)) > >

Re: [PATCH] INET: fix incorrect "inet_sock->is_icsk" assignment

2007-01-10 Thread Jarek Poplawski
On Tue, Jan 09, 2007 at 09:26:46AM -0500, Paul Moore wrote: > On Tuesday 09 January 2007 3:43 am, Jarek Poplawski wrote: > > ... But if you consider this code will probably become classical > > and will be read, quoted and teached next 1000 years, then the style > > could matter... > > This from

Re: [PACKET]: Add PACKET_AUXDATA cmsg

2007-01-10 Thread David Miller
From: Herbert Xu <[EMAIL PROTECTED]> Date: Wed, 10 Jan 2007 13:54:35 +1100 > [PACKET]: Add optional checksum computation for recvmsg This looks good, thanks Herbert. I'll queue it up for 2.6.21 - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL

Re: [IPSEC] flow: Cache negative results

2007-01-10 Thread David Miller
From: Herbert Xu <[EMAIL PROTECTED]> Date: Wed, 10 Jan 2007 18:22:51 +1100 > This patch also happens to fix a nasty bug where if an expiring > flow entry that's not at the head happens to trigger a security > denial, all entries before it are removed from the cache and > leaked. Nasty, this is be

Re: BUG: soft lockup detected on CPU#0! (2.6.18.2 plus hacks)

2007-01-10 Thread Jarek Poplawski
On Tue, Jan 09, 2007 at 09:10:45AM +0100, Jarek Poplawski wrote: > On Mon, Jan 08, 2007 at 10:03:50AM -0800, Stephen Hemminger wrote: ... > > > > * Must be invoked with RCU read lock (no preempt) > > > > */ > > > > struct net_device *__find_vlan_dev(struct net_device *real_dev, > > > > ... > > >

Re: [PATCH 3/3] chelsio: more rx speedup

2007-01-10 Thread Ingo Oeser
Divy Le Ray schrieb: > Stephen Hemminger wrote: > > On Tue, 9 Jan 2007 09:42:03 +0100 > > Ingo Oeser <[EMAIL PROTECTED]> wrote: > >> Stephen Hemminger schrieb: > >>> - if (fl->credits < drop_thres) { > >>> +use_orig_buf: > >>> + if (fl->credits < 2) { > >>> > >> Why 2? What does this magic n

Re: [PATCH 3/3] chelsio: more rx speedup

2007-01-10 Thread Ingo Oeser
Stephen Hemminger schrieb: > On Tue, 9 Jan 2007 09:42:03 +0100 > Ingo Oeser <[EMAIL PROTECTED]> wrote: > > Stephen Hemminger schrieb: > > > --- netdev-2.6.orig/drivers/net/chelsio/sge.c > > > +++ netdev-2.6/drivers/net/chelsio/sge.c > > Please use NET_IP_ALIGN here: > > Wrong, NET_IP_ALIGN is inte

[take32 10/10] kevent: Kevent based AIO (aio_sendfile()).

2007-01-10 Thread Evgeniy Polyakov
Kevent based AIO (aio_sendfile()). aio_sendfile() contains of two major parts: AIO state machine and page processing code. The former is just a small subsystem, which allows to queue callback for theirs invocation in process' context on behalf of pool of kernel threads. It allows to queue cach

[take32 0/10] kevent: Generic event handling mechanism.

2007-01-10 Thread Evgeniy Polyakov
Generic event handling mechanism. Kevent is a generic subsytem which allows to handle event notifications. It supports both level and edge triggered events. It is similar to poll/epoll in some cases, but it is more scalable, it is faster and allows to work with essentially eny kind of events. Ev

[take32 1/10] kevent: Description.

2007-01-10 Thread Evgeniy Polyakov
Description. diff --git a/Documentation/kevent.txt b/Documentation/kevent.txt new file mode 100644 index 000..325204f --- /dev/null +++ b/Documentation/kevent.txt @@ -0,0 +1,259 @@ +Description. + +int kevent_init(struct kevent_ring *ring, unsigned int ring_size, + unsigned int flags)

[take32 9/10] kevent: Private userspace notifications.

2007-01-10 Thread Evgeniy Polyakov
Private userspace notifications. Allows to register notifications of any private userspace events over kevent. Events can be marked as readt using kevent_ctl(KEVENT_READY) command. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git a/kernel/kevent/kevent_unotify.c b/kernel/kevent/k

[take32 3/10] kevent: poll/select() notifications.

2007-01-10 Thread Evgeniy Polyakov
poll/select() notifications. This patch includes generic poll/select notifications. kevent_poll works simialr to epoll and has the same issues (callback is invoked not from internal state machine of the caller, but through process awake, a lot of allocations and so on). Signed-off-by: Evgeniy Po

[take32 6/10] kevent: Pipe notifications.

2007-01-10 Thread Evgeniy Polyakov
Pipe notifications. diff --git a/fs/pipe.c b/fs/pipe.c index 68090e8..0c75bf1 100644 --- a/fs/pipe.c +++ b/fs/pipe.c @@ -16,6 +16,7 @@ #include #include #include +#include #include #include @@ -313,6 +314,7 @@ redo: break; } if

[take32 5/10] kevent: Timer notifications.

2007-01-10 Thread Evgeniy Polyakov
Timer notifications. Timer notifications can be used for fine grained per-process time management, since interval timers are very inconvenient to use, and they are limited. This subsystem uses high-resolution timers. id.raw[0] is used as number of seconds id.raw[1] is used as number of nanosec

[take32 4/10] kevent: Socket notifications.

2007-01-10 Thread Evgeniy Polyakov
Socket notifications. This patch includes socket send/recv/accept notifications. Using trivial web server based on kevent and this features instead of epoll it's performance increased more than noticebly. More details about various benchmarks and server itself (evserver_kevent.c) can be found on

[take32 8/10] kevent: Kevent posix timer notifications.

2007-01-10 Thread Evgeniy Polyakov
Kevent posix timer notifications. Simple extensions to POSIX timers which allows to deliver notification of the timer expiration through kevent queue. Example application posix_timer.c can be found in archive on project homepage. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git

[take32 7/10] kevent: Signal notifications.

2007-01-10 Thread Evgeniy Polyakov
Signal notifications. This type of notifications allows to deliver signals through kevent queue. One can find example application signal.c on project homepage. If KEVENT_SIGNAL_NOMASK bit is set in raw_u64 id then signal will be delivered only through queue, otherwise both delivery types are use