Re: Bonding support for eth1394?

2007-10-13 Thread Stefan Richter
(Adding Cc: netdev) Karl Svec wrote to linux1394-devel: I'm trying to create a bonded network interface for an Xdmx setup out of a regular ethernet device (sungem) and a firewire ethernet (eth1394) device. However, ifenslave fails on the firewire device, and gives me the following

Re: Kernel panic (network stack)

2007-10-13 Thread xeb
Hello! I develop network driver. It works fine while less then 100 network interfaces exists. Then i give kernel panic. What could cause it ? Since it probably in your code. Please code (or place to download) the driver code. You can download from

Re: tc_verd vs. skb_clone

2007-10-13 Thread jamal
On Fri, 2007-12-10 at 22:00 +0800, Herbert Xu wrote: Hi Jamal: I was wondering why we're not copying tc_verd as is in skb_clone. In particular, this makes pskb_copy behave differently compared to skb_clone and I can't find a justificatino for it. Any ideas? In the case of an action

Re: MSI interrupts and disable_irq

2007-10-13 Thread Manfred Spraul
Jeff Garzik wrote: I think the scenario you outline is an illustration of the approach's fragility: disable_irq() is a heavy hammer that originated with INTx, and it relies on a chip-specific disable method (kernel/irq/manage.c) that practically guarantees behavior will vary across

[PATCH 1/5] myri10ge: fix some indentation, white spaces, and comments

2007-10-13 Thread Brice Goglin
Fix one comment in myri10ge.c and update indendation and white spaces to match the code generated by indent from upstream CVS. Signed-off-by: Brice Goglin [EMAIL PROTECTED] --- drivers/net/myri10ge/myri10ge.c | 11 +-- 1 file changed, 5 insertions(+), 6 deletions(-) Index:

[PATCH 0/5] myri10ge updates for 2.6.24

2007-10-13 Thread Brice Goglin
Hi Jeff, Now that LRO and the new NAPI have landed in myri10ge for 2.6.24, here's a couple updates. The big part is support for IPv6 TSO, which requires the addition of skb_is_gso_v6(). I am CC'ing Dave and Herbert in the corresponding mails. The other patches are trivial. 1. myri10ge: fix some

[PATCH 2/5] myri10ge: update firmware headers

2007-10-13 Thread Brice Goglin
Update myri10ge firmware headers to latest upstream version with TSO6 and RSS support. Signed-off-by: Brice Goglin [EMAIL PROTECTED] --- drivers/net/myri10ge/myri10ge_mcp.h | 90 ++-- 1 file changed, 86 insertions(+), 4 deletions(-) Index:

[PATCH 5/5] myri10ge: update driver version to 1.3.2-1.287

2007-10-13 Thread Brice Goglin
The myri10ge driver is now at version 1.3.2-1.287. Signed-off-by: Brice Goglin [EMAIL PROTECTED] --- drivers/net/myri10ge/myri10ge.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: linux-git/drivers/net/myri10ge/myri10ge.c

[PATCH 3/5] [IPV6]: Add skb_is_gso_v6

2007-10-13 Thread Brice Goglin
Add skb_is_gso_v6(). Signed-off-by: Brice Goglin [EMAIL PROTECTED] --- include/linux/skbuff.h |5 + 1 file changed, 5 insertions(+) Index: linux-git/include/linux/skbuff.h === --- linux-git.orig/include/linux/skbuff.h

[PATCH 4/5] myri10ge: add IPv6 TSO support

2007-10-13 Thread Brice Goglin
Add support for IPv6 TSO to the myri10ge driver. Signed-off-by: Brice Goglin [EMAIL PROTECTED] --- drivers/net/myri10ge/myri10ge.c | 87 1 file changed, 79 insertions(+), 8 deletions(-) Index: linux-git/drivers/net/myri10ge/myri10ge.c

[patch 6/8] m68k: fix net drivers after recent get_stats updates

2007-10-13 Thread Geert Uytterhoeven
m68k: fix net drivers after recent get_stats updates Signed-off-by: Geert Uytterhoeven [EMAIL PROTECTED] --- drivers/net/macmace.c |6 +++--- drivers/net/mvme147.c |1 - 2 files changed, 3 insertions(+), 4 deletions(-) --- a/drivers/net/macmace.c +++ b/drivers/net/macmace.c @@ -538,8

[patch 8/8] ssb bus needs linux/io.h

2007-10-13 Thread Geert Uytterhoeven
ssb bus needs linux/io.h linux/drivers/ssb/main.c: In function 'ssb_ssb_read16': linux/drivers/ssb/main.c:518: error: implicit declaration of function 'readw' linux/drivers/ssb/main.c: In function 'ssb_ssb_read32': linux/drivers/ssb/main.c:526: error: implicit declaration of function 'readl'

Re: [PATCH] Update function names in /proc/net/tcp documentation

2007-10-13 Thread Jean Delvare
Hi Rick, On Fri, 12 Oct 2007 16:13:32 -0700, Rick Jones wrote: Jean Delvare wrote: Update function name references to match the current code. Signed-off-by: Jean Delvare [EMAIL PROTECTED] --- Documentation/networking/proc_net_tcp.txt |4 ++-- 1 file changed, 2 insertions(+), 2

Re: [patch 6/8] m68k: fix net drivers after recent get_stats updates

2007-10-13 Thread Jeff Garzik
ACK - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] Update function names in /proc/net/tcp documentation

2007-10-13 Thread Herbert Xu
Jean Delvare [EMAIL PROTECTED] wrote: I didn't know that, sorry. What is the new interface to access the TCP information? inet_diag is the preferred interface. Cheers, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED] Home Page:

Re: 2.6.23-mm1 thread exit_group issue

2007-10-13 Thread Oleg Nesterov
On 10/12, Andrew Morton wrote: On Fri, 12 Oct 2007 15:47:59 -0400 Mathieu Desnoyers [EMAIL PROTECTED] wrote: Hi Andrew, I noticed a regression between 2.6.23-rc8-mm2 and 2.6.23-mm1 (with your hotfixes). User space threads seems to receive a ERESTART_RESTARTBLOCK as soon as a thread

Re: 2.6.23-mm1 thread exit_group issue

2007-10-13 Thread Oleg Nesterov
On 10/13, Oleg Nesterov wrote: On 10/12, Andrew Morton wrote: Bisection shows that this problem is caused by these two patches: pid-namespaces-allow-cloning-of-new-namespace.patch This? http://marc.info/?l=linux-mm-commitsm=118712242002039 Pavel, this patch has a subtle difference

Bluetooth wireless mouse very sluggish when there is moderated network activity

2007-10-13 Thread Ismail Dönmez
Hi all, I got a Bluetooth wireless mouse identifed as, input: Microsoft Microsoft� Wireless Notebook Presenter Mouse 8000 as /devices/pci:00/:00:1d.1/usb3/3-1/3-1.3/3-1.3:1.0/input/input12 input: USB HID v1.11 Mouse [Microsoft Microsoft� Wireless Notebook Presenter Mouse 8000] on

Re: Bluetooth wireless mouse very sluggish when there is moderate network activity

2007-10-13 Thread Ismail Dönmez
s/moderated/moderate of course :-/ Saturday 13 October 2007 Tarihinde 17:13:03 yazmıştınız: Hi all, I got a Bluetooth wireless mouse identifed as, input: Microsoft Microsoft� Wireless Notebook Presenter Mouse 8000 as /devices/pci:00/:00:1d.1/usb3/3-1/3-1.3/3-1.3:1.0/input/input12

Re: Non-linear SKBs

2007-10-13 Thread Kristian Evensen
Reading through my mail again, I see that I was a bit unclear. What I want to achieve is to share a frag between to skbs (where one has no earlier referance to it). Sorry. [EMAIL PROTECTED] wrote: If the underlying device can do scatter-gather and checksumming, the TCP code builds outgoing

Re: [PATCH] IB/ipoib: Bound the net device to the ipoib_neigh structue

2007-10-13 Thread Moni Shoua
I will be near my lab only tomorrow... I will check this and let you know. On 10/11/07, Roland Dreier [EMAIL PROTECTED] wrote: It happens only when ib interfaces are slaves of a bonding device. I thought before that the stuck is in napi_disable() but it's almost right. I put prints

Re: [patch 8/8] ssb bus needs linux/io.h

2007-10-13 Thread Michael Buesch
On Saturday 13 October 2007 14:31:31 Geert Uytterhoeven wrote: ssb bus needs linux/io.h linux/drivers/ssb/main.c: In function 'ssb_ssb_read16': linux/drivers/ssb/main.c:518: error: implicit declaration of function 'readw' linux/drivers/ssb/main.c: In function 'ssb_ssb_read32':

Re: Bonding support for eth1394?

2007-10-13 Thread Roland Dreier
The bonding sources have a few occurrences of EOPNOTSUPP. Unless I missed something, they are all related to setting the hardware address of the interface. AFAICS this is impossible with IP over FireWire. If it is crucial to bonding to be able to change the slaves' hardware addresses,

[PATCH] tehuti: possible leak in bdx_probe

2007-10-13 Thread Florin Malita
If pci_enable_device fails, bdx_probe returns without freeing the allocated pci_nic structure. Coverity CID 1908. Signed-off-by: Florin Malita [EMAIL PROTECTED] --- drivers/net/tehuti.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/tehuti.c

[PATCH 10/14] iptables socket match

2007-10-13 Thread KOVACS Krisztian
Add iptables 'socket' match, which matches packets for which a TCP/UDP socket lookup succeeds. Signed-off-by: Jan Engelhardt [EMAIL PROTECTED] Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- net/netfilter/Kconfig | 14 ++ net/netfilter/Makefile|1

[PATCH 11/14] iptables TPROXY target

2007-10-13 Thread KOVACS Krisztian
The TPROXY target implements redirection of non-local TCP/UDP traffic to local sockets. Additionally, it's possible to manipulate the packet mark if and only if a socket has been found. (We need this because we cannot use multiple targets in the same iptables rule.) Signed-off-by: Jan Engelhardt

[PATCH 12/14] Don't lookup the socket if there's a socket attached to the skb

2007-10-13 Thread KOVACS Krisztian
Use the socket cached in the TPROXY target if it's present. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- net/ipv4/tcp_ipv4.c |8 1 files changed, 8 insertions(+), 0 deletions(-) diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index fb471b0..90ee2ca 100644 ---

[PATCH 13/14] Don't lookup the socket if there's a socket attached to the skb

2007-10-13 Thread KOVACS Krisztian
Use the socket cached in the TPROXY target if it's present. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- net/ipv4/udp.c |8 1 files changed, 8 insertions(+), 0 deletions(-) diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 053d5c4..6592689 100644 --- a/net/ipv4/udp.c +++

[PATCH 14/14] Add documentation

2007-10-13 Thread KOVACS Krisztian
Add basic usage instructions to Documentation/networking. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- Documentation/networking/tproxy.txt | 62 +++ 1 files changed, 62 insertions(+), 0 deletions(-) diff --git a/Documentation/networking/tproxy.txt

Re: 2.6.23-mm1 thread exit_group issue

2007-10-13 Thread Andrew Morton
On Sat, 13 Oct 2007 16:02:30 +0400 Oleg Nesterov [EMAIL PROTECTED] wrote: On 10/13, Oleg Nesterov wrote: On 10/12, Andrew Morton wrote: Bisection shows that this problem is caused by these two patches: pid-namespaces-allow-cloning-of-new-namespace.patch This?

Re: Bonding support for eth1394?

2007-10-13 Thread Stefan Richter
Roland Dreier wrote: There are a few changes to the bonding driver pending that will add support for bonding IP-over-InfiniBand interfaces. IPoIB also cannot change its HW address, so the patches address that issue. Once those patches land, bonding eth1394 interfaces may just work. Sounds

[PATCH 00/14] Transparent Proxying Patches, Take 5

2007-10-13 Thread KOVACS Krisztian
Hi Dave, This is the fifth round of transparent proxying patches following recent discussion on netfilter-devel [1,2]. The aim of the patchset is to make non-locally bound sockets work both for receiving and sending. The target is IPv4 TCP/UDP at the moment. Speaking of the patches, there are

[PATCH 01/14] Loosen source address check on IPv4 output

2007-10-13 Thread KOVACS Krisztian
ip_route_output() contains a check to make sure that no flows with non-local source IP addresses are routed. This obviously makes using such addresses impossible. This patch introduces a flowi flag which makes omitting this check possible. The new flag provides a way of handling transparent and

[PATCH 02/14] Implement IP_TRANSPARENT socket option

2007-10-13 Thread KOVACS Krisztian
This patch introduces the IP_TRANSPARENT socket option: enabling that will make the IPv4 routing omit the non-local source address check on output. Setting IP_TRANSPARENT requires NET_ADMIN capability. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] Acked-by: Patrick McHardy [EMAIL PROTECTED]

[PATCH 03/14] Allow binding to non-local addresses if IP_TRANSPARENT is set

2007-10-13 Thread KOVACS Krisztian
Setting IP_TRANSPARENT is not really useful without allowing non-local binds for the socket. To make user-space code simpler we allow these binds even if IP_TRANSPARENT is set but IP_FREEBIND is not. Signed-off-by: Tóth László Attila [EMAIL PROTECTED] Acked-by: Patrick McHardy [EMAIL PROTECTED]

[PATCH 04/14] Conditionally enable transparent flow flag when connecting

2007-10-13 Thread KOVACS Krisztian
Set FLOWI_FLAG_ANYSRC in flowi-flags if the socket has the transparent socket option set. This way we selectively enable certain connections with non-local source addresses to be routed. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- include/net/route.h |4 1 files changed, 4

[PATCH 06/14] Port redirection support for TCP

2007-10-13 Thread KOVACS Krisztian
Current TCP code relies on the local port of the listening socket being the same as the destination address of the incoming connection. Port redirection used by many transparent proxying techniques obviously breaks this, so we have to store the original destination port address. This patch

[PATCH 07/14] Export UDP socket lookup function

2007-10-13 Thread KOVACS Krisztian
The iptables tproxy code has to be able to do UDP socket hash lookups, so we have to provide an exported lookup function for this purpose. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- include/net/udp.h |4 net/ipv4/udp.c|8 2 files changed, 12 insertions(+), 0

[PATCH 08/14] Split Netfilter IPv4 defragmentation into a separate module

2007-10-13 Thread KOVACS Krisztian
Netfilter connection tracking requires all IPv4 packets to be defragmented. Both the socket match and the TPROXY target depend on this functionality, so this patch separates the Netfilter IPv4 defrag hooks into a separate module. Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] ---

[PATCH 09/14] iptables tproxy core

2007-10-13 Thread KOVACS Krisztian
The iptables tproxy core is a module that contains the common routines used by various tproxy related modules (TPROXY target and socket match) Signed-off-by: KOVACS Krisztian [EMAIL PROTECTED] --- include/net/netfilter/nf_tproxy_core.h | 32 +++ net/netfilter/Kconfig

[PATCH 05/14] Handle TCP SYN+ACK/ACK/RST transparency

2007-10-13 Thread KOVACS Krisztian
The TCP stack sends out SYN+ACK/ACK/RST reply packets in response to incoming packets. The non-local source address check on output bites us again, as replies for transparently redirected traffic won't have a chance to leave the node. This patch selectively sets the FLOWI_FLAG_ANYSRC flag when

Re: [PATCH 00/14] Transparent Proxying Patches, Take 5

2007-10-13 Thread David Miller
From: KOVACS Krisztian [EMAIL PROTECTED] Date: Sat, 13 Oct 2007 19:28:57 +0200 This is the fifth round of transparent proxying patches following recent discussion on netfilter-devel [1,2]. The aim of the patchset is to make non-locally bound sockets work both for receiving and sending. The

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread David Miller
From: Komuro [EMAIL PROTECTED] Date: Sun, 14 Oct 2007 07:36:58 +0900 Dear David The patch [TCP]: Set initial_ssthresh default to zero in Cubic and BIC. is not very safe. With this patch, ftp-transfer stops in my system. (vsftpd-2.0.5-8) Please revert this patch. No, I will not

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread David Miller
From: David Miller [EMAIL PROTECTED] Date: Sat, 13 Oct 2007 15:52:11 -0700 (PDT) From: Komuro [EMAIL PROTECTED] Date: Sun, 14 Oct 2007 07:36:58 +0900 BTW, even my reply didn't reach him, nifty.com reports user unknown for him. I really, truly, suspect therefore that he has other kinds of

Re: net-2.6.24 breaks powerpc mysteriously

2007-10-13 Thread Denys Vlasenko
On Friday 12 October 2007 03:45, David Miller wrote: From: Andrew Morton [EMAIL PROTECTED] Date: Thu, 11 Oct 2007 19:22:33 -0700 With net-2.6.24 (pulled yesterday) applied: g5:/usr/src/25 ml arch/powerpc/boot/inflate.o Using ARCH=powerpc CROSS_COMPILE= CHK

Re: net-2.6.24 breaks powerpc mysteriously

2007-10-13 Thread Denys Vlasenko
On Friday 12 October 2007 05:09, Paul Mackerras wrote: I supposed a hacky fix is to add __KERNEL__ ifdef protection around zlib_inflate_blob() and those troublesome includes. A nicer fix is That would do, but I don't see why zlib_inflate_blob had to be added to inflate.c rather than being

Re: 2.6.23-mm1 thread exit_group issue

2007-10-13 Thread Mathieu Desnoyers
* Oleg Nesterov ([EMAIL PROTECTED]) wrote: On 10/12, Andrew Morton wrote: On Fri, 12 Oct 2007 15:47:59 -0400 Mathieu Desnoyers [EMAIL PROTECTED] wrote: Hi Andrew, I noticed a regression between 2.6.23-rc8-mm2 and 2.6.23-mm1 (with your hotfixes). User space threads seems to

Re: net-2.6.24 breaks powerpc mysteriously

2007-10-13 Thread David Miller
From: Denys Vlasenko [EMAIL PROTECTED] Date: Sun, 14 Oct 2007 04:40:46 +0100 Please find updated patch in attachment. Compile-tested. We fixed this several days ago already. - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More

[0/10] Remove sk_buff ** from netfilter API

2007-10-13 Thread Herbert Xu
On Sun, Sep 30, 2007 at 05:38:28PM +0200, Patrick McHardy wrote: From a quick look it seems at least IPv4 and IPv6 don't need to change the skb anywhere else. It seems to be necessary for bridging though to unshare the skb. OTOH br_netfilter.c already unshares the skb for IPv4 and IPv6, so we

[PATCH 1/10] [SKBUFF]: Merge common code between copy_skb_header and skb_clone

2007-10-13 Thread Herbert Xu
[SKBUFF]: Merge common code between copy_skb_header and skb_clone This patch creates a new function __copy_skb_header to merge the common code between copy_skb_header and skb_clone. Having two functions which are largely the same is a source of wasted labour as well as confusion. In fact the

[PATCH 2/10] [SKBUFF]: Add skb_morph

2007-10-13 Thread Herbert Xu
[SKBUFF]: Add skb_morph This patch creates a new function skb_morph that's just like skb_clone except that it lets user provide the spare skb that will be overwritten by the one that's to be cloned. This will be used by IP fragment reassembly so that we get back the same skb that went in last

[PATCH 3/10] [IPV4]: Make ip_defrag return the same packet

2007-10-13 Thread Herbert Xu
[IPV4]: Make ip_defrag return the same packet This patch is a bit of a hack. However it is worth it if you consider that this is the only reason why we have to carry around the struct sk_buff ** pointers in netfilter. It makes ip_defrag always return the packet that was given to it on input. It

[PATCH 4/10] [IPV4]: Change ip_defrag to return an integer

2007-10-13 Thread Herbert Xu
[IPV4]: Change ip_defrag to return an integer Now that ip_frag always returns the packet given to it on input, we can change it to return an integer indicating error instead. This patch does that and updates all its callers accordingly. Signed-off-by: Herbert Xu [EMAIL PROTECTED] ---

[PATCH 5/10] [NET]: Avoid unnecessary cloning for ingress filtering

2007-10-13 Thread Herbert Xu
[NET]: Avoid unnecessary cloning for ingress filtering As it is we always invoke pt_prev before ing_filter, even if there are no ingress filters attached. This can cause unnecessary cloning in pt_prev. This patch changes it so that we only invoke pt_prev if there are ingress filters attached.

[PATCH 6/10] [BRIDGE]: Unshare skb upon entry

2007-10-13 Thread Herbert Xu
[BRIDGE]: Unshare skb upon entry Due to the special location of the bridging hook, it should never see a shared packet anyway (certainly not with any in-kernel code). So it makes sense to unshare the skb there if necessary as that will greatly simplify the code below it (in particular,

[PATCH 8/10] [IPVS]: Replace local version of skb_make_writable

2007-10-13 Thread Herbert Xu
[IPVS]: Replace local version of skb_make_writable This patch removes the IPVS-specific version of skb_make_writable and replaces it with the netfilter one. Signed-off-by: Herbert Xu [EMAIL PROTECTED] --- include/net/ip_vs.h |1 net/ipv4/ipvs/ip_vs_app.c |5 ++--

[PATCH 7/10] [NETFILTER]: Do not copy skb in skb_make_writable

2007-10-13 Thread Herbert Xu
[NETFILTER]: Do not copy skb in skb_make_writable Now that all callers of netfilter can guarantee that the skb is not shared, we no longer have to copy the skb in skb_make_writable. Signed-off-by: Herbert Xu [EMAIL PROTECTED] --- include/linux/netfilter.h |2 -

[PATCH 9/10] [NETFILTER]: Avoid skb_copy/pskb_copy/skb_realloc_headroom

2007-10-13 Thread Herbert Xu
[NETFILTER]: Avoid skb_copy/pskb_copy/skb_realloc_headroom This patch replaces unnecessary uses of skb_copy, pskb_copy and skb_realloc_headroom by functions such as skb_make_writable and pskb_expand_head. This allows us to remove the double pointers later. Signed-off-by: Herbert Xu [EMAIL

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread David Miller
From: Komuro [EMAIL PROTECTED] Date: Sun, 14 Oct 2007 13:28:51 +0900 Dear David Komuro, every single email I sent to you bounces with user unknown, I bet it is some spam filter or similar that doesn't like the fact that I lack reverse DNS. From mailing-list-archive, I can read your

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread Komuro
Dear David Komuro, every single email I sent to you bounces with user unknown, I bet it is some spam filter or similar that doesn't like the fact that I lack reverse DNS. From mailing-list-archive, I can read your email. Best Regards Komuro Dear David Actually, tcp_sk(sk)-snd_ssthresh is

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread Komuro
Dear David Sorry, my mailer's mail-address setting is wrong. Best Regards Komuro - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [NOT VERY SAFE] [TCP]: Set initial_ssthresh default to zero in Cubic and BIC.

2007-10-13 Thread David Miller
From: Komuro [EMAIL PROTECTED] Date: Sun, 14 Oct 2007 13:53:56 +0900 Sorry, my mailer's mail-address setting is wrong. Thank you for fixing this :-) - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at