Remove redefinition of lp in tc35815.c.
drivers/net/tc35815.c: In function 'tc35815_interrupt':
drivers/net/tc35815.c:1464: error: redefinition of 'lp'
drivers/net/tc35815.c:1443: error: previous definition of 'lp' was here
Signed-off-by: Yoichi Yuasa <[EMAIL PROTECTED]>
diff -pruN -X generic/Do
On Sat, 13 Oct 2007, Stefan Richter wrote:
> Roland Dreier wrote:
> > There are a few changes to the bonding driver pending that will add
> > support for bonding IP-over-InfiniBand interfaces. IPoIB also cannot
> > change its HW address, so the patches address that issue.
> >
> > Once those patc
On 10/13/07, Manfred Spraul <[EMAIL PROTECTED]> wrote:
> Jeff Garzik wrote:
> >
> > I think the scenario you outline is an illustration of the approach's
> > fragility: disable_irq() is a heavy hammer that originated with INTx,
> > and it relies on a chip-specific disable method (kernel/irq/manage
From: Komuro <[EMAIL PROTECTED]>
Date: Sun, 14 Oct 2007 13:53:56 +0900
> Sorry, my mailer's mail-address setting is wrong.
Thank you for fixing this :-)
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http:/
Dear David
Sorry, my mailer's mail-address setting is wrong.
Best Regards
Komuro
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Dear David
>Komuro, every single email I sent to you bounces with "user unknown",
>I bet it is some spam filter or similar that doesn't like the
>fact that I lack reverse DNS.
>From mailing-list-archive,
I can read your email.
Best Regards
Komuro
> Dear David
>
> Actually, tcp_sk(sk)->snd_sst
From: Komuro <[EMAIL PROTECTED]>
Date: Sun, 14 Oct 2007 13:28:51 +0900
>
> Dear David
>
> >Komuro, every single email I sent to you bounces with "user unknown",
> >I bet it is some spam filter or similar that doesn't like the
> >fact that I lack reverse DNS.
>
> >From mailing-list-archive,
> I
[NETFILTER]: Avoid skb_copy/pskb_copy/skb_realloc_headroom
This patch replaces unnecessary uses of skb_copy, pskb_copy and
skb_realloc_headroom by functions such as skb_make_writable and
pskb_expand_head.
This allows us to remove the double pointers later.
Signed-off-by: Herbert Xu <[EMAIL PROTE
[IPVS]: Replace local version of skb_make_writable
This patch removes the IPVS-specific version of skb_make_writable and
replaces it with the netfilter one.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
include/net/ip_vs.h |1
net/ipv4/ipvs/ip_vs_app.c |5 ++--
ne
[NETFILTER]: Do not copy skb in skb_make_writable
Now that all callers of netfilter can guarantee that the skb is not shared,
we no longer have to copy the skb in skb_make_writable.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
include/linux/netfilter.h |2 -
net/ipv4/netfi
[NET]: Avoid unnecessary cloning for ingress filtering
As it is we always invoke pt_prev before ing_filter, even if there are no
ingress filters attached. This can cause unnecessary cloning in pt_prev.
This patch changes it so that we only invoke pt_prev if there are ingress
filters attached.
S
[BRIDGE]: Unshare skb upon entry
Due to the special location of the bridging hook, it should never see a
shared packet anyway (certainly not with any in-kernel code). So it
makes sense to unshare the skb there if necessary as that will greatly
simplify the code below it (in particular, netfilter)
[IPV4]: Make ip_defrag return the same packet
This patch is a bit of a hack. However it is worth it if you consider that
this is the only reason why we have to carry around the struct sk_buff **
pointers in netfilter.
It makes ip_defrag always return the packet that was given to it on input.
It
[IPV4]: Change ip_defrag to return an integer
Now that ip_frag always returns the packet given to it on input, we can
change it to return an integer indicating error instead. This patch does
that and updates all its callers accordingly.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
include
On Sun, Sep 30, 2007 at 05:38:28PM +0200, Patrick McHardy wrote:
>
> >From a quick look it seems at least IPv4 and IPv6 don't need to
> change the skb anywhere else. It seems to be necessary for
> bridging though to unshare the skb. OTOH br_netfilter.c already
> unshares the skb for IPv4 and IPv6,
[SKBUFF]: Merge common code between copy_skb_header and skb_clone
This patch creates a new function __copy_skb_header to merge the common
code between copy_skb_header and skb_clone. Having two functions which
are largely the same is a source of wasted labour as well as confusion.
In fact the tc_
[SKBUFF]: Add skb_morph
This patch creates a new function skb_morph that's just like skb_clone
except that it lets user provide the spare skb that will be overwritten
by the one that's to be cloned.
This will be used by IP fragment reassembly so that we get back the same
skb that went in last (ra
From: Denys Vlasenko <[EMAIL PROTECTED]>
Date: Sun, 14 Oct 2007 04:40:46 +0100
> Please find updated patch in attachment.
> Compile-tested.
We fixed this several days ago already.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
Mor
* Oleg Nesterov ([EMAIL PROTECTED]) wrote:
> On 10/12, Andrew Morton wrote:
> >
> > On Fri, 12 Oct 2007 15:47:59 -0400
> > Mathieu Desnoyers <[EMAIL PROTECTED]> wrote:
> >
> > > Hi Andrew,
> > >
> > > I noticed a regression between 2.6.23-rc8-mm2 and 2.6.23-mm1 (with your
> > > hotfixes). User sp
On Friday 12 October 2007 05:09, Paul Mackerras wrote:
> > I supposed a hacky fix is to add __KERNEL__ ifdef protection around
> > zlib_inflate_blob() and those troublesome includes. A nicer fix is
>
> That would do, but I don't see why zlib_inflate_blob had to be added
> to inflate.c rather than
On Friday 12 October 2007 03:45, David Miller wrote:
> From: Andrew Morton <[EMAIL PROTECTED]>
> Date: Thu, 11 Oct 2007 19:22:33 -0700
>
> > With net-2.6.24 (pulled yesterday) applied:
> >
> > g5:/usr/src/25> ml arch/powerpc/boot/inflate.o
> > Using ARCH=powerpc CROSS_COMPILE=
> > CHK inc
From: David Miller <[EMAIL PROTECTED]>
Date: Sat, 13 Oct 2007 15:52:11 -0700 (PDT)
> From: Komuro <[EMAIL PROTECTED]>
> Date: Sun, 14 Oct 2007 07:36:58 +0900
BTW, even my reply didn't reach him, nifty.com reports "user unknown"
for him.
I really, truly, suspect therefore that he has other kinds
From: Komuro <[EMAIL PROTECTED]>
Date: Sun, 14 Oct 2007 07:36:58 +0900
>
> Dear David
>
> The patch "[TCP]: Set initial_ssthresh default to zero in Cubic and BIC."
> is not very safe.
>
> With this patch, ftp-transfer stops in my system.
> (vsftpd-2.0.5-8)
>
> Please revert this patch.
No, I
From: KOVACS Krisztian <[EMAIL PROTECTED]>
Date: Sat, 13 Oct 2007 19:28:57 +0200
> This is the fifth round of transparent proxying patches following
> recent discussion on netfilter-devel [1,2].
>
> The aim of the patchset is to make non-locally bound sockets work both
> for receiving and sending
The iptables tproxy core is a module that contains the common routines used by
various tproxy related modules (TPROXY target and socket match)
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
include/net/netfilter/nf_tproxy_core.h | 32 +++
net/netfilter/Kconfig
The iptables tproxy code has to be able to do UDP socket hash lookups,
so we have to provide an exported lookup function for this purpose.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
include/net/udp.h |4
net/ipv4/udp.c|8
2 files changed, 12 insertions(+),
Netfilter connection tracking requires all IPv4 packets to be defragmented.
Both the socket match and the TPROXY target depend on this functionality, so
this patch separates the Netfilter IPv4 defrag hooks into a separate module.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
include/ne
Current TCP code relies on the local port of the listening socket
being the same as the destination address of the incoming
connection. Port redirection used by many transparent proxying
techniques obviously breaks this, so we have to store the original
destination port address.
This patch extends
Setting IP_TRANSPARENT is not really useful without allowing non-local
binds for the socket. To make user-space code simpler we allow these binds
even if IP_TRANSPARENT is set but IP_FREEBIND is not.
Signed-off-by: Tóth László Attila <[EMAIL PROTECTED]>
Acked-by: Patrick McHardy <[EMAIL PROTECTED]
Set FLOWI_FLAG_ANYSRC in flowi->flags if the socket has the
transparent socket option set. This way we selectively enable certain
connections with non-local source addresses to be routed.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
include/net/route.h |4
1 files changed, 4
The TCP stack sends out SYN+ACK/ACK/RST reply packets in response to
incoming packets. The non-local source address check on output bites
us again, as replies for transparently redirected traffic won't have a
chance to leave the node.
This patch selectively sets the FLOWI_FLAG_ANYSRC flag when doi
This patch introduces the IP_TRANSPARENT socket option: enabling that will make
the IPv4 routing omit the non-local source address check on output. Setting
IP_TRANSPARENT requires NET_ADMIN capability.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
Acked-by: Patrick McHardy <[EMAIL PROTECTED]
Hi Dave,
This is the fifth round of transparent proxying patches following
recent discussion on netfilter-devel [1,2].
The aim of the patchset is to make non-locally bound sockets work both
for receiving and sending. The target is IPv4 TCP/UDP at the moment.
Speaking of the patches, there are tw
ip_route_output() contains a check to make sure that no flows with
non-local source IP addresses are routed. This obviously makes using
such addresses impossible.
This patch introduces a flowi flag which makes omitting this check
possible. The new flag provides a way of handling transparent and
no
Roland Dreier wrote:
> There are a few changes to the bonding driver pending that will add
> support for bonding IP-over-InfiniBand interfaces. IPoIB also cannot
> change its HW address, so the patches address that issue.
>
> Once those patches land, bonding eth1394 interfaces may "just work".
S
On Sat, 13 Oct 2007 16:02:30 +0400 Oleg Nesterov <[EMAIL PROTECTED]> wrote:
> On 10/13, Oleg Nesterov wrote:
> >
> > On 10/12, Andrew Morton wrote:
> > >
> > > Bisection shows that this problem is caused by these two patches:
> > >
> > > pid-namespaces-allow-cloning-of-new-namespace.patch
> >
> >
Use the socket cached in the TPROXY target if it's present.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
net/ipv4/udp.c |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c
index 053d5c4..6592689 100644
--- a/net/ipv4/udp.c
++
Add basic usage instructions to Documentation/networking.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
Documentation/networking/tproxy.txt | 62 +++
1 files changed, 62 insertions(+), 0 deletions(-)
diff --git a/Documentation/networking/tproxy.txt
b
The TPROXY target implements redirection of non-local TCP/UDP traffic to local
sockets. Additionally, it's possible to manipulate the packet mark if and only
if a socket has been found. (We need this because we cannot use multiple
targets in the same iptables rule.)
Signed-off-by: Jan Engelhardt <
Use the socket cached in the TPROXY target if it's present.
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
net/ipv4/tcp_ipv4.c |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
index fb471b0..90ee2ca 100644
--- a/ne
Add iptables 'socket' match, which matches packets for which a TCP/UDP
socket lookup succeeds.
Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]>
Signed-off-by: KOVACS Krisztian <[EMAIL PROTECTED]>
---
net/netfilter/Kconfig | 14 ++
net/netfilter/Makefile|1
net/netfilter/xt_so
If pci_enable_device fails, bdx_probe returns without freeing the
allocated pci_nic structure.
Coverity CID 1908.
Signed-off-by: Florin Malita <[EMAIL PROTECTED]>
---
drivers/net/tehuti.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/net/tehuti.c b/drivers/net
> The bonding sources have a few occurrences of EOPNOTSUPP. Unless I
> missed something, they are all related to setting the hardware address
> of the interface. AFAICS this is impossible with IP over FireWire. If
> it is crucial to bonding to be able to change the slaves' hardware
> addres
On Saturday 13 October 2007 14:31:31 Geert Uytterhoeven wrote:
> ssb bus needs
>
> linux/drivers/ssb/main.c: In function 'ssb_ssb_read16':
> linux/drivers/ssb/main.c:518: error: implicit declaration of function 'readw'
> linux/drivers/ssb/main.c: In function 'ssb_ssb_read32':
> linux/drivers/ssb/
I will be near my lab only tomorrow...
I will check this and let you know.
On 10/11/07, Roland Dreier <[EMAIL PROTECTED]> wrote:
> > It happens only when ib interfaces are slaves of a bonding device.
> > I thought before that the stuck is in napi_disable() but it's almost right.
> > I put print
Reading through my mail again, I see that I was a bit unclear. What I
want to achieve is to share a frag between to skbs (where one has no
earlier referance to it). Sorry.
[EMAIL PROTECTED] wrote:
If the underlying device can do scatter-gather and checksumming,
the TCP code builds outgoing pac
s/moderated/moderate of course :-/
Saturday 13 October 2007 Tarihinde 17:13:03 yazmıştınız:
> Hi all,
>
> I got a Bluetooth wireless mouse identifed as,
>
> input: Microsoft Microsoft� Wireless Notebook Presenter Mouse 8000
> as /devices/pci:00/:00:1d.1/usb3/3-1/3-1.3/3-1.3:1.0/input/input
Hi all,
I got a Bluetooth wireless mouse identifed as,
input: Microsoft Microsoft� Wireless Notebook Presenter Mouse 8000
as /devices/pci:00/:00:1d.1/usb3/3-1/3-1.3/3-1.3:1.0/input/input12
input: USB HID v1.11 Mouse [Microsoft Microsoft� Wireless Notebook Presenter
Mouse 8000] on usb-00
On 10/12, Andrew Morton wrote:
>
> On Fri, 12 Oct 2007 15:47:59 -0400
> Mathieu Desnoyers <[EMAIL PROTECTED]> wrote:
>
> > Hi Andrew,
> >
> > I noticed a regression between 2.6.23-rc8-mm2 and 2.6.23-mm1 (with your
> > hotfixes). User space threads seems to receive a ERESTART_RESTARTBLOCK
> > as s
On 10/13, Oleg Nesterov wrote:
>
> On 10/12, Andrew Morton wrote:
> >
> > Bisection shows that this problem is caused by these two patches:
> >
> > pid-namespaces-allow-cloning-of-new-namespace.patch
>
> This? http://marc.info/?l=linux-mm-commits&m=118712242002039
>
> Pavel, this patch has a subt
Jean Delvare <[EMAIL PROTECTED]> wrote:
>
> I didn't know that, sorry. What is the new interface to access the
> TCP information?
inet_diag is the preferred interface.
Cheers,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]>
Home Page: http://gondor.
ACK
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi Rick,
On Fri, 12 Oct 2007 16:13:32 -0700, Rick Jones wrote:
> Jean Delvare wrote:
> > Update function name references to match the current code.
> >
> > Signed-off-by: Jean Delvare <[EMAIL PROTECTED]>
> > ---
> > Documentation/networking/proc_net_tcp.txt |4 ++--
> > 1 file changed, 2 ins
ssb bus needs
linux/drivers/ssb/main.c: In function 'ssb_ssb_read16':
linux/drivers/ssb/main.c:518: error: implicit declaration of function 'readw'
linux/drivers/ssb/main.c: In function 'ssb_ssb_read32':
linux/drivers/ssb/main.c:526: error: implicit declaration of function 'readl'
linux/drivers/s
m68k: fix net drivers after recent get_stats updates
Signed-off-by: Geert Uytterhoeven <[EMAIL PROTECTED]>
---
drivers/net/macmace.c |6 +++---
drivers/net/mvme147.c |1 -
2 files changed, 3 insertions(+), 4 deletions(-)
--- a/drivers/net/macmace.c
+++ b/drivers/net/macmace.c
@@ -538,8 +
Add support for IPv6 TSO to the myri10ge driver.
Signed-off-by: Brice Goglin <[EMAIL PROTECTED]>
---
drivers/net/myri10ge/myri10ge.c | 87
1 file changed, 79 insertions(+), 8 deletions(-)
Index: linux-git/drivers/net/myri10ge/myri10ge.c
The myri10ge driver is now at version 1.3.2-1.287.
Signed-off-by: Brice Goglin <[EMAIL PROTECTED]>
---
drivers/net/myri10ge/myri10ge.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: linux-git/drivers/net/myri10ge/myri10ge.c
===
Add skb_is_gso_v6().
Signed-off-by: Brice Goglin <[EMAIL PROTECTED]>
---
include/linux/skbuff.h |5 +
1 file changed, 5 insertions(+)
Index: linux-git/include/linux/skbuff.h
===
--- linux-git.orig/include/linux/skbuff.h
Update myri10ge firmware headers to latest upstream version with
TSO6 and RSS support.
Signed-off-by: Brice Goglin <[EMAIL PROTECTED]>
---
drivers/net/myri10ge/myri10ge_mcp.h | 90 ++--
1 file changed, 86 insertions(+), 4 deletions(-)
Index: linux-git/drivers/ne
Hi Jeff,
Now that LRO and the new NAPI have landed in myri10ge for 2.6.24, here's
a couple updates. The big part is support for IPv6 TSO, which requires
the addition of skb_is_gso_v6(). I am CC'ing Dave and Herbert in the
corresponding mails. The other patches are trivial.
1. myri10ge: fix some i
Fix one comment in myri10ge.c and update indendation and white spaces
to match the code generated by indent from upstream CVS.
Signed-off-by: Brice Goglin <[EMAIL PROTECTED]>
---
drivers/net/myri10ge/myri10ge.c | 11 +--
1 file changed, 5 insertions(+), 6 deletions(-)
Index: linux-git/
Jeff Garzik wrote:
I think the scenario you outline is an illustration of the approach's
fragility: disable_irq() is a heavy hammer that originated with INTx,
and it relies on a chip-specific disable method (kernel/irq/manage.c)
that practically guarantees behavior will vary across MSI/INTx/
On Fri, 2007-12-10 at 22:00 +0800, Herbert Xu wrote:
> Hi Jamal:
>
> I was wondering why we're not copying tc_verd as is in skb_clone.
> In particular, this makes pskb_copy behave differently compared
> to skb_clone and I can't find a justificatino for it.
>
> Any ideas?
In the case of an action
> > Hello!
> > I develop network driver.
> > It works fine while less then 100 network interfaces exists.
> > Then i give kernel panic. What could cause it ?
>
> Since it probably in your code. Please code (or place to download)
> the driver code.
You can download from http://sourceforge.net/proje
(Adding Cc: netdev)
Karl Svec wrote to linux1394-devel:
> I'm trying to create a bonded network interface for an Xdmx setup out
> of a regular ethernet device (sungem) and a firewire ethernet
> (eth1394) device. However, ifenslave fails on the firewire device,
> and gives me the following ou
65 matches
Mail list logo