01 Nov, 2005
7 commits
-
Signed-off-by: Yan Zheng
Signed-off-by: Arnaldo Carvalho de Melo -
Here is a complimentary insurance policy for those feeling a bit insecure.
You don't have to accept this. However, if you do, you can't blame me for
it :)> 1) dccp_transmit_skb sets the owner for all packets except data packets.
We can actually verify this by looking at pkt_type.
Signed-off-by: Herbert Xu
Signed-off-by: Arnaldo Carvalho de Melo -
While we're at it let's reorganise the set_owner_w calls a little so that:
1) dccp_transmit_skb sets the owner for all packets except data packets.
2) Add dccp_skb_entail to set owner for packets queued for retransmission.
3) Make dccp_transmit_skb static.Signed-off-by: Herbert Xu
Signed-off-by: Arnaldo Carvalho de Melo -
I find that linux will reply echo request destined to an address which
belongs to an interface other than the one from which the request received.
This behavior doesn't make sense for link local address.YOSHIFUJI Hideaki said:
Please note that sender does need to setup neighbor entry by hand to reproduce
this bug. (Link-local address on eth1 is not visible on eth0, from the point
of view of neighbor discovery in IPv6.)+--------+ +--------+
| sender | | router |
+---+----+ +-+----+-+
|eth0 eth0| |eth1
-----+----------------------+- -+--------------Signed-off-by: Yan Zheng
Acked-by: YOSHIFUJI Hideaki
Signed-off-by: Andrew Morton (forwarded)
Signed-off-by: Arnaldo Carvalho de Melo -
Missing unlock, as noted by Ted Unangst .
Signed-off-by: Andrew Morton
Signed-off-by: Arnaldo Carvalho de Melo -
Like ip_tables already has it for some time, this adds support for
having multiple revisions for each match/target. We steal one byte from
the name in order to accomodate a 8 bit version number.Signed-off-by: Harald Welte
Signed-off-by: Arnaldo Carvalho de Melo -
Use compare_ether_addr in bridge code.
Signed-off-by: Stephen Hemminger
Signed-off-by: Arnaldo Carvalho de Melo
31 Oct, 2005
1 commit
-
Typo fix: dots appearing after a newline in printk strings.
Signed-off-by: Jean Delvare
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
30 Oct, 2005
3 commits
-
This patch rewrites various occurences of &sg[0] where sg is an array
of length one to simply sg.Signed-off-by: Herbert Xu
-
This patch uses sg_set_buf/sg_init_one in some places where it was
duplicated.Signed-off-by: David Hardeman
Cc: James Bottomley
Cc: Greg KH
Cc: "David S. Miller"
Cc: Jeff Garzik
Signed-off-by: Andrew Morton
Signed-off-by: Herbert Xu -
Bluetooth HIDP selects INPUT and it really needs it to be there - module
depends on input core. And input core is never built on s390...Marked as broken on s390, for now; if somebody has better ideas, feel
free to fix it and remove dependency...Signed-off-by: Al Viro
Acked-by: Marcel Holtmann
Signed-off-by: Linus Torvalds
29 Oct, 2005
17 commits
-
fib_del_ifaddr() dereferences ifa->ifa_dev, so the code already assumes that
ifa->ifa_dev is non-NULL, the check is unnecessary.Signed-off-by: Jayachandran C.
Signed-off-by: Arnaldo Carvalho de Melo -
Expose faster ether compare for use by protocols and other
driver. And change name to be more consistent with other ether
address manipulation routines in same fileSigned-off-by: Stephen Hemminger
Signed-off-by: Arnaldo Carvalho de Melo -
privileged ports.
Signed-off-by: Ivan Skytte Jorgensen
Signed-off-by: Sridhar Samudrala -
Signed-off-by: Ivan Skytte Jorgensen
Signed-off-by: Sridhar Samudrala -
Signed-off-by: Ivan Skytte Jorgensen
Signed-off-by: Sridhar Samudrala -
Rename SCTP specific control message flags to use SCTP_ prefix rather than
MSG_ prefix as per the latest sctp sockets API draft.Signed-off-by: Ivan Skytte Jorgensen
Signed-off-by: Sridhar Samudrala -
5.1.3. Maximum Response Code
The Maximum Response Code field specifies the maximum time allowed
before sending a responding Report. The actual time allowed, called
the Maximum Response Delay, is represented in units of milliseconds,
and is derived from the Maximum Response Code as follows:If Maximum Response Code < 32768,
Maximum Response Delay = Maximum Response CodeIf Maximum Response Code >=32768, Maximum Response Code represents a
floating-point value as follows:0 1 2 3 4 5 6 7 8 9 A B C D E F
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1| exp | mant |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Maximum Response Delay = (mant | 0x1000) << (exp+3)
5.1.9. QQIC (Querier's Query Interval Code)
The Querier's Query Interval Code field specifies the [Query
Interval] used by the Querier. The actual interval, called the
Querier's Query Interval (QQI), is represented in units of seconds,
and is derived from the Querier's Query Interval Code as follows:If QQIC < 128, QQI = QQIC
If QQIC >= 128, QQIC represents a floating-point value as follows:
0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
|1| exp | mant |
+-+-+-+-+-+-+-+-+QQI = (mant | 0x10) << (exp + 3)
-- rfc3810
#define MLDV2_QQIC(value) MLDV2_EXP(0x80, 4, 3, value)
#define MLDV2_MRC(value) MLDV2_EXP(0x8000, 12, 3, value)Above macro are defined in mcast.c. but 1 << 4 == 0x10 and 1 << 12 == 0x1000.
So the result computed by original Macro is larger.Signed-off-by: Yan Zheng
Acked-by: David L Stevens
Signed-off-by: Arnaldo Carvalho de Melo -
Attached is kernel patch for UDP Fragmentation Offload (UFO) feature.
1. This patch incorporate the review comments by Jeff Garzik.
2. Renamed USO as UFO (UDP Fragmentation Offload)
3. udp sendfile support with UFOThis patches uses scatter-gather feature of skb to generate large UDP
datagram. Below is a "how-to" on changes required in network device
driver to use the UFO interface.UDP Fragmentation Offload (UFO) Interface:
-------------------------------------------
UFO is a feature wherein the Linux kernel network stack will offload the
IP fragmentation functionality of large UDP datagram to hardware. This
will reduce the overhead of stack in fragmenting the large UDP datagram to
MTU sized packets1) Drivers indicate their capability of UFO using
dev->features |= NETIF_F_UFO | NETIF_F_HW_CSUM | NETIF_F_SGNETIF_F_HW_CSUM is required for UFO over ipv6.
2) UFO packet will be submitted for transmission using driver xmit routine.
UFO packet will have a non-zero value for"skb_shinfo(skb)->ufo_size"
skb_shinfo(skb)->ufo_size will indicate the length of data part in each IP
fragment going out of the adapter after IP fragmentation by hardware.skb->data will contain MAC/IP/UDP header and skb_shinfo(skb)->frags[]
contains the data payload. The skb->ip_summed will be set to CHECKSUM_HW
indicating that hardware has to do checksum calculation. Hardware should
compute the UDP checksum of complete datagram and also ip header checksum of
each fragmented IP packet.For IPV6 the UFO provides the fragment identification-id in
skb_shinfo(skb)->ip6_frag_id. The adapter should use this ID for generating
IPv6 fragments.Signed-off-by: Ananda Raju
Signed-off-by: Rusty Russell (forwarded)
Signed-off-by: Arnaldo Carvalho de Melo -
This patch updates the HCI security filter with support for the Extended
Inquiry Response (EIR) feature.Signed-off-by: Marcel Holtmann
-
This patch makes another bunch of functions static.
Signed-off-by: Marcel Holtmann
-
This patch moves rfcomm_crc_table[] into the RFCOMM core, because there
is no need to keep it in a separate file.Signed-off-by: Marcel Holtmann
-
Input: convert net/bluetooth to dynamic input_dev allocation
This is required for input_dev sysfs integration
Signed-off-by: Dmitry Torokhov
Signed-off-by: Greg Kroah-Hartman
28 Oct, 2005
8 commits
-
Signed-off-by: Al Viro
Signed-off-by: Linus Torvalds -
Signed-off-by: Trond Myklebust
-
This reverts 747c5534c9a6da4aa87e7cdc2209ea98ea27f381 commit.
-
This bug is responsible for causing the infamous "Treason uncloaked"
messages that's been popping up everywhere since the printk was added.
It has usually been blamed on foreign operating systems. However,
some of those reports implicate Linux as both systems are running
Linux or the TCP connection is going across the loopback interface.In fact, there really is a bug in the Linux TCP header prediction code
that's been there since at least 2.1.8. This bug was tracked down with
help from Dale Blount.The effect of this bug ranges from harmless "Treason uncloaked"
messages to hung/aborted TCP connections. The details of the bug
and fix is as follows.When snd_wnd is updated, we only update pred_flags if
tcp_fast_path_check succeeds. When it fails (for example,
when our rcvbuf is used up), we will leave pred_flags with
an out-of-date snd_wnd value.When the out-of-date pred_flags happens to match the next incoming
packet we will again hit the fast path and use the current snd_wnd
which will be wrong.In the case of the treason messages, it just happens that the snd_wnd
cached in pred_flags is zero while tp->snd_wnd is non-zero. Therefore
when a zero-window packet comes in we incorrectly conclude that the
window is non-zero.In fact if the peer continues to send us zero-window pure ACKs we
will continue making the same mistake. It's only when the peer
transmits a zero-window packet with data attached that we get a
chance to snap out of it. This is what triggers the treason
message at the next retransmit timeout.Signed-off-by: Herbert Xu
Signed-off-by: Arnaldo Carvalho de Melo
27 Oct, 2005
2 commits
-
Convert nanoseconds to microseconds correctly.
Spotted by Steve Dickson
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds -
Although this message is having the intended effect of causing wireless
driver maintainers to upgrade their code, I never should have merged this
patch in its present form. Leading to tons of bug reports and unhappy
users.Some wireless apps poll for statistics regularly, which leads to a printk()
every single time they ask for stats. That's a little bit _too_ much of a
reminder that the driver is using an old API.Change this to printing out the message once, per kernel boot.
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
26 Oct, 2005
2 commits
-
James Ketrenos wrote:
> [3/4] Use the tx_headroom and reserve requested space.This patch introduced a compile problem; patch below corrects this.
Fixed compilation error due to not passing tx_headroom in
ieee80211_tx_frame.Signed-off-by: James Ketrenos
Signed-off-by: Jeff Garzik