- 16 Apr, 2003 2 commits
-
-
Sridhar Samudrala authored
into us.ibm.com:/home/sridhar/BK/lksctp-2.5.67
-
Sridhar Samudrala authored
-
- 15 Apr, 2003 1 commit
-
-
Jon Grimm authored
We are incorrectly using the rt6->rt6i_dst as our destination address, resulting in bogus dst address when requiring a gateway.
-
- 14 Apr, 2003 4 commits
-
-
Jon Grimm authored
-
http://linux-lksctp.bkbits.net/lksctp-2.5.workJon Grimm authored
into touki.austin.ibm.com:/home/jgrimm/bk/lksctp-2.5.work
-
Jon Grimm authored
The sctp scoping rules try to prevent accidentally sending non-routable addresses to a peer as alternate addresses. However, the current implementation is way too strict in that one can't even try to send from a private address to a global address (a pretty common real world setup with host behind NAT) even when that's the _only_ address available. If we find no addresses available, try looking for a private address to send with, as a fallback. Additionally, if we are sending with only a single address, don't bother embedding this address in the INIT/INIT-ACK chunk.
-
Sridhar Samudrala authored
-
- 10 Apr, 2003 1 commit
-
-
Jon Grimm authored
Short circuit normal case. First check if the chunk belongs at the end of the queue. If so, don't bother walking the entire list, just just put at end.
-
- 09 Apr, 2003 3 commits
- 08 Apr, 2003 3 commits
-
-
Jon Grimm authored
-
Sridhar Samudrala authored
into us.ibm.com:/home/sridhar/BK/lksctp-2.5.67
-
Jon Grimm authored
Rip out our own HMAC-SHA1 and replace with crypto API. Can now choose hmac-sha1, hmac-md5, or none with regards to what HMAC to use for cookie echo verification.
-
- 07 Apr, 2003 6 commits
-
-
Linus Torvalds authored
-
Linus Torvalds authored
implies that it should vary between 0-7, not any further (the higher bits are done by updating current_vector by 8). This also means that we don't have any overflow condition.
-
Krzysztof Halasa authored
This version fixes: - missing rtnl_lock()/rtnl_unload() bug on unregister_hdlc_device - N2, C101: interrupt handler now works under high IRQ load from other devices (with previous versions, the IRQ processing for the card could sometimes stop after reaching "work limit") This is production-tested on devices I have access to (N2, C101, PC300, PCI200SYN).
-
Zwane Mwaikambo authored
This patch disables irqbalance and doesn't spawn a kernel thread for systems which run SMP kernels and only have one online cpu.
-
Jens Axboe authored
This finally kills of blk_queue_empty(). This is similar to the patch I recently sent to fix the SCSI logic as well. A lot of drivers are doing this in our core, mainly because that is the way they always did it: start_queue: if (blk_queue_empty(q)) return; rq = elv_next_request(q); if (!rq) return; Patch simply removes the blk_queue_empty() check, and adds a check for !rq return from elv_next_request() if the driver didn't already do that. Additionally, the AS io scheduler can return NULL from elv_next_request() if it thinks this is best. This way we are also prepared for that to work well. Patch was done by Nick Piggin.
-
Zwane Mwaikambo authored
Bug report from J Sanchez in #kernelnewbies
-
- 06 Apr, 2003 1 commit
-
-
bk://linux-dj.bkbits.net/cpufreqLinus Torvalds authored
into home.transmeta.com:/home/torvalds/v2.5/linux
-
- 07 Apr, 2003 2 commits
-
-
Dave Jones authored
-
Dave Jones authored
-
- 06 Apr, 2003 3 commits
-
-
Ingo Molnar authored
The problem with setiathome is that it displays something every now and then - so it gets a backboost from X, and hovers at a relatively high priority.
-
Zwane Mwaikambo authored
This comment seems to want to include SET_MODULE_OWNER as one of the deprecated facilities.
-
Dave Jones authored
Looks like a cut-n-paste thinko in the Kconfig file..
-
- 05 Apr, 2003 1 commit
-
-
Andi Kleen authored
Make it compile again and various cleanups and a few bug fixes. Only changes x86-64 specific files. Most of it are S3 suspend changes from Pavel and comment spelling fixes from Steven Cole. - Remove now obsolete check_cpu function - Fix sys_ioctl prototype - Small optimization - use SYSCALL for 32bit signal handling. - Fix S3 suspend handling and split into individual files like i386 (Pavel) - Merge from i386 (pci fixes etc.) - Set correct paging attributes for IOMMU aperture - Fix disable apic option
-
- 04 Apr, 2003 13 commits
-
-
Ulrich Drepper authored
The ipc multiplexer syscall on x86 currently returns EINVAL for a non-existing sub-opcode. This logical but is a problem with the introduction of new operations (like semtimedop). Now EINVAL can mean "no such operation" and "invalid parameter". To avoid such problems in future, could you apply the attached patch?
-
Roman Zippel authored
update diffserv URL, patch provided by Tero Pelander (tpeland@tkukoulu.fi).
-
Roman Zippel authored
A gconf update by Romain Liévin <roms@tilp.info> - fixed bug when double-clicking for changing value. - expand row when enabling a row with a submenu. - various bug fixes
-
John Levon authored
The semantically correct approach is for register_module_notifier not to exist at all. That way is #ifdef hell. So this just makes it an empty function (and also adds a missing comment).
-
Andrey Panin authored
This trivial patch removes some now unused data structures from mach-visws/mpparse.c
-
Andrey Panin authored
Visual Workstations 320/540 are SGI products, so IMHO they can use penguin with SGI logo as mips does :))
-
Andrey Panin authored
This fixes the mighty penguin logo not appearing on visual workstation framebuffer. The trouble is missing 'case FB_VISUAL_PSEUDOCOLOR:' in fb_prepare_logo() function.
-
Andrey Panin authored
This fixes the visws framebuffer driver which needs vm_area_struct from linux/mm.h
-
bk://linux-pnp.bkbits.net/pnp-2.5Linus Torvalds authored
into home.transmeta.com:/home/torvalds/v2.5/linux
-
Roland McGrath authored
Here is the cleanup patch I promised back in February. Sorry it took a while. The effects should be purely cosmetic in 2.5.66. However, the new interface for the proper way to send thread-specific of process-global signals from inside the kernel is needed for correct implementation of some fixes to timer stuff that Ulrich told me about. This cleans up some obsolete comments and macros in kernel/signal.c, restores send_sig_info to its original behavior, and adds a global entry point send_group_sig_info. I checked all the uses of send_sig and send_sig_info and changed a few to send_group_sig_info. I think it would be cleanest if the whole mess of *_sig* entry points were reduced to two or three, but I did the change that minimized the number of callers I had to fix up. There should be no discernible difference, since the 2.5.66 send_sig_info function did group semantics for those signals by number already. The only exception to that is pdeath_signal, which I guess can be any signal number but I deemed ought to be process-wide. I did not change any of the calls using SIGKILL, though that does have process-wide semantics. There is no need to change it since SIGKILL always kills the whole group, though the code path for send_sig(SIGKILL,...) calls in multithreaded processes will be different now.
-
John Levon authored
OK, so I screwed up - didn't notice the late_initcall() that was introduced, which was obviously bogus. This one should build OK for the module case. I've tested insmod/rmmod alongside a mounted sysfs. I think the built-in case is OK: oprofile/ is after kernel/ in the link order. I tested that too.
-
Andrew Morton authored
ACPI is performing a spin_lock() on a `void *'. That's OK when spin_lock is implemented via an inline function. But when it is implemented via macros it causes compile-time breakage. So cast it to the right type. It really should be fixed not to use opaque handles, though.
-
Corey Minyard authored
This fixes some performance problems. Some vendors implement firmware updates over IPMI, and this speeds up that process quite a bit. * Improve the "send - wait for response - send -wait for response - etc" performance when using high-res timers. Before, an ~10ms delay would be added to each message, because it didn't restart the timer if nothing was happing when a new message was started. * Add some checking for leaked messages.
-