David,
Please pull from:
master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.22
Till I fully investigate and fix this we should just use the
pointer based approach, where this problem bug doesn't happens, good
thing its selectable :)
- Arnaldo
-----
There is a bug when using IPSEC, so till it is fixed, just use the
old code in all arches.
Signed-off-by: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
---
include/linux/skbuff.h | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
From dc63d9f74e5678c80b68e325e4b21de5af5e6110 Mon Sep 17 00:00:00 2001
From: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
Date: Fri, 16 Mar 2007 22:37:20 -0300
Subject: [PATCH] [SK_BUFF]: Disable the offset code
There is a bug when using IPSEC, so till it is fixed, just use the
old code in all arches.
Signed-off-by: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
---
include/linux/skbuff.h | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
index 3e4a2bd..673ca0c 100644
--- a/include/linux/skbuff.h
+++ b/include/linux/skbuff.h
@@ -180,7 +180,9 @@ enum {
SKB_GSO_TCPV6 = 1 << 4,
};
-#if BITS_PER_LONG > 32
+/* #if BITS_PER_LONG > 32 */
+#if 0
+/* Disabled for now till the ipsec problem is fixed -acme */
#define NET_SKBUFF_DATA_USES_OFFSET 1
#endif
--
1.5.0.3