In article <[EMAIL PROTECTED]> (at Tue, 27 Dec 2005 02:35:52 -0200), Arnaldo
Carvalho de Melo <[EMAIL PROTECTED]> says:
> diff --git a/drivers/net/sundance.c b/drivers/net/sundance.c
> index 0ab9c38..8cdeb5c 100644
> --- a/drivers/net/sundance.c
> +++ b/drivers/net/sundance.c
> @@ -633,9 +633,13
From: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
Date: Tue, 27 Dec 2005 02:35:40 -0200
>Please consider pulling from:
>
> master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.16.git
>
>These changesets were compile tested with allyesconfig,
> allmodconfig and simple qemu co
From: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
Date: Tue, 27 Dec 2005 02:38:39 -0200
> oops, commited a mistake and shipped a sundance.c driver patch in this
> lot, resending in a jiffie...
Ok, let me know when the tree is fixed.
-
To unsubscribe from this list: send the line "unsubscribe net
Hi David,
Please consider pulling from:
master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.16.git
These changesets were compile tested with allyesconfig,
allmodconfig and simple qemu configurations.
- Arnaldo
tree d0a039881ddd44da08b952e12495db7f91a28055
parent 3d876a7abafca
Hi David,
Please consider pulling from:
master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.16.git
These changesets were compile tested with allyesconfig,
allmodconfig and simple qemu configurations.
- Arnaldo
tree e099badea7f181e08cd427f9b04f3f57dc3068a5
parent 6fcae8357f524
From: "Gabor Fekete" <[EMAIL PROTECTED]>
Date: Tue, 29 Nov 2005 13:18:28 -0800
> I realized that in fib_rules.c the inet_rtm_new_rule()
> function adds rules without checking if they already
> exist. This may result in duplicate rules being added.
> It makes it difficult to remove a rule when it i
The comments in ieee80211.h claim that one doesn't need to set the len
parameter of the stats struct. But if one doesn't, the management frames
are read far over the memory they actually occupy causing badness.
Signed-Off-By: Johannes Berg <[EMAIL PROTECTED]>
--- linux-2.6.15-rc7-rc15.ieee80211-o
Hi,
After discussion with Stephen Smalley and James Morris, we decided to
change the SELinux authorization from relabel to testing for a security
operation (set_ipsec). That is, a process must have the authority to
set IPsec security contexts in order to create or delete IPsec policy
or SA en