1. 09 May, 2006 7 commits
  2. 08 May, 2006 16 commits
  3. 07 May, 2006 11 commits
  4. 06 May, 2006 6 commits
    • Russell King's avatar
      [ARM] rtc-sa1100: fix compiler warnings and error cleanup · f1226701
      Russell King authored
      Fix:
      drivers/rtc/rtc-sa1100.c: In function `sa1100_rtc_proc':
      drivers/rtc/rtc-sa1100.c:298: warning: unsigned int format, long unsigned int arg (arg 3)
      
      and arrange for sa1100_rtc_open() to pass the devid to free_irq()
      rather than NULL.
      Signed-off-by: default avatarRussell King <rmk+kernel@arm.linux.org.uk>
      f1226701
    • Russell King's avatar
      [ARM] Allow SA1100 RTC alarm to be configured for wakeup · 19ca5d27
      Russell King authored
      The SA1100 RTC alarm can be configured to wake up the CPU
      from sleep mode, and the RTC driver has been using the
      API to configure this mode.  Unfortunately, the code was
      which sets the required bit in the hardware was missing.
      Signed-off-by: default avatarRussell King <rmk+kernel@arm.linux.org.uk>
      19ca5d27
    • John Heffner's avatar
      [TCP]: Fix snd_cwnd adjustments in tcp_highspeed.c · 5528e568
      John Heffner authored
      Xiaoliang (David) Wei wrote:
      > Hi gurus,
      > 
      >    I am reading the code of tcp_highspeed.c in the kernel and have a
      > question on the hstcp_cong_avoid function, specifically the following
      > AI part (line 136~143 in net/ipv4/tcp_highspeed.c ):
      > 
      >                /* Do additive increase */
      >                if (tp->snd_cwnd < tp->snd_cwnd_clamp) {
      >                        tp->snd_cwnd_cnt += ca->ai;
      >                        if (tp->snd_cwnd_cnt >= tp->snd_cwnd) {
      >                                tp->snd_cwnd++;
      >                                tp->snd_cwnd_cnt -= tp->snd_cwnd;
      >                        }
      >                }
      > 
      >    In this part, when (tp->snd_cwnd_cnt == tp->snd_cwnd),
      > snd_cwnd_cnt will be -1... snd_cwnd_cnt is defined as u16, will this
      > small chance of getting -1 becomes a problem?
      > Shall we change it by reversing the order of the cwnd++ and cwnd_cnt -= 
      > cwnd?
      
      Absolutely correct.  Thanks.
      Signed-off-by: default avatarJohn Heffner <jheffner@psc.edu>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      5528e568
    • Ralf Baechle's avatar
      [NETROM/ROSE]: Kill module init version kernel log messages. · f530937b
      Ralf Baechle authored
      There are out of date and don't tell the user anything useful.
      The similar messages which IPV4 and the core networking used
      to output were killed a long time ago.
      Signed-off-by: default avatarRalf Baechle <ralf@linux-mips.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      f530937b
    • Herbert Xu's avatar
      [DCCP]: Fix sock_orphan dead lock · 134af346
      Herbert Xu authored
      Calling sock_orphan inside bh_lock_sock in dccp_close can lead to dead
      locks.  For example, the inet_diag code holds sk_callback_lock without
      disabling BH.  If an inbound packet arrives during that admittedly tiny
      window, it will cause a dead lock on bh_lock_sock.  Another possible
      path would be through sock_wfree if the network device driver frees the
      tx skb in process context with BH enabled.
      
      We can fix this by moving sock_orphan out of bh_lock_sock.
      
      The tricky bit is to work out when we need to destroy the socket
      ourselves and when it has already been destroyed by someone else.
      
      By moving sock_orphan before the release_sock we can solve this
      problem.  This is because as long as we own the socket lock its
      state cannot change.
      
      So we simply record the socket state before the release_sock
      and then check the state again after we regain the socket lock.
      If the socket state has transitioned to DCCP_CLOSED in the time being,
      we know that the socket has been destroyed.  Otherwise the socket is
      still ours to keep.
      
      This problem was discoverd by Ingo Molnar using his lock validator.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      134af346
    • Stephen Hemminger's avatar
      [BRIDGE]: keep track of received multicast packets · 1c29fc49
      Stephen Hemminger authored
      It makes sense to add this simple statistic to keep track of received
      multicast packets.
      Signed-off-by: default avatarStephen Hemminger <shemminger@osdl.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      1c29fc49