<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/net, branch v2.6.16.17</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/net?h=v2.6.16.17</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/net?h=v2.6.16.17'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-05-20T22:00:31Z</updated>
<entry>
<title>[PATCH] TG3: ethtool always report port is TP.</title>
<updated>2006-05-20T22:00:31Z</updated>
<author>
<name>Karsten Keil</name>
<email>kkeil@suse.de</email>
</author>
<published>2006-05-12T19:49:08Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=39970bdd43f953f204f1bcbdf1d97dc2d78df17f'/>
<id>urn:sha1:39970bdd43f953f204f1bcbdf1d97dc2d78df17f</id>
<content type='text'>
Even with fiber cards ethtool reports that the connected port is TP,
the patch fix this.

Signed-off-by: Karsten Keil &lt;kkeil@suse.de&gt;
Acked-by: Michael Chan &lt;mchan@broadcom.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] via-rhine: zero pad short packets on Rhine I ethernet cards</title>
<updated>2006-05-20T22:00:28Z</updated>
<author>
<name>Craig Brind</name>
<email>craigbrind@gmail.com</email>
</author>
<published>2006-05-02T19:59:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3aa2b0523df53ba510599942aa87c03de183ff45'/>
<id>urn:sha1:3aa2b0523df53ba510599942aa87c03de183ff45</id>
<content type='text'>
Fixes Rhine I cards disclosing fragments of previously transmitted frames
in new transmissions.

Before transmission, any socket buffer (skb) shorter than the ethernet
minimum length of 60 bytes was zero-padded.  On Rhine I cards the data can
later be copied into an aligned transmission buffer without copying this
padding.  This resulted in the transmission of the frame with the extra
bytes beyond the provided content leaking the previous contents of this
buffer on to the network.

Now zero-padding is repeated in the local aligned buffer if one is used.

Following a suggestion from the via-rhine maintainer, no attempt is made
here to avoid the duplicated effort of padding the skb if it is known that
an aligned buffer will definitely be used.  This is to make the change
"obviously correct" and allow it to be applied to a stable kernel if
necessary.  There is no change to the flow of control and the changes are
only to the Rhine I code path.

The patch has run on an in-service Rhine-I host without incident.  Frames
shorter than 60 bytes are now correctly zero-padded when captured on a
separate host.  I see no unusual stats reported by ifconfig, and no unusual
log messages.

Signed-off-by: Craig Brind &lt;craigbrind@gmail.com&gt;
Signed-off-by: Roger Luethi &lt;rl@hellgate.ch&gt;
Cc: Jeff Garzik &lt;jeff@garzik.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Jeff Garzik &lt;jeff@garzik.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] NET: e1000: Update truesize with the length of the packet for packet split</title>
<updated>2006-05-01T19:03:44Z</updated>
<author>
<name>Auke Kok</name>
<email>auke-jan.h.kok@intel.com</email>
</author>
<published>2006-04-26T06:16:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c34250c9922f0e00f14db99c6892b81cc77083e8'/>
<id>urn:sha1:c34250c9922f0e00f14db99c6892b81cc77083e8</id>
<content type='text'>
Update skb with the real packet size.

Signed-off-by: Jesse Brandeburg &lt;jesse.brandeburg@intel.com&gt;
Signed-off-by: Auke Kok &lt;auke-jan.h.kok@intel.com&gt;
Signed-off-by: John Ronciak &lt;john.ronciak@intel.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] sky2: bad memory reference on dual port cards</title>
<updated>2006-04-17T20:16:04Z</updated>
<author>
<name>Stephen Hemminger</name>
<email>shemminger@osdl.org</email>
</author>
<published>2006-04-06T00:47:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8abb9bed57d5ee0f645eedb7208e8d53b2431b01'/>
<id>urn:sha1:8abb9bed57d5ee0f645eedb7208e8d53b2431b01</id>
<content type='text'>
Sky2 driver will oops referencing bad memory if used on
a dual port card.  The problem is accessing past end of
MIB counter space.

Signed-off-by: Stephen Hemminger &lt;shemminger@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] hostap: Fix EAPOL frame encryption</title>
<updated>2006-04-07T16:44:30Z</updated>
<author>
<name>Jouni Malinen</name>
<email>jkmaline@cc.hut.fi</email>
</author>
<published>2006-03-25T05:24:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1cce602f07cbc7e9f543cc5c4c98da011a671e03'/>
<id>urn:sha1:1cce602f07cbc7e9f543cc5c4c98da011a671e03</id>
<content type='text'>
Fixed encrypted of EAPOL frames from wlan#ap interface (hostapd). This
was broken when moving to use new frame control field defines in
net/ieee80211.h. hostapd uses Protected flag, not protocol version
(which was cleared in this function anyway). This fixes WPA group key
handshake and re-authentication.
http://hostap.epitest.fi/bugz/show_bug.cgi?id=126

Signed-off-by: Jouni Malinen &lt;jkmaline@cc.hut.fi&gt;
</content>
</entry>
<entry>
<title>[PATCH] AIRO{,_CS} &lt;-&gt; CRYPTO fixes</title>
<updated>2006-04-07T16:44:30Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2006-03-25T18:22:27Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c0e7ba91759b66981cb2ad5c91054506d1ccc239'/>
<id>urn:sha1:c0e7ba91759b66981cb2ad5c91054506d1ccc239</id>
<content type='text'>
CRYPTO is a helper variable, and to make it easier for users, it should
therefore select'ed and not be listed in the dependencies.

drivers/net/wireless/airo.c requires CONFIG_CRYPTO for compilations.

Therefore, AIRO_CS also has to select CRYPTO.

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] drivers/net/wireless/ipw2200.c: fix an array overun</title>
<updated>2006-04-07T16:44:29Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2006-03-25T21:07:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9f45b01aa6885323f18fe56e3fe19a6df5b7f1e9'/>
<id>urn:sha1:9f45b01aa6885323f18fe56e3fe19a6df5b7f1e9</id>
<content type='text'>
This patch fixes a big array overun found by the Coverity checker.

This was already fixed in Linus' tree.

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] PCMCIA_SPECTRUM must select FW_LOADER</title>
<updated>2006-04-07T16:44:27Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2006-03-31T16:33:45Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ec2849262d7f37fca2fd62ccff6e7be3ef2e4e7a'/>
<id>urn:sha1:ec2849262d7f37fca2fd62ccff6e7be3ef2e4e7a</id>
<content type='text'>
PCMCIA_SPECTRUM must select FW_LOADER.

Reported by "Alexander E. Patrakov" &lt;patrakov@ums.usu.ru&gt;.

This patch was already included in Linus' tree.

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] USB: Fix irda-usb use after use</title>
<updated>2006-04-07T16:44:26Z</updated>
<author>
<name>Eugene Teo</name>
<email>eugene.teo@eugeneteo.net</email>
</author>
<published>2006-03-15T22:57:19Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=91011e696c0483c778a1c07a77eb92d0d95aed7c'/>
<id>urn:sha1:91011e696c0483c778a1c07a77eb92d0d95aed7c</id>
<content type='text'>
Don't read from free'd memory after calling netif_rx().  docopy is used as
a boolean (0 and 1) so unsigned int is sufficient.

Coverity bug #928

Signed-off-by: Eugene Teo &lt;eugene.teo@eugeneteo.net&gt;
Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[TG3]: 40-bit DMA workaround part 2</title>
<updated>2006-03-19T21:21:12Z</updated>
<author>
<name>Michael Chan</name>
<email>mchan@broadcom.com</email>
</author>
<published>2006-03-19T21:21:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4a29cc2e503b33a1e96db4c3f9a94165f153f259'/>
<id>urn:sha1:4a29cc2e503b33a1e96db4c3f9a94165f153f259</id>
<content type='text'>
The 40-bit DMA workaround recently implemented for 5714, 5715, and
5780 needs to be expanded because there may be other tg3 devices
behind the EPB Express to PCIX bridge in the 5780 class device.

For example, some 4-port card or mother board designs have 5704 behind
the 5714.

All devices behind the EPB require the 40-bit DMA workaround.

Thanks to Chris Elmquist again for reporting the problem and testing
the patch.

Signed-off-by: Michael Chan &lt;mchan@broadcom.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
