David,

       Please pull from:

master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.22

       Till I fully investigate and fix this we should just use the
pointer based approach, where this problem bug doesn't happens, good
thing its selectable :)

- Arnaldo

-----
There is a bug when using IPSEC, so till it is fixed, just use the
old code in all arches.

Signed-off-by: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
---
include/linux/skbuff.h |    4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
From dc63d9f74e5678c80b68e325e4b21de5af5e6110 Mon Sep 17 00:00:00 2001
From: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
Date: Fri, 16 Mar 2007 22:37:20 -0300
Subject: [PATCH] [SK_BUFF]: Disable the offset code

There is a bug when using IPSEC, so till it is fixed, just use the
old code in all arches.

Signed-off-by: Arnaldo Carvalho de Melo <[EMAIL PROTECTED]>
---
 include/linux/skbuff.h |    4 +++-
 1 files changed, 3 insertions(+), 1 deletions(-)

diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
index 3e4a2bd..673ca0c 100644
--- a/include/linux/skbuff.h
+++ b/include/linux/skbuff.h
@@ -180,7 +180,9 @@ enum {
 	SKB_GSO_TCPV6 = 1 << 4,
 };
 
-#if BITS_PER_LONG > 32
+/* #if BITS_PER_LONG > 32 */
+#if 0
+/* Disabled for now till the ipsec problem is fixed -acme */
 #define NET_SKBUFF_DATA_USES_OFFSET 1
 #endif
 
-- 
1.5.0.3

Reply via email to