ion (by Howard McLauchlan)
--------
Dominik Brodowski (107):
syscalls: define and explain goal to not call syscalls in the kernel
kernel: use kernel_wait4() instead of sys_wait4()
kernel: open-code sys_rt_sigpending() in sys_sigpending()
kexec: call do_kexec
On Thu, Mar 29, 2018 at 02:46:44PM +, David Laight wrote:
> From: Dominik Brodowski
> > Sent: 29 March 2018 15:42
> > On Thu, Mar 29, 2018 at 07:20:27AM -0700, Matthew Wilcox wrote:
> > > On Thu, Mar 29, 2018 at 01:22:37PM +0200, Dominik Brodowski wrote:
> > >
On Thu, Mar 29, 2018 at 07:20:27AM -0700, Matthew Wilcox wrote:
> On Thu, Mar 29, 2018 at 01:22:37PM +0200, Dominik Brodowski wrote:
> > At least on 64-bit x86, it will likely be a hard requirement from v4.17
> > onwards to not call system call functions in the kernel: It is better
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c | 11 ---
3 files changed, 11 insertions(+), 4 deletions(-)
diff
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c | 11 ---
3 files changed, 11 insertions(+), 4 deletions(-)
diff --git a
[ While most parts of this patch set have been sent out already at least
once, I send out *all* patches to lkml once again as this whole series
touches several different subsystems in sensitive areas. ]
System calls are interaction points between userspace and the kernel.
Therefore, system cal
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/socket.c | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/net/socket.c b/net/socket.c
index 5dd2e39a6cd4..a05289b1f863 100644
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 13 +
net/compat.c | 8 +---
net/socket.c | 38 +++---
3 files
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 6 ++
net/compat.c | 3 ++-
net/socket.c | 21 +
3 files changed, 21 insertions(+), 9 deletions
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/socket.c | 13 ++---
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/include/linux/socket.h b
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c | 14 ++
3 files changed, 13 insertions(+), 5 deletions(-)
diff
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/socket.c | 17 -
1 file changed, 12 insertions(+), 5 deletions(-)
diff --git a/net/socket.c b/net/socket.c
index a05289b1f863..54d19b0edab1
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 4 ++--
net/socket.c | 20 +---
3 files changed, 17 insertions(+), 9 deletions(-)
diff
://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 16
1 file changed, 12 insertions(+), 4 deletions(-)
diff --git a/net/compat.c b/net/compat.c
index 75bfcbbb2e3e
://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 23 ---
1 file changed, 16 insertions(+), 7 deletions(-)
diff --git a/net/compat.c b/net/compat.c
index 9e0d030063ad
.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9 +++--
3 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/include/linux
As the syscall functions should only be called from the system call table
but not from elsewhere in the kernel, it is sufficient that they are
defined in linux/compat.h.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/net/compat.h | 11 ---
1
can be streamlined. For details, see
http://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 37 ++---
1 file changed, 30 insertions(+), 7 deletions
details, see
http://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 2 +-
net/socket.c | 3 ++-
2 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/net/compat.c b/net
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9 +++--
3 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/include
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9 +++--
3 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/include
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9 +++--
3 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/include
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 3 +++
net/compat.c | 3 ++-
net/socket.c | 19 ---
3 files changed, 17 insertions(+), 8 deletions(-)
diff
/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c | 14 ++
3 files changed, 13 insertions(+), 5 deletions(-)
diff
://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/net/compat.c b/net/compat.c
index 513adc8d0e0f
streamlined. For details, see
http://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 3 ++-
net/socket.c | 3 ++-
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/net
://lkml.kernel.org/r/20180325162527.ga17...@light.dominikbrodowski.net
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 17 -
1 file changed, 12 insertions(+), 5 deletions(-)
diff --git a/net/compat.c b/net/compat.c
index cdf5b0c1b962
() macro, and remove x86-specific prototypes from
various header files.
Suggested-by: Andy Lutomirski
Cc: Arnd Bergmann
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Cc: Thomas Gleixner
Cc: Andi Kleen
Cc: Ingo Molnar
Cc: Andrew Morton
Cc: Al Viro
Cc: x...@kernel.org
Signed-off-by: Dominik
On Fri, Mar 16, 2018 at 02:30:21PM -0400, David Miller wrote:
> From: Dominik Brodowski
> Date: Fri, 16 Mar 2018 18:05:52 +0100
>
> > The rationale of this change is described in patch 1 of part 1[*] as
> > follows:
> >
> > The syscall entry points to the
Using the net-internal helper __compat_sys_recvmmsg() allows us to avoid
the internal calls to the compat_sys_recvmmsg() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 17 -
1 file changed, 12 insertions(+), 5
Using the net-internal helper __sys_getsockname() allows us to avoid the
internal calls to the sys_getsockname() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c
Using the net-internal helper __sys_accept4() allows us to avoid the
internal calls to the sys_accept4() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 4 ++--
net/socket.c | 20
. __sys_recvmmsg() does not need this trickery, as the
check is handled within the do_sys_recvmmsg() function internal to
net/socket.c.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 13 +
net/compat.c | 8 +---
net
sys_recv() merely expands the parameters to __sys_recvfrom() by NULL and
NULL. Open-code this in the two places which used sys_recv() as a wrapper
to __sys_recvfrom().
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 3 ++-
net/socket.c | 3
Using the net-internal helper __sys_sendto() allows us to avoid the
internal calls to the sys_sendto() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 3 +++
net/compat.c | 3 ++-
net/socket.c | 19
Using the net-internal helper __sys_socketpair() allows us to avoid the
internal calls to the sys_socketpair() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c
Using the net-internal helper __sys_getsockopt() allows us to avoid the
internal calls to the sys_getsockopt() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/socket.c | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff
Using the net-internal helper __sys_recvfrom() allows us to avoid the
internal calls to the sys_recvfrom() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 6 ++
net/compat.c | 3 ++-
net/socket.c
Using the net-internal helper __compat_sys_recvfrom() allows us to avoid
the internal calls to the compat_sys_recvfrom() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 23 ---
1 file changed, 16 insertions(+), 7
Using the net-internal helper do_sys_recvmmsg() allows us to avoid the
internal calls to the sys_getsockopt() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/socket.c | 17 -
1 file changed, 12 insertions(+), 5 deletions(-)
diff
Using the net-internal helper __sys_bind() allows us to avoid the
internal calls to the sys_bind() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9 +++--
3
Using the net-internal helper __sys_setsockopt() allows us to avoid the
internal calls to the sys_setsockopt() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/socket.c | 13 ++---
2 files changed
Using the net-internal helper __sys_socket() allows us to avoid the
internal calls to the sys_socket() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9
Using the net-internal helper __sys_listen() allows us to avoid the
internal calls to the sys_listen() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9
Using the net-internal helper __sys_connect() allows us to avoid the
internal calls to the sys_connect() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c | 11
Using the net-internal helper __sys_shutdown() allows us to avoid the
internal calls to the sys_shutdown() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 1 +
net/compat.c | 2 +-
net/socket.c | 9
sys_send() merely expands the parameters to __sys_sendto() by NULL and 0.
Open-code this in the two places which used sys_send() as a wrapper to
__sys_sendto().
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 2 +-
net/socket.c | 3 ++-
2
Using the net-internal helpers __compat_sys_...msg() allows us to avoid
the internal calls to the compat_sys_...msg() syscalls.
compat_sys_recvmmsg() is handled in a different patch.
Signed-off-by: Dominik Brodowski
---
net/compat.c | 37 ++---
1 file changed, 30
Using the net-internal helper __compat_sys_setsockopt() allows us to avoid
the internal calls to the compat_sys_setsockopt() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 14 ++
1 file changed, 10 insertions(+), 4
-next
Dominik Brodowski (22):
net: socket: add __sys_recvfrom() helper; remove in-kernel call to
syscall
net: socket: add __sys_sendto() helper; remove in-kernel call to
syscall
net: socket: add __sys_accept4() helper; remove in-kernel call to
syscall
net: socket: add
Using the net-internal helper __sys_getpeername() allows us to avoid the
internal calls to the sys_getpeername() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
include/linux/socket.h | 2 ++
net/compat.c | 2 +-
net/socket.c
Using the net-internal helper __compat_sys_getsockopt() allows us to avoid
the internal calls to the compat_sys_getsockopt() syscall.
Cc: David S. Miller
Cc: netdev@vger.kernel.org
Signed-off-by: Dominik Brodowski
---
net/compat.c | 16
1 file changed, 12 insertions(+), 4
As ieee80211_bss_get_ie() derefences an RCU to return ssid_ie, both
the call to this function and any operation on this variable need
protection by the RCU read lock.
Fixes: 44905265bc15 ("nl80211: don't expose wdev->ssid for most interfaces")
Signed-off-by: Dominik Brodowski
As ieee80211_bss_get_ie() derefences an RCU, it needs to be called with
rcu_read_lock held.
Fixes: 44905265bc15 ("nl80211: don't expose wdev->ssid for most interfaces")
Signed-off-by: Dominik Brodowski
---
> This uses the ssid_ie, so that doesn't really seem righ
As ieee80211_bss_get_ie() derefences an RCU, it needs to be called with
rcu_read_lock held.
Fixes: 44905265bc15 ("nl80211: don't expose wdev->ssid for most interfaces")
Signed-off-by: Dominik Brodowski
---
This patch fixes the regression I reported in the last couple of weeks
On Sat, Dec 30, 2017 at 02:11:33PM +0100, Dominik Brodowski wrote:
> On Fri, Dec 22, 2017 at 08:20:12AM +0100, Dominik Brodowski wrote:
> > Dear all,
> >
> > once the (wifi) link becomes ready, the following warning is emitted on
> > mainline (v4.15-rc4-202-ge
On Fri, Dec 22, 2017 at 08:20:12AM +0100, Dominik Brodowski wrote:
> Dear all,
>
> once the (wifi) link becomes ready, the following warning is emitted on
> mainline (v4.15-rc4-202-gead68f216110) on my notebook:
... and it is still present as of v4.15-rc5-149-g5aa90a845892
> [
Dear all,
once the (wifi) link becomes ready, the following warning is emitted on
mainline (v4.15-rc4-202-gead68f216110) on my notebook:
[ 22.770422] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 22.772364] =
[ 22.772369] WARNING: suspicious RCU usa
From: Dominik Brodowski <[EMAIL PROTECTED]>
Date: Wed, 25 Oct 2006 21:28:53 -0400
Subject: [PATCH] pcmcia: remove manf_id and card_id indirection
As we read out the manufactor and card_id from the PCMCIA device in the
PCMCIA core, and device drivers can access those reliably in
From: Dominik Brodowski <[EMAIL PROTECTED]>
Date: Sun, 4 Jun 2006 18:06:13 +0200
Subject: [PATCH] pcmcia: remove prod_id indirection
As we read out the product information strings (VERS_1) from the PCMCIA device
in the PCMCIA core, and device drivers can access those reliably in
From: Dominik Brodowski <[EMAIL PROTECTED]>
Date: Wed, 25 Oct 2006 21:49:27 -0400
Subject: [PATCH] pcmcia: conf.ConfigBase and conf.Present consolidation
struct pcmcia_device *p_dev->conf.ConfigBase and .Present are set in almost
all PCMICA driver right at the beginning, using the same
CONFIG_PM=n slim: drivers/pcmcia/*
i82092: wire up errors from pci_register_driver()
Amol Lad (1):
ioremap balanced with iounmap for drivers/pcmcia
David Brownell (1):
pcmcia: at91_cf update
Dominik Brodowski (2):
pcmcia: add more IDs to hostap_cs.c
PCMCIA: f
From: Dominik Brodowski <[EMAIL PROTECTED]>
Date: Sun, 2 Jul 2006 21:21:51 +0200
Subject: [PATCH] pcmcia: add more IDs to hostap_cs.c
As a replacement for the broad manufactor/card ID match we commented out
because of conflicts with pcnet_cs, add two product ID matches.
Signed-off-by: D
Hi Pavel,
On Fri, Jun 30, 2006 at 05:18:43PM -0400, Pavel Roskin wrote:
> On Fri, 2006-06-30 at 21:59 +0200, Dominik Brodowski wrote:
> > - PCMCIA_DEVICE_MANF_CARD(0xc00f, 0x),
> > +/* PCMCIA_DEVICE_MANF_CARD(0xc00f, 0x),conflict with pcnet_cs */
>
> That&
;
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/net/pcmcia/com20020_cs.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/drivers/net/pcmcia/com20020_cs.c b/drivers/net/pcmcia/com20020_cs.c
index 441de82..48434d7 100644
--- a/drivers/net/pcmcia/c
From: Komuro <[EMAIL PROTECTED]>
Date: Mon, 17 Apr 2006 21:41:21 +0900
Subject: [PATCH] pcmcia: hostap_cs.c - 0xc00f,0x conflicts with pcnet_cs
Comment out the ID 0xc00f,0x in hostap_cs.c, as it conflicts with the
pcnet_cs driver.
Signed-off-by: [EMAIL PROTECTED]
Signed-off-by: D
Please review these patches which I inted to push upstream for 2.6.17 soon.
Thanks,
Dominik
Subject: [PATCH] pcmcia: add new ID to pcnet_cs
This adds a new ID to pcnet_cs, as noted by Kuro Moji.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/net/pcmcia/pcne
Instead of the DEV_OK macro, drivers should use pcmcia_dev_present().
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/char/pcmcia/cm4000_cs.c |4 ++--
drivers/char/pcmcia/cm4040_cs.c |2 +-
drivers/net/pcmcia/3c574_cs.c |4 ++--
d
As we do not allow setting Vcc in the pcmcia core, and Vpp1 and
Vpp2 can only be set to the same value, a lot of code can be
streamlined.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/bluetooth/bluecard_cs.c |4
drivers/bluetooth/bt3c_cs.c
Handle the _modifying_ operation sm91c92_cs requires in
pcmcia_modify_configuration, so that the only remaining users
of pcmcia_release_configuration() are within the pcmcia core
module.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/mtd/maps/pcmciamtd.c
Remove the unused DEV_RELEASE_PENDING flag, and move the DEV_SUSPEND flag
into the p_dev structure, and make use of it at the core level.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
drivers/net/wireless/atmel_cs.c |2 +-
drivers/net/wireless/ray_cs.c |2 +-
d
Convert the remaining drivers which use pcmcia_release_io or
pcmcia_release_irq, and remove the EXPORT of these symbols.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
Documentation/pcmcia/driver-changes.txt |4 ++--
drivers/isdn/hardware/avm/avm_cs.c
pcmcia_disable_device(struct pcmcia_device *p_dev) performs the necessary
cleanups upon device or driver removal: it calls the appropriate
pcmcia_release_* functions, and can replace (most) of the current drivers'
_release() functions.
Signed-off-by: Dominik Brodowski <[EMAIL P
In all but one case, the suspend and resume functions of PCMCIA drivers
contain mostly of calls to pcmcia_release_configuration() and
pcmcia_request_configuration(). Therefore, move this code out of the
drivers and into the core.
Signed-off-by: Dominik Brodowski <[EMAIL PROTECTED]>
---
d
On Fri, Jan 06, 2006 at 12:31:24PM +0100, Johannes Berg wrote:
> On Fri, 2006-01-06 at 12:00 +0100, Michael Buesch wrote:
>
> > * "master" interface as real device node
> > * Virtual interfaces (net_devices)
>
> I didn't want to spam the netdev wiki with this (yet) so I collected
> some more stru
75 matches
Mail list logo