diff options
author | Vegard Nossum <vegard.nossum@gmail.com> | 2009-06-15 09:50:49 -0400 |
---|---|---|
committer | Vegard Nossum <vegard.nossum@gmail.com> | 2009-06-15 09:50:49 -0400 |
commit | 722f2a6c87f34ee0fd0130a8cf45f81e0705594a (patch) | |
tree | 50b054df34d2731eb0ba0cf1a6c27e43e7eed428 /net | |
parent | 7a0aeb14e18ad59394bd9bbc6e57fb345819e748 (diff) | |
parent | 45e3e1935e2857c54783291107d33323b3ef33c8 (diff) |
Merge commit 'linus/master' into HEAD
Conflicts:
MAINTAINERS
Signed-off-by: Vegard Nossum <vegard.nossum@gmail.com>
Diffstat (limited to 'net')
-rw-r--r-- | net/9p/trans_virtio.c | 6 | ||||
-rw-r--r-- | net/ipv6/Kconfig | 2 | ||||
-rw-r--r-- | net/ipv6/addrconf.c | 2 | ||||
-rw-r--r-- | net/netfilter/Kconfig | 4 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_acct.c | 2 |
5 files changed, 8 insertions, 8 deletions
diff --git a/net/9p/trans_virtio.c b/net/9p/trans_virtio.c index bb8579a141a8..a49484e67e1d 100644 --- a/net/9p/trans_virtio.c +++ b/net/9p/trans_virtio.c | |||
@@ -246,7 +246,7 @@ static int p9_virtio_probe(struct virtio_device *vdev) | |||
246 | chan->vdev = vdev; | 246 | chan->vdev = vdev; |
247 | 247 | ||
248 | /* We expect one virtqueue, for requests. */ | 248 | /* We expect one virtqueue, for requests. */ |
249 | chan->vq = vdev->config->find_vq(vdev, 0, req_done); | 249 | chan->vq = virtio_find_single_vq(vdev, req_done, "requests"); |
250 | if (IS_ERR(chan->vq)) { | 250 | if (IS_ERR(chan->vq)) { |
251 | err = PTR_ERR(chan->vq); | 251 | err = PTR_ERR(chan->vq); |
252 | goto out_free_vq; | 252 | goto out_free_vq; |
@@ -261,7 +261,7 @@ static int p9_virtio_probe(struct virtio_device *vdev) | |||
261 | return 0; | 261 | return 0; |
262 | 262 | ||
263 | out_free_vq: | 263 | out_free_vq: |
264 | vdev->config->del_vq(chan->vq); | 264 | vdev->config->del_vqs(vdev); |
265 | fail: | 265 | fail: |
266 | mutex_lock(&virtio_9p_lock); | 266 | mutex_lock(&virtio_9p_lock); |
267 | chan_index--; | 267 | chan_index--; |
@@ -332,7 +332,7 @@ static void p9_virtio_remove(struct virtio_device *vdev) | |||
332 | BUG_ON(chan->inuse); | 332 | BUG_ON(chan->inuse); |
333 | 333 | ||
334 | if (chan->initialized) { | 334 | if (chan->initialized) { |
335 | vdev->config->del_vq(chan->vq); | 335 | vdev->config->del_vqs(vdev); |
336 | chan->initialized = false; | 336 | chan->initialized = false; |
337 | } | 337 | } |
338 | } | 338 | } |
diff --git a/net/ipv6/Kconfig b/net/ipv6/Kconfig index ca8cb326d1d2..ead6c7a42f44 100644 --- a/net/ipv6/Kconfig +++ b/net/ipv6/Kconfig | |||
@@ -168,7 +168,7 @@ config IPV6_SIT | |||
168 | into IPv4 packets. This is useful if you want to connect two IPv6 | 168 | into IPv4 packets. This is useful if you want to connect two IPv6 |
169 | networks over an IPv4-only path. | 169 | networks over an IPv4-only path. |
170 | 170 | ||
171 | Saying M here will produce a module called sit.ko. If unsure, say Y. | 171 | Saying M here will produce a module called sit. If unsure, say Y. |
172 | 172 | ||
173 | config IPV6_NDISC_NODETYPE | 173 | config IPV6_NDISC_NODETYPE |
174 | bool | 174 | bool |
diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c index a8218bc1806a..597487ae6ce8 100644 --- a/net/ipv6/addrconf.c +++ b/net/ipv6/addrconf.c | |||
@@ -2765,7 +2765,7 @@ static void addrconf_dad_start(struct inet6_ifaddr *ifp, u32 flags) | |||
2765 | spin_unlock_bh(&ifp->lock); | 2765 | spin_unlock_bh(&ifp->lock); |
2766 | read_unlock_bh(&idev->lock); | 2766 | read_unlock_bh(&idev->lock); |
2767 | /* | 2767 | /* |
2768 | * If the defice is not ready: | 2768 | * If the device is not ready: |
2769 | * - keep it tentative if it is a permanent address. | 2769 | * - keep it tentative if it is a permanent address. |
2770 | * - otherwise, kill it. | 2770 | * - otherwise, kill it. |
2771 | */ | 2771 | */ |
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index cb3ad741ebf8..c26a20c58dde 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig | |||
@@ -327,7 +327,7 @@ config NETFILTER_XT_TARGET_CONNMARK | |||
327 | 327 | ||
328 | If you want to compile it as a module, say M here and read | 328 | If you want to compile it as a module, say M here and read |
329 | <file:Documentation/kbuild/modules.txt>. The module will be called | 329 | <file:Documentation/kbuild/modules.txt>. The module will be called |
330 | ipt_CONNMARK.ko. If unsure, say `N'. | 330 | ipt_CONNMARK. If unsure, say `N'. |
331 | 331 | ||
332 | config NETFILTER_XT_TARGET_CONNSECMARK | 332 | config NETFILTER_XT_TARGET_CONNSECMARK |
333 | tristate '"CONNSECMARK" target support' | 333 | tristate '"CONNSECMARK" target support' |
@@ -584,7 +584,7 @@ config NETFILTER_XT_MATCH_CONNMARK | |||
584 | 584 | ||
585 | If you want to compile it as a module, say M here and read | 585 | If you want to compile it as a module, say M here and read |
586 | <file:Documentation/kbuild/modules.txt>. The module will be called | 586 | <file:Documentation/kbuild/modules.txt>. The module will be called |
587 | ipt_connmark.ko. If unsure, say `N'. | 587 | ipt_connmark. If unsure, say `N'. |
588 | 588 | ||
589 | config NETFILTER_XT_MATCH_CONNTRACK | 589 | config NETFILTER_XT_MATCH_CONNTRACK |
590 | tristate '"conntrack" connection tracking match support' | 590 | tristate '"conntrack" connection tracking match support' |
diff --git a/net/netfilter/nf_conntrack_acct.c b/net/netfilter/nf_conntrack_acct.c index 9fe8982bd7c9..4a1d94aac20b 100644 --- a/net/netfilter/nf_conntrack_acct.c +++ b/net/netfilter/nf_conntrack_acct.c | |||
@@ -116,7 +116,7 @@ int nf_conntrack_acct_init(struct net *net) | |||
116 | if (net_eq(net, &init_net)) { | 116 | if (net_eq(net, &init_net)) { |
117 | #ifdef CONFIG_NF_CT_ACCT | 117 | #ifdef CONFIG_NF_CT_ACCT |
118 | printk(KERN_WARNING "CONFIG_NF_CT_ACCT is deprecated and will be removed soon. Please use\n"); | 118 | printk(KERN_WARNING "CONFIG_NF_CT_ACCT is deprecated and will be removed soon. Please use\n"); |
119 | printk(KERN_WARNING "nf_conntrack.acct=1 kernel paramater, acct=1 nf_conntrack module option or\n"); | 119 | printk(KERN_WARNING "nf_conntrack.acct=1 kernel parameter, acct=1 nf_conntrack module option or\n"); |
120 | printk(KERN_WARNING "sysctl net.netfilter.nf_conntrack_acct=1 to enable it.\n"); | 120 | printk(KERN_WARNING "sysctl net.netfilter.nf_conntrack_acct=1 to enable it.\n"); |
121 | #endif | 121 | #endif |
122 | 122 | ||