summaryrefslogtreecommitdiff
path: root/target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch
diff options
context:
space:
mode:
authorLuka Perkov <luka@openwrt.org>2015-02-07 17:48:39 +0000
committerLuka Perkov <luka@openwrt.org>2015-02-07 17:48:39 +0000
commit0bbcdb21da8777276aab85ef94f40d27c101f1ee (patch)
treed0e8374cf1bee5168b04380cde63662019cf0c16 /target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch
parentd81a8ad5239d2f65683845645fef527e6d39ac2e (diff)
downloadmtk-20170518-0bbcdb21da8777276aab85ef94f40d27c101f1ee.zip
mtk-20170518-0bbcdb21da8777276aab85ef94f40d27c101f1ee.tar.gz
mtk-20170518-0bbcdb21da8777276aab85ef94f40d27c101f1ee.tar.bz2
ar71xx: refresh patches
Signed-off-by: Luka Perkov <luka@openwrt.org> SVN-Revision: 44303
Diffstat (limited to 'target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch')
-rw-r--r--target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch6
1 files changed, 3 insertions, 3 deletions
diff --git a/target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch b/target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch
index c4d0005..b00a629 100644
--- a/target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch
+++ b/target/linux/ar71xx/patches-3.14/902-unaligned_access_hacks.patch
@@ -210,7 +210,7 @@
#include <asm/uaccess.h>
#include <linux/proc_fs.h>
-@@ -771,10 +772,10 @@ static void tcp_v6_send_response(struct
+@@ -771,10 +772,10 @@ static void tcp_v6_send_response(struct
topt = (__be32 *)(t1 + 1);
if (tsecr) {
@@ -637,7 +637,7 @@
#include <linux/netdevice.h>
--- a/include/net/inet_ecn.h
+++ b/include/net/inet_ecn.h
-@@ -115,13 +115,13 @@ static inline int IP6_ECN_set_ce(struct
+@@ -115,13 +115,13 @@ static inline int IP6_ECN_set_ce(struct
{
if (INET_ECN_is_not_ect(ipv6_get_dsfield(iph)))
return 0;
@@ -836,7 +836,7 @@
ptr = ip6hoff + sizeof(struct ipv6hdr);
--- a/net/xfrm/xfrm_input.c
+++ b/net/xfrm/xfrm_input.c
-@@ -77,8 +77,8 @@ int xfrm_parse_spi(struct sk_buff *skb,
+@@ -77,8 +77,8 @@ int xfrm_parse_spi(struct sk_buff *skb,
if (!pskb_may_pull(skb, hlen))
return -EINVAL;