<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4, branch v2.6.13</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.13</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.13'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2005-08-24T05:06:09Z</updated>
<entry>
<title>[FIB_TRIE]: Don't ignore negative results from fib_semantic_match</title>
<updated>2005-08-24T05:06:09Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2005-08-24T05:06:09Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=06c7427021f1cc83703f14659d8405ca773ba1ef'/>
<id>urn:sha1:06c7427021f1cc83703f14659d8405ca773ba1ef</id>
<content type='text'>
When a semantic match occurs either success, not found or an error
(for matching unreachable routes/blackholes) is returned. fib_trie
ignores the errors and looks for a different matching route. Treat
results other than "no match" as success and end lookup.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Document non-trivial locking path in tcp_v{4,6}_get_port().</title>
<updated>2005-08-23T17:49:54Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2005-08-23T17:49:54Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=d5d283751ef3c05b6766501a46800cbee84959d6'/>
<id>urn:sha1:d5d283751ef3c05b6766501a46800cbee84959d6</id>
<content type='text'>
This trips up a lot of folks reading this code.
Put an unlikely() around the port-exhaustion test
for good measure.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Unconditionally clear TCP_NAGLE_PUSH in skb_entail().</title>
<updated>2005-08-23T17:13:06Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2005-08-23T17:13:06Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=89ebd197eb2cd31d6187db344d5117064e19fdde'/>
<id>urn:sha1:89ebd197eb2cd31d6187db344d5117064e19fdde</id>
<content type='text'>
Intention of this bit is to force pushing of the existing
send queue when TCP_CORK or TCP_NODELAY state changes via
setsockopt().

But it's easy to create a situation where the bit never
clears.  For example, if the send queue starts empty:

1) set TCP_NODELAY
2) clear TCP_NODELAY
3) set TCP_CORK
4) do small write()

The current code will leave TCP_NAGLE_PUSH set after that
sequence.  Unconditionally clearing the bit when new data
is added via skb_entail() solves the problem.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Fix HW checksum handling in ip_queue/ip6_queue</title>
<updated>2005-08-23T17:10:35Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2005-08-23T17:10:35Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=66a79a19a7c582efd99bb143c3a59fbda006eb39'/>
<id>urn:sha1:66a79a19a7c582efd99bb143c3a59fbda006eb39</id>
<content type='text'>
The checksum needs to be filled in on output, after mangling a packet
ip_summed needs to be reset.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV4]: Fix negative timer loop with lots of ipv4 peers.</title>
<updated>2005-08-23T17:10:15Z</updated>
<author>
<name>Dave Johnson</name>
<email>djohnson+linux-kernel@sw.starentnetworks.com</email>
</author>
<published>2005-08-23T17:10:15Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=1344a41637114485fac7afa1505bce2ff862807a'/>
<id>urn:sha1:1344a41637114485fac7afa1505bce2ff862807a</id>
<content type='text'>
From: Dave Johnson &lt;djohnson+linux-kernel@sw.starentnetworks.com&gt;

Found this bug while doing some scaling testing that created 500K inet
peers.

peer_check_expire() in net/ipv4/inetpeer.c isn't using inet_peer_gc_mintime
correctly and will end up creating an expire timer with less than the
minimum duration, and even zero/negative if enough active peers are
present.

If &gt;65K peers, the timer will be less than inet_peer_gc_mintime, and with
&gt;70K peers, the timer duration will reach zero and go negative.

The timer handler will continue to schedule another zero/negative timer in
a loop until peers can be aged.  This can continue for at least a few
minutes or even longer if the peers remain active due to arriving packets
while the loop is occurring.

Bug is present in both 2.4 and 2.6.  Same patch will apply to both just
fine.

Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Do TSO deferral even if tail SKB can go out now.</title>
<updated>2005-08-23T17:09:27Z</updated>
<author>
<name>Dmitry Yusupov</name>
<email>dima@neterion.com</email>
</author>
<published>2005-08-23T17:09:27Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=14869c388673e8db3348ab3706fa6485d0f0cf95'/>
<id>urn:sha1:14869c388673e8db3348ab3706fa6485d0f0cf95</id>
<content type='text'>
If the tail SKB fits into the window, it is still
benefitical to defer until the goal percentage of
the window is available.  This give the application
time to feed more data into the send queue and thus
results in larger TSO frames going out.

Patch from Dmitry Yusupov &lt;dima@neterion.com&gt;.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Fix HW checksum handling in TCPMSS target</title>
<updated>2005-08-21T00:40:41Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2005-08-21T00:40:41Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7e71af49d46e4c25f17a2c8f53d62ffd14f01007'/>
<id>urn:sha1:7e71af49d46e4c25f17a2c8f53d62ffd14f01007</id>
<content type='text'>
Most importantly, remove bogus BUG() in receive path.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Fix HW checksum handling in ECN target</title>
<updated>2005-08-21T00:39:15Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2005-08-21T00:39:15Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f93592ff4fa4a55aa7640d435fa93338e190294d'/>
<id>urn:sha1:f93592ff4fa4a55aa7640d435fa93338e190294d</id>
<content type='text'>
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Fix ECN target TCP marking</title>
<updated>2005-08-21T00:38:40Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2005-08-21T00:38:40Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=fd841326d73096ad79be9c3fa348f9ad04541cc2'/>
<id>urn:sha1:fd841326d73096ad79be9c3fa348f9ad04541cc2</id>
<content type='text'>
An incorrect check made it bail out before doing anything.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPCOMP]: Fix false smp_processor_id warning</title>
<updated>2005-08-18T21:36:59Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2005-08-18T21:36:59Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=6fc8b9e7c60d4a3d4d7f1189f74e37651f5610e6'/>
<id>urn:sha1:6fc8b9e7c60d4a3d4d7f1189f74e37651f5610e6</id>
<content type='text'>
This patch fixes a false-positive from debug_smp_processor_id().

The processor ID is only used to look up crypto_tfm objects.
Any processor ID is acceptable here as long as it is one that is
iterated on by for_each_cpu().

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
