<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4, branch v2.6.26</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.26</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.26'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2008-07-10T23:52:52Z</updated>
<entry>
<title>ipv4: fib_trie: Fix lookup error return</title>
<updated>2008-07-10T23:52:52Z</updated>
<author>
<name>Ben Hutchings</name>
<email>bhutchings@solarflare.com</email>
</author>
<published>2008-07-10T23:52:52Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=2e655571c618434c24ac2ca989374fdd84470d6d'/>
<id>urn:sha1:2e655571c618434c24ac2ca989374fdd84470d6d</id>
<content type='text'>
In commit a07f5f508a4d9728c8e57d7f66294bf5b254ff7f "[IPV4] fib_trie: style
cleanup", the changes to check_leaf() and fn_trie_lookup() were wrong - where
fn_trie_lookup() would previously return a negative error value from
check_leaf(), it now returns 0.
 
Now fn_trie_lookup() doesn't appear to care about plen, so we can revert
check_leaf() to returning the error value.

Signed-off-by: Ben Hutchings &lt;bhutchings@solarflare.com&gt;
Tested-by: William Boughton &lt;bill@boughton.de&gt;
Acked-by: Stephen Heminger &lt;shemminger@vyatta.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: correct kcalloc usage</title>
<updated>2008-07-10T23:51:32Z</updated>
<author>
<name>Milton Miller</name>
<email>miltonm@bga.com</email>
</author>
<published>2008-07-10T23:51:32Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=3d8ea1fd7001f39b5cc0ad2ff51696292ea3cfbf'/>
<id>urn:sha1:3d8ea1fd7001f39b5cc0ad2ff51696292ea3cfbf</id>
<content type='text'>
kcalloc is supposed to be called with the count as its first argument and
the element size as the second.

Signed-off-by: Milton Miller &lt;miltonm@bga.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_nat_snmp_basic: fix a range check in NAT for SNMP</title>
<updated>2008-07-09T22:06:45Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2008-07-09T22:06:45Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=252815b0cfe711001eff0327872209986b36d490'/>
<id>urn:sha1:252815b0cfe711001eff0327872209986b36d490</id>
<content type='text'>
Fix a range check in netfilter IP NAT for SNMP to always use a big enough size
variable that the compiler won't moan about comparing it to ULONG_MAX/8 on a
64-bit platform.

Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: fix a size_t &lt; 0 comparison in tcp_read_sock</title>
<updated>2008-07-03T10:31:21Z</updated>
<author>
<name>Octavian Purdila</name>
<email>opurdila@ixiacom.com</email>
</author>
<published>2008-07-03T10:31:21Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=374e7b59498ce0785b3727794b351221528a5159'/>
<id>urn:sha1:374e7b59498ce0785b3727794b351221528a5159</id>
<content type='text'>
&lt;used&gt; should be of type int (not size_t) since recv_actor can return
negative values and it is also used in a &lt; 0 comparison.

Signed-off-by: Octavian Purdila &lt;opurdila@ixiacom.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: net/ipv4/tcp.c needs linux/scatterlist.h</title>
<updated>2008-07-03T10:22:02Z</updated>
<author>
<name>Andrew Morton</name>
<email>akpm@linux-foundation.org</email>
</author>
<published>2008-07-03T10:22:02Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=81b23b4a7acd9b37a269c62d02479d4f645dd20a'/>
<id>urn:sha1:81b23b4a7acd9b37a269c62d02479d4f645dd20a</id>
<content type='text'>
alpha:

net/ipv4/tcp.c: In function 'tcp_calc_md5_hash':
net/ipv4/tcp.c:2479: error: implicit declaration of function 'sg_init_table'    net/ipv4/tcp.c:2482: error: implicit declaration of function 'sg_set_buf'
net/ipv4/tcp.c:2507: error: implicit declaration of function 'sg_mark_end'      

Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>net/inet_lro: remove setting skb-&gt;ip_summed when not LRO-able</title>
<updated>2008-06-28T03:09:00Z</updated>
<author>
<name>Eli Cohen</name>
<email>eli@mellanox.co.il</email>
</author>
<published>2008-06-28T03:09:00Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=251a4b320f2352598f84e4452ab538aa8064af52'/>
<id>urn:sha1:251a4b320f2352598f84e4452ab538aa8064af52</id>
<content type='text'>
When an SKB cannot be chained to a session, the current code attempts
to "restore" its ip_summed field from lro_mgr-&gt;ip_summed. However,
lro_mgr-&gt;ip_summed does not hold the original value; in fact, we'd
better not touch skb-&gt;ip_summed since it is not modified by the code
in the path leading to a failure to chain it.  Also use a cleaer
comment to the describe the ip_summed field of struct net_lro_mgr.

Issue raised by Or Gerlitz &lt;ogerlitz@voltaire.com&gt;

Signed-off-by: Eli Cohen &lt;eli@mellanox.co.il&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>inet fragments: fix race between inet_frag_find and inet_frag_secret_rebuild</title>
<updated>2008-06-28T03:06:08Z</updated>
<author>
<name>Pavel Emelyanov</name>
<email>xemul@openvz.org</email>
</author>
<published>2008-06-28T03:06:08Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=9a375803feaadb6c34e0807bd9325885dcca5c00'/>
<id>urn:sha1:9a375803feaadb6c34e0807bd9325885dcca5c00</id>
<content type='text'>
The problem is that while we work w/o the inet_frags.lock even
read-locked the secret rebuild timer may occur (on another CPU, since
BHs are still disabled in the inet_frag_find) and change the rnd seed
for ipv4/6 fragments.

It was caused by my patch fd9e63544cac30a34c951f0ec958038f0529e244
([INET]: Omit double hash calculations in xxx_frag_intern) late 
in the 2.6.24 kernel, so this should probably be queued to -stable.

Signed-off-by: Pavel Emelyanov &lt;xemul@openvz.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: /proc/net/tcp rto,ato values not scaled properly (v2)</title>
<updated>2008-06-28T03:00:19Z</updated>
<author>
<name>Stephen Hemminger</name>
<email>shemminger@vyatta.com</email>
</author>
<published>2008-06-28T03:00:19Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7be87351a1f6430426e88b4fcde353ab3330caff'/>
<id>urn:sha1:7be87351a1f6430426e88b4fcde353ab3330caff</id>
<content type='text'>
I found another case where we are sending information to userspace
in the wrong HZ scale.  This should have been fixed back in 2.5 :-(

This means an ABI change but as it stands there is no way for an application
like ss to get the right value.

Signed-off-by: Stephen Hemminger &lt;shemminger@vyatta.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: calculate tcp_mem based on low memory instead of all memory</title>
<updated>2008-06-28T00:23:57Z</updated>
<author>
<name>Miquel van Smoorenburg</name>
<email>miquels@cistron.nl</email>
</author>
<published>2008-06-28T00:23:57Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=57413ebc4e0f1e471a3b4db4aff9a85c083d090e'/>
<id>urn:sha1:57413ebc4e0f1e471a3b4db4aff9a85c083d090e</id>
<content type='text'>
The tcp_mem array which contains limits on the total amount of memory
used by TCP sockets is calculated based on nr_all_pages.  On a 32 bits
x86 system, we should base this on the number of lowmem pages.

Signed-off-by: Miquel van Smoorenburg &lt;miquels@cistron.nl&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>xfrm: fix fragmentation for ipv4 xfrm tunnel</title>
<updated>2008-06-17T23:38:23Z</updated>
<author>
<name>Steffen Klassert</name>
<email>steffen.klassert@secunet.com</email>
</author>
<published>2008-06-17T23:37:13Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=fe833fca2eac6b3d3ad5e35f44ad4638362f1da8'/>
<id>urn:sha1:fe833fca2eac6b3d3ad5e35f44ad4638362f1da8</id>
<content type='text'>
When generating the ip header for the transformed packet we just copy
the frag_off field of the ip header from the original packet to the ip
header of the new generated packet. If we receive a packet as a chain
of fragments, all but the last of the new generated packets have the
IP_MF flag set. We have to mask the frag_off field to only keep the
IP_DF flag from the original packet. This got lost with git commit
36cf9acf93e8561d9faec24849e57688a81eb9c5 ("[IPSEC]: Separate
inner/outer mode processing on output")

Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Acked-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
