03 May, 2007

1 commit


26 Apr, 2007

9 commits


23 Mar, 2007

1 commit

  • Turning up the warnings on gcc makes it emit warnings
    about the placement of 'inline' in function declarations.
    Here's everything that was under net/

    Signed-off-by: Dave Jones
    Signed-off-by: David S. Miller

    Dave Jones
     

15 Feb, 2007

1 commit

  • The semantic effect of insert_at_head is that it would allow new registered
    sysctl entries to override existing sysctl entries of the same name. Which is
    pain for caching and the proc interface never implemented.

    I have done an audit and discovered that none of the current users of
    register_sysctl care as (excpet for directories) they do not register
    duplicate sysctl entries.

    So this patch simply removes the support for overriding existing entries in
    the sys_sysctl interface since no one uses it or cares and it makes future
    enhancments harder.

    Signed-off-by: Eric W. Biederman
    Acked-by: Ralf Baechle
    Acked-by: Martin Schwidefsky
    Cc: Russell King
    Cc: David Howells
    Cc: "Luck, Tony"
    Cc: Ralf Baechle
    Cc: Paul Mackerras
    Cc: Martin Schwidefsky
    Cc: Andi Kleen
    Cc: Jens Axboe
    Cc: Corey Minyard
    Cc: Neil Brown
    Cc: "John W. Linville"
    Cc: James Bottomley
    Cc: Jan Kara
    Cc: Trond Myklebust
    Cc: Mark Fasheh
    Cc: David Chinner
    Cc: "David S. Miller"
    Cc: Patrick McHardy
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Eric W. Biederman
     

11 Feb, 2007

1 commit


09 Feb, 2007

1 commit


14 Dec, 2006

1 commit


07 Dec, 2006

1 commit

  • The attached patch resolves an issue where a IP DNATed packet with a
    martian source is forwarded while it's better to drop it. It also
    resolves messages complaining about ip forwarding being disabled while
    it's actually enabled. Thanks to lepton for
    reporting this problem.

    This is probably a candidate for the -stable release.

    Signed-off-by: Bart De Schuymer
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Bart De Schuymer
     

03 Dec, 2006

2 commits


23 Sep, 2006

3 commits


25 Jul, 2006

1 commit


09 Jul, 2006

1 commit

  • This patch adds the wrapper function skb_is_gso which can be used instead
    of directly testing skb_shinfo(skb)->gso_size. This makes things a little
    nicer and allows us to change the primary key for indicating whether an skb
    is GSO (if we ever want to do that).

    Signed-off-by: Herbert Xu
    Signed-off-by: David S. Miller

    Herbert Xu
     

23 Jun, 2006

1 commit

  • Having separate fields in sk_buff for TSO/UFO (tso_size/ufo_size) is not
    going to scale if we add any more segmentation methods (e.g., DCCP). So
    let's merge them.

    They were used to tell the protocol of a packet. This function has been
    subsumed by the new gso_type field. This is essentially a set of netdev
    feature bits (shifted by 16 bits) that are required to process a specific
    skb. As such it's easy to tell whether a given device can process a GSO
    skb: you just have to and the gso_type field and the netdev's features
    field.

    I've made gso_type a conjunction. The idea is that you have a base type
    (e.g., SKB_GSO_TCPV4) that can be modified further to support new features.
    For example, if we add a hardware TSO type that supports ECN, they would
    declare NETIF_F_TSO | NETIF_F_TSO_ECN. All TSO packets with CWR set would
    have a gso_type of SKB_GSO_TCPV4 | SKB_GSO_TCPV4_ECN while all other TSO
    packets would be SKB_GSO_TCPV4. This means that only the CWR packets need
    to be emulated in software.

    Signed-off-by: Herbert Xu
    Signed-off-by: David S. Miller

    Herbert Xu
     

18 Jun, 2006

1 commit

  • I found a few more spots where pskb_trim_rcsum could be used but were not.
    This patch changes them to use it.

    Also, sk_filter can get paged skb data. Therefore we must use pskb_trim
    instead of skb_trim.

    Signed-off-by: Herbert Xu
    Signed-off-by: David S. Miller

    Herbert Xu
     

10 Apr, 2006

1 commit


21 Mar, 2006

6 commits


24 Feb, 2006

1 commit

  • The bridge-netfilter code attaches a fake dst_entry with dst->ops == NULL
    to purely bridged packets. When these packets are SNATed and a policy
    lookup is done, xfrm_lookup crashes because it tries to dereference
    dst->ops.

    Change xfrm_lookup not to dereference dst->ops before checking for the
    DST_NOXFRM flag and set this flag in the fake dst_entry.

    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     

14 Feb, 2006

1 commit


13 Feb, 2006

1 commit


10 Feb, 2006

1 commit

  • Bridge netfilter code needs to handle the case where device is
    removed from bridge while packet in process. In these cases the
    bridge_parent can become null while processing.

    This should fix: http://bugzilla.kernel.org/show_bug.cgi?id=5803

    Signed-off-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Stephen Hemminger
     

07 Jan, 2006

1 commit

  • It looks like the bridge netfilter code does not correctly update
    the hardware checksum after popping off the VLAN header.

    This is by inspection, I have *not* tested this.
    To test you would need to set up a filtering bridge with vlans
    and a device the does hardware receive checksum (skge, or sungem)

    Signed-off-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Stephen Hemminger
     

04 Jan, 2006

1 commit


27 Dec, 2005

1 commit

  • Call nf_bridge_put() before allocating a new nf_bridge structure and
    potentially overwriting the pointer to a previously allocated one.
    This fixes a memory leak which can occur when the bridge topology
    allows for an skb to traverse more than one bridge.

    Signed-off-by: David Kimdon
    Signed-off-by: David S. Miller

    David Kimdon
     

20 Dec, 2005

1 commit

  • A typo caused some bridged IPv6 packets to get dropped randomly,
    as reported by Sebastien Chaumontet. The patch below fixes this
    (using skb->nh.raw instead of raw) and also makes the jumbo packet
    length checking up-to-date with the code in
    net/ipv6/exthdrs.c::ipv6_hop_jumbo.

    Signed-off-by: Bart De Schuymer
    Signed-off-by: David S. Miller

    Bart De Schuymer