Skip to content
Snippets Groups Projects
  1. May 22, 2008
    • Rami Rosen's avatar
      net: The world is not perfect patch. · 071f92d0
      Rami Rosen authored
      
        Unless there will be any objection here, I suggest consider the
      following patch which simply removes the code for the
      -DI_WISH_WORLD_WERE_PERFECT in the three methods which use it.
      
      The compilation errors we get when using -DI_WISH_WORLD_WERE_PERFECT
      show that this code was not built and not used for really a long time.
      
      Signed-off-by: default avatarRami Rosen <ramirose@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      071f92d0
    • Ilpo Järvinen's avatar
      tcp: Make prior_ssthresh a u32 · 4b749440
      Ilpo Järvinen authored
      
      If previous window was above representable values of u16,
      strange things will happen if undo with the truncated value
      is called for. Alternatively, this could be fixed by some
      max trickery but that would limit undoing high-speed undos.
      
      Adds 16-bit hole but there isn't anything to fill it with.
      
      Signed-off-by: default avatarIlpo Järvinen <ilpo.jarvinen@helsinki.fi>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      4b749440
    • David S. Miller's avatar
      xfrm_user: Remove zero length key checks. · 88860c9e
      David S. Miller authored
      
      The crypto layer will determine whether that is valid
      or not.
      
      Suggested by Herbert Xu, based upon a report and patch
      by Martin Willi.
      
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Acked-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      88860c9e
    • Denis Cheng's avatar
      net/ipv4/arp.c: Use common hex_asc helpers · 51f82a2b
      Denis Cheng authored
      
      Here the local hexbuf is a duplicate of global const char hex_asc from
      lib/hexdump.c, except the hex letters' cases:
      
      	const char hexbuf[] = "0123456789ABCDEF";
      
      	const char hex_asc[] = "0123456789abcdef";
      
      and here to print HW addresses, the hex cases are not significant.
      
      Thanks to Harvey Harrison to introduce the hex_asc_hi/hex_asc_lo helpers.
      
      Signed-off-by: default avatarDenis Cheng <crquan@gmail.com>
      Signed-off-by: default avatarHarvey Harrison <harvey.harrison@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      51f82a2b
    • David S. Miller's avatar
      cassini: Only use chip checksum for ipv4 packets. · b1443e2f
      David S. Miller authored
      
      According to David Monro, at least with Natsemi Saturn chips the
      cassini driver has some trouble with ipv6 checksums.
      
      Until we have more information about what's going on here, only
      use the chip checksums for ipv4.
      
      This workaround was suggested and tested by David.
      
      Update version and release date.
      
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b1443e2f
    • Sridhar Samudrala's avatar
      tcp: TCP connection times out if ICMP frag needed is delayed · 7d227cd2
      Sridhar Samudrala authored
      
      We are seeing an issue with TCP in handling an ICMP frag needed
      message that is received after net.ipv4.tcp_retries1 retransmits.
      The default value of retries1 is 3. So if the path mtu changes
      and ICMP frag needed is lost for the first 3 retransmits or if
      it gets delayed until 3 retransmits are done, TCP doesn't update
      MSS correctly and continues to retransmit the orginal message
      until it timesout after tcp_retries2 retransmits.
      
      I am seeing this issue even with the latest 2.6.25.4 kernel.
      
      In tcp_retransmit_timer(), when retransmits counter exceeds 
      tcp_retries1 value, the dst cache entry of the socket is reset.
      At this time, if we receive an ICMP frag needed message, the 
      dst entry gets updated with the new MTU, but the TCP sockets
      dst_cache entry remains NULL.
      
      So the next time when we try to retransmit after the ICMP frag
      needed is received, tcp_retransmit_skb() gets called. Here the
      cur_mss value is calculated at the start of the routine with
      a NULL sk_dst_cache. Instead we should call tcp_current_mss after
      the rebuild_header that caches the dst entry with the updated mtu.
      Also the rebuild_header should be called before tcp_fragment
      so that skb is fragmented if the mss goes down.
      
      Signed-off-by: default avatarSridhar Samudrala <sri@us.ibm.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      7d227cd2
  2. May 21, 2008
  3. May 20, 2008
  4. May 19, 2008
  5. May 16, 2008
  6. May 15, 2008
Loading