<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/net/ipv4, branch v2.6.19</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.19</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.19'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2006-11-29T04:59:38Z</updated>
<entry>
<title>[NETFILTER]: ipt_REJECT: fix memory corruption</title>
<updated>2006-11-29T04:59:38Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-29T04:10:21Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=af443b6d90de17f7630621269cf0610d9d772670'/>
<id>urn:sha1:af443b6d90de17f7630621269cf0610d9d772670</id>
<content type='text'>
On devices with hard_header_len &gt; LL_MAX_HEADER ip_route_me_harder()
reallocates the skb, leading to memory corruption when using the stale
tcph pointer to update the checksum.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: conntrack: fix refcount leak when finding expectation</title>
<updated>2006-11-29T04:59:37Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-11-27T18:26:46Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=2e47c264a2e6ea24c27b4987607222202818c1f4'/>
<id>urn:sha1:2e47c264a2e6ea24c27b4987607222202818c1f4</id>
<content type='text'>
All users of __{ip,nf}_conntrack_expect_find() don't expect that
it increments the reference count of expectation.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ctnetlink: fix reference count leak</title>
<updated>2006-11-29T04:59:36Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-27T18:26:25Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c537b75a3ba9f5d2569f313742cd379dff6ceb70'/>
<id>urn:sha1:c537b75a3ba9f5d2569f313742cd379dff6ceb70</id>
<content type='text'>
When NFA_NEST exceeds the skb size the protocol reference is leaked.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NET]: Fix kfifo_alloc() error check.</title>
<updated>2006-11-25T23:16:49Z</updated>
<author>
<name>Akinobu Mita</name>
<email>akinobu.mita@gmail.com</email>
</author>
<published>2006-11-23T04:26:11Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=ac16ca6412d9feb5b2f8fc76a4ed938b5d107f94'/>
<id>urn:sha1:ac16ca6412d9feb5b2f8fc76a4ed938b5d107f94</id>
<content type='text'>
The return value of kfifo_alloc() should be checked by IS_ERR().

Signed-off-by: Akinobu Mita &lt;akinobu.mita@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[UDP]: Make udp_encap_rcv use pskb_may_pull</title>
<updated>2006-11-25T23:16:48Z</updated>
<author>
<name>Olaf Kirch</name>
<email>okir@suse.de</email>
</author>
<published>2006-11-23T04:11:42Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=753eab76a3337863a0d86ce045fa4eb6c3cbeef9'/>
<id>urn:sha1:753eab76a3337863a0d86ce045fa4eb6c3cbeef9</id>
<content type='text'>
Make udp_encap_rcv use pskb_may_pull

IPsec with NAT-T breaks on some notebooks using the latest e1000 chipset,
when header split is enabled. When receiving sufficiently large packets, the
driver puts everything up to and including the UDP header into the header
portion of the skb, and the rest goes into the paged part. udp_encap_rcv
forgets to use pskb_may_pull, and fails to decapsulate it. Instead, it
passes it up it to the IKE daemon.

Signed-off-by: Olaf Kirch &lt;okir@suse.de&gt;
Signed-off-by: Jean Delvare &lt;jdelvare@suse.de&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: H.323 conntrack: fix crash with CONFIG_IP_NF_CT_ACCT</title>
<updated>2006-11-25T23:16:47Z</updated>
<author>
<name>Faidon Liambotis</name>
<email>paravoid@debian.org</email>
</author>
<published>2006-11-22T05:46:02Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82'/>
<id>urn:sha1:38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82</id>
<content type='text'>
H.323 connection tracking code calls ip_ct_refresh_acct() when
processing RCFs and URQs but passes NULL as the skb.
When CONFIG_IP_NF_CT_ACCT is enabled, the connection tracking core tries
to derefence the skb, which results in an obvious panic.
A similar fix was applied on the SIP connection tracking code some time
ago.

Signed-off-by: Faidon Liambotis &lt;paravoid@debian.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Fix up sysctl_tcp_mem initialization.</title>
<updated>2006-11-16T05:18:51Z</updated>
<author>
<name>John Heffner</name>
<email>jheffner@psc.edu</email>
</author>
<published>2006-11-15T04:25:17Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=52bf376c63eebe72e862a1a6e713976b038c3f50'/>
<id>urn:sha1:52bf376c63eebe72e862a1a6e713976b038c3f50</id>
<content type='text'>
Fix up tcp_mem initial settings to take into account the size of the
hash entries (different on SMP and non-SMP systems).

Signed-off-by: John Heffner &lt;jheffner@psc.edu&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Use pskb_trim in {ip,ip6,nfnetlink}_queue</title>
<updated>2006-11-16T05:18:48Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-15T03:48:09Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d8a585d78efdf191a64ca655136ac1e49fd27cf4'/>
<id>urn:sha1:d8a585d78efdf191a64ca655136ac1e49fd27cf4</id>
<content type='text'>
Based on patch by James D. Nurmi:

I've got some code very dependant on nfnetlink_queue, and turned up a
large number of warns coming from skb_trim.  While it's quite possibly
my code, having not seen it on older kernels made me a bit suspect.

Anyhow, based on some googling I turned up this thread:
http://lkml.org/lkml/2006/8/13/56

And believe the issue to be related, so attached is a small patch to
the kernel -- not sure if this is completely correct, but for anyone
else hitting the WARN_ON(1) in skbuff.h, it might be helpful..

Signed-off-by: James D. Nurmi &lt;jdnurmi@gmail.com&gt;

Ported to ip6_queue and nfnetlink_queue and added return value
checks.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPVS]: More endianness fixed.</title>
<updated>2006-11-10T22:57:37Z</updated>
<author>
<name>Julian Anastasov</name>
<email>ja@ssi.bg</email>
</author>
<published>2006-11-10T22:57:37Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=bb831eb2027c12a740ad4e4ad78f2a0e841ae808'/>
<id>urn:sha1:bb831eb2027c12a740ad4e4ad78f2a0e841ae808</id>
<content type='text'>
- make sure port in FTP data is in network order (in fact it was looking
buggy for big endian boxes before Viro's changes)
- htonl -&gt; htons for port

Signed-off-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: Don't use highmem in tcp hash size calculation.</title>
<updated>2006-11-07T23:10:11Z</updated>
<author>
<name>John Heffner</name>
<email>jheffner@psc.edu</email>
</author>
<published>2006-11-07T07:10:51Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9e950efa20dc8037c27509666cba6999da9368e8'/>
<id>urn:sha1:9e950efa20dc8037c27509666cba6999da9368e8</id>
<content type='text'>
This patch removes consideration of high memory when determining TCP
hash table sizes.  Taking into account high memory results in tcp_mem
values that are too large.

Signed-off-by: John Heffner &lt;jheffner@psc.edu&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
