Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
d5c74234
Commit
d5c74234
authored
Oct 29, 2002
by
Alexander Viro
Committed by
Anton Blanchard
Oct 29, 2002
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[PATCH] compile fixes
parent
06a9b8fe
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
5 additions
and
5 deletions
+5
-5
net/ipv4/netfilter/ip_conntrack_standalone.c
net/ipv4/netfilter/ip_conntrack_standalone.c
+1
-1
net/ipv4/netfilter/ipt_REJECT.c
net/ipv4/netfilter/ipt_REJECT.c
+3
-3
net/ipv4/syncookies.c
net/ipv4/syncookies.c
+1
-1
No files found.
net/ipv4/netfilter/ip_conntrack_standalone.c
View file @
d5c74234
...
...
@@ -201,7 +201,7 @@ static unsigned int ip_refrag(unsigned int hooknum,
/* Local packets are never produced too large for their
interface. We degfragment them at LOCAL_OUT, however,
so we have to refragment them here. */
if
((
*
pskb
)
->
len
>
rt
->
u
.
dst
.
pmtu
)
{
if
((
*
pskb
)
->
len
>
dst_pmtu
(
&
rt
->
u
.
dst
)
)
{
/* No hook can be after us, so this should be OK. */
ip_fragment
(
*
pskb
,
okfn
);
return
NF_STOLEN
;
...
...
net/ipv4/netfilter/ipt_REJECT.c
View file @
d5c74234
...
...
@@ -148,7 +148,7 @@ static void send_reset(struct sk_buff *oldskb, int local)
nskb
->
dst
=
&
rt
->
u
.
dst
;
/* "Never happens" */
if
(
nskb
->
len
>
nskb
->
dst
->
pmtu
)
if
(
nskb
->
len
>
dst_pmtu
(
nskb
->
dst
)
)
goto
free_nskb
;
connection_attach
(
nskb
,
oldskb
->
nfct
);
...
...
@@ -225,8 +225,8 @@ static void send_unreach(struct sk_buff *skb_in, int code)
/* RFC says return as much as we can without exceeding 576 bytes. */
length
=
skb_in
->
len
+
sizeof
(
struct
iphdr
)
+
sizeof
(
struct
icmphdr
);
if
(
length
>
rt
->
u
.
dst
.
pmtu
)
length
=
rt
->
u
.
dst
.
pmtu
;
if
(
length
>
dst_pmtu
(
&
rt
->
u
.
dst
)
)
length
=
dst_pmtu
(
&
rt
->
u
.
dst
)
;
if
(
length
>
576
)
length
=
576
;
...
...
net/ipv4/syncookies.c
View file @
d5c74234
...
...
@@ -189,7 +189,7 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb,
}
/* Try to redo what tcp_v4_send_synack did. */
req
->
window_clamp
=
rt
->
u
.
dst
.
window
;
req
->
window_clamp
=
dst_metric
(
&
rt
->
u
.
dst
,
RTAX_WINDOW
);
tcp_select_initial_window
(
tcp_full_space
(
sk
),
req
->
mss
,
&
req
->
rcv_wnd
,
&
req
->
window_clamp
,
0
,
&
rcv_wscale
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment