<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-linux/net/ipv4/ipvs, branch stable</title>
<subtitle>WireGuard for the Linux kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-linux/atom/net/ipv4/ipvs?h=stable</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-linux/atom/net/ipv4/ipvs?h=stable'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/'/>
<updated>2008-10-08T21:41:35Z</updated>
<entry>
<title>ipvs: Remove stray file left over from ipvs move</title>
<updated>2008-10-08T21:41:35Z</updated>
<author>
<name>Sven Wegener</name>
<email>sven.wegener@stealer.net</email>
</author>
<published>2008-10-08T21:41:35Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=071d7ab6649eb34a873a53e71635186e9117101d'/>
<id>urn:sha1:071d7ab6649eb34a873a53e71635186e9117101d</id>
<content type='text'>
Commit cb7f6a7b716e801097b564dec3ccb58d330aef56 ("IPVS: Move IPVS to
net/netfilter/ipvs") has left a stray file in the old location of ipvs.

Signed-off-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>IPVS: Move IPVS to net/netfilter/ipvs</title>
<updated>2008-10-06T21:38:24Z</updated>
<author>
<name>Julius Volz</name>
<email>juliusv@google.com</email>
</author>
<published>2008-09-19T10:32:57Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=cb7f6a7b716e801097b564dec3ccb58d330aef56'/>
<id>urn:sha1:cb7f6a7b716e801097b564dec3ccb58d330aef56</id>
<content type='text'>
Since IPVS now has partial IPv6 support, this patch moves IPVS from
net/ipv4/ipvs to net/netfilter/ipvs. It's a result of:

$ git mv net/ipv4/ipvs net/netfilter

and adapting the relevant Kconfigs/Makefiles to the new path.

Signed-off-by: Julius Volz &lt;juliusv@google.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>ipvs: Fix unused label warning</title>
<updated>2008-09-21T23:57:26Z</updated>
<author>
<name>Sven Wegener</name>
<email>sven.wegener@stealer.net</email>
</author>
<published>2008-09-20T09:48:33Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=8d5803bf6fbe5264000afc8c34bff08e8ecc023b'/>
<id>urn:sha1:8d5803bf6fbe5264000afc8c34bff08e8ecc023b</id>
<content type='text'>
Signed-off-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>ipvs: Restrict sync message to 255 connections</title>
<updated>2008-09-21T23:55:58Z</updated>
<author>
<name>Sven Wegener</name>
<email>sven.wegener@stealer.net</email>
</author>
<published>2008-09-19T18:41:56Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=e6f225ebb7c35fe30fdf8608927c5cf8fce6de7d'/>
<id>urn:sha1:e6f225ebb7c35fe30fdf8608927c5cf8fce6de7d</id>
<content type='text'>
The nr_conns variable in the sync message header is only eight bits wide
and will overflow on interfaces with a large MTU. As a result the backup
won't parse all connections contained in the sync buffer. On regular
ethernet with an MTU of 1500 this isn't a problem, because we can't
overflow the value, but consider jumbo frames being used on a cross-over
connection between both directors.

We now restrict the size of the sync buffer, so that we never put more
than 255 connections into a single sync buffer.

Signed-off-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>net: Use hton[sl]() instead of __constant_hton[sl]() where applicable</title>
<updated>2008-09-21T05:20:49Z</updated>
<author>
<name>Arnaldo Carvalho de Melo</name>
<email>acme@redhat.com</email>
</author>
<published>2008-09-21T05:20:49Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=6067804047b64dde89f4f133fc7eba48ee44107d'/>
<id>urn:sha1:6067804047b64dde89f4f133fc7eba48ee44107d</id>
<content type='text'>
Signed-off-by: Arnaldo Carvalho de Melo &lt;acme@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>ipvs: change some __constant_htons() to htons()</title>
<updated>2008-09-17T00:13:17Z</updated>
<author>
<name>Brian Haley</name>
<email>brian.haley@hp.com</email>
</author>
<published>2008-09-16T15:11:11Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=d286600e199aa2f1058a1f883d234e73626304d2'/>
<id>urn:sha1:d286600e199aa2f1058a1f883d234e73626304d2</id>
<content type='text'>
Change __contant_htons() to htons() in the IPVS code when not in an
initializer.

-Brian

Signed-off-by: Brian Haley &lt;brian.haley@hp.com&gt;
Acked-by: Julius Volz &lt;juliusv@google.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
</content>
</entry>
<entry>
<title>ipvs: add __aquire/__release annotations to ip_vs_info_seq_start/ip_vs_info_seq_stop</title>
<updated>2008-09-17T00:10:42Z</updated>
<author>
<name>Simon Horman</name>
<email>horms@verge.net.au</email>
</author>
<published>2008-09-17T00:10:42Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=563e94f072714657a82a59a3bf81a719a6a25591'/>
<id>urn:sha1:563e94f072714657a82a59a3bf81a719a6a25591</id>
<content type='text'>
This teaches sparse that the following are not problems:

make C=1
  CHECK   net/ipv4/ipvs/ip_vs_ctl.c
net/ipv4/ipvs/ip_vs_ctl.c:1793:14: warning: context imbalance in 'ip_vs_info_seq_start' - wrong count at exit
net/ipv4/ipvs/ip_vs_ctl.c:1842:13: warning: context imbalance in 'ip_vs_info_seq_stop' - unexpected unlock

Acked-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Acked-by: Julius Volz &lt;juliusv@google.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;

</content>
</entry>
<entry>
<title>ipvs: supply a valid 0 address to ip_vs_conn_new()</title>
<updated>2008-09-17T00:10:42Z</updated>
<author>
<name>Simon Horman</name>
<email>horms@verge.net.au</email>
</author>
<published>2008-09-17T00:10:42Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=dff630ddad3884b99fae3ad92f5eccbf26618679'/>
<id>urn:sha1:dff630ddad3884b99fae3ad92f5eccbf26618679</id>
<content type='text'>
ip_vs_conn_new expects a union nf_inet_addr as the type for its address
parameters, not a plain integer.

This problem was detected by sparse.

make C=1
  CHECK   net/ipv4/ipvs/ip_vs_core.c
net/ipv4/ipvs/ip_vs_core.c:469:9: warning: Using plain integer as NULL pointer

Acked-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Acked-by: Julius Volz &lt;juliusv@google.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;

</content>
</entry>
<entry>
<title>ipvs: only unlock in ip_vs_edit_service() if already locked</title>
<updated>2008-09-17T00:10:41Z</updated>
<author>
<name>Simon Horman</name>
<email>horms@verge.net.au</email>
</author>
<published>2008-09-17T00:10:41Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=9e691ed68d94ab3047e028736641445b4cf74d67'/>
<id>urn:sha1:9e691ed68d94ab3047e028736641445b4cf74d67</id>
<content type='text'>
Jumping to out unlocks __ip_vs_svc_lock, but that lock is not taken until
after code that may jump to out.

This problem was detected by sparse.

make C=1
  CHECK   net/ipv4/ipvs/ip_vs_ctl.c
net/ipv4/ipvs/ip_vs_ctl.c:1332:2: warning: context imbalance in 'ip_vs_edit_service' - unexpected unlock

Acked-by: Sven Wegener &lt;sven.wegener@stealer.net&gt;
Acked-by: Julius Volz &lt;juliusv@google.com&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;

</content>
</entry>
<entry>
<title>net: ip_vs_proto_{tcp,udp} build fix</title>
<updated>2008-09-13T06:23:50Z</updated>
<author>
<name>Stephen Rothwell</name>
<email>sfr@canb.auug.org.au</email>
</author>
<published>2008-09-13T06:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-linux/commit/?id=63f2c0464875b6ef2132cecb19b2a5abbf061227'/>
<id>urn:sha1:63f2c0464875b6ef2132cecb19b2a5abbf061227</id>
<content type='text'>
Signed-off-by: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
