Commit d5c74234 authored by Alexander Viro's avatar Alexander Viro Committed by Anton Blanchard

[PATCH] compile fixes

parent 06a9b8fe
...@@ -201,7 +201,7 @@ static unsigned int ip_refrag(unsigned int hooknum, ...@@ -201,7 +201,7 @@ static unsigned int ip_refrag(unsigned int hooknum,
/* Local packets are never produced too large for their /* Local packets are never produced too large for their
interface. We degfragment them at LOCAL_OUT, however, interface. We degfragment them at LOCAL_OUT, however,
so we have to refragment them here. */ so we have to refragment them here. */
if ((*pskb)->len > rt->u.dst.pmtu) { if ((*pskb)->len > dst_pmtu(&rt->u.dst)) {
/* No hook can be after us, so this should be OK. */ /* No hook can be after us, so this should be OK. */
ip_fragment(*pskb, okfn); ip_fragment(*pskb, okfn);
return NF_STOLEN; return NF_STOLEN;
......
...@@ -148,7 +148,7 @@ static void send_reset(struct sk_buff *oldskb, int local) ...@@ -148,7 +148,7 @@ static void send_reset(struct sk_buff *oldskb, int local)
nskb->dst = &rt->u.dst; nskb->dst = &rt->u.dst;
/* "Never happens" */ /* "Never happens" */
if (nskb->len > nskb->dst->pmtu) if (nskb->len > dst_pmtu(nskb->dst))
goto free_nskb; goto free_nskb;
connection_attach(nskb, oldskb->nfct); connection_attach(nskb, oldskb->nfct);
...@@ -225,8 +225,8 @@ static void send_unreach(struct sk_buff *skb_in, int code) ...@@ -225,8 +225,8 @@ static void send_unreach(struct sk_buff *skb_in, int code)
/* RFC says return as much as we can without exceeding 576 bytes. */ /* RFC says return as much as we can without exceeding 576 bytes. */
length = skb_in->len + sizeof(struct iphdr) + sizeof(struct icmphdr); length = skb_in->len + sizeof(struct iphdr) + sizeof(struct icmphdr);
if (length > rt->u.dst.pmtu) if (length > dst_pmtu(&rt->u.dst))
length = rt->u.dst.pmtu; length = dst_pmtu(&rt->u.dst);
if (length > 576) if (length > 576)
length = 576; length = 576;
......
...@@ -189,7 +189,7 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb, ...@@ -189,7 +189,7 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb,
} }
/* Try to redo what tcp_v4_send_synack did. */ /* Try to redo what tcp_v4_send_synack did. */
req->window_clamp = rt->u.dst.window; req->window_clamp = dst_metric(&rt->u.dst, RTAX_WINDOW);
tcp_select_initial_window(tcp_full_space(sk), req->mss, tcp_select_initial_window(tcp_full_space(sk), req->mss,
&req->rcv_wnd, &req->window_clamp, &req->rcv_wnd, &req->window_clamp,
0, &rcv_wscale); 0, &rcv_wscale);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment