This is a note to let you know that I've just added the patch titled
l2tp: Fix build warning with ipv6 disabled.
to the 3.11-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
l2tp-fix-build-warning-with-ipv6-disabled.patch
and it can be found in the queue-3.11 subdirectory.
If you, or anyone else, feels it should not be added to the stable tree,
please let <[email protected]> know about it.
>From 0ec2b01190b1a2ba020241ab89730bf7e7d77b9c Mon Sep 17 00:00:00 2001
From: "David S. Miller" <[email protected]>
Date: Tue, 8 Oct 2013 15:44:26 -0400
Subject: l2tp: Fix build warning with ipv6 disabled.
From: "David S. Miller" <[email protected]>
[ Upstream commit 8d8a51e26a6d415e1470759f2cf5f3ee3ee86196 ]
net/l2tp/l2tp_core.c: In function ‘l2tp_verify_udp_checksum’:
net/l2tp/l2tp_core.c:499:22: warning: unused variable ‘tunnel’
[-Wunused-variable]
Create a helper "l2tp_tunnel()" to facilitate this, and as a side
effect get rid of a bunch of unnecessary void pointer casts.
Signed-off-by: David S. Miller <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
net/l2tp/l2tp_core.c | 13 ++++++++-----
1 file changed, 8 insertions(+), 5 deletions(-)
--- a/net/l2tp/l2tp_core.c
+++ b/net/l2tp/l2tp_core.c
@@ -115,6 +115,11 @@ struct l2tp_net {
static void l2tp_session_set_header_len(struct l2tp_session *session, int
version);
static void l2tp_tunnel_free(struct l2tp_tunnel *tunnel);
+static inline struct l2tp_tunnel *l2tp_tunnel(struct sock *sk)
+{
+ return sk->sk_user_data;
+}
+
static inline struct l2tp_net *l2tp_pernet(struct net *net)
{
BUG_ON(!net);
@@ -496,7 +501,6 @@ out:
static inline int l2tp_verify_udp_checksum(struct sock *sk,
struct sk_buff *skb)
{
- struct l2tp_tunnel *tunnel = (struct l2tp_tunnel *)sk->sk_user_data;
struct udphdr *uh = udp_hdr(skb);
u16 ulen = ntohs(uh->len);
__wsum psum;
@@ -505,7 +509,7 @@ static inline int l2tp_verify_udp_checks
return 0;
#if IS_ENABLED(CONFIG_IPV6)
- if (sk->sk_family == PF_INET6 && !tunnel->v4mapped) {
+ if (sk->sk_family == PF_INET6 && !l2tp_tunnel(sk)->v4mapped) {
if (!uh->check) {
LIMIT_NETDEBUG(KERN_INFO "L2TP: IPv6: checksum is 0\n");
return 1;
@@ -1305,10 +1309,9 @@ EXPORT_SYMBOL_GPL(l2tp_xmit_skb);
*/
static void l2tp_tunnel_destruct(struct sock *sk)
{
- struct l2tp_tunnel *tunnel;
+ struct l2tp_tunnel *tunnel = l2tp_tunnel(sk);
struct l2tp_net *pn;
- tunnel = sk->sk_user_data;
if (tunnel == NULL)
goto end;
@@ -1676,7 +1679,7 @@ int l2tp_tunnel_create(struct net *net,
}
/* Check if this socket has already been prepped */
- tunnel = (struct l2tp_tunnel *)sk->sk_user_data;
+ tunnel = l2tp_tunnel(sk);
if (tunnel != NULL) {
/* This socket has already been prepped */
err = -EBUSY;
Patches currently in stable-queue which might be from [email protected] are
queue-3.11/tcp-tsq-can-use-a-dynamic-limit.patch
queue-3.11/net-dst-provide-accessor-function-to-dst-xfrm.patch
queue-3.11/net-vlan-fix-nlmsg-size-calculation-in-vlan_get_size.patch
queue-3.11/net-mlx4_en-rename-name-of-mlx4_en_rx_alloc-members.patch
queue-3.11/vti-get-rid-of-nf-mark-rule-in-prerouting.patch
queue-3.11/bridge-correctly-clamp-max-forward_delay-when-enabling-stp.patch
queue-3.11/ipv4-fix-ineffective-source-address-selection.patch
queue-3.11/sctp-use-software-crc32-checksum-when-xfrm-transform-will-happen.patch
queue-3.11/can-dev-fix-nlmsg-size-calculation-in-can_get_size.patch
queue-3.11/net-heap-overflow-in-__audit_sockaddr.patch
queue-3.11/ipv6-always-prefer-rt6i_gateway-if-present.patch
queue-3.11/net-unix-inherit-sock_pass-cred-sec-flags-from-socket-to-fix-race.patch
queue-3.11/net-do-not-call-sock_put-on-timewait-sockets.patch
queue-3.11/unix_diag-fix-info-leak.patch
queue-3.11/tcp-must-unclone-packets-before-mangling-them.patch
queue-3.11/l2tp-fix-kernel-panic-when-using-ipv4-mapped-ipv6-addresses.patch
queue-3.11/netfilter-nf_conntrack-fix-rt6i_gateway-checks-for-h.323-helper.patch
queue-3.11/inet-fix-possible-memory-corruption-with-udp_cork-and-ufo.patch
queue-3.11/net-mv643xx_eth-update-statistics-timer-from-timer-context-only.patch
queue-3.11/netem-update-backlog-after-drop.patch
queue-3.11/l2tp-must-disable-bh-before-calling-l2tp_xmit_skb.patch
queue-3.11/ipv6-probe-routes-asynchronous-in-rt6_probe.patch
queue-3.11/net-secure_seq-fix-warning-when-config_ipv6-and-config_inet-are-not-selected.patch
queue-3.11/revert-bridge-only-expire-the-mdb-entry-when-query-is-received.patch
queue-3.11/wanxl-fix-info-leak-in-ioctl.patch
queue-3.11/ipv6-fill-rt6i_gateway-with-nexthop-address.patch
queue-3.11/tcp-fix-incorrect-ca_state-in-tail-loss-probe.patch
queue-3.11/netem-free-skb-s-in-tree-on-reset.patch
queue-3.11/proc-connector-fix-info-leaks.patch
queue-3.11/net-mv643xx_eth-fix-orphaned-statistics-timer-crash.patch
queue-3.11/tcp-do-not-forget-fin-in-tcp_shifted_skb.patch
queue-3.11/virtio-net-refill-only-when-device-is-up-during-setting-queues.patch
queue-3.11/davinci_emac.c-fix-iff_allmulti-setup.patch
queue-3.11/bridge-update-mdb-expiration-timer-upon-reports.patch
queue-3.11/net-fix-cipso-packet-validation-when-netlabel.patch
queue-3.11/be2net-pass-if_id-for-v1-and-v2-versions-of-tx_create-cmd.patch
queue-3.11/bnx2x-record-rx-queue-for-lro-packets.patch
queue-3.11/sctp-perform-software-checksum-if-packet-has-to-be-fragmented.patch
queue-3.11/connector-use-nlmsg_len-to-check-message-length.patch
queue-3.11/virtio-net-don-t-respond-to-cpu-hotplug-notifier-if-we-re-not-ready.patch
queue-3.11/farsync-fix-info-leak-in-ioctl.patch
queue-3.11/l2tp-fix-build-warning-with-ipv6-disabled.patch
queue-3.11/net-mlx4_en-fix-pages-never-dma-unmapped-on-rx.patch
queue-3.11/tcp-tso-packets-automatic-sizing.patch
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html