<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4, branch v4.3</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v4.3</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v4.3'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2015-10-28T01:14:51Z</updated>
<entry>
<title>fib_trie: leaf_walk_rcu should not compute key if key is less than pn-&gt;key</title>
<updated>2015-10-28T01:14:51Z</updated>
<author>
<name>Alexander Duyck</name>
<email>aduyck@mirantis.com</email>
</author>
<published>2015-10-27T22:06:45Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c2229fe1430d4e1c70e36520229dd64a87802b20'/>
<id>urn:sha1:c2229fe1430d4e1c70e36520229dd64a87802b20</id>
<content type='text'>
We were computing the child index in cases where the key value we were
looking for was actually less than the base key of the tnode.  As a result
we were getting incorrect index values that would cause us to skip over
some children.

To fix this I have added a test that will force us to use child index 0 if
the key we are looking for is less than the key of the current tnode.

Fixes: 8be33e955cb9 ("fib_trie: Fib walk rcu should take a tnode and key instead of a trie and a leaf")
Reported-by: Brian Rak &lt;brak@gameservers.com&gt;
Signed-off-by: Alexander Duyck &lt;aduyck@mirantis.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>ipv6: gre: support SIT encapsulation</title>
<updated>2015-10-27T05:01:18Z</updated>
<author>
<name>Eric Dumazet</name>
<email>edumazet@google.com</email>
</author>
<published>2015-10-24T12:47:44Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7e3b6e7423d5f994257c1de88e06b509673fdbcf'/>
<id>urn:sha1:7e3b6e7423d5f994257c1de88e06b509673fdbcf</id>
<content type='text'>
gre_gso_segment() chokes if SIT frames were aggregated by GRO engine.

Fixes: 61c1db7fae21e ("ipv6: sit: add GSO/TSO support")
Signed-off-by: Eric Dumazet &lt;edumazet@google.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: allow dctcp alpha to drop to zero</title>
<updated>2015-10-23T09:46:52Z</updated>
<author>
<name>Andrew Shewmaker</name>
<email>agshew@gmail.com</email>
</author>
<published>2015-10-19T04:59:08Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c80dbe04612986fd6104b4a1be21681b113b5ac9'/>
<id>urn:sha1:c80dbe04612986fd6104b4a1be21681b113b5ac9</id>
<content type='text'>
If alpha is strictly reduced by alpha &gt;&gt; dctcp_shift_g and if alpha is less
than 1 &lt;&lt; dctcp_shift_g, then alpha may never reach zero. For example,
given shift_g=4 and alpha=15, alpha &gt;&gt; dctcp_shift_g yields 0 and alpha
remains 15. The effect isn't noticeable in this case below cwnd=137, but
could gradually drive uncongested flows with leftover alpha down to
cwnd=137. A larger dctcp_shift_g would have a greater effect.

This change causes alpha=15 to drop to 0 instead of being decrementing by 1
as it would when alpha=16. However, it requires one less conditional to
implement since it doesn't have to guard against subtracting 1 from 0U. A
decay of 15 is not unreasonable since an equal or greater amount occurs at
alpha &gt;= 240.

Signed-off-by: Andrew G. Shewmaker &lt;agshew@gmail.com&gt;
Acked-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>openvswitch: Fix egress tunnel info.</title>
<updated>2015-10-23T02:39:25Z</updated>
<author>
<name>Pravin B Shelar</name>
<email>pshelar@nicira.com</email>
</author>
<published>2015-10-23T01:17:16Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=fc4099f17240767554ff3a73977acb78ef615404'/>
<id>urn:sha1:fc4099f17240767554ff3a73977acb78ef615404</id>
<content type='text'>
While transitioning to netdev based vport we broke OVS
feature which allows user to retrieve tunnel packet egress
information for lwtunnel devices.  Following patch fixes it
by introducing ndo operation to get the tunnel egress info.
Same ndo operation can be used for lwtunnel devices and compat
ovs-tnl-vport devices. So after adding such device operation
we can remove similar operation from ovs-vport.

Fixes: 614732eaa12d ("openvswitch: Use regular VXLAN net_device device").
Signed-off-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec</title>
<updated>2015-10-22T14:46:05Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2015-10-22T14:46:05Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=199c6550694dcdf5f568ea9db6fe2b46d14e4fa5'/>
<id>urn:sha1:199c6550694dcdf5f568ea9db6fe2b46d14e4fa5</id>
<content type='text'>
Steffen Klassert says:

====================
pull request (net): ipsec 2015-10-22

1) Fix IPsec pre-encap fragmentation for GSO packets.
   From Herbert Xu.

2) Fix some header checks in _decode_session6.
   We skip the header informations if the data pointer points
   already behind the header in question for some protocols.
   This is because we call pskb_may_pull with a negative value
   converted to unsigened int from pskb_may_pull in this case.
   Skipping the header informations can lead to incorrect policy
   lookups. From Mathias Krause.

3) Allow to change the replay threshold and expiry timer of a
   state without having to set other attributes like replay
   counter and byte lifetime. Changing these other attributes
   may break the SA. From Michael Rossberg.

4) Fix pmtu discovery for local generated packets.
   We may fail dispatch to the inner address family.
   As a reault, the local error handler is not called
   and the mtu value is not reported back to userspace.

Please pull or let me know if there are problems.
====================

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tcp: remove improper preemption check in tcp_xmit_probe_skb()</title>
<updated>2015-10-22T02:29:26Z</updated>
<author>
<name>Renato Westphal</name>
<email>renatowestphal@gmail.com</email>
</author>
<published>2015-10-19T20:51:34Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e2e8009ff72ad2a795b67785f3238af152146368'/>
<id>urn:sha1:e2e8009ff72ad2a795b67785f3238af152146368</id>
<content type='text'>
Commit e520af48c7e5a introduced the following bug when setting the
TCP_REPAIR sockoption:

[ 2860.657036] BUG: using __this_cpu_add() in preemptible [00000000] code: daemon/12164
[ 2860.657045] caller is __this_cpu_preempt_check+0x13/0x20
[ 2860.657049] CPU: 1 PID: 12164 Comm: daemon Not tainted 4.2.3 #1
[ 2860.657051] Hardware name: Dell Inc. PowerEdge R210 II/0JP7TR, BIOS 2.0.5 03/13/2012
[ 2860.657054]  ffffffff81c7f071 ffff880231e9fdf8 ffffffff8185d765 0000000000000002
[ 2860.657058]  0000000000000001 ffff880231e9fe28 ffffffff8146ed91 ffff880231e9fe18
[ 2860.657062]  ffffffff81cd1a5d ffff88023534f200 ffff8800b9811000 ffff880231e9fe38
[ 2860.657065] Call Trace:
[ 2860.657072]  [&lt;ffffffff8185d765&gt;] dump_stack+0x4f/0x7b
[ 2860.657075]  [&lt;ffffffff8146ed91&gt;] check_preemption_disabled+0xe1/0xf0
[ 2860.657078]  [&lt;ffffffff8146edd3&gt;] __this_cpu_preempt_check+0x13/0x20
[ 2860.657082]  [&lt;ffffffff817e0bc7&gt;] tcp_xmit_probe_skb+0xc7/0x100
[ 2860.657085]  [&lt;ffffffff817e1e2d&gt;] tcp_send_window_probe+0x2d/0x30
[ 2860.657089]  [&lt;ffffffff817d1d8c&gt;] do_tcp_setsockopt.isra.29+0x74c/0x830
[ 2860.657093]  [&lt;ffffffff817d1e9c&gt;] tcp_setsockopt+0x2c/0x30
[ 2860.657097]  [&lt;ffffffff81767b74&gt;] sock_common_setsockopt+0x14/0x20
[ 2860.657100]  [&lt;ffffffff817669e1&gt;] SyS_setsockopt+0x71/0xc0
[ 2860.657104]  [&lt;ffffffff81865172&gt;] entry_SYSCALL_64_fastpath+0x16/0x75

Since tcp_xmit_probe_skb() can be called from process context, use
NET_INC_STATS() instead of NET_INC_STATS_BH().

Fixes: e520af48c7e5 ("tcp: add TCPWinProbe and TCPKeepAlive SNMP counters")
Signed-off-by: Renato Westphal &lt;renatow@taghos.com.br&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf</title>
<updated>2015-10-22T02:26:17Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2015-10-22T02:26:17Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=36a28b21169d28db2a3409a4e2d4b9a7563c1a00'/>
<id>urn:sha1:36a28b21169d28db2a3409a4e2d4b9a7563c1a00</id>
<content type='text'>
Pablo Neira Ayuso says:

====================
Netfilter fixes for net

The following patchset contains four Netfilter fixes for net, they are:

1) Fix Kconfig dependencies of new nf_dup_ipv4 and nf_dup_ipv6.

2) Remove bogus test nh_scope in IPv4 rpfilter match that is breaking
   --accept-local, from Xin Long.

3) Wait for RCU grace period after dropping the pending packets in the
   nfqueue, from Florian Westphal.

4) Fix sleeping allocation while holding spin_lock_bh, from Nikolay Borisov.
====================

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>xfrm: Fix pmtu discovery for local generated packets.</title>
<updated>2015-10-19T08:30:05Z</updated>
<author>
<name>Steffen Klassert</name>
<email>steffen.klassert@secunet.com</email>
</author>
<published>2015-10-19T08:30:05Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ca064bd89363a6e7e71b1c5226ff1b718957a9d4'/>
<id>urn:sha1:ca064bd89363a6e7e71b1c5226ff1b718957a9d4</id>
<content type='text'>
Commit 044a832a777 ("xfrm: Fix local error reporting crash
with interfamily tunnels") moved the setting of skb-&gt;protocol
behind the last access of the inner mode family to fix an
interfamily crash. Unfortunately now skb-&gt;protocol might not
be set at all, so we fail dispatch to the inner address family.
As a reault, the local error handler is not called and the
mtu value is not reported back to userspace.

We fix this by setting skb-&gt;protocol on message size errors
before we call xfrm_local_error.

Fixes: 044a832a7779c ("xfrm: Fix local error reporting crash with interfamily tunnels")
Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
</content>
</entry>
<entry>
<title>netfilter: ipt_rpfilter: remove the nh_scope test in rpfilter_lookup_reverse</title>
<updated>2015-10-12T15:27:48Z</updated>
<author>
<name>lucien</name>
<email>lucien.xin@gmail.com</email>
</author>
<published>2015-10-06T13:03:07Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=cc4998febd567d1c671684abce5595344bd4e8b2'/>
<id>urn:sha1:cc4998febd567d1c671684abce5595344bd4e8b2</id>
<content type='text'>
--accept-local  option works for res.type == RTN_LOCAL, which should be
from the local table, but there, the fib_info's nh-&gt;nh_scope =
RT_SCOPE_NOWHERE ( &gt; RT_SCOPE_HOST). in fib_create_info().

	if (cfg-&gt;fc_scope == RT_SCOPE_HOST) {
		struct fib_nh *nh = fi-&gt;fib_nh;

		/* Local address is added. */
		if (nhs != 1 || nh-&gt;nh_gw)
			goto err_inval;
		nh-&gt;nh_scope = RT_SCOPE_NOWHERE;   &lt;===
		nh-&gt;nh_dev = dev_get_by_index(net, fi-&gt;fib_nh-&gt;nh_oif);
		err = -ENODEV;
		if (!nh-&gt;nh_dev)
			goto failure;

but in our rpfilter_lookup_reverse():

	if (dev_match || flags &amp; XT_RPFILTER_LOOSE)
		return FIB_RES_NH(res).nh_scope &lt;= RT_SCOPE_HOST;

if nh-&gt;nh_scope &gt; RT_SCOPE_HOST, it will fail. --accept-local option
will never be passed.

it seems the test is bogus and can be removed to fix this issue.

	if (dev_match || flags &amp; XT_RPFILTER_LOOSE)
		return FIB_RES_NH(res).nh_scope &lt;= RT_SCOPE_HOST;

ipv6 does not have this issue.

Signed-off-by: Xin Long &lt;lucien.xin@gmail.com&gt;
Acked-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>ipv4: fix reply_dst leakage on arp reply</title>
<updated>2015-10-05T11:05:15Z</updated>
<author>
<name>Jiri Benc</name>
<email>jbenc@redhat.com</email>
</author>
<published>2015-10-01T14:25:43Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=181a4224acdfb993a21f987f8617b5c8d7bc654e'/>
<id>urn:sha1:181a4224acdfb993a21f987f8617b5c8d7bc654e</id>
<content type='text'>
There are cases when the created metadata reply is not used. Ensure the
allocated memory is freed also in such cases.

Fixes: 63d008a4e9ee ("ipv4: send arp replies to the correct tunnel")
Reported-by: Hannes Frederic Sowa &lt;hannes@stressinduktion.org&gt;
Signed-off-by: Jiri Benc &lt;jbenc@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
