<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/bridge, branch v3.4</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/bridge?h=v3.4</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/bridge?h=v3.4'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-04-24T04:16:24Z</updated>
<entry>
<title>set fake_rtable's dst to NULL to avoid kernel Oops</title>
<updated>2012-04-24T04:16:24Z</updated>
<author>
<name>Peter Huang (Peng)</name>
<email>peter.huangpeng@huawei.com</email>
</author>
<published>2012-04-19T20:12:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a881e963c7fe1f226e991ee9bbe8907acda93294'/>
<id>urn:sha1:a881e963c7fe1f226e991ee9bbe8907acda93294</id>
<content type='text'>
bridge: set fake_rtable's dst to NULL to avoid kernel Oops

when bridge is deleted before tap/vif device's delete, kernel may
encounter an oops because of NULL reference to fake_rtable's dst.
Set fake_rtable's dst to NULL before sending packets out can solve
this problem.

v4 reformat, change br_drop_fake_rtable(skb) to {}

v3 enrich commit header

v2 introducing new flag DST_FAKE_RTABLE to dst_entry struct.

[ Use "do { } while (0)" for nop br_drop_fake_rtable()
  implementation -DaveM ]

Acked-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Signed-off-by: Peter Huang &lt;peter.huangpeng@huawei.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bridge: Do not send queries on multicast group leaves</title>
<updated>2012-04-11T13:43:13Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2012-04-04T01:01:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=996304bbea3d2a094b7ba54c3bd65d3fffeac57b'/>
<id>urn:sha1:996304bbea3d2a094b7ba54c3bd65d3fffeac57b</id>
<content type='text'>
As it stands the bridge IGMP snooping system will respond to
group leave messages with queries for remaining membership.
This is both unnecessary and undesirable.  First of all any
multicast routers present should be doing this rather than us.
What's more the queries that we send may end up upsetting other
multicast snooping swithces in the system that are buggy.

In fact, we can simply remove the code that send these queries
because the existing membership expiry mechanism doesn't rely
on them anyway.

So this patch simply removes all code associated with group
queries in response to group leave messages.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2012-03-09T22:34:20Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2012-03-09T22:34:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b2d3298e0916fa059712691c85a0e97becc4ab9f'/>
<id>urn:sha1:b2d3298e0916fa059712691c85a0e97becc4ab9f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>bridge: fix state reporting when port is disabled</title>
<updated>2012-03-08T08:25:25Z</updated>
<author>
<name>Paulius Zaleckas</name>
<email>paulius.zaleckas@gmail.com</email>
</author>
<published>2012-03-06T22:25:22Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5200959b833ddacf28b6ffce8c331dfd6e0ca797'/>
<id>urn:sha1:5200959b833ddacf28b6ffce8c331dfd6e0ca797</id>
<content type='text'>
Now we have:
eth0: link *down*
br0: port 1(eth0) entered *forwarding* state

br_log_state(p) should be called *after* p-&gt;state is set
to BR_STATE_DISABLED.

Reported-by: Zilvinas Valinskas &lt;zilvinas@wilibox.com&gt;
Signed-off-by: Paulius Zaleckas &lt;paulius.zaleckas@gmail.com&gt;
Acked-by: Stephen Hemminger &lt;shemminger@vyatta.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bridge: br_log_state() s/entering/entered/</title>
<updated>2012-03-08T08:25:25Z</updated>
<author>
<name>Paulius Zaleckas</name>
<email>paulius.zaleckas@gmail.com</email>
</author>
<published>2012-03-06T22:25:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d9e179ecec0805c41b17f9a0c3b925d415677772'/>
<id>urn:sha1:d9e179ecec0805c41b17f9a0c3b925d415677772</id>
<content type='text'>
When br_log_state() is reporting state it should say "entered"
istead of "entering" since state at this point is already
changed.

Signed-off-by: Paulius Zaleckas &lt;paulius.zaleckas@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bridge: netfilter: don't call iptables on vlan packets if sysctl is off</title>
<updated>2012-03-06T19:43:49Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2012-03-06T01:22:54Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=739e4505a0e8209622dc71743bfa1c804eacf7f4'/>
<id>urn:sha1:739e4505a0e8209622dc71743bfa1c804eacf7f4</id>
<content type='text'>
When net.bridge.bridge-nf-filter-vlan-tagged is 0 (default), vlan packets
arriving should not be sent to ip(6)tables by bridge netfilter.

However, it turns out that we currently always send VLAN packets to
netfilter, if ..
a), CONFIG_VLAN_8021Q is enabled ; or
b), CONFIG_VLAN_8021Q is not set but rx vlan offload is enabled
   on the bridge port.

This is because bridge netfilter treats skb with
skb-&gt;protocol == ETH_P_IP{V6} as "non-vlan packet".

With rx vlan offload on or CONFIG_VLAN_8021Q=y, the vlan header has
already been removed here, and we cannot rely on skb-&gt;protocol alone.

Fix this by only using skb-&gt;protocol if the skb has no vlan tag,
or if a vlan tag is present and filter-vlan-tagged bridge netfilter
sysctl is enabled.

We cannot remove the skb-&gt;protocol == htons(ETH_P_8021Q) test
because the vlan tag is still around in the CONFIG_VLAN_8021Q=n &amp;&amp;
"ethtool -K $itf rxvlan off" case.

reproducer:
iptables -t raw -I PREROUTING -i br0
iptables -t raw -I PREROUTING -i br0.1

Then send packets to an ip address configured on br0.1 interface.
Even with net.bridge.bridge-nf-filter-vlan-tagged=0, the 1st rule
will match instead of the 2nd one.

With this patch applied, the 2nd rule will match instead.
In the non-local address case, netfilter won't be consulted after
this patch unless the sysctl is switched on.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: bridge: fix wrong pointer dereference</title>
<updated>2012-03-06T19:43:49Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2012-03-06T01:22:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a157b9d5b5b626e46eba2ac4e342da8db25cabc4'/>
<id>urn:sha1:a157b9d5b5b626e46eba2ac4e342da8db25cabc4</id>
<content type='text'>
In adf7ff8, a invalid dereference was added in ebt_make_names.

CC [M]  net/bridge/netfilter/ebtables.o
net/bridge/netfilter/ebtables.c: In function `ebt_make_names':
net/bridge/netfilter/ebtables.c:1371:20: warning: `t' may be used uninitialized in this function [-Wuninitialized]

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: ebtables: fix wrong name length while copying to user-space</title>
<updated>2012-03-06T19:43:49Z</updated>
<author>
<name>Santosh Nayak</name>
<email>santoshprasadnayak@gmail.com</email>
</author>
<published>2012-03-06T01:22:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=848edc69192a38bf9d261032f248b14f47e6af8b'/>
<id>urn:sha1:848edc69192a38bf9d261032f248b14f47e6af8b</id>
<content type='text'>
user-space ebtables expects 32 bytes-long names, but xt_match names
use 29 bytes. We have to copy less 29 bytes and then, make sure we
fill the remaining bytes with zeroes.

Signed-off-by: Santosh Nayak &lt;santoshprasadnayak@gmail.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2012-03-06T02:16:26Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2012-03-06T02:16:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f6a1ad4295f9291038380178d09978caf6982dd8'/>
<id>urn:sha1:f6a1ad4295f9291038380178d09978caf6982dd8</id>
<content type='text'>
Conflicts:
	drivers/net/vmxnet3/vmxnet3_drv.c

Small vmxnet3 conflict with header size bug fix in 'net'.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bridge: check return value of ipv6_dev_get_saddr()</title>
<updated>2012-03-05T21:45:34Z</updated>
<author>
<name>Ulrich Weber</name>
<email>ulrich.weber@sophos.com</email>
</author>
<published>2012-03-05T04:52:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d1d81d4c3dd886d5fa25a2c4fa1e39cb89613712'/>
<id>urn:sha1:d1d81d4c3dd886d5fa25a2c4fa1e39cb89613712</id>
<content type='text'>
otherwise source IPv6 address of ICMPV6_MGM_QUERY packet
might be random junk if IPv6 is disabled on interface or
link-local address is not yet ready (DAD).

Signed-off-by: Ulrich Weber &lt;ulrich.weber@sophos.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
