aboutsummaryrefslogtreecommitdiffstats
path: root/include/net
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2015-09-10 16:53:15 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2015-09-10 16:53:15 -0400
commit65c61bc5dbbcfa1ff38e58aa834cb9a88e84a886 (patch)
treeccafacfe41411a5627b02cf17e68ea98f561bdf1 /include/net
parentb8889c4fc6ba03e289cec6a4d692f6f080a55e53 (diff)
parent30927520dbae297182990bb21d08762bcc35ce1d (diff)
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
Pull networking fixes from David Miller: 1) Fix out-of-bounds array access in netfilter ipset, from Jozsef Kadlecsik. 2) Use correct free operation on netfilter conntrack templates, from Daniel Borkmann. 3) Fix route leak in SCTP, from Marcelo Ricardo Leitner. 4) Fix sizeof(pointer) in mac80211, from Thierry Reding. 5) Fix cache pointer comparison in ip6mr leading to missed unlock of mrt_lock. From Richard Laing. 6) rds_conn_lookup() needs to consider network namespace in key comparison, from Sowmini Varadhan. 7) Fix deadlock in TIPC code wrt broadcast link wakeups, from Kolmakov Dmitriy. 8) Fix fd leaks in bpf syscall, from Daniel Borkmann. 9) Fix error recovery when installing ipv6 multipath routes, we would delete the old route before we would know if we could fully commit to the new set of nexthops. Fix from Roopa Prabhu. 10) Fix run-time suspend problems in r8152, from Hayes Wang. 11) In fec, don't program the MAC address into the chip when the clocks are gated off. From Fugang Duan. 12) Fix poll behavior for netlink sockets when using rx ring mmap, from Daniel Borkmann. 13) Don't allocate memory with GFP_KERNEL from get_stats64 in r8169 driver, from Corinna Vinschen. 14) In TCP Cubic congestion control, handle idle periods better where we are application limited, in order to keep cwnd from growing out of control. From Eric Dumzet. * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (65 commits) tcp_cubic: better follow cubic curve after idle period tcp: generate CA_EVENT_TX_START on data frames xen-netfront: respect user provided max_queues xen-netback: respect user provided max_queues r8169: Fix sleeping function called during get_stats64, v2 ether: add IEEE 1722 ethertype - TSN netlink, mmap: fix edge-case leakages in nf queue zero-copy netlink, mmap: don't walk rx ring on poll if receive queue non-empty cxgb4: changes for new firmware 1.14.4.0 net: fec: add netif status check before set mac address r8152: fix the runtime suspend issues r8152: split DRIVER_VERSION ipv6: fix ifnullfree.cocci warnings add microchip LAN88xx phy driver stmmac: fix check for phydev being open net: qlcnic: delete redundant memsets net: mv643xx_eth: use kzalloc net: jme: use kzalloc() instead of kmalloc+memset net: cavium: liquidio: use kzalloc in setup_glist() net: ipv6: use common fib_default_rule_pref ...
Diffstat (limited to 'include/net')
-rw-r--r--include/net/fib_rules.h2
-rw-r--r--include/net/mac80211.h4
-rw-r--r--include/net/netfilter/br_netfilter.h2
-rw-r--r--include/net/netfilter/nf_conntrack.h1
-rw-r--r--include/net/netfilter/nf_tables.h2
5 files changed, 6 insertions, 5 deletions
diff --git a/include/net/fib_rules.h b/include/net/fib_rules.h
index 4e8f804f4589..59160de702b6 100644
--- a/include/net/fib_rules.h
+++ b/include/net/fib_rules.h
@@ -66,7 +66,6 @@ struct fib_rules_ops {
66 struct nlattr **); 66 struct nlattr **);
67 int (*fill)(struct fib_rule *, struct sk_buff *, 67 int (*fill)(struct fib_rule *, struct sk_buff *,
68 struct fib_rule_hdr *); 68 struct fib_rule_hdr *);
69 u32 (*default_pref)(struct fib_rules_ops *ops);
70 size_t (*nlmsg_payload)(struct fib_rule *); 69 size_t (*nlmsg_payload)(struct fib_rule *);
71 70
72 /* Called after modifications to the rules set, must flush 71 /* Called after modifications to the rules set, must flush
@@ -118,5 +117,4 @@ int fib_rules_lookup(struct fib_rules_ops *, struct flowi *, int flags,
118 struct fib_lookup_arg *); 117 struct fib_lookup_arg *);
119int fib_default_rule_add(struct fib_rules_ops *, u32 pref, u32 table, 118int fib_default_rule_add(struct fib_rules_ops *, u32 pref, u32 table,
120 u32 flags); 119 u32 flags);
121u32 fib_default_rule_pref(struct fib_rules_ops *ops);
122#endif 120#endif
diff --git a/include/net/mac80211.h b/include/net/mac80211.h
index e3314e516681..bfc569498bfa 100644
--- a/include/net/mac80211.h
+++ b/include/net/mac80211.h
@@ -477,7 +477,9 @@ struct ieee80211_event {
477 * @chandef: Channel definition for this BSS -- the hardware might be 477 * @chandef: Channel definition for this BSS -- the hardware might be
478 * configured a higher bandwidth than this BSS uses, for example. 478 * configured a higher bandwidth than this BSS uses, for example.
479 * @ht_operation_mode: HT operation mode like in &struct ieee80211_ht_operation. 479 * @ht_operation_mode: HT operation mode like in &struct ieee80211_ht_operation.
480 * This field is only valid when the channel type is one of the HT types. 480 * This field is only valid when the channel is a wide HT/VHT channel.
481 * Note that with TDLS this can be the case (channel is HT, protection must
482 * be used from this field) even when the BSS association isn't using HT.
481 * @cqm_rssi_thold: Connection quality monitor RSSI threshold, a zero value 483 * @cqm_rssi_thold: Connection quality monitor RSSI threshold, a zero value
482 * implies disabled 484 * implies disabled
483 * @cqm_rssi_hyst: Connection quality monitor RSSI hysteresis 485 * @cqm_rssi_hyst: Connection quality monitor RSSI hysteresis
diff --git a/include/net/netfilter/br_netfilter.h b/include/net/netfilter/br_netfilter.h
index bab824bde92c..d4c6b5f30acd 100644
--- a/include/net/netfilter/br_netfilter.h
+++ b/include/net/netfilter/br_netfilter.h
@@ -59,7 +59,7 @@ static inline unsigned int
59br_nf_pre_routing_ipv6(const struct nf_hook_ops *ops, struct sk_buff *skb, 59br_nf_pre_routing_ipv6(const struct nf_hook_ops *ops, struct sk_buff *skb,
60 const struct nf_hook_state *state) 60 const struct nf_hook_state *state)
61{ 61{
62 return NF_DROP; 62 return NF_ACCEPT;
63} 63}
64#endif 64#endif
65 65
diff --git a/include/net/netfilter/nf_conntrack.h b/include/net/netfilter/nf_conntrack.h
index f5e23c6dee8b..e8ad46834df8 100644
--- a/include/net/netfilter/nf_conntrack.h
+++ b/include/net/netfilter/nf_conntrack.h
@@ -298,6 +298,7 @@ void init_nf_conntrack_hash_rnd(void);
298struct nf_conn *nf_ct_tmpl_alloc(struct net *net, 298struct nf_conn *nf_ct_tmpl_alloc(struct net *net,
299 const struct nf_conntrack_zone *zone, 299 const struct nf_conntrack_zone *zone,
300 gfp_t flags); 300 gfp_t flags);
301void nf_ct_tmpl_free(struct nf_conn *tmpl);
301 302
302#define NF_CT_STAT_INC(net, count) __this_cpu_inc((net)->ct.stat->count) 303#define NF_CT_STAT_INC(net, count) __this_cpu_inc((net)->ct.stat->count)
303#define NF_CT_STAT_INC_ATOMIC(net, count) this_cpu_inc((net)->ct.stat->count) 304#define NF_CT_STAT_INC_ATOMIC(net, count) this_cpu_inc((net)->ct.stat->count)
diff --git a/include/net/netfilter/nf_tables.h b/include/net/netfilter/nf_tables.h
index 2a246680a6c3..aa8bee72c9d3 100644
--- a/include/net/netfilter/nf_tables.h
+++ b/include/net/netfilter/nf_tables.h
@@ -125,7 +125,7 @@ static inline enum nft_data_types nft_dreg_to_type(enum nft_registers reg)
125 125
126static inline enum nft_registers nft_type_to_reg(enum nft_data_types type) 126static inline enum nft_registers nft_type_to_reg(enum nft_data_types type)
127{ 127{
128 return type == NFT_DATA_VERDICT ? NFT_REG_VERDICT : NFT_REG_1; 128 return type == NFT_DATA_VERDICT ? NFT_REG_VERDICT : NFT_REG_1 * NFT_REG_SIZE / NFT_REG32_SIZE;
129} 129}
130 130
131unsigned int nft_parse_register(const struct nlattr *attr); 131unsigned int nft_parse_register(const struct nlattr *attr);