diff options
Diffstat (limited to 'net')
27 files changed, 102 insertions, 97 deletions
diff --git a/net/batman-adv/soft-interface.c b/net/batman-adv/soft-interface.c index 4493913f0d5c..813db4e64602 100644 --- a/net/batman-adv/soft-interface.c +++ b/net/batman-adv/soft-interface.c | |||
@@ -168,6 +168,7 @@ static int batadv_interface_tx(struct sk_buff *skb, | |||
168 | case ETH_P_8021Q: | 168 | case ETH_P_8021Q: |
169 | vhdr = (struct vlan_ethhdr *)skb->data; | 169 | vhdr = (struct vlan_ethhdr *)skb->data; |
170 | vid = ntohs(vhdr->h_vlan_TCI) & VLAN_VID_MASK; | 170 | vid = ntohs(vhdr->h_vlan_TCI) & VLAN_VID_MASK; |
171 | vid |= BATADV_VLAN_HAS_TAG; | ||
171 | 172 | ||
172 | if (vhdr->h_vlan_encapsulated_proto != ethertype) | 173 | if (vhdr->h_vlan_encapsulated_proto != ethertype) |
173 | break; | 174 | break; |
@@ -331,6 +332,7 @@ void batadv_interface_rx(struct net_device *soft_iface, | |||
331 | case ETH_P_8021Q: | 332 | case ETH_P_8021Q: |
332 | vhdr = (struct vlan_ethhdr *)skb->data; | 333 | vhdr = (struct vlan_ethhdr *)skb->data; |
333 | vid = ntohs(vhdr->h_vlan_TCI) & VLAN_VID_MASK; | 334 | vid = ntohs(vhdr->h_vlan_TCI) & VLAN_VID_MASK; |
335 | vid |= BATADV_VLAN_HAS_TAG; | ||
334 | 336 | ||
335 | if (vhdr->h_vlan_encapsulated_proto != ethertype) | 337 | if (vhdr->h_vlan_encapsulated_proto != ethertype) |
336 | break; | 338 | break; |
diff --git a/net/bridge/br_netlink.c b/net/bridge/br_netlink.c index b9259efa636e..e74ddc1c29a8 100644 --- a/net/bridge/br_netlink.c +++ b/net/bridge/br_netlink.c | |||
@@ -207,7 +207,7 @@ int br_getlink(struct sk_buff *skb, u32 pid, u32 seq, | |||
207 | struct net_device *dev, u32 filter_mask) | 207 | struct net_device *dev, u32 filter_mask) |
208 | { | 208 | { |
209 | int err = 0; | 209 | int err = 0; |
210 | struct net_bridge_port *port = br_port_get_rcu(dev); | 210 | struct net_bridge_port *port = br_port_get_rtnl(dev); |
211 | 211 | ||
212 | /* not a bridge port and */ | 212 | /* not a bridge port and */ |
213 | if (!port && !(filter_mask & RTEXT_FILTER_BRVLAN)) | 213 | if (!port && !(filter_mask & RTEXT_FILTER_BRVLAN)) |
@@ -451,7 +451,7 @@ static size_t br_get_link_af_size(const struct net_device *dev) | |||
451 | struct net_port_vlans *pv; | 451 | struct net_port_vlans *pv; |
452 | 452 | ||
453 | if (br_port_exists(dev)) | 453 | if (br_port_exists(dev)) |
454 | pv = nbp_get_vlan_info(br_port_get_rcu(dev)); | 454 | pv = nbp_get_vlan_info(br_port_get_rtnl(dev)); |
455 | else if (dev->priv_flags & IFF_EBRIDGE) | 455 | else if (dev->priv_flags & IFF_EBRIDGE) |
456 | pv = br_get_vlan_info((struct net_bridge *)netdev_priv(dev)); | 456 | pv = br_get_vlan_info((struct net_bridge *)netdev_priv(dev)); |
457 | else | 457 | else |
diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h index 598cb0b333c6..efb57d911569 100644 --- a/net/bridge/br_private.h +++ b/net/bridge/br_private.h | |||
@@ -202,13 +202,10 @@ struct net_bridge_port | |||
202 | 202 | ||
203 | static inline struct net_bridge_port *br_port_get_rcu(const struct net_device *dev) | 203 | static inline struct net_bridge_port *br_port_get_rcu(const struct net_device *dev) |
204 | { | 204 | { |
205 | struct net_bridge_port *port = | 205 | return rcu_dereference(dev->rx_handler_data); |
206 | rcu_dereference_rtnl(dev->rx_handler_data); | ||
207 | |||
208 | return br_port_exists(dev) ? port : NULL; | ||
209 | } | 206 | } |
210 | 207 | ||
211 | static inline struct net_bridge_port *br_port_get_rtnl(struct net_device *dev) | 208 | static inline struct net_bridge_port *br_port_get_rtnl(const struct net_device *dev) |
212 | { | 209 | { |
213 | return br_port_exists(dev) ? | 210 | return br_port_exists(dev) ? |
214 | rtnl_dereference(dev->rx_handler_data) : NULL; | 211 | rtnl_dereference(dev->rx_handler_data) : NULL; |
@@ -746,6 +743,7 @@ extern struct net_bridge_port *br_get_port(struct net_bridge *br, | |||
746 | extern void br_init_port(struct net_bridge_port *p); | 743 | extern void br_init_port(struct net_bridge_port *p); |
747 | extern void br_become_designated_port(struct net_bridge_port *p); | 744 | extern void br_become_designated_port(struct net_bridge_port *p); |
748 | 745 | ||
746 | extern void __br_set_forward_delay(struct net_bridge *br, unsigned long t); | ||
749 | extern int br_set_forward_delay(struct net_bridge *br, unsigned long x); | 747 | extern int br_set_forward_delay(struct net_bridge *br, unsigned long x); |
750 | extern int br_set_hello_time(struct net_bridge *br, unsigned long x); | 748 | extern int br_set_hello_time(struct net_bridge *br, unsigned long x); |
751 | extern int br_set_max_age(struct net_bridge *br, unsigned long x); | 749 | extern int br_set_max_age(struct net_bridge *br, unsigned long x); |
diff --git a/net/bridge/br_stp.c b/net/bridge/br_stp.c index 1c0a50f13229..3c86f0538cbb 100644 --- a/net/bridge/br_stp.c +++ b/net/bridge/br_stp.c | |||
@@ -209,7 +209,7 @@ static void br_record_config_information(struct net_bridge_port *p, | |||
209 | p->designated_age = jiffies - bpdu->message_age; | 209 | p->designated_age = jiffies - bpdu->message_age; |
210 | 210 | ||
211 | mod_timer(&p->message_age_timer, jiffies | 211 | mod_timer(&p->message_age_timer, jiffies |
212 | + (p->br->max_age - bpdu->message_age)); | 212 | + (bpdu->max_age - bpdu->message_age)); |
213 | } | 213 | } |
214 | 214 | ||
215 | /* called under bridge lock */ | 215 | /* called under bridge lock */ |
@@ -544,18 +544,27 @@ int br_set_max_age(struct net_bridge *br, unsigned long val) | |||
544 | 544 | ||
545 | } | 545 | } |
546 | 546 | ||
547 | void __br_set_forward_delay(struct net_bridge *br, unsigned long t) | ||
548 | { | ||
549 | br->bridge_forward_delay = t; | ||
550 | if (br_is_root_bridge(br)) | ||
551 | br->forward_delay = br->bridge_forward_delay; | ||
552 | } | ||
553 | |||
547 | int br_set_forward_delay(struct net_bridge *br, unsigned long val) | 554 | int br_set_forward_delay(struct net_bridge *br, unsigned long val) |
548 | { | 555 | { |
549 | unsigned long t = clock_t_to_jiffies(val); | 556 | unsigned long t = clock_t_to_jiffies(val); |
557 | int err = -ERANGE; | ||
550 | 558 | ||
559 | spin_lock_bh(&br->lock); | ||
551 | if (br->stp_enabled != BR_NO_STP && | 560 | if (br->stp_enabled != BR_NO_STP && |
552 | (t < BR_MIN_FORWARD_DELAY || t > BR_MAX_FORWARD_DELAY)) | 561 | (t < BR_MIN_FORWARD_DELAY || t > BR_MAX_FORWARD_DELAY)) |
553 | return -ERANGE; | 562 | goto unlock; |
554 | 563 | ||
555 | spin_lock_bh(&br->lock); | 564 | __br_set_forward_delay(br, t); |
556 | br->bridge_forward_delay = t; | 565 | err = 0; |
557 | if (br_is_root_bridge(br)) | 566 | |
558 | br->forward_delay = br->bridge_forward_delay; | 567 | unlock: |
559 | spin_unlock_bh(&br->lock); | 568 | spin_unlock_bh(&br->lock); |
560 | return 0; | 569 | return err; |
561 | } | 570 | } |
diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c index d45e760141bb..108084a04671 100644 --- a/net/bridge/br_stp_if.c +++ b/net/bridge/br_stp_if.c | |||
@@ -129,6 +129,14 @@ static void br_stp_start(struct net_bridge *br) | |||
129 | char *envp[] = { NULL }; | 129 | char *envp[] = { NULL }; |
130 | 130 | ||
131 | r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC); | 131 | r = call_usermodehelper(BR_STP_PROG, argv, envp, UMH_WAIT_PROC); |
132 | |||
133 | spin_lock_bh(&br->lock); | ||
134 | |||
135 | if (br->bridge_forward_delay < BR_MIN_FORWARD_DELAY) | ||
136 | __br_set_forward_delay(br, BR_MIN_FORWARD_DELAY); | ||
137 | else if (br->bridge_forward_delay < BR_MAX_FORWARD_DELAY) | ||
138 | __br_set_forward_delay(br, BR_MAX_FORWARD_DELAY); | ||
139 | |||
132 | if (r == 0) { | 140 | if (r == 0) { |
133 | br->stp_enabled = BR_USER_STP; | 141 | br->stp_enabled = BR_USER_STP; |
134 | br_debug(br, "userspace STP started\n"); | 142 | br_debug(br, "userspace STP started\n"); |
@@ -137,10 +145,10 @@ static void br_stp_start(struct net_bridge *br) | |||
137 | br_debug(br, "using kernel STP\n"); | 145 | br_debug(br, "using kernel STP\n"); |
138 | 146 | ||
139 | /* To start timers on any ports left in blocking */ | 147 | /* To start timers on any ports left in blocking */ |
140 | spin_lock_bh(&br->lock); | ||
141 | br_port_state_selection(br); | 148 | br_port_state_selection(br); |
142 | spin_unlock_bh(&br->lock); | ||
143 | } | 149 | } |
150 | |||
151 | spin_unlock_bh(&br->lock); | ||
144 | } | 152 | } |
145 | 153 | ||
146 | static void br_stp_stop(struct net_bridge *br) | 154 | static void br_stp_stop(struct net_bridge *br) |
diff --git a/net/core/netpoll.c b/net/core/netpoll.c index 2c637e9a0b27..fc75c9e461b8 100644 --- a/net/core/netpoll.c +++ b/net/core/netpoll.c | |||
@@ -550,7 +550,7 @@ static void netpoll_neigh_reply(struct sk_buff *skb, struct netpoll_info *npinfo | |||
550 | return; | 550 | return; |
551 | 551 | ||
552 | proto = ntohs(eth_hdr(skb)->h_proto); | 552 | proto = ntohs(eth_hdr(skb)->h_proto); |
553 | if (proto == ETH_P_IP) { | 553 | if (proto == ETH_P_ARP) { |
554 | struct arphdr *arp; | 554 | struct arphdr *arp; |
555 | unsigned char *arp_ptr; | 555 | unsigned char *arp_ptr; |
556 | /* No arp on this interface */ | 556 | /* No arp on this interface */ |
@@ -1284,15 +1284,14 @@ EXPORT_SYMBOL_GPL(__netpoll_free_async); | |||
1284 | 1284 | ||
1285 | void netpoll_cleanup(struct netpoll *np) | 1285 | void netpoll_cleanup(struct netpoll *np) |
1286 | { | 1286 | { |
1287 | if (!np->dev) | ||
1288 | return; | ||
1289 | |||
1290 | rtnl_lock(); | 1287 | rtnl_lock(); |
1288 | if (!np->dev) | ||
1289 | goto out; | ||
1291 | __netpoll_cleanup(np); | 1290 | __netpoll_cleanup(np); |
1292 | rtnl_unlock(); | ||
1293 | |||
1294 | dev_put(np->dev); | 1291 | dev_put(np->dev); |
1295 | np->dev = NULL; | 1292 | np->dev = NULL; |
1293 | out: | ||
1294 | rtnl_unlock(); | ||
1296 | } | 1295 | } |
1297 | EXPORT_SYMBOL(netpoll_cleanup); | 1296 | EXPORT_SYMBOL(netpoll_cleanup); |
1298 | 1297 | ||
diff --git a/net/dccp/ipv6.c b/net/dccp/ipv6.c index 9c61f9c02fdb..6cf9f7782ad4 100644 --- a/net/dccp/ipv6.c +++ b/net/dccp/ipv6.c | |||
@@ -135,6 +135,7 @@ static void dccp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, | |||
135 | 135 | ||
136 | if (dst) | 136 | if (dst) |
137 | dst->ops->redirect(dst, sk, skb); | 137 | dst->ops->redirect(dst, sk, skb); |
138 | goto out; | ||
138 | } | 139 | } |
139 | 140 | ||
140 | if (type == ICMPV6_PKT_TOOBIG) { | 141 | if (type == ICMPV6_PKT_TOOBIG) { |
diff --git a/net/ipv4/igmp.c b/net/ipv4/igmp.c index d6c0e64ec97f..dace87f06e5f 100644 --- a/net/ipv4/igmp.c +++ b/net/ipv4/igmp.c | |||
@@ -369,7 +369,7 @@ static struct sk_buff *igmpv3_newpack(struct net_device *dev, int size) | |||
369 | pip->saddr = fl4.saddr; | 369 | pip->saddr = fl4.saddr; |
370 | pip->protocol = IPPROTO_IGMP; | 370 | pip->protocol = IPPROTO_IGMP; |
371 | pip->tot_len = 0; /* filled in later */ | 371 | pip->tot_len = 0; /* filled in later */ |
372 | ip_select_ident(pip, &rt->dst, NULL); | 372 | ip_select_ident(skb, &rt->dst, NULL); |
373 | ((u8 *)&pip[1])[0] = IPOPT_RA; | 373 | ((u8 *)&pip[1])[0] = IPOPT_RA; |
374 | ((u8 *)&pip[1])[1] = 4; | 374 | ((u8 *)&pip[1])[1] = 4; |
375 | ((u8 *)&pip[1])[2] = 0; | 375 | ((u8 *)&pip[1])[2] = 0; |
@@ -714,7 +714,7 @@ static int igmp_send_report(struct in_device *in_dev, struct ip_mc_list *pmc, | |||
714 | iph->daddr = dst; | 714 | iph->daddr = dst; |
715 | iph->saddr = fl4.saddr; | 715 | iph->saddr = fl4.saddr; |
716 | iph->protocol = IPPROTO_IGMP; | 716 | iph->protocol = IPPROTO_IGMP; |
717 | ip_select_ident(iph, &rt->dst, NULL); | 717 | ip_select_ident(skb, &rt->dst, NULL); |
718 | ((u8 *)&iph[1])[0] = IPOPT_RA; | 718 | ((u8 *)&iph[1])[0] = IPOPT_RA; |
719 | ((u8 *)&iph[1])[1] = 4; | 719 | ((u8 *)&iph[1])[1] = 4; |
720 | ((u8 *)&iph[1])[2] = 0; | 720 | ((u8 *)&iph[1])[2] = 0; |
diff --git a/net/ipv4/inetpeer.c b/net/ipv4/inetpeer.c index 000e3d239d64..33d5537881ed 100644 --- a/net/ipv4/inetpeer.c +++ b/net/ipv4/inetpeer.c | |||
@@ -32,8 +32,8 @@ | |||
32 | * At the moment of writing this notes identifier of IP packets is generated | 32 | * At the moment of writing this notes identifier of IP packets is generated |
33 | * to be unpredictable using this code only for packets subjected | 33 | * to be unpredictable using this code only for packets subjected |
34 | * (actually or potentially) to defragmentation. I.e. DF packets less than | 34 | * (actually or potentially) to defragmentation. I.e. DF packets less than |
35 | * PMTU in size uses a constant ID and do not use this code (see | 35 | * PMTU in size when local fragmentation is disabled use a constant ID and do |
36 | * ip_select_ident() in include/net/ip.h). | 36 | * not use this code (see ip_select_ident() in include/net/ip.h). |
37 | * | 37 | * |
38 | * Route cache entries hold references to our nodes. | 38 | * Route cache entries hold references to our nodes. |
39 | * New cache entries get references via lookup by destination IP address in | 39 | * New cache entries get references via lookup by destination IP address in |
diff --git a/net/ipv4/ip_output.c b/net/ipv4/ip_output.c index 9ee17e3d11c3..a04d872c54f9 100644 --- a/net/ipv4/ip_output.c +++ b/net/ipv4/ip_output.c | |||
@@ -148,7 +148,7 @@ int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk, | |||
148 | iph->daddr = (opt && opt->opt.srr ? opt->opt.faddr : daddr); | 148 | iph->daddr = (opt && opt->opt.srr ? opt->opt.faddr : daddr); |
149 | iph->saddr = saddr; | 149 | iph->saddr = saddr; |
150 | iph->protocol = sk->sk_protocol; | 150 | iph->protocol = sk->sk_protocol; |
151 | ip_select_ident(iph, &rt->dst, sk); | 151 | ip_select_ident(skb, &rt->dst, sk); |
152 | 152 | ||
153 | if (opt && opt->opt.optlen) { | 153 | if (opt && opt->opt.optlen) { |
154 | iph->ihl += opt->opt.optlen>>2; | 154 | iph->ihl += opt->opt.optlen>>2; |
@@ -386,7 +386,7 @@ packet_routed: | |||
386 | ip_options_build(skb, &inet_opt->opt, inet->inet_daddr, rt, 0); | 386 | ip_options_build(skb, &inet_opt->opt, inet->inet_daddr, rt, 0); |
387 | } | 387 | } |
388 | 388 | ||
389 | ip_select_ident_more(iph, &rt->dst, sk, | 389 | ip_select_ident_more(skb, &rt->dst, sk, |
390 | (skb_shinfo(skb)->gso_segs ?: 1) - 1); | 390 | (skb_shinfo(skb)->gso_segs ?: 1) - 1); |
391 | 391 | ||
392 | skb->priority = sk->sk_priority; | 392 | skb->priority = sk->sk_priority; |
@@ -1316,7 +1316,7 @@ struct sk_buff *__ip_make_skb(struct sock *sk, | |||
1316 | else | 1316 | else |
1317 | ttl = ip_select_ttl(inet, &rt->dst); | 1317 | ttl = ip_select_ttl(inet, &rt->dst); |
1318 | 1318 | ||
1319 | iph = (struct iphdr *)skb->data; | 1319 | iph = ip_hdr(skb); |
1320 | iph->version = 4; | 1320 | iph->version = 4; |
1321 | iph->ihl = 5; | 1321 | iph->ihl = 5; |
1322 | iph->tos = inet->tos; | 1322 | iph->tos = inet->tos; |
@@ -1324,7 +1324,7 @@ struct sk_buff *__ip_make_skb(struct sock *sk, | |||
1324 | iph->ttl = ttl; | 1324 | iph->ttl = ttl; |
1325 | iph->protocol = sk->sk_protocol; | 1325 | iph->protocol = sk->sk_protocol; |
1326 | ip_copy_addrs(iph, fl4); | 1326 | ip_copy_addrs(iph, fl4); |
1327 | ip_select_ident(iph, &rt->dst, sk); | 1327 | ip_select_ident(skb, &rt->dst, sk); |
1328 | 1328 | ||
1329 | if (opt) { | 1329 | if (opt) { |
1330 | iph->ihl += opt->optlen>>2; | 1330 | iph->ihl += opt->optlen>>2; |
diff --git a/net/ipv4/ipmr.c b/net/ipv4/ipmr.c index 9ae54b09254f..62212c772a4b 100644 --- a/net/ipv4/ipmr.c +++ b/net/ipv4/ipmr.c | |||
@@ -1658,7 +1658,7 @@ static void ip_encap(struct sk_buff *skb, __be32 saddr, __be32 daddr) | |||
1658 | iph->protocol = IPPROTO_IPIP; | 1658 | iph->protocol = IPPROTO_IPIP; |
1659 | iph->ihl = 5; | 1659 | iph->ihl = 5; |
1660 | iph->tot_len = htons(skb->len); | 1660 | iph->tot_len = htons(skb->len); |
1661 | ip_select_ident(iph, skb_dst(skb), NULL); | 1661 | ip_select_ident(skb, skb_dst(skb), NULL); |
1662 | ip_send_check(iph); | 1662 | ip_send_check(iph); |
1663 | 1663 | ||
1664 | memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt)); | 1664 | memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt)); |
diff --git a/net/ipv4/raw.c b/net/ipv4/raw.c index a86c7ae71881..bfec521c717f 100644 --- a/net/ipv4/raw.c +++ b/net/ipv4/raw.c | |||
@@ -387,7 +387,7 @@ static int raw_send_hdrinc(struct sock *sk, struct flowi4 *fl4, | |||
387 | iph->check = 0; | 387 | iph->check = 0; |
388 | iph->tot_len = htons(length); | 388 | iph->tot_len = htons(length); |
389 | if (!iph->id) | 389 | if (!iph->id) |
390 | ip_select_ident(iph, &rt->dst, NULL); | 390 | ip_select_ident(skb, &rt->dst, NULL); |
391 | 391 | ||
392 | iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); | 392 | iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); |
393 | } | 393 | } |
diff --git a/net/ipv4/tcp_metrics.c b/net/ipv4/tcp_metrics.c index 4a22f3e715df..52f3c6b971d2 100644 --- a/net/ipv4/tcp_metrics.c +++ b/net/ipv4/tcp_metrics.c | |||
@@ -502,7 +502,9 @@ reset: | |||
502 | * ACKs, wait for troubles. | 502 | * ACKs, wait for troubles. |
503 | */ | 503 | */ |
504 | if (crtt > tp->srtt) { | 504 | if (crtt > tp->srtt) { |
505 | inet_csk(sk)->icsk_rto = crtt + max(crtt >> 2, tcp_rto_min(sk)); | 505 | /* Set RTO like tcp_rtt_estimator(), but from cached RTT. */ |
506 | crtt >>= 3; | ||
507 | inet_csk(sk)->icsk_rto = crtt + max(2 * crtt, tcp_rto_min(sk)); | ||
506 | } else if (tp->srtt == 0) { | 508 | } else if (tp->srtt == 0) { |
507 | /* RFC6298: 5.7 We've failed to get a valid RTT sample from | 509 | /* RFC6298: 5.7 We've failed to get a valid RTT sample from |
508 | * 3WHS. This is most likely due to retransmission, | 510 | * 3WHS. This is most likely due to retransmission, |
diff --git a/net/ipv4/xfrm4_mode_tunnel.c b/net/ipv4/xfrm4_mode_tunnel.c index eb1dd4d643f2..b5663c37f089 100644 --- a/net/ipv4/xfrm4_mode_tunnel.c +++ b/net/ipv4/xfrm4_mode_tunnel.c | |||
@@ -117,7 +117,7 @@ static int xfrm4_mode_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) | |||
117 | 117 | ||
118 | top_iph->frag_off = (flags & XFRM_STATE_NOPMTUDISC) ? | 118 | top_iph->frag_off = (flags & XFRM_STATE_NOPMTUDISC) ? |
119 | 0 : (XFRM_MODE_SKB_CB(skb)->frag_off & htons(IP_DF)); | 119 | 0 : (XFRM_MODE_SKB_CB(skb)->frag_off & htons(IP_DF)); |
120 | ip_select_ident(top_iph, dst->child, NULL); | 120 | ip_select_ident(skb, dst->child, NULL); |
121 | 121 | ||
122 | top_iph->ttl = ip4_dst_hoplimit(dst->child); | 122 | top_iph->ttl = ip4_dst_hoplimit(dst->child); |
123 | 123 | ||
diff --git a/net/ipv6/ip6_tunnel.c b/net/ipv6/ip6_tunnel.c index 61355f7f4da5..2d8f4829575b 100644 --- a/net/ipv6/ip6_tunnel.c +++ b/net/ipv6/ip6_tunnel.c | |||
@@ -1656,9 +1656,9 @@ static int ip6_tnl_fill_info(struct sk_buff *skb, const struct net_device *dev) | |||
1656 | 1656 | ||
1657 | if (nla_put_u32(skb, IFLA_IPTUN_LINK, parm->link) || | 1657 | if (nla_put_u32(skb, IFLA_IPTUN_LINK, parm->link) || |
1658 | nla_put(skb, IFLA_IPTUN_LOCAL, sizeof(struct in6_addr), | 1658 | nla_put(skb, IFLA_IPTUN_LOCAL, sizeof(struct in6_addr), |
1659 | &parm->raddr) || | ||
1660 | nla_put(skb, IFLA_IPTUN_REMOTE, sizeof(struct in6_addr), | ||
1661 | &parm->laddr) || | 1659 | &parm->laddr) || |
1660 | nla_put(skb, IFLA_IPTUN_REMOTE, sizeof(struct in6_addr), | ||
1661 | &parm->raddr) || | ||
1662 | nla_put_u8(skb, IFLA_IPTUN_TTL, parm->hop_limit) || | 1662 | nla_put_u8(skb, IFLA_IPTUN_TTL, parm->hop_limit) || |
1663 | nla_put_u8(skb, IFLA_IPTUN_ENCAP_LIMIT, parm->encap_limit) || | 1663 | nla_put_u8(skb, IFLA_IPTUN_ENCAP_LIMIT, parm->encap_limit) || |
1664 | nla_put_be32(skb, IFLA_IPTUN_FLOWINFO, parm->flowinfo) || | 1664 | nla_put_be32(skb, IFLA_IPTUN_FLOWINFO, parm->flowinfo) || |
diff --git a/net/ipv6/netfilter/nf_nat_proto_icmpv6.c b/net/ipv6/netfilter/nf_nat_proto_icmpv6.c index 61aaf70f376e..2205e8eeeacf 100644 --- a/net/ipv6/netfilter/nf_nat_proto_icmpv6.c +++ b/net/ipv6/netfilter/nf_nat_proto_icmpv6.c | |||
@@ -69,8 +69,8 @@ icmpv6_manip_pkt(struct sk_buff *skb, | |||
69 | hdr = (struct icmp6hdr *)(skb->data + hdroff); | 69 | hdr = (struct icmp6hdr *)(skb->data + hdroff); |
70 | l3proto->csum_update(skb, iphdroff, &hdr->icmp6_cksum, | 70 | l3proto->csum_update(skb, iphdroff, &hdr->icmp6_cksum, |
71 | tuple, maniptype); | 71 | tuple, maniptype); |
72 | if (hdr->icmp6_code == ICMPV6_ECHO_REQUEST || | 72 | if (hdr->icmp6_type == ICMPV6_ECHO_REQUEST || |
73 | hdr->icmp6_code == ICMPV6_ECHO_REPLY) { | 73 | hdr->icmp6_type == ICMPV6_ECHO_REPLY) { |
74 | inet_proto_csum_replace2(&hdr->icmp6_cksum, skb, | 74 | inet_proto_csum_replace2(&hdr->icmp6_cksum, skb, |
75 | hdr->icmp6_identifier, | 75 | hdr->icmp6_identifier, |
76 | tuple->src.u.icmp.id, 0); | 76 | tuple->src.u.icmp.id, 0); |
diff --git a/net/netfilter/ipset/ip_set_core.c b/net/netfilter/ipset/ip_set_core.c index f77139007983..f2e30fb31e78 100644 --- a/net/netfilter/ipset/ip_set_core.c +++ b/net/netfilter/ipset/ip_set_core.c | |||
@@ -1052,7 +1052,7 @@ ip_set_swap(struct sock *ctnl, struct sk_buff *skb, | |||
1052 | * Not an artificial restriction anymore, as we must prevent | 1052 | * Not an artificial restriction anymore, as we must prevent |
1053 | * possible loops created by swapping in setlist type of sets. */ | 1053 | * possible loops created by swapping in setlist type of sets. */ |
1054 | if (!(from->type->features == to->type->features && | 1054 | if (!(from->type->features == to->type->features && |
1055 | from->type->family == to->type->family)) | 1055 | from->family == to->family)) |
1056 | return -IPSET_ERR_TYPE_MISMATCH; | 1056 | return -IPSET_ERR_TYPE_MISMATCH; |
1057 | 1057 | ||
1058 | strncpy(from_name, from->name, IPSET_MAXNAMELEN); | 1058 | strncpy(from_name, from->name, IPSET_MAXNAMELEN); |
@@ -1489,8 +1489,7 @@ ip_set_utest(struct sock *ctnl, struct sk_buff *skb, | |||
1489 | if (ret == -EAGAIN) | 1489 | if (ret == -EAGAIN) |
1490 | ret = 1; | 1490 | ret = 1; |
1491 | 1491 | ||
1492 | return (ret < 0 && ret != -ENOTEMPTY) ? ret : | 1492 | return ret > 0 ? 0 : -IPSET_ERR_EXIST; |
1493 | ret > 0 ? 0 : -IPSET_ERR_EXIST; | ||
1494 | } | 1493 | } |
1495 | 1494 | ||
1496 | /* Get headed data of a set */ | 1495 | /* Get headed data of a set */ |
diff --git a/net/netfilter/ipset/ip_set_getport.c b/net/netfilter/ipset/ip_set_getport.c index 6fdf88ae2353..dac156f819ac 100644 --- a/net/netfilter/ipset/ip_set_getport.c +++ b/net/netfilter/ipset/ip_set_getport.c | |||
@@ -116,12 +116,12 @@ ip_set_get_ip6_port(const struct sk_buff *skb, bool src, | |||
116 | { | 116 | { |
117 | int protoff; | 117 | int protoff; |
118 | u8 nexthdr; | 118 | u8 nexthdr; |
119 | __be16 frag_off; | 119 | __be16 frag_off = 0; |
120 | 120 | ||
121 | nexthdr = ipv6_hdr(skb)->nexthdr; | 121 | nexthdr = ipv6_hdr(skb)->nexthdr; |
122 | protoff = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr), &nexthdr, | 122 | protoff = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr), &nexthdr, |
123 | &frag_off); | 123 | &frag_off); |
124 | if (protoff < 0) | 124 | if (protoff < 0 || (frag_off & htons(~0x7)) != 0) |
125 | return false; | 125 | return false; |
126 | 126 | ||
127 | return get_port(skb, nexthdr, protoff, src, port, proto); | 127 | return get_port(skb, nexthdr, protoff, src, port, proto); |
diff --git a/net/netfilter/ipset/ip_set_hash_gen.h b/net/netfilter/ipset/ip_set_hash_gen.h index 57beb1762b2d..707bc520d629 100644 --- a/net/netfilter/ipset/ip_set_hash_gen.h +++ b/net/netfilter/ipset/ip_set_hash_gen.h | |||
@@ -325,18 +325,22 @@ mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) | |||
325 | static void | 325 | static void |
326 | mtype_del_cidr(struct htype *h, u8 cidr, u8 nets_length) | 326 | mtype_del_cidr(struct htype *h, u8 cidr, u8 nets_length) |
327 | { | 327 | { |
328 | u8 i, j; | 328 | u8 i, j, net_end = nets_length - 1; |
329 | 329 | ||
330 | for (i = 0; i < nets_length - 1 && h->nets[i].cidr != cidr; i++) | 330 | for (i = 0; i < nets_length; i++) { |
331 | ; | 331 | if (h->nets[i].cidr != cidr) |
332 | h->nets[i].nets--; | 332 | continue; |
333 | 333 | if (h->nets[i].nets > 1 || i == net_end || | |
334 | if (h->nets[i].nets != 0) | 334 | h->nets[i + 1].nets == 0) { |
335 | return; | 335 | h->nets[i].nets--; |
336 | 336 | return; | |
337 | for (j = i; j < nets_length - 1 && h->nets[j].nets; j++) { | 337 | } |
338 | h->nets[j].cidr = h->nets[j + 1].cidr; | 338 | for (j = i; j < net_end && h->nets[j].nets; j++) { |
339 | h->nets[j].nets = h->nets[j + 1].nets; | 339 | h->nets[j].cidr = h->nets[j + 1].cidr; |
340 | h->nets[j].nets = h->nets[j + 1].nets; | ||
341 | } | ||
342 | h->nets[j].nets = 0; | ||
343 | return; | ||
340 | } | 344 | } |
341 | } | 345 | } |
342 | #endif | 346 | #endif |
diff --git a/net/netfilter/ipset/ip_set_hash_ipportnet.c b/net/netfilter/ipset/ip_set_hash_ipportnet.c index c6a525373be4..f15f3e28b9c3 100644 --- a/net/netfilter/ipset/ip_set_hash_ipportnet.c +++ b/net/netfilter/ipset/ip_set_hash_ipportnet.c | |||
@@ -260,7 +260,7 @@ hash_ipportnet4_uadt(struct ip_set *set, struct nlattr *tb[], | |||
260 | e.ip = htonl(ip); | 260 | e.ip = htonl(ip); |
261 | e.ip2 = htonl(ip2_from & ip_set_hostmask(e.cidr + 1)); | 261 | e.ip2 = htonl(ip2_from & ip_set_hostmask(e.cidr + 1)); |
262 | ret = adtfn(set, &e, &ext, &ext, flags); | 262 | ret = adtfn(set, &e, &ext, &ext, flags); |
263 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 263 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
264 | ip_set_eexist(ret, flags) ? 0 : ret; | 264 | ip_set_eexist(ret, flags) ? 0 : ret; |
265 | } | 265 | } |
266 | 266 | ||
@@ -544,7 +544,7 @@ hash_ipportnet6_uadt(struct ip_set *set, struct nlattr *tb[], | |||
544 | 544 | ||
545 | if (adt == IPSET_TEST || !with_ports || !tb[IPSET_ATTR_PORT_TO]) { | 545 | if (adt == IPSET_TEST || !with_ports || !tb[IPSET_ATTR_PORT_TO]) { |
546 | ret = adtfn(set, &e, &ext, &ext, flags); | 546 | ret = adtfn(set, &e, &ext, &ext, flags); |
547 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 547 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
548 | ip_set_eexist(ret, flags) ? 0 : ret; | 548 | ip_set_eexist(ret, flags) ? 0 : ret; |
549 | } | 549 | } |
550 | 550 | ||
diff --git a/net/netfilter/ipset/ip_set_hash_net.c b/net/netfilter/ipset/ip_set_hash_net.c index da740ceb56ae..223e9f546d0f 100644 --- a/net/netfilter/ipset/ip_set_hash_net.c +++ b/net/netfilter/ipset/ip_set_hash_net.c | |||
@@ -199,7 +199,7 @@ hash_net4_uadt(struct ip_set *set, struct nlattr *tb[], | |||
199 | if (adt == IPSET_TEST || !tb[IPSET_ATTR_IP_TO]) { | 199 | if (adt == IPSET_TEST || !tb[IPSET_ATTR_IP_TO]) { |
200 | e.ip = htonl(ip & ip_set_hostmask(e.cidr)); | 200 | e.ip = htonl(ip & ip_set_hostmask(e.cidr)); |
201 | ret = adtfn(set, &e, &ext, &ext, flags); | 201 | ret = adtfn(set, &e, &ext, &ext, flags); |
202 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 202 | return ip_set_enomatch(ret, flags, adt, set) ? -ret: |
203 | ip_set_eexist(ret, flags) ? 0 : ret; | 203 | ip_set_eexist(ret, flags) ? 0 : ret; |
204 | } | 204 | } |
205 | 205 | ||
@@ -396,7 +396,7 @@ hash_net6_uadt(struct ip_set *set, struct nlattr *tb[], | |||
396 | 396 | ||
397 | ret = adtfn(set, &e, &ext, &ext, flags); | 397 | ret = adtfn(set, &e, &ext, &ext, flags); |
398 | 398 | ||
399 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 399 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
400 | ip_set_eexist(ret, flags) ? 0 : ret; | 400 | ip_set_eexist(ret, flags) ? 0 : ret; |
401 | } | 401 | } |
402 | 402 | ||
diff --git a/net/netfilter/ipset/ip_set_hash_netiface.c b/net/netfilter/ipset/ip_set_hash_netiface.c index 84ae6f6ce624..7d798d5d5cd3 100644 --- a/net/netfilter/ipset/ip_set_hash_netiface.c +++ b/net/netfilter/ipset/ip_set_hash_netiface.c | |||
@@ -368,7 +368,7 @@ hash_netiface4_uadt(struct ip_set *set, struct nlattr *tb[], | |||
368 | if (adt == IPSET_TEST || !tb[IPSET_ATTR_IP_TO]) { | 368 | if (adt == IPSET_TEST || !tb[IPSET_ATTR_IP_TO]) { |
369 | e.ip = htonl(ip & ip_set_hostmask(e.cidr)); | 369 | e.ip = htonl(ip & ip_set_hostmask(e.cidr)); |
370 | ret = adtfn(set, &e, &ext, &ext, flags); | 370 | ret = adtfn(set, &e, &ext, &ext, flags); |
371 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 371 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
372 | ip_set_eexist(ret, flags) ? 0 : ret; | 372 | ip_set_eexist(ret, flags) ? 0 : ret; |
373 | } | 373 | } |
374 | 374 | ||
@@ -634,7 +634,7 @@ hash_netiface6_uadt(struct ip_set *set, struct nlattr *tb[], | |||
634 | 634 | ||
635 | ret = adtfn(set, &e, &ext, &ext, flags); | 635 | ret = adtfn(set, &e, &ext, &ext, flags); |
636 | 636 | ||
637 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 637 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
638 | ip_set_eexist(ret, flags) ? 0 : ret; | 638 | ip_set_eexist(ret, flags) ? 0 : ret; |
639 | } | 639 | } |
640 | 640 | ||
diff --git a/net/netfilter/ipset/ip_set_hash_netport.c b/net/netfilter/ipset/ip_set_hash_netport.c index 9a0869853be5..09d6690bee6f 100644 --- a/net/netfilter/ipset/ip_set_hash_netport.c +++ b/net/netfilter/ipset/ip_set_hash_netport.c | |||
@@ -244,7 +244,7 @@ hash_netport4_uadt(struct ip_set *set, struct nlattr *tb[], | |||
244 | if (adt == IPSET_TEST || !(with_ports || tb[IPSET_ATTR_IP_TO])) { | 244 | if (adt == IPSET_TEST || !(with_ports || tb[IPSET_ATTR_IP_TO])) { |
245 | e.ip = htonl(ip & ip_set_hostmask(e.cidr + 1)); | 245 | e.ip = htonl(ip & ip_set_hostmask(e.cidr + 1)); |
246 | ret = adtfn(set, &e, &ext, &ext, flags); | 246 | ret = adtfn(set, &e, &ext, &ext, flags); |
247 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 247 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
248 | ip_set_eexist(ret, flags) ? 0 : ret; | 248 | ip_set_eexist(ret, flags) ? 0 : ret; |
249 | } | 249 | } |
250 | 250 | ||
@@ -489,7 +489,7 @@ hash_netport6_uadt(struct ip_set *set, struct nlattr *tb[], | |||
489 | 489 | ||
490 | if (adt == IPSET_TEST || !with_ports || !tb[IPSET_ATTR_PORT_TO]) { | 490 | if (adt == IPSET_TEST || !with_ports || !tb[IPSET_ATTR_PORT_TO]) { |
491 | ret = adtfn(set, &e, &ext, &ext, flags); | 491 | ret = adtfn(set, &e, &ext, &ext, flags); |
492 | return ip_set_enomatch(ret, flags, adt) ? 1 : | 492 | return ip_set_enomatch(ret, flags, adt, set) ? -ret : |
493 | ip_set_eexist(ret, flags) ? 0 : ret; | 493 | ip_set_eexist(ret, flags) ? 0 : ret; |
494 | } | 494 | } |
495 | 495 | ||
diff --git a/net/netfilter/ipvs/ip_vs_xmit.c b/net/netfilter/ipvs/ip_vs_xmit.c index b75ff6429a04..c47444e4cf8c 100644 --- a/net/netfilter/ipvs/ip_vs_xmit.c +++ b/net/netfilter/ipvs/ip_vs_xmit.c | |||
@@ -883,7 +883,7 @@ ip_vs_tunnel_xmit(struct sk_buff *skb, struct ip_vs_conn *cp, | |||
883 | iph->daddr = cp->daddr.ip; | 883 | iph->daddr = cp->daddr.ip; |
884 | iph->saddr = saddr; | 884 | iph->saddr = saddr; |
885 | iph->ttl = old_iph->ttl; | 885 | iph->ttl = old_iph->ttl; |
886 | ip_select_ident(iph, &rt->dst, NULL); | 886 | ip_select_ident(skb, &rt->dst, NULL); |
887 | 887 | ||
888 | /* Another hack: avoid icmp_send in ip_fragment */ | 888 | /* Another hack: avoid icmp_send in ip_fragment */ |
889 | skb->local_df = 1; | 889 | skb->local_df = 1; |
diff --git a/net/netfilter/nfnetlink_queue_core.c b/net/netfilter/nfnetlink_queue_core.c index 95a98c8c1da6..ae2e5c11d01a 100644 --- a/net/netfilter/nfnetlink_queue_core.c +++ b/net/netfilter/nfnetlink_queue_core.c | |||
@@ -1009,7 +1009,7 @@ nfqnl_recv_verdict(struct sock *ctnl, struct sk_buff *skb, | |||
1009 | verdict = NF_DROP; | 1009 | verdict = NF_DROP; |
1010 | 1010 | ||
1011 | if (ct) | 1011 | if (ct) |
1012 | nfqnl_ct_seq_adjust(skb, ct, ctinfo, diff); | 1012 | nfqnl_ct_seq_adjust(entry->skb, ct, ctinfo, diff); |
1013 | } | 1013 | } |
1014 | 1014 | ||
1015 | if (nfqa[NFQA_MARK]) | 1015 | if (nfqa[NFQA_MARK]) |
diff --git a/net/sctp/input.c b/net/sctp/input.c index 5f2068679f83..98b69bbecdd9 100644 --- a/net/sctp/input.c +++ b/net/sctp/input.c | |||
@@ -634,8 +634,7 @@ void sctp_v4_err(struct sk_buff *skb, __u32 info) | |||
634 | break; | 634 | break; |
635 | case ICMP_REDIRECT: | 635 | case ICMP_REDIRECT: |
636 | sctp_icmp_redirect(sk, transport, skb); | 636 | sctp_icmp_redirect(sk, transport, skb); |
637 | err = 0; | 637 | /* Fall through to out_unlock. */ |
638 | break; | ||
639 | default: | 638 | default: |
640 | goto out_unlock; | 639 | goto out_unlock; |
641 | } | 640 | } |
diff --git a/net/sctp/ipv6.c b/net/sctp/ipv6.c index da613ceae28c..e7b2d4fe2b6a 100644 --- a/net/sctp/ipv6.c +++ b/net/sctp/ipv6.c | |||
@@ -183,7 +183,7 @@ static void sctp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, | |||
183 | break; | 183 | break; |
184 | case NDISC_REDIRECT: | 184 | case NDISC_REDIRECT: |
185 | sctp_icmp_redirect(sk, transport, skb); | 185 | sctp_icmp_redirect(sk, transport, skb); |
186 | break; | 186 | goto out_unlock; |
187 | default: | 187 | default: |
188 | break; | 188 | break; |
189 | } | 189 | } |
@@ -204,44 +204,23 @@ out: | |||
204 | in6_dev_put(idev); | 204 | in6_dev_put(idev); |
205 | } | 205 | } |
206 | 206 | ||
207 | /* Based on tcp_v6_xmit() in tcp_ipv6.c. */ | ||
208 | static int sctp_v6_xmit(struct sk_buff *skb, struct sctp_transport *transport) | 207 | static int sctp_v6_xmit(struct sk_buff *skb, struct sctp_transport *transport) |
209 | { | 208 | { |
210 | struct sock *sk = skb->sk; | 209 | struct sock *sk = skb->sk; |
211 | struct ipv6_pinfo *np = inet6_sk(sk); | 210 | struct ipv6_pinfo *np = inet6_sk(sk); |
212 | struct flowi6 fl6; | 211 | struct flowi6 *fl6 = &transport->fl.u.ip6; |
213 | |||
214 | memset(&fl6, 0, sizeof(fl6)); | ||
215 | |||
216 | fl6.flowi6_proto = sk->sk_protocol; | ||
217 | |||
218 | /* Fill in the dest address from the route entry passed with the skb | ||
219 | * and the source address from the transport. | ||
220 | */ | ||
221 | fl6.daddr = transport->ipaddr.v6.sin6_addr; | ||
222 | fl6.saddr = transport->saddr.v6.sin6_addr; | ||
223 | |||
224 | fl6.flowlabel = np->flow_label; | ||
225 | IP6_ECN_flow_xmit(sk, fl6.flowlabel); | ||
226 | if (ipv6_addr_type(&fl6.saddr) & IPV6_ADDR_LINKLOCAL) | ||
227 | fl6.flowi6_oif = transport->saddr.v6.sin6_scope_id; | ||
228 | else | ||
229 | fl6.flowi6_oif = sk->sk_bound_dev_if; | ||
230 | |||
231 | if (np->opt && np->opt->srcrt) { | ||
232 | struct rt0_hdr *rt0 = (struct rt0_hdr *) np->opt->srcrt; | ||
233 | fl6.daddr = *rt0->addr; | ||
234 | } | ||
235 | 212 | ||
236 | pr_debug("%s: skb:%p, len:%d, src:%pI6 dst:%pI6\n", __func__, skb, | 213 | pr_debug("%s: skb:%p, len:%d, src:%pI6 dst:%pI6\n", __func__, skb, |
237 | skb->len, &fl6.saddr, &fl6.daddr); | 214 | skb->len, &fl6->saddr, &fl6->daddr); |
238 | 215 | ||
239 | SCTP_INC_STATS(sock_net(sk), SCTP_MIB_OUTSCTPPACKS); | 216 | IP6_ECN_flow_xmit(sk, fl6->flowlabel); |
240 | 217 | ||
241 | if (!(transport->param_flags & SPP_PMTUD_ENABLE)) | 218 | if (!(transport->param_flags & SPP_PMTUD_ENABLE)) |
242 | skb->local_df = 1; | 219 | skb->local_df = 1; |
243 | 220 | ||
244 | return ip6_xmit(sk, skb, &fl6, np->opt, np->tclass); | 221 | SCTP_INC_STATS(sock_net(sk), SCTP_MIB_OUTSCTPPACKS); |
222 | |||
223 | return ip6_xmit(sk, skb, fl6, np->opt, np->tclass); | ||
245 | } | 224 | } |
246 | 225 | ||
247 | /* Returns the dst cache entry for the given source and destination ip | 226 | /* Returns the dst cache entry for the given source and destination ip |
@@ -254,10 +233,12 @@ static void sctp_v6_get_dst(struct sctp_transport *t, union sctp_addr *saddr, | |||
254 | struct dst_entry *dst = NULL; | 233 | struct dst_entry *dst = NULL; |
255 | struct flowi6 *fl6 = &fl->u.ip6; | 234 | struct flowi6 *fl6 = &fl->u.ip6; |
256 | struct sctp_bind_addr *bp; | 235 | struct sctp_bind_addr *bp; |
236 | struct ipv6_pinfo *np = inet6_sk(sk); | ||
257 | struct sctp_sockaddr_entry *laddr; | 237 | struct sctp_sockaddr_entry *laddr; |
258 | union sctp_addr *baddr = NULL; | 238 | union sctp_addr *baddr = NULL; |
259 | union sctp_addr *daddr = &t->ipaddr; | 239 | union sctp_addr *daddr = &t->ipaddr; |
260 | union sctp_addr dst_saddr; | 240 | union sctp_addr dst_saddr; |
241 | struct in6_addr *final_p, final; | ||
261 | __u8 matchlen = 0; | 242 | __u8 matchlen = 0; |
262 | __u8 bmatchlen; | 243 | __u8 bmatchlen; |
263 | sctp_scope_t scope; | 244 | sctp_scope_t scope; |
@@ -281,7 +262,8 @@ static void sctp_v6_get_dst(struct sctp_transport *t, union sctp_addr *saddr, | |||
281 | pr_debug("src=%pI6 - ", &fl6->saddr); | 262 | pr_debug("src=%pI6 - ", &fl6->saddr); |
282 | } | 263 | } |
283 | 264 | ||
284 | dst = ip6_dst_lookup_flow(sk, fl6, NULL, false); | 265 | final_p = fl6_update_dst(fl6, np->opt, &final); |
266 | dst = ip6_dst_lookup_flow(sk, fl6, final_p, false); | ||
285 | if (!asoc || saddr) | 267 | if (!asoc || saddr) |
286 | goto out; | 268 | goto out; |
287 | 269 | ||
@@ -333,10 +315,12 @@ static void sctp_v6_get_dst(struct sctp_transport *t, union sctp_addr *saddr, | |||
333 | } | 315 | } |
334 | } | 316 | } |
335 | rcu_read_unlock(); | 317 | rcu_read_unlock(); |
318 | |||
336 | if (baddr) { | 319 | if (baddr) { |
337 | fl6->saddr = baddr->v6.sin6_addr; | 320 | fl6->saddr = baddr->v6.sin6_addr; |
338 | fl6->fl6_sport = baddr->v6.sin6_port; | 321 | fl6->fl6_sport = baddr->v6.sin6_port; |
339 | dst = ip6_dst_lookup_flow(sk, fl6, NULL, false); | 322 | final_p = fl6_update_dst(fl6, np->opt, &final); |
323 | dst = ip6_dst_lookup_flow(sk, fl6, final_p, false); | ||
340 | } | 324 | } |
341 | 325 | ||
342 | out: | 326 | out: |