From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 13354C7618B for ; Mon, 29 Jul 2019 17:28:00 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id E393B206DD for ; Mon, 29 Jul 2019 17:27:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564421280; bh=84sFfN8BLYDPAZjnPZ2gWMIaKnzZcW62FcLErO0vmxA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=gJSUdK0Vllh+lQ6ueX1Cl67bpe31qS0V87GcBNV4UEHDrylsAEwfuECV1fE2M5x/0 LLxV7+arj8xIouXOv9Wp04mVIqu1teUK79OE0ys+c0LepTOfVA/5y/5jZ1/jJ0Yv6g HelfvOUCo1Zor69eDJ+LVeBMr/51xTZgFqRHCkqc= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728905AbfG2R17 (ORCPT ); Mon, 29 Jul 2019 13:27:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:41164 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725934AbfG2R16 (ORCPT ); Mon, 29 Jul 2019 13:27:58 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0A6C7206DD; Mon, 29 Jul 2019 17:27:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564421277; bh=84sFfN8BLYDPAZjnPZ2gWMIaKnzZcW62FcLErO0vmxA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=vD87Bh/9iJK4xjJHmxcLeFtMIi/zB9+vfMdOgyYgM/m6Jw1ja1ljJZIGHX9yB3OUO LzRx0Mh4SustYEdaV1EKDlKRc1MQzZwiHAPtk2+Z6tSKLy5FeWkoFK/1GvrvlCVY5C RturpfPOgoXZQ2A8xwX1/qn5dUadrCkF2/70ZiRI= Date: Mon, 29 Jul 2019 13:27:55 -0400 From: Sasha Levin To: Greg KH Cc: Stephen Suryaputra , stable@vger.kernel.org, linux-kernel@vger.kernel.org, dsahern@gmail.com, davem@davemloft.net Subject: Re: Back-porting request Message-ID: <20190729172755.GB29162@sasha-vm> References: <20190729154234.GA3508@ubuntu> <20190729155627.GA15584@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20190729155627.GA15584@kroah.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 29, 2019 at 05:56:27PM +0200, Greg KH wrote: >On Mon, Jul 29, 2019 at 11:42:34AM -0400, Stephen Suryaputra wrote: >> Hello, >> >> I'm requesting this commit to be back-ported to v4.14: >> --- >> commit 5b18f1289808fee5d04a7e6ecf200189f41a4db6 >> Author: Stephen Suryaputra >> Date: Wed Jun 26 02:21:16 2019 -0400 >> >> ipv4: reset rt_iif for recirculated mcast/bcast out pkts >> >> Multicast or broadcast egress packets have rt_iif set to the oif. These >> packets might be recirculated back as input and lookup to the raw >> sockets may fail because they are bound to the incoming interface >> (skb_iif). If rt_iif is not zero, during the lookup, inet_iif() function >> returns rt_iif instead of skb_iif. Hence, the lookup fails. >> >> v2: Make it non vrf specific (David Ahern). Reword the changelog to >> reflect it. >> Signed-off-by: Stephen Suryaputra >> Reviewed-by: David Ahern >> Signed-off-by: David S. Miller >> --- >> >> We found the issue in that release and the above commit is on >> linux-stable. On the discussion behind this commit, please see: >> https://www.spinics.net/lists/netdev/msg581045.html >> >> I think after the following diff is needed on top of the above commit >> for v4.14: >> >> --- >> diff --git a/net/ipv4/route.c b/net/ipv4/route.c >> index 4d85a4fdfdb0..ad2718c1624e 100644 >> --- a/net/ipv4/route.c >> +++ b/net/ipv4/route.c >> @@ -1623,11 +1623,8 @@ struct rtable *rt_dst_clone(struct net_device *dev, struct rtable *rt) >> new_rt->rt_iif = rt->rt_iif; >> new_rt->rt_pmtu = rt->rt_pmtu; >> new_rt->rt_mtu_locked = rt->rt_mtu_locked; >> - new_rt->rt_gw_family = rt->rt_gw_family; >> - if (rt->rt_gw_family == AF_INET) >> - new_rt->rt_gw4 = rt->rt_gw4; >> - else if (rt->rt_gw_family == AF_INET6) >> - new_rt->rt_gw6 = rt->rt_gw6; >> + new_rt->rt_gateway = rt->rt_gateway; >> + new_rt->rt_table_id = rt->rt_table_id; >> INIT_LIST_HEAD(&new_rt->rt_uncached); >> >> new_rt->dst.flags |= DST_HOST; >> --- >> >> Thank you, > >For networking patches to be applied to the stable kernel tree(s), >please read: > https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html >for how to do this properly. > >There is a section for how to do this for networking patches as they are >accepted a bit differently from other patches. To clarify a bit more here: technically you're asking for a patch to be included in 4.14, which isn't one of the "last two stable releases", so that document will tell you to send that patch directly to us. However, this patch isn't in 4.19 either, which is still Dave's domain, and we can't take it in 4.14 if it's not in 4.19 (we don't want to introduce regressions for people who are upgrading their kernels), so this will still need to go through Dave. -- Thanks, Sasha