WSL2-Linux-Kernel/net
Jonas Gorski 4e777199c0 net: bridge: br_fdb_external_learn_add(): always set EXT_LEARN
[ Upstream commit bee2ef946d3184e99077be526567d791c473036f ]

When userspace wants to take over a fdb entry by setting it as
EXTERN_LEARNED, we set both flags BR_FDB_ADDED_BY_EXT_LEARN and
BR_FDB_ADDED_BY_USER in br_fdb_external_learn_add().

If the bridge updates the entry later because its port changed, we clear
the BR_FDB_ADDED_BY_EXT_LEARN flag, but leave the BR_FDB_ADDED_BY_USER
flag set.

If userspace then wants to take over the entry again,
br_fdb_external_learn_add() sees that BR_FDB_ADDED_BY_USER and skips
setting the BR_FDB_ADDED_BY_EXT_LEARN flags, thus silently ignores the
update.

Fix this by always allowing to set BR_FDB_ADDED_BY_EXT_LEARN regardless
if this was a user fdb entry or not.

Fixes: 710ae72877 ("net: bridge: Mark FDB entries that were added by user as such")
Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Acked-by: Nikolay Aleksandrov <razor@blackwall.org>
Reviewed-by: Ido Schimmel <idosch@nvidia.com>
Link: https://patch.msgid.link/20240903081958.29951-1-jonas.gorski@bisdn.de
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-09-12 11:07:47 +02:00
..
6lowpan
9p
802
8021q gro: remove rcu_read_lock/rcu_read_unlock from gro_complete handlers 2024-09-12 11:07:47 +02:00
appletalk
atm
ax25
batman-adv
bluetooth Bluetooth: MGMT: Ignore keys being loaded with invalid type 2024-09-12 11:07:43 +02:00
bpf
bpfilter
bridge net: bridge: br_fdb_external_learn_add(): always set EXT_LEARN 2024-09-12 11:07:47 +02:00
caif
can can: bcm: Remove proc entry when dev is unregistered. 2024-09-12 11:07:46 +02:00
ceph
core ethtool: check device is present when getting link settings 2024-09-04 13:23:40 +02:00
dcb
dccp
dns_resolver
dsa
ethernet gro: remove rcu_read_lock/rcu_read_unlock from gro_complete handlers 2024-09-12 11:07:47 +02:00
ethtool ethtool: check device is present when getting link settings 2024-09-04 13:23:40 +02:00
hsr
ieee802154
ife
ipv4 fou: Fix null-ptr-deref in GRO. 2024-09-12 11:07:47 +02:00
ipv6 gro: remove rcu_read_lock/rcu_read_unlock from gro_complete handlers 2024-09-12 11:07:47 +02:00
iucv s390/iucv: fix receive buffer virtual vs physical address confusion 2024-09-04 13:23:27 +02:00
kcm kcm: Serialise kcm_sendmsg() for the same socket. 2024-09-04 13:23:32 +02:00
key
l2tp
l3mdev
lapb
llc
mac80211 wifi: mac80211: fix BA session teardown race 2024-09-04 13:23:20 +02:00
mac802154
mctp
mpls
mptcp mptcp: pm: send ACK on an active subflow 2024-09-12 11:07:45 +02:00
ncsi
netfilter netfilter: nf_conncount: fix wrong variable type 2024-09-12 11:07:45 +02:00
netlabel
netlink netlink: hold nlk->cb_mutex longer in __netlink_dump_start() 2024-09-04 13:23:25 +02:00
netrom
nfc
nsh
openvswitch
packet
phonet
psample
qrtr
rds net:rds: Fix possible deadlock in rds_message_put 2024-09-04 13:23:39 +02:00
rfkill
rose
rxrpc
sched sched: sch_cake: fix bulk flow accounting logic for host fairness 2024-09-12 11:07:44 +02:00
sctp
smc
strparser
sunrpc sunrpc: use the struct net as the svc proc private 2024-09-04 13:23:30 +02:00
switchdev
tipc
tls
unix af_unix: Remove put_pid()/put_cred() in copy_peercred(). 2024-09-12 11:07:45 +02:00
vmw_vsock
wireless wifi: cfg80211: make hash table duplicates more survivable 2024-09-12 11:07:41 +02:00
x25
xdp
xfrm
Kconfig
Makefile
compat.c
devres.c
socket.c
sysctl_net.c