Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2459052imj; Mon, 18 Feb 2019 06:24:29 -0800 (PST) X-Google-Smtp-Source: AHgI3IZa4ppmfaajxz0rCCnXehIAEOtWYO78L0/WWXlLjWL6+AtJKYURer6rlEbVKdxWqfUraX5K X-Received: by 2002:a17:902:503:: with SMTP id 3mr25817527plf.233.1550499869350; Mon, 18 Feb 2019 06:24:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550499869; cv=none; d=google.com; s=arc-20160816; b=fho0Hi6M1aSfPzcT8/SWpqY1cp9PSAgl6qtQ3GU+0zDL/WMdbhiN8WqjbUGwlB0DuF iq5xVxziwqihk7CQCtItlZrbY/Cv+rLayWP8HmSXGgtF6uzIs490eBWl5vgUPSUXFx05 gcJoqVtQbxY0lpklnZu11wD3WivSxJ5zJwV2XH3LB3bLbQLmjsTCFwG8LuucPYyp51Z/ cpscoQJHt9G9BqgoTP5HSNLyEdLtfPfLmHbCUdsJurHjX1XkdmWlSlIL4zjQ72bptQBi xcv5soS/EQuztoy6w2eJuI4CfENawP5U+StIK5aXcriRgYTry6JrvjdarAzt7iz5sqfm PDzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GututdtIRRDB5kahvyQ5vLs629xUxg5Jvci44MX1knE=; b=NaM2STjIM7OkSwq7KC4dxhUcG2L9A4d+/7/OqDLuZ+NpXLNmL49JaWkTrIxAVWfopF GY6KQyJOEgKIyI4CLklrZEcUTn+uviX0JnCYlbTMsDqL14Pwr8N9YcAJWltttepH17H0 3br6SOK8lCepz7yhS/4MkcRt22I3dvoP03Fjmt4eYd3O+PGfTGLbLvrRAhO5JibSnHTL /r055LFFL7vHyZO0zNMnr3QTpGySy4x9u6YtX9Km0ZVs0U/+J3sLjkD+lcQJ3geJuY6m Mw+h6l2ZDe3tbyP/6GA9hpd/8eIe/Hh/NtvnJRilrkqjiTD3je5NnRY5HylZo+Jl9v1P LGgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FMhUp70c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u2si12631822pgp.592.2019.02.18.06.24.13; Mon, 18 Feb 2019 06:24:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FMhUp70c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389932AbfBROEb (ORCPT + 99 others); Mon, 18 Feb 2019 09:04:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:46904 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389898AbfBROE0 (ORCPT ); Mon, 18 Feb 2019 09:04:26 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 61D9321901; Mon, 18 Feb 2019 14:04:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498665; bh=2+l3cMPKqe1k1P0pJY7BW97+2aB+VVuUAcNeatCVcOs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FMhUp70cbb6VhB04J9CWGpCv+0sq+HP1Mipxpc/fKVFqr9GzZMNf251YfZLEcesYH qX0WVCBi85XkhxcT5c1Vy6sZLh45FSumjML/NgnAsFor5oMFl5GhoYH9qKSz8ElnXM 52XNEbZLYg646119izGiuxKj0plWPKmoueqlWewk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Rundong Ge , "David S. Miller" Subject: [PATCH 4.4 082/143] net: dsa: slave: Dont propagate flag changes on down slave interfaces Date: Mon, 18 Feb 2019 14:43:30 +0100 Message-Id: <20190218133532.071482604@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133529.099444112@linuxfoundation.org> References: <20190218133529.099444112@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Rundong Ge [ Upstream commit 17ab4f61b8cd6f9c38e9d0b935d86d73b5d0d2b5 ] The unbalance of master's promiscuity or allmulti will happen after ifdown and ifup a slave interface which is in a bridge. When we ifdown a slave interface , both the 'dsa_slave_close' and 'dsa_slave_change_rx_flags' will clear the master's flags. The flags of master will be decrease twice. In the other hand, if we ifup the slave interface again, since the slave's flags were cleared the 'dsa_slave_open' won't set the master's flag, only 'dsa_slave_change_rx_flags' that triggered by 'br_add_if' will set the master's flags. The flags of master is increase once. Only propagating flag changes when a slave interface is up makes sure this does not happen. The 'vlan_dev_change_rx_flags' had the same problem and was fixed, and changes here follows that fix. Fixes: 91da11f870f0 ("net: Distributed Switch Architecture protocol support") Signed-off-by: Rundong Ge Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/dsa/slave.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) --- a/net/dsa/slave.c +++ b/net/dsa/slave.c @@ -157,10 +157,14 @@ static void dsa_slave_change_rx_flags(st struct dsa_slave_priv *p = netdev_priv(dev); struct net_device *master = p->parent->dst->master_netdev; - if (change & IFF_ALLMULTI) - dev_set_allmulti(master, dev->flags & IFF_ALLMULTI ? 1 : -1); - if (change & IFF_PROMISC) - dev_set_promiscuity(master, dev->flags & IFF_PROMISC ? 1 : -1); + if (dev->flags & IFF_UP) { + if (change & IFF_ALLMULTI) + dev_set_allmulti(master, + dev->flags & IFF_ALLMULTI ? 1 : -1); + if (change & IFF_PROMISC) + dev_set_promiscuity(master, + dev->flags & IFF_PROMISC ? 1 : -1); + } } static void dsa_slave_set_rx_mode(struct net_device *dev)