<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in srv6_iptunnel_cache.sh</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2025</copyright>
    <generator>Java</generator><item>
        <title>a55f7f5f29b32c2c53cc291899cf9b0c25a07f7c - Merge tag &apos;net-7.0-rc8&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net</title>
        <link>http://opengrok.net:8080/history/linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh#a55f7f5f29b32c2c53cc291899cf9b0c25a07f7c</link>
        <description>Merge tag &apos;net-7.0-rc8&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netPull networking fixes from Paolo Abeni: &quot;Including fixes from netfilter, IPsec and wireless. This is again  considerably bigger than the old average. No known outstanding  regressions.  Current release - regressions:   - net: increase IP_TUNNEL_RECURSION_LIMIT to 5   - eth: ice: fix PTP timestamping broken by SyncE code on E825C  Current release - new code bugs:   - eth: stmmac: dwmac-motorcomm: fix eFUSE MAC address read failure  Previous releases - regressions:   - core: fix cross-cache free of KFENCE-allocated skb head   - sched: act_csum: validate nested VLAN headers   - rxrpc: fix call removal to use RCU safe deletion   - xfrm:      - wait for RCU readers during policy netns exit      - fix refcount leak in xfrm_migrate_policy_find   - wifi: rt2x00usb: fix devres lifetime   - mptcp: fix slab-use-after-free in __inet_lookup_established   - ipvs: fix NULL deref in ip_vs_add_service error path   - eth:      - airoha: fix memory leak in airoha_qdma_rx_process()      - lan966x: fix use-after-free and leak in lan966x_fdma_reload()  Previous releases - always broken:   - ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()   - ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group     dump   - bridge: guard local VLAN-0 FDB helpers against NULL vlan group   - xsk: tailroom reservation and MTU validation   - rxrpc:      - fix to request an ack if window is limited      - fix RESPONSE authenticator parser OOB read   - netfilter: nft_ct: fix use-after-free in timeout object destroy   - batman-adv: hold claim backbone gateways by reference   - eth:      - stmmac: fix PTP ref clock for Tegra234      - idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling      - ipa: fix GENERIC_CMD register field masks for IPA v5.0+&quot;* tag &apos;net-7.0-rc8&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (104 commits)  net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()  net: lan966x: fix page pool leak in error paths  net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()  nfc: pn533: allocate rx skb before consuming bytes  l2tp: Drop large packets with UDP encap  net: ipa: fix event ring index not programmed for IPA v5.0+  net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+  MAINTAINERS: Add Prashanth as additional maintainer for amd-xgbe driver  devlink: Fix incorrect skb socket family dumping  af_unix: read UNIX_DIAG_VFS data under unix_state_lock  Revert &quot;mptcp: add needs_id for netlink appending addr&quot;  mptcp: fix slab-use-after-free in __inet_lookup_established  net: txgbe: leave space for null terminators on property_entry  net: ioam6: fix OOB and missing lock  rxrpc: proc: size address buffers for %pISpc output  rxrpc: only handle RESPONSE during service challenge  rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()  rxrpc: Fix leak of rxgk context in rxgk_verify_response()  rxrpc: Fix integer overflow in rxgk_verify_response()  rxrpc: Fix missing error checks for rxkad encryption/decryption failure  ...

            List of files:
            /linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh</description>
        <pubDate>Thu, 09 Apr 2026 15:39:25 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>f821664dde29302e8450aa0597bf1e4c7c5b0a22 - Merge branch &apos;seg6-fix-dst_cache-sharing-in-seg6-lwtunnel&apos;</title>
        <link>http://opengrok.net:8080/history/linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh#f821664dde29302e8450aa0597bf1e4c7c5b0a22</link>
        <description>Merge branch &apos;seg6-fix-dst_cache-sharing-in-seg6-lwtunnel&apos;Andrea Mayer says:====================seg6: fix dst_cache sharing in seg6 lwtunnelThe seg6 lwtunnel encap uses a single per-route dst_cache sharedbetween seg6_input_core() and seg6_output_core(). These two pathscan perform the post-encap SID lookup in different routing contexts(e.g., ip rules matching on the ingress interface, or VRF tableseparation). Whichever path runs first populates the cache, and theother reuses it blindly, bypassing its own lookup.Patch 1 fixes this by splitting the cache into cache_input andcache_output. Patch 2 adds a selftest that validates the isolation.====================Link: https://patch.msgid.link/20260404004405.4057-1-andrea.mayer@uniroma2.itSigned-off-by: Jakub Kicinski &lt;kuba@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh</description>
        <pubDate>Wed, 08 Apr 2026 03:20:59 +0000</pubDate>
        <dc:creator>Jakub Kicinski &lt;kuba@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>32dfd742f06a68fac6499a58f52025990c854031 - selftests: seg6: add test for dst_cache isolation in seg6 lwtunnel</title>
        <link>http://opengrok.net:8080/history/linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh#32dfd742f06a68fac6499a58f52025990c854031</link>
        <description>selftests: seg6: add test for dst_cache isolation in seg6 lwtunnelAdd a selftest that verifies the dst_cache in seg6 lwtunnel is notshared between the input (forwarding) and output (locally generated)paths.The test creates three namespaces (ns_src, ns_router, ns_dst)connected in a line. An SRv6 encap route on ns_router encapsulatestraffic destined to cafe::1 with SID fc00::100. The SID isreachable only for forwarded traffic (from ns_src) via an ip rulematching the ingress interface (iif veth-r0 lookup 100), andblackholed in the main table.The test verifies that:  1. A packet generated locally on ns_router does not reach     ns_dst with an empty cache, since the SID is blackholed;  2. A forwarded packet from ns_src populates the input cache     from table 100 and reaches ns_dst;  3. A packet generated locally on ns_router still does not     reach ns_dst after the input cache is populated,     confirming the output path does not reuse the input     cache entry.Both the forwarded and local packets are pinned to the same CPUwith taskset, since dst_cache is per-cpu.Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrea Mayer &lt;andrea.mayer@uniroma2.it&gt;Reviewed-by: Nicolas Dichtel &lt;nicolas.dichtel@6wind.com&gt;Reviewed-by: Justin Iurman &lt;justin.iurman@gmail.com&gt;Link: https://patch.msgid.link/20260404004405.4057-3-andrea.mayer@uniroma2.itSigned-off-by: Jakub Kicinski &lt;kuba@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/net/srv6_iptunnel_cache.sh</description>
        <pubDate>Sat, 04 Apr 2026 00:44:05 +0000</pubDate>
        <dc:creator>Andrea Mayer &lt;andrea.mayer@uniroma2.it&gt;</dc:creator>
    </item>
</channel>
</rss>
