summaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorMatthieu Baerts (NGI0) <matttbe@kernel.org>2025-09-12 14:52:22 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2025-09-25 11:13:43 +0200
commitbb7a3f09e9d49085bc941f6d975613759d8bcf98 (patch)
treef199676021d9cabc4d8c317ee77a48a4c046522b /net
parent7f5b09cc84e0372181f3940f7c533bd7d9d6d20e (diff)
downloadlinux-bb7a3f09e9d49085bc941f6d975613759d8bcf98.tar.gz
linux-bb7a3f09e9d49085bc941f6d975613759d8bcf98.tar.bz2
linux-bb7a3f09e9d49085bc941f6d975613759d8bcf98.zip
selftests: mptcp: userspace pm: validate deny-join-id0 flag
[ Upstream commit 24733e193a0d68f20d220e86da0362460c9aa812 ] The previous commit adds the MPTCP_PM_EV_FLAG_DENY_JOIN_ID0 flag. Make sure it is correctly announced by the other peer when it has been received. pm_nl_ctl will now display 'deny_join_id0:1' when monitoring the events, and when this flag was set by the other peer. The 'Fixes' tag here below is the same as the one from the previous commit: this patch here is not fixing anything wrong in the selftests, but it validates the previous fix for an issue introduced by this commit ID. Fixes: 702c2f646d42 ("mptcp: netlink: allow userspace-driven subflow establishment") Reviewed-by: Mat Martineau <martineau@kernel.org> Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org> Link: https://patch.msgid.link/20250912-net-mptcp-pm-uspace-deny_join_id0-v1-3-40171884ade8@kernel.org Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions