Skip to content
  1. Nov 23, 2023
  2. Nov 22, 2023
    • Heiner Kallweit's avatar
      Revert "net: r8169: Disable multicast filter for RTL8168H and RTL8107E" · 6a263102
      Heiner Kallweit authored
      
      
      This reverts commit efa5f131.
      
      I couldn't reproduce the reported issue. What I did, based on a pcap
      packet log provided by the reporter:
      - Used same chip version (RTL8168h)
      - Set MAC address to the one used on the reporters system
      - Replayed the EAPOL unicast packet that, according to the reporter,
        was filtered out by the mc filter.
      The packet was properly received.
      
      Therefore the root cause of the reported issue seems to be somewhere
      else. Disabling mc filtering completely for the most common chip
      version is a quite big hammer. Therefore revert the change and wait
      for further analysis results from the reporter.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarHeiner Kallweit <hkallweit1@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      6a263102
    • D. Wythe's avatar
      net/smc: avoid data corruption caused by decline · e6d71b43
      D. Wythe authored
      
      
      We found a data corruption issue during testing of SMC-R on Redis
      applications.
      
      The benchmark has a low probability of reporting a strange error as
      shown below.
      
      "Error: Protocol error, got "\xe2" as reply type byte"
      
      Finally, we found that the retrieved error data was as follows:
      
      0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C
      0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00
      0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2
      
      It is quite obvious that this is a SMC DECLINE message, which means that
      the applications received SMC protocol message.
      We found that this was caused by the following situations:
      
      client                  server
              ¦  clc proposal
              ------------->
              ¦  clc accept
              <-------------
              ¦  clc confirm
              ------------->
      wait llc confirm
      			send llc confirm
              ¦failed llc confirm
              ¦   x------
      (after 2s)timeout
                              wait llc confirm rsp
      
      wait decline
      
      (after 1s) timeout
                              (after 2s) timeout
              ¦   decline
              -------------->
              ¦   decline
              <--------------
      
      As a result, a decline message was sent in the implementation, and this
      message was read from TCP by the already-fallback connection.
      
      This patch double the client timeout as 2x of the server value,
      With this simple change, the Decline messages should never cross or
      collide (during Confirm link timeout).
      
      This issue requires an immediate solution, since the protocol updates
      involve a more long-term solution.
      
      Fixes: 0fb0b02b ("net/smc: adapt SMC client code to use the LLC flow")
      Signed-off-by: default avatarD. Wythe <alibuda@linux.alibaba.com>
      Reviewed-by: default avatarWen Gu <guwen@linux.alibaba.com>
      Reviewed-by: default avatarWenjia Zhang <wenjia@linux.ibm.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      e6d71b43
    • Nguyen Dinh Phi's avatar
      nfc: virtual_ncidev: Add variable to check if ndev is running · 84d2db91
      Nguyen Dinh Phi authored
      
      
      syzbot reported an memory leak that happens when an skb is add to
      send_buff after virtual nci closed.
      This patch adds a variable to track if the ndev is running before
      handling new skb in send function.
      
      Signed-off-by: default avatarNguyen Dinh Phi <phind.uet@gmail.com>
      Reported-by: default avatar <syzbot+6eb09d75211863f15e3e@syzkaller.appspotmail.com>
      Closes: https://lore.kernel.org/lkml/00000000000075472b06007df4fb@google.com
      
      
      Reviewed-by: Bongsu Jeon
      Reviewed-by: default avatarKrzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      84d2db91
    • Hao Ge's avatar
      dpll: Fix potential msg memleak when genlmsg_put_reply failed · b6fe6f03
      Hao Ge authored
      
      
      We should clean the skb resource if genlmsg_put_reply failed.
      
      Fixes: 9d71b54b ("dpll: netlink: Add DPLL framework base functions")
      Signed-off-by: default avatarHao Ge <gehao@kylinos.cn>
      Reviewed-by: default avatarVadim Fedorenko <vadim.fedorenko@linux.dev>
      Link: https://lore.kernel.org/r/20231121013709.73323-1-gehao@kylinos.cn
      
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      b6fe6f03
    • Jakub Kicinski's avatar
      Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf · b2d66643
      Jakub Kicinski authored
      Daniel Borkmann says:
      
      ====================
      pull-request: bpf 2023-11-21
      
      We've added 19 non-merge commits during the last 4 day(s) which contain
      a total of 18 files changed, 1043 insertions(+), 416 deletions(-).
      
      The main changes are:
      
      1) Fix BPF verifier to validate callbacks as if they are called an unknown
         number of times in order to fix not detecting some unsafe programs,
         from Eduard Zingerman.
      
      2) Fix bpf_redirect_peer() handling which missed proper stats accounting
         for veth and netkit and also generally fix missing stats for the latter,
         from Peilin Ye, Daniel Borkmann et al.
      
      * tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf:
        selftests/bpf: check if max number of bpf_loop iterations is tracked
        bpf: keep track of max number of bpf_loop callback iterations
        selftests/bpf: test widening for iterating callbacks
        bpf: widening for callback iterators
        selftests/bpf: tests for iterating callbacks
        bpf: verify callbacks as if they are called unknown number of times
        bpf: extract setup_func_entry() utility function
        bpf: extract __check_reg_arg() utility function
        selftests/bpf: fix bpf_loop_bench for new callback verification scheme
        selftests/bpf: track string payload offset as scalar in strobemeta
        selftests/bpf: track tcp payload offset as scalar in xdp_synproxy
        selftests/bpf: Add netkit to tc_redirect selftest
        selftests/bpf: De-veth-ize the tc_redirect test case
        bpf, netkit: Add indirect call wrapper for fetching peer dev
        bpf: Fix dev's rx stats for bpf_redirect_peer traffic
        veth: Use tstats per-CPU traffic counters
        netkit: Add tstats per-CPU traffic counters
        net: Move {l,t,d}stats allocation to core and convert veth & vrf
        net, vrf: Move dstats structure to core
      ====================
      
      Link: https://lore.kernel.org/r/20231121193113.11796-1-daniel@iogearbox.net
      
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      b2d66643
    • Jakub Kicinski's avatar
      docs: netdev: try to guide people on dealing with silence · 495ec91b
      Jakub Kicinski authored
      There has been more than a few threads which went idle before
      the merge window and now people came back to them and started
      asking about next steps.
      
      We currently tell people to be patient and not to repost too
      often. Our "not too often", however, is still a few orders of
      magnitude faster than other subsystems. Or so I feel after
      hearing people talk about review rates at LPC.
      
      Clarify in the doc that if the discussion went idle for a week
      on netdev, 95% of the time there's no point waiting longer.
      
      Link: https://lore.kernel.org/r/20231120200109.620392-1-kuba@kernel.org
      
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      495ec91b
    • Jose Ignacio Tornos Martinez's avatar
      net: usb: ax88179_178a: fix failed operations during ax88179_reset · 0739af07
      Jose Ignacio Tornos Martinez authored
      
      
      Using generic ASIX Electronics Corp. AX88179 Gigabit Ethernet device,
      the following test cycle has been implemented:
          - power on
          - check logs
          - shutdown
          - after detecting the system shutdown, disconnect power
          - after approximately 60 seconds of sleep, power is restored
      Running some cycles, sometimes error logs like this appear:
          kernel: ax88179_178a 2-9:1.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -19
          kernel: ax88179_178a 2-9:1.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0001: -19
          ...
      These failed operation are happening during ax88179_reset execution, so
      the initialization could not be correct.
      
      In order to avoid this, we need to increase the delay after reset and
      clock initial operations. By using these larger values, many cycles
      have been run and no failed operations appear.
      
      It would be better to check some status register to verify when the
      operation has finished, but I do not have found any available information
      (neither in the public datasheets nor in the manufacturer's driver). The
      only available information for the necessary delays is the maufacturer's
      driver (original values) but the proposed values are not enough for the
      tested devices.
      
      Fixes: e2ca90c2 ("ax88179_178a: ASIX AX88179_178A USB 3.0/2.0 to gigabit ethernet adapter driver")
      Reported-by: default avatarHerb Wei <weihao.bj@ieisystem.com>
      Tested-by: default avatarHerb Wei <weihao.bj@ieisystem.com>
      Signed-off-by: default avatarJose Ignacio Tornos Martinez <jtornosm@redhat.com>
      Link: https://lore.kernel.org/r/20231120120642.54334-1-jtornosm@redhat.com
      
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      0739af07
  3. Nov 21, 2023