Skip to content
  1. Jan 25, 2023
  2. Jan 24, 2023
    • Kuniyuki Iwashima's avatar
      netrom: Fix use-after-free of a listening socket. · 409db27e
      Kuniyuki Iwashima authored
      syzbot reported a use-after-free in do_accept(), precisely nr_accept()
      as sk_prot_alloc() allocated the memory and sock_put() frees it. [0]
      
      The issue could happen if the heartbeat timer is fired and
      nr_heartbeat_expiry() calls nr_destroy_socket(), where a socket
      has SOCK_DESTROY or a listening socket has SOCK_DEAD.
      
      In this case, the first condition cannot be true.  SOCK_DESTROY is
      flagged in nr_release() only when the file descriptor is close()d,
      but accept() is being called for the listening socket, so the second
      condition must be true.
      
      Usually, the AF_NETROM listener neither starts timers nor sets
      SOCK_DEAD.  However, the condition is met if connect() fails before
      listen().  connect() starts the t1 timer and heartbeat timer, and
      t1timer calls nr_disconnect() when timeout happens.  Then, SOCK_DEAD
      is set, and if we call listen(), the heartbeat timer calls
      nr_destroy_socket().
      
        nr_connect
          nr_establish_data_link(sk)
            nr_start_t1timer(sk)
          nr_start_heartbeat(sk)
                                          nr_t1timer_expiry
                                            nr_disconnect(sk, ETIMEDOUT)
                                              nr_sk(sk)->state = NR_STATE_0
                                              sk->sk_state = TCP_CLOSE
                                              sock_set_flag(sk, SOCK_DEAD)
      nr_listen
        if (sk->sk_state != TCP_LISTEN)
          sk->sk_state = TCP_LISTEN
                                          nr_heartbeat_expiry
                                            switch (nr->state)
                                            case NR_STATE_0
                                              if (sk->sk_state == TCP_LISTEN &&
                                                  sock_flag(sk, SOCK_DEAD))
                                                nr_destroy_socket(sk)
      
      This path seems expected, and nr_destroy_socket() is called to clean
      up resources.  Initially, there was sock_hold() before nr_destroy_socket()
      so that the socket would not be freed, but the commit 517a16b1
      ("netrom: Decrease sock refcount when sock timers expire") accidentally
      removed it.
      
      To fix use-after-free, let's add sock_hold().
      
      [0]:
      BUG: KASAN: use-after-free in do_accept+0x483/0x510 net/socket.c:1848
      Read of size 8 at addr ffff88807978d398 by task syz-executor.3/5315
      
      CPU: 0 PID: 5315 Comm: syz-executor.3 Not tainted 6.2.0-rc3-syzkaller-00165-gd9fc1511728c #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
      Call Trace:
       <TASK>
       __dump_stack lib/dump_stack.c:88 [inline]
       dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
       print_address_description mm/kasan/report.c:306 [inline]
       print_report+0x15e/0x461 mm/kasan/report.c:417
       kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
       do_accept+0x483/0x510 net/socket.c:1848
       __sys_accept4_file net/socket.c:1897 [inline]
       __sys_accept4+0x9a/0x120 net/socket.c:1927
       __do_sys_accept net/socket.c:1944 [inline]
       __se_sys_accept net/socket.c:1941 [inline]
       __x64_sys_accept+0x75/0xb0 net/socket.c:1941
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x63/0xcd
      RIP: 0033:0x7fa436a8c0c9
      Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
      RSP: 002b:00007fa437784168 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
      RAX: ffffffffffffffda RBX: 00007fa436bac050 RCX: 00007fa436a8c0c9
      RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005
      RBP: 00007fa436ae7ae9 R08: 0000000000000000 R09: 0000000000000000
      R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
      R13: 00007ffebc6700df R14: 00007fa437784300 R15: 0000000000022000
       </TASK>
      
      Allocated by task 5294:
       kasan_save_stack+0x22/0x40 mm/kasan/common.c:45
       kasan_set_track+0x25/0x30 mm/kasan/common.c:52
       ____kasan_kmalloc mm/kasan/common.c:371 [inline]
       ____kasan_kmalloc mm/kasan/common.c:330 [inline]
       __kasan_kmalloc+0xa3/0xb0 mm/kasan/common.c:380
       kasan_kmalloc include/linux/kasan.h:211 [inline]
       __do_kmalloc_node mm/slab_common.c:968 [inline]
       __kmalloc+0x5a/0xd0 mm/slab_common.c:981
       kmalloc include/linux/slab.h:584 [inline]
       sk_prot_alloc+0x140/0x290 net/core/sock.c:2038
       sk_alloc+0x3a/0x7a0 net/core/sock.c:2091
       nr_create+0xb6/0x5f0 net/netrom/af_netrom.c:433
       __sock_create+0x359/0x790 net/socket.c:1515
       sock_create net/socket.c:1566 [inline]
       __sys_socket_create net/socket.c:1603 [inline]
       __sys_socket_create net/socket.c:1588 [inline]
       __sys_socket+0x133/0x250 net/socket.c:1636
       __do_sys_socket net/socket.c:1649 [inline]
       __se_sys_socket net/socket.c:1647 [inline]
       __x64_sys_socket+0x73/0xb0 net/socket.c:1647
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x63/0xcd
      
      Freed by task 14:
       kasan_save_stack+0x22/0x40 mm/kasan/common.c:45
       kasan_set_track+0x25/0x30 mm/kasan/common.c:52
       kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:518
       ____kasan_slab_free mm/kasan/common.c:236 [inline]
       ____kasan_slab_free+0x13b/0x1a0 mm/kasan/common.c:200
       kasan_slab_free include/linux/kasan.h:177 [inline]
       __cache_free mm/slab.c:3394 [inline]
       __do_kmem_cache_free mm/slab.c:3580 [inline]
       __kmem_cache_free+0xcd/0x3b0 mm/slab.c:3587
       sk_prot_free net/core/sock.c:2074 [inline]
       __sk_destruct+0x5df/0x750 net/core/sock.c:2166
       sk_destruct net/core/sock.c:2181 [inline]
       __sk_free+0x175/0x460 net/core/sock.c:2192
       sk_free+0x7c/0xa0 net/core/sock.c:2203
       sock_put include/net/sock.h:1991 [inline]
       nr_heartbeat_expiry+0x1d7/0x460 net/netrom/nr_timer.c:148
       call_timer_fn+0x1da/0x7c0 kernel/time/timer.c:1700
       expire_timers+0x2c6/0x5c0 kernel/time/timer.c:1751
       __run_timers kernel/time/timer.c:2022 [inline]
       __run_timers kernel/time/timer.c:1995 [inline]
       run_timer_softirq+0x326/0x910 kernel/time/timer.c:2035
       __do_softirq+0x1fb/0xadc kernel/softirq.c:571
      
      Fixes: 517a16b1
      
       ("netrom: Decrease sock refcount when sock timers expire")
      Reported-by: default avatar <syzbot+5fafd5cfe1fc91f6b352@syzkaller.appspotmail.com>
      Signed-off-by: default avatarKuniyuki Iwashima <kuniyu@amazon.com>
      Link: https://lore.kernel.org/r/20230120231927.51711-1-kuniyu@amazon.com
      Signed-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      409db27e
    • Jakub Kicinski's avatar
      Merge branch '40GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue · 208a2110
      Jakub Kicinski authored
      
      
      Tony Nguyen says:
      
      ====================
      Intel Wired LAN Driver Updates 2023-01-20 (iavf)
      
      This series contains updates to iavf driver only.
      
      Michal Schmidt converts single iavf workqueue to per adapter to avoid
      deadlock issues.
      
      Marcin moves setting of VLAN related netdev features to watchdog task to
      avoid RTNL deadlock.
      
      Stefan Assmann schedules immediate watchdog task execution on changing
      primary MAC to avoid excessive delay.
      
      * '40GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue:
        iavf: schedule watchdog immediately when changing primary MAC
        iavf: Move netdev_update_features() into watchdog task
        iavf: fix temporary deadlock and failure to set MAC address
      ====================
      
      Link: https://lore.kernel.org/r/20230120211036.430946-1-anthony.l.nguyen@intel.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      208a2110
    • Jakub Kicinski's avatar
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf · 571cca79
      Jakub Kicinski authored
      Pablo Neira Ayuso says:
      
      ====================
      Netfilter fixes for net
      
      1) Fix overlap detection in rbtree set backend: Detect overlap by going
         through the ordered list of valid tree nodes. To shorten the number of
         visited nodes in the list, this algorithm descends the tree to search
         for an existing element greater than the key value to insert that is
         greater than the new element.
      
      2) Fix for the rbtree set garbage collector: Skip inactive and busy
         elements when checking for expired elements to avoid interference
         with an ongoing transaction from control plane.
      
      This is a rather large fix coming at this stage of the 6.2-rc. Since
      33c7aba0
      
       ("netfilter: nf_tables: do not set up extensions for end
      interval"), bogus overlap errors in the rbtree set occur more frequently.
      
      * git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf:
        netfilter: nft_set_rbtree: skip elements in transaction from garbage collection
        netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
      ====================
      
      Link: https://lore.kernel.org/r/20230123211601.292930-1-pablo@netfilter.org
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      571cca79
    • Mat Martineau's avatar
      MAINTAINERS: Update MPTCP maintainer list and CREDITS · bce4affe
      Mat Martineau authored
      
      
      My responsibilities at Intel have changed, so I'm handing off exclusive
      MPTCP subsystem maintainer duties to Matthieu. It has been a privilege
      to see MPTCP through its initial upstreaming and first few years in the
      upstream kernel!
      
      Acked-by: default avatarMatthieu Baerts <matthieu.baerts@tessares.net>
      Signed-off-by: default avatarMat Martineau <mathew.j.martineau@linux.intel.com>
      Link: https://lore.kernel.org/r/20230120231121.36121-1-mathew.j.martineau@linux.intel.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      bce4affe
    • Alexandru Tachici's avatar
      net: ethernet: adi: adin1110: Fix multicast offloading · 8a4f6d02
      Alexandru Tachici authored
      Driver marked broadcast/multicast frames as offloaded incorrectly.
      Mark them as offloaded only when HW offloading has been enabled.
      This should happen only for ADIN2111 when both ports are bridged
      by the software.
      
      Fixes: bc93e19d
      
       ("net: ethernet: adi: Add ADIN1110 support")
      Signed-off-by: default avatarAlexandru Tachici <alexandru.tachici@analog.com>
      Reviewed-by: default avatarAndrew Lunn <andrew@lunn.ch>
      Link: https://lore.kernel.org/r/20230120090846.18172-1-alexandru.tachici@analog.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      8a4f6d02
    • Ahmad Fatoum's avatar
      net: dsa: microchip: fix probe of I2C-connected KSZ8563 · 360fdc99
      Ahmad Fatoum authored
      Starting with commit eee16b14 ("net: dsa: microchip: perform the
      compatibility check for dev probed"), the KSZ switch driver now bails
      out if it thinks the DT compatible doesn't match the actual chip ID
      read back from the hardware:
      
        ksz9477-switch 1-005f: Device tree specifies chip KSZ9893 but found
        KSZ8563, please fix it!
      
      For the KSZ8563, which used ksz_switch_chips[KSZ9893], this was fine
      at first, because it indeed shares the same chip id as the KSZ9893.
      
      Commit b4490809 ("net: dsa: microchip: add separate struct
      ksz_chip_data for KSZ8563 chip") started differentiating KSZ9893
      compatible chips by consulting the 0x1F register. The resulting breakage
      was fixed for the SPI driver in the same commit by introducing the
      appropriate ksz_switch_chips[KSZ8563], but not for the I2C driver.
      
      Fix this for I2C-connected KSZ8563 now to get it probing again.
      
      Fixes: b4490809
      
       ("net: dsa: microchip: add separate struct ksz_chip_data for KSZ8563 chip").
      Reviewed-by: default avatarAndrew Lunn <andrew@lunn.ch>
      Signed-off-by: default avatarAhmad Fatoum <a.fatoum@pengutronix.de>
      Acked-by: default avatarArun Ramadoss <arun.ramadoss@microchip.com>
      Reviewed-by: default avatarFlorian Fainelli <f.fainelli@gmail.com>
      Link: https://lore.kernel.org/r/20230120110933.1151054-1-a.fatoum@pengutronix.de
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      360fdc99
    • Eric Dumazet's avatar
      ipv4: prevent potential spectre v1 gadget in fib_metrics_match() · 5e9398a2
      Eric Dumazet authored
      if (!type)
              continue;
          if (type > RTAX_MAX)
              return false;
          ...
          fi_val = fi->fib_metrics->metrics[type - 1];
      
      @type being used as an array index, we need to prevent
      cpu speculation or risk leaking kernel memory content.
      
      Fixes: 5f9ae3d9
      
       ("ipv4: do metrics match when looking up and deleting a route")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Link: https://lore.kernel.org/r/20230120133140.3624204-1-edumazet@google.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      5e9398a2
    • Eric Dumazet's avatar
      ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() · 1d1d63b6
      Eric Dumazet authored
      if (!type)
      		continue;
      	if (type > RTAX_MAX)
      		return -EINVAL;
      	...
      	metrics[type - 1] = val;
      
      @type being used as an array index, we need to prevent
      cpu speculation or risk leaking kernel memory content.
      
      Fixes: 6cf9dfd3
      
       ("net: fib: move metrics parsing to a helper")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Link: https://lore.kernel.org/r/20230120133040.3623463-1-edumazet@google.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      1d1d63b6
    • Jakub Kicinski's avatar
      Merge branch 'netlink-annotate-various-data-races' · d6ab640c
      Jakub Kicinski authored
      
      
      Eric Dumazet says:
      
      ====================
      netlink: annotate various data races
      
      A recent syzbot report came to my attention.
      
      After addressing it, I also fixed other related races.
      ====================
      
      Link: https://lore.kernel.org/r/20230120125955.3453768-1-edumazet@google.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      d6ab640c
    • Eric Dumazet's avatar
      netlink: annotate data races around sk_state · 9b663b5c
      Eric Dumazet authored
      netlink_getsockbyportid() reads sk_state while a concurrent
      netlink_connect() can change its value.
      
      Fixes: 1da177e4
      
       ("Linux-2.6.12-rc2")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      9b663b5c
    • Eric Dumazet's avatar
      netlink: annotate data races around dst_portid and dst_group · 004db64d
      Eric Dumazet authored
      netlink_getname(), netlink_sendmsg() and netlink_getsockbyportid()
      can read nlk->dst_portid and nlk->dst_group while another
      thread is changing them.
      
      Fixes: 1da177e4
      
       ("Linux-2.6.12-rc2")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      004db64d
    • Eric Dumazet's avatar
      netlink: annotate data races around nlk->portid · c1bb9484
      Eric Dumazet authored
      syzbot reminds us netlink_getname() runs locklessly [1]
      
      This first patch annotates the race against nlk->portid.
      
      Following patches take care of the remaining races.
      
      [1]
      BUG: KCSAN: data-race in netlink_getname / netlink_insert
      
      write to 0xffff88814176d310 of 4 bytes by task 2315 on cpu 1:
      netlink_insert+0xf1/0x9a0 net/netlink/af_netlink.c:583
      netlink_autobind+0xae/0x180 net/netlink/af_netlink.c:856
      netlink_sendmsg+0x444/0x760 net/netlink/af_netlink.c:1895
      sock_sendmsg_nosec net/socket.c:714 [inline]
      sock_sendmsg net/socket.c:734 [inline]
      ____sys_sendmsg+0x38f/0x500 net/socket.c:2476
      ___sys_sendmsg net/socket.c:2530 [inline]
      __sys_sendmsg+0x19a/0x230 net/socket.c:2559
      __do_sys_sendmsg net/socket.c:2568 [inline]
      __se_sys_sendmsg net/socket.c:2566 [inline]
      __x64_sys_sendmsg+0x42/0x50 net/socket.c:2566
      do_syscall_x64 arch/x86/entry/common.c:50 [inline]
      do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
      entry_SYSCALL_64_after_hwframe+0x63/0xcd
      
      read to 0xffff88814176d310 of 4 bytes by task 2316 on cpu 0:
      netlink_getname+0xcd/0x1a0 net/netlink/af_netlink.c:1144
      __sys_getsockname+0x11d/0x1b0 net/socket.c:2026
      __do_sys_getsockname net/socket.c:2041 [inline]
      __se_sys_getsockname net/socket.c:2038 [inline]
      __x64_sys_getsockname+0x3e/0x50 net/socket.c:2038
      do_syscall_x64 arch/x86/entry/common.c:50 [inline]
      do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
      entry_SYSCALL_64_after_hwframe+0x63/0xcd
      
      value changed: 0x00000000 -> 0xc9a49780
      
      Reported by Kernel Concurrency Sanitizer on:
      CPU: 0 PID: 2316 Comm: syz-executor.2 Not tainted 6.2.0-rc3-syzkaller-00030-ge8f60cd7db24-dirty #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
      
      Fixes: 1da177e4
      
       ("Linux-2.6.12-rc2")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Reported-by: default avatarsyzbot <syzkaller@googlegroups.com>
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      c1bb9484
    • Pablo Neira Ayuso's avatar
      netfilter: nft_set_rbtree: skip elements in transaction from garbage collection · 5d235d6c
      Pablo Neira Ayuso authored
      Skip interference with an ongoing transaction, do not perform garbage
      collection on inactive elements. Reset annotated previous end interval
      if the expired element is marked as busy (control plane removed the
      element right before expiration).
      
      Fixes: 8d8540c4
      
       ("netfilter: nft_set_rbtree: add timeout support")
      Reviewed-by: default avatarStefano Brivio <sbrivio@redhat.com>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      5d235d6c
    • Pablo Neira Ayuso's avatar
      netfilter: nft_set_rbtree: Switch to node list walk for overlap detection · c9e6978e
      Pablo Neira Ayuso authored
      ...instead of a tree descent, which became overly complicated in an
      attempt to cover cases where expired or inactive elements would affect
      comparisons with the new element being inserted.
      
      Further, it turned out that it's probably impossible to cover all those
      cases, as inactive nodes might entirely hide subtrees consisting of a
      complete interval plus a node that makes the current insertion not
      overlap.
      
      To speed up the overlap check, descent the tree to find a greater
      element that is closer to the key value to insert. Then walk down the
      node list for overlap detection. Starting the overlap check from
      rb_first() unconditionally is slow, it takes 10 times longer due to the
      full linear traversal of the list.
      
      Moreover, perform garbage collection of expired elements when walking
      down the node list to avoid bogus overlap reports.
      
      For the insertion operation itself, this essentially reverts back to the
      implementation before commit 7c84d414 ("netfilter: nft_set_rbtree:
      Detect partial overlaps on insertion"), except that cases of complete
      overlap are already handled in the overlap detection phase itself, which
      slightly simplifies the loop to find the insertion point.
      
      Based on initial patch from Stefano Brivio, including text from the
      original patch description too.
      
      Fixes: 7c84d414
      
       ("netfilter: nft_set_rbtree: Detect partial overlaps on insertion")
      Reviewed-by: default avatarStefano Brivio <sbrivio@redhat.com>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      c9e6978e
  3. Jan 23, 2023
    • Gergely Risko's avatar
      ipv6: fix reachability confirmation with proxy_ndp · 9f535c87
      Gergely Risko authored
      When proxying IPv6 NDP requests, the adverts to the initial multicast
      solicits are correct and working.  On the other hand, when later a
      reachability confirmation is requested (on unicast), no reply is sent.
      
      This causes the neighbor entry expiring on the sending node, which is
      mostly a non-issue, as a new multicast request is sent.  There are
      routers, where the multicast requests are intentionally delayed, and in
      these environments the current implementation causes periodic packet
      loss for the proxied endpoints.
      
      The root cause is the erroneous decrease of the hop limit, as this
      is checked in ndisc.c and no answer is generated when it's 254 instead
      of the correct 255.
      
      Cc: stable@vger.kernel.org
      Fixes: 46c7655f
      
       ("ipv6: decrease hop limit counter in ip6_forward()")
      Signed-off-by: default avatarGergely Risko <gergely.risko@gmail.com>
      Tested-by: default avatarGergely Risko <gergely.risko@gmail.com>
      Reviewed-by: default avatarDavid Ahern <dsahern@kernel.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      9f535c87
    • David S. Miller's avatar
      Merge branch 'ethtool-mac-merge' · 0ad999c1
      David S. Miller authored
      
      
      Vladimir Oltean say:
      
      ====================
      ethtool support for IEEE 802.3 MAC Merge layer
      
      Change log
      ----------
      
      v3->v4:
      - add missing opening bracket in ocelot_port_mm_irq()
      - moved cfg.verify_time range checking so that it actually takes place
        for the updated rather than old value
      v3 at:
      https://patchwork.kernel.org/project/netdevbpf/cover/20230117085947.2176464-1-vladimir.oltean@nxp.com/
      
      v2->v3:
      - made get_mm return int instead of void
      - deleted ETHTOOL_A_MM_SUPPORTED
      - renamed ETHTOOL_A_MM_ADD_FRAG_SIZE to ETHTOOL_A_MM_TX_MIN_FRAG_SIZE
      - introduced ETHTOOL_A_MM_RX_MIN_FRAG_SIZE
      - cleaned up documentation
      - rebased on top of PLCA changes
      - renamed ETHTOOL_STATS_SRC_* to ETHTOOL_MAC_STATS_SRC_*
      v2 at:
      https://patchwork.kernel.org/project/netdevbpf/cover/20230111161706.1465242-1-vladimir.oltean@nxp.com/
      
      v1->v2:
      I've decided to focus just on the MAC Merge layer for now, which is why
      I am able to submit this patch set as non-RFC.
      v1 (RFC) at:
      https://patchwork.kernel.org/project/netdevbpf/cover/20220816222920.1952936-1-vladimir.oltean@nxp.com/
      
      What is being introduced
      ------------------------
      
      TL;DR: a MAC Merge layer as defined by IEEE 802.3-2018, clause 99
      (interspersing of express traffic). This is controlled through ethtool
      netlink (ETHTOOL_MSG_MM_GET, ETHTOOL_MSG_MM_SET). The raw ethtool
      commands are posted here:
      https://patchwork.kernel.org/project/netdevbpf/cover/20230111153638.1454687-1-vladimir.oltean@nxp.com/
      
      The MAC Merge layer has its own statistics counters
      (ethtool --include-statistics --show-mm swp0) as well as two member
      MACs, the statistics of which can be queried individually, through a new
      ethtool netlink attribute, corresponding to:
      
      $ ethtool -I --show-pause eno2 --src aggregate
      $ ethtool -S eno2 --groups eth-mac eth-phy eth-ctrl rmon -- --src pmac
      
      The core properties of the MAC Merge layer are described in great detail
      in patches 02/12 and 03/12. They can be viewed in "make htmldocs" format.
      
      Devices for which the API is supported
      --------------------------------------
      
      I decided to start with the Ethernet switch on NXP LS1028A (Felix)
      because of the smaller patch set. I also have support for the ENETC
      controller pending.
      
      I would like to get confirmation that the UAPI being proposed here will
      not restrict any use cases known by other hardware vendors.
      
      Why is support for preemptible traffic classes not here?
      --------------------------------------------------------
      
      There is legitimate concern whether the 802.1Q portion of the standard
      (which traffic classes go to the eMAC and which to the pMAC) should be
      modeled in Linux using tc or using another UAPI. I think that is
      stalling the entire series, but should be discussed separately instead.
      Removing FP adminStatus support makes me confident enough to submit this
      patch set without an RFC tag (meaning: I wouldn't mind if it was merged
      as is).
      
      What is submitted here is sufficient for an LLDP daemon to do its job.
      I've patched openlldp to advertise and configure frame preemption:
      https://github.com/vladimiroltean/openlldp/tree/frame-preemption-v3
      
      In case someone wants to try it out, here are some commands I've used.
      
       # Configure the interfaces to receive and transmit LLDP Data Units
       lldptool -L -i eno0 adminStatus=rxtx
       lldptool -L -i swp0 adminStatus=rxtx
       # Enable the transmission of certain TLVs on switch's interface
       lldptool -T -i eno0 -V addEthCap enableTx=yes
       lldptool -T -i swp0 -V addEthCap enableTx=yes
       # Query LLDP statistics on switch's interface
       lldptool -S -i swp0
       # Query the received neighbor TLVs
       lldptool -i swp0 -t -n -V addEthCap
       Additional Ethernet Capabilities TLV
               Preemption capability supported
               Preemption capability enabled
               Preemption capability active
               Additional fragment size: 60 octets
      
      So using this patch set, lldpad will be able to advertise and configure
      frame preemption, but still, no data packet will be sent as preemptible
      over the link, because there is no UAPI to control which traffic classes
      are sent as preemptible and which as express.
      
      Preemptable or preemptible?
      ---------------------------
      
      IEEE 802.3 uses "preemptable" throughout. IEEE 802.1Q uses "preemptible"
      throughout. Because the definition of "preemptible" falls under 802.1Q's
      jurisdiction and 802.3 just references it, I went with the 802.1Q naming
      even where supporting an 802.3 feature. Also, checkpatch agrees with this.
      ====================
      
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      0ad999c1
    • Vladimir Oltean's avatar
      net: ethtool: netlink: introduce ethnl_update_bool() · 7c494a77
      Vladimir Oltean authored
      
      
      Due to the fact that the kernel-side data structures have been carried
      over from the ioctl-based ethtool, we are now in the situation where we
      have an ethnl_update_bool32() function, but the plain function that
      operates on a boolean value kept in an actual u8 netlink attribute
      doesn't exist.
      
      With new ethtool features that are exposed solely over netlink, the
      kernel data structures will use the "bool" type, so we will need this
      kind of helper. Introduce it now; it's needed for things like
      verify-disabled for the MAC merge configuration.
      
      Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      7c494a77
    • Wei Fang's avatar
      net: fec: Use page_pool_put_full_page when freeing rx buffers · e38553bd
      Wei Fang authored
      The page_pool_release_page was used when freeing rx buffers, and this
      function just unmaps the page (if mapped) and does not recycle the page.
      So after hundreds of down/up the eth0, the system will out of memory.
      For more details, please refer to the following reproduce steps and
      bug logs. To solve this issue and refer to the doc of page pool, the
      page_pool_put_full_page should be used to replace page_pool_release_page.
      Because this API will try to recycle the page if the page refcnt equal to
      1. After testing 20000 times, the issue can not be reproduced anymore
      (about testing 391 times the issue will occur on i.MX8MN-EVK before).
      
      Reproduce steps:
      Create the test script and run the script. The script content is as
      follows:
      LOOPS=20000
      i=1
      while [ $i -le $LOOPS ]
      do
          echo "TINFO:ENET $curface up and down test $i times"
          org_macaddr=$(cat /sys/class/net/eth0/address)
          ifconfig eth0 down
          ifconfig eth0  hw ether $org_macaddr up
          i=$(expr $i + 1)
      done
      sleep 5
      if cat /sys/class/net/eth0/operstate | grep 'up';then
          echo "TEST PASS"
      else
          echo "TEST FAIL"
      fi
      
      Bug detail logs:
      TINFO:ENET  up and down test 391 times
      [  850.471205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
      [  853.535318] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
      [  853.541694] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
      [  870.590531] page_pool_release_retry() stalled pool shutdown 199 inflight 60 sec
      [  931.006557] page_pool_release_retry() stalled pool shutdown 199 inflight 120 sec
      TINFO:ENET  up and down test 392 times
      [  991.426544] page_pool_release_retry() stalled pool shutdown 192 inflight 181 sec
      [ 1051.838531] page_pool_release_retry() stalled pool shutdown 170 inflight 241 sec
      [ 1093.751217] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
      [ 1096.446520] page_pool_release_retry() stalled pool shutdown 308 inflight 60 sec
      [ 1096.831245] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
      [ 1096.839092] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
      [ 1112.254526] page_pool_release_retry() stalled pool shutdown 103 inflight 302 sec
      [ 1156.862533] page_pool_release_retry() stalled pool shutdown 308 inflight 120 sec
      [ 1172.674516] page_pool_release_retry() stalled pool shutdown 103 inflight 362 sec
      [ 1217.278532] page_pool_release_retry() stalled pool shutdown 308 inflight 181 sec
      TINFO:ENET  up and down test 393 times
      [ 1233.086535] page_pool_release_retry() stalled pool shutdown 103 inflight 422 sec
      [ 1277.698513] page_pool_release_retry() stalled pool shutdown 308 inflight 241 sec
      [ 1293.502525] page_pool_release_retry() stalled pool shutdown 86 inflight 483 sec
      [ 1338.110518] page_pool_release_retry() stalled pool shutdown 308 inflight 302 sec
      [ 1353.918540] page_pool_release_retry() stalled pool shutdown 32 inflight 543 sec
      [ 1361.179205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)
      [ 1364.255298] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
      [ 1364.263189] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
      [ 1371.998532] page_pool_release_retry() stalled pool shutdown 310 inflight 60 sec
      [ 1398.530542] page_pool_release_retry() stalled pool shutdown 308 inflight 362 sec
      [ 1414.334539] page_pool_release_retry() stalled pool shutdown 16 inflight 604 sec
      [ 1432.414520] page_pool_release_retry() stalled pool shutdown 310 inflight 120 sec
      [ 1458.942523] page_pool_release_retry() stalled pool shutdown 308 inflight 422 sec
      [ 1474.750521] page_pool_release_retry() stalled pool shutdown 16 inflight 664 sec
      TINFO:ENET  up and down test 394 times
      [ 1492.830522] page_pool_release_retry() stalled pool shutdown 310 inflight 181 sec
      [ 1519.358519] page_pool_release_retry() stalled pool shutdown 308 inflight 483 sec
      [ 1535.166545] page_pool_release_retry() stalled pool shutdown 2 inflight 724 sec
      [ 1537.090278] eth_test2.sh invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0
      [ 1537.101192] CPU: 3 PID: 2379 Comm: eth_test2.sh Tainted: G         C         6.1.1+g56321e101aca #1
      [ 1537.110249] Hardware name: NXP i.MX8MNano EVK board (DT)
      [ 1537.115561] Call trace:
      [ 1537.118005]  dump_backtrace.part.0+0xe0/0xf0
      [ 1537.122289]  show_stack+0x18/0x40
      [ 1537.125608]  dump_stack_lvl+0x64/0x80
      [ 1537.129276]  dump_stack+0x18/0x34
      [ 1537.132592]  dump_header+0x44/0x208
      [ 1537.136083]  oom_kill_process+0x2b4/0x2c0
      [ 1537.140097]  out_of_memory+0xe4/0x594
      [ 1537.143766]  __alloc_pages+0xb68/0xd00
      [ 1537.147521]  alloc_pages+0xac/0x160
      [ 1537.151013]  __get_free_pages+0x14/0x40
      [ 1537.154851]  pgd_alloc+0x1c/0x30
      [ 1537.158082]  mm_init+0xf8/0x1d0
      [ 1537.161228]  mm_alloc+0x48/0x60
      [ 1537.164368]  alloc_bprm+0x7c/0x240
      [ 1537.167777]  do_execveat_common.isra.0+0x70/0x240
      [ 1537.172486]  __arm64_sys_execve+0x40/0x54
      [ 1537.176502]  invoke_syscall+0x48/0x114
      [ 1537.180255]  el0_svc_common.constprop.0+0xcc/0xec
      [ 1537.184964]  do_el0_svc+0x2c/0xd0
      [ 1537.188280]  el0_svc+0x2c/0x84
      [ 1537.191340]  el0t_64_sync_handler+0xf4/0x120
      [ 1537.195613]  el0t_64_sync+0x18c/0x190
      [ 1537.199334] Mem-Info:
      [ 1537.201620] active_anon:342 inactive_anon:10343 isolated_anon:0
      [ 1537.201620]  active_file:54 inactive_file:112 isolated_file:0
      [ 1537.201620]  unevictable:0 dirty:0 writeback:0
      [ 1537.201620]  slab_reclaimable:2620 slab_unreclaimable:7076
      [ 1537.201620]  mapped:1489 shmem:2473 pagetables:466
      [ 1537.201620]  sec_pagetables:0 bounce:0
      [ 1537.201620]  kernel_misc_reclaimable:0
      [ 1537.201620]  free:136672 free_pcp:96 free_cma:129241
      [ 1537.240419] Node 0 active_anon:1368kB inactive_anon:41372kB active_file:216kB inactive_file:5052kB unevictable:0kB isolated(anon):0kB isolated(file):0kB s
      [ 1537.271422] Node 0 DMA free:541636kB boost:0kB min:30000kB low:37500kB high:45000kB reserved_highatomic:0KB active_anon:1368kB inactive_anon:41372kB actiB
      [ 1537.300219] lowmem_reserve[]: 0 0 0 0
      [ 1537.303929] Node 0 DMA: 1015*4kB (UMEC) 743*8kB (UMEC) 417*16kB (UMEC) 235*32kB (UMEC) 116*64kB (UMEC) 25*128kB (UMEC) 4*256kB (UC) 2*512kB (UC) 0*1024kBB
      [ 1537.323938] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB
      [ 1537.332708] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB
      [ 1537.341292] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB
      [ 1537.349776] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB
      [ 1537.358087] 2939 total pagecache pages
      [ 1537.361876] 0 pages in swap cache
      [ 1537.365229] Free swap  = 0kB
      [ 1537.368147] Total swap = 0kB
      [ 1537.371065] 516096 pages RAM
      [ 1537.373959] 0 pages HighMem/MovableOnly
      [ 1537.377834] 17302 pages reserved
      [ 1537.381103] 163840 pages cma reserved
      [ 1537.384809] 0 pages hwpoisoned
      [ 1537.387902] Tasks state (memory values in pages):
      [ 1537.392652] [  pid  ]   uid  tgid total_vm      rss pgtables_bytes swapents oom_score_adj name
      [ 1537.401356] [    201]   993   201     1130       72    45056        0             0 rpcbind
      [ 1537.409772] [    202]     0   202     4529     1640    77824        0          -250 systemd-journal
      [ 1537.418861] [    222]     0   222     4691      801    69632        0         -1000 systemd-udevd
      [ 1537.427787] [    248]   994   248    20914      130    65536        0             0 systemd-timesyn
      [ 1537.436884] [    497]     0   497      620       31    49152        0             0 atd
      [ 1537.444938] [    500]     0   500      854       77    53248        0             0 crond
      [ 1537.453165] [    503]   997   503     1470      160    49152        0          -900 dbus-daemon
      [ 1537.461908] [    505]     0   505      633       24    40960        0             0 firmwared
      [ 1537.470491] [    513]     0   513     2507      180    61440        0             0 ofonod
      [ 1537.478800] [    514]   990   514    69640      137    81920        0             0 parsec
      [ 1537.487120] [    533]     0   533      599       39    40960        0             0 syslogd
      [ 1537.495518] [    534]     0   534     4546      148    65536        0             0 systemd-logind
      [ 1537.504560] [    535]     0   535      690       24    45056        0             0 tee-supplicant
      [ 1537.513564] [    540]   996   540     2769      168    61440        0             0 systemd-network
      [ 1537.522680] [    566]     0   566     3878      228    77824        0             0 connmand
      [ 1537.531168] [    645]   998   645     1538      133    57344        0             0 avahi-daemon
      [ 1537.540004] [    646]   998   646     1461       64    57344        0             0 avahi-daemon
      [ 1537.548846] [    648]   992   648      781       41    45056        0             0 rpc.statd
      [ 1537.557415] [    650] 64371   650      590       23    45056        0             0 ninfod
      [ 1537.565754] [    653] 61563   653      555       24    45056        0             0 rdisc
      [ 1537.573971] [    655]     0   655   374569     2999   290816        0          -999 containerd
      [ 1537.582621] [    658]     0   658     1311       20    49152        0             0 agetty
      [ 1537.590922] [    663]     0   663     1529       97    49152        0             0 login
      [ 1537.599138] [    666]     0   666     3430      202    69632        0             0 wpa_supplicant
      [ 1537.608147] [    667]     0   667     2344       96    61440        0             0 systemd-userdbd
      [ 1537.617240] [    677]     0   677     2964      314    65536        0           100 systemd
      [ 1537.625651] [    679]     0   679     3720      646    73728        0           100 (sd-pam)
      [ 1537.634138] [    687]     0   687     1289      403    45056        0             0 sh
      [ 1537.642108] [    789]     0   789      970       93    45056        0             0 eth_test2.sh
      [ 1537.650955] [   2355]     0  2355     2346       94    61440        0             0 systemd-userwor
      [ 1537.660046] [   2356]     0  2356     2346       94    61440        0             0 systemd-userwor
      [ 1537.669137] [   2358]     0  2358     2346       95    57344        0             0 systemd-userwor
      [ 1537.678258] [   2379]     0  2379      970       93    45056        0             0 eth_test2.sh
      [ 1537.687098] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/user.slice/user-0.slice/user@0.service,tas0
      [ 1537.703009] Out of memory: Killed process 679 ((sd-pam)) total-vm:14880kB, anon-rss:2584kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_ad0
      [ 1553.246526] page_pool_release_retry() stalled pool shutdown 310 inflight 241 sec
      
      Fixes: 95698ff6
      
       ("net: fec: using page pool to manage RX buffers")
      Signed-off-by: default avatarWei Fang <wei.fang@nxp.com>
      Reviewed-by: default avatarshenwei wang <Shenwei.wang@nxp.com>
      Reviewed-by: default avatarJesse Brandeburg <jesse.brandeburg@intel.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      e38553bd
  4. Jan 21, 2023
    • Paolo Abeni's avatar
      net: fix UaF in netns ops registration error path · 71ab9c3e
      Paolo Abeni authored
      If net_assign_generic() fails, the current error path in ops_init() tries
      to clear the gen pointer slot. Anyway, in such error path, the gen pointer
      itself has not been modified yet, and the existing and accessed one is
      smaller than the accessed index, causing an out-of-bounds error:
      
       BUG: KASAN: slab-out-of-bounds in ops_init+0x2de/0x320
       Write of size 8 at addr ffff888109124978 by task modprobe/1018
      
       CPU: 2 PID: 1018 Comm: modprobe Not tainted 6.2.0-rc2.mptcp_ae5ac65fbed5+ #1641
       Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014
       Call Trace:
        <TASK>
        dump_stack_lvl+0x6a/0x9f
        print_address_description.constprop.0+0x86/0x2b5
        print_report+0x11b/0x1fb
        kasan_report+0x87/0xc0
        ops_init+0x2de/0x320
        register_pernet_operations+0x2e4/0x750
        register_pernet_subsys+0x24/0x40
        tcf_register_action+0x9f/0x560
        do_one_initcall+0xf9/0x570
        do_init_module+0x190/0x650
        load_module+0x1fa5/0x23c0
        __do_sys_finit_module+0x10d/0x1b0
        do_syscall_64+0x58/0x80
        entry_SYSCALL_64_after_hwframe+0x72/0xdc
       RIP: 0033:0x7f42518f778d
       Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48
             89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
             ff 73 01 c3 48 8b 0d cb 56 2c 00 f7 d8 64 89 01 48
       RSP: 002b:00007fff96869688 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
       RAX: ffffffffffffffda RBX: 00005568ef7f7c90 RCX: 00007f42518f778d
       RDX: 0000000000000000 RSI: 00005568ef41d796 RDI: 0000000000000003
       RBP: 00005568ef41d796 R08: 0000000000000000 R09: 0000000000000000
       R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000000
       R13: 00005568ef7f7d30 R14: 0000000000040000 R15: 0000000000000000
        </TASK>
      
      This change addresses the issue by skipping the gen pointer
      de-reference in the mentioned error-path.
      
      Found by code inspection and verified with explicit error injection
      on a kasan-enabled kernel.
      
      Fixes: d266935a
      
       ("net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed")
      Signed-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      Reviewed-by: default avatarSimon Horman <simon.horman@corigine.com>
      Link: https://lore.kernel.org/r/cec4e0f3bb2c77ac03a6154a8508d3930beb5f0f.1674154348.git.pabeni@redhat.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      71ab9c3e
    • Yoshihiro Shimoda's avatar
      net: ethernet: renesas: rswitch: Fix ethernet-ports handling · fd941bd6
      Yoshihiro Shimoda authored
      If one of ports in the ethernet-ports was disabled, this driver
      failed to probe all ports. So, fix it.
      
      Fixes: 3590918b
      
       ("net: ethernet: renesas: Add support for "Ethernet Switch"")
      Signed-off-by: default avatarYoshihiro Shimoda <yoshihiro.shimoda.uh@renesas.com>
      Reviewed-by: default avatarJiri Pirko <jiri@nvidia.com>
      Reviewed-by: default avatarJacob Keller <jacob.e.keller@intel.com>
      Link: https://lore.kernel.org/r/20230120001959.1059850-1-yoshihiro.shimoda.uh@renesas.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      fd941bd6
    • Haiyang Zhang's avatar
      net: mana: Fix IRQ name - add PCI and queue number · 20e3028c
      Haiyang Zhang authored
      The PCI and queue number info is missing in IRQ names.
      
      Add PCI and queue number to IRQ names, to allow CPU affinity
      tuning scripts to work.
      
      Cc: stable@vger.kernel.org
      Fixes: ca9c54d2
      
       ("net: mana: Add a driver for Microsoft Azure Network Adapter (MANA)")
      Signed-off-by: default avatarHaiyang Zhang <haiyangz@microsoft.com>
      Reviewed-by: default avatarJesse Brandeburg <jesse.brandeburg@intel.com>
      Link: https://lore.kernel.org/r/1674161950-19708-1-git-send-email-haiyangz@microsoft.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      20e3028c
    • Eric Dumazet's avatar
      netlink: prevent potential spectre v1 gadgets · f0950402
      Eric Dumazet authored
      Most netlink attributes are parsed and validated from
      __nla_validate_parse() or validate_nla()
      
          u16 type = nla_type(nla);
      
          if (type == 0 || type > maxtype) {
              /* error or continue */
          }
      
      @type is then used as an array index and can be used
      as a Spectre v1 gadget.
      
      array_index_nospec() can be used to prevent leaking
      content of kernel memory to malicious users.
      
      This should take care of vast majority of netlink uses,
      but an audit is needed to take care of others where
      validation is not yet centralized in core netlink functions.
      
      Fixes: bfa83a9e
      
       ("[NETLINK]: Type-safe netlink messages/attributes interface")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Link: https://lore.kernel.org/r/20230119110150.2678537-1-edumazet@google.com
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      f0950402
    • Linus Torvalds's avatar
      Merge tag 'net-6.2-rc5-2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net · 5deaa985
      Linus Torvalds authored
      Pull networking fixes from Jakub Kicinski:
       "Including fixes from wireless, bluetooth, bpf and netfilter.
      
        Current release - regressions:
      
         - Revert "net: team: use IFF_NO_ADDRCONF flag to prevent ipv6
           addrconf", fix nsna_ping mode of team
      
         - wifi: mt76: fix bugs in Rx queue handling and DMA mapping
      
         - eth: mlx5:
            - add missing mutex_unlock in error reporter
            - protect global IPsec ASO with a lock
      
        Current release - new code bugs:
      
         - rxrpc: fix wrong error return in rxrpc_connect_call()
      
        Previous releases - regressions:
      
         - bluetooth: hci_sync: fix use of HCI_OP_LE_READ_BUFFER_SIZE_V2
      
         - wifi:
            - mac80211: fix crashes on Rx due to incorrect initialization of
              rx->link and rx->link_sta
            - mac80211: fix bugs in iTXQ conversion - Tx stalls, incorrect
              aggregation handling, crashes
            - brcmfmac: fix regression for Broadcom PCIe wifi devices
            - rndis_wlan: prevent buffer overflow in rndis_query_oid
      
         - netfilter: conntrack: handle tcp challenge acks during connection
           reuse
      
         - sched: avoid grafting on htb_destroy_class_offload when destroying
      
         - virtio-net: correctly enable callback during start_xmit, fix stalls
      
         - tcp: avoid the lookup process failing to get sk in ehash table
      
         - ipa: disable ipa interrupt during suspend
      
         - eth: stmmac: enable all safety features by default
      
        Previous releases - always broken:
      
         - bpf:
            - fix pointer-leak due to insufficient speculative store bypass
              mitigation (Spectre v4)
            - skip task with pid=1 in send_signal_common() to avoid a splat
            - fix BPF program ID information in BPF_AUDIT_UNLOAD as well as
              PERF_BPF_EVENT_PROG_UNLOAD events
            - fix potential deadlock in htab_lock_bucket from same bucket
              index but different map_locked index
      
         - bluetooth:
            - fix a buffer overflow in mgmt_mesh_add()
            - hci_qca: fix driver shutdown on closed serdev
            - ISO: fix possible circular locking dependency
            - CIS: hci_event: fix invalid wait context
      
         - wifi: brcmfmac: fixes for survey dump handling
      
         - mptcp: explicitly specify sock family at subflow creation time
      
         - netfilter: nft_payload: incorrect arithmetics when fetching VLAN
           header bits
      
         - tcp: fix rate_app_limited to default to 1
      
         - l2tp: close all race conditions in l2tp_tunnel_register()
      
         - eth: mlx5: fixes for QoS config and eswitch configuration
      
         - eth: enetc: avoid deadlock in enetc_tx_onestep_tstamp()
      
         - eth: stmmac: fix invalid call to mdiobus_get_phy()
      
        Misc:
      
         - ethtool: add netlink attr in rss get reply only if the value is not
           empty"
      
      * tag 'net-6.2-rc5-2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (88 commits)
        Revert "Merge branch 'octeontx2-af-CPT'"
        tcp: fix rate_app_limited to default to 1
        bnxt: Do not read past the end of test names
        net: stmmac: enable all safety features by default
        octeontx2-af: add mbox to return CPT_AF_FLT_INT info
        octeontx2-af: update cpt lf alloc mailbox
        octeontx2-af: restore rxc conf after teardown sequence
        octeontx2-af: optimize cpt pf identification
        octeontx2-af: modify FLR sequence for CPT
        octeontx2-af: add mbox for CPT LF reset
        octeontx2-af: recover CPT engine when it gets fault
        net: dsa: microchip: ksz9477: port map correction in ALU table entry register
        selftests/net: toeplitz: fix race on tpacket_v3 block close
        net/ulp: use consistent error code when blocking ULP
        octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt
        tcp: avoid the lookup process failing to get sk in ehash table
        Revert "net: team: use IFF_NO_ADDRCONF flag to prevent ipv6 addrconf"
        MAINTAINERS: add networking entries for Willem
        net: sched: gred: prevent races when adding offloads to stats
        l2tp: prevent lockdep issue in l2tp_tunnel_register()
        ...
      5deaa985
    • Stefan Assmann's avatar
      iavf: schedule watchdog immediately when changing primary MAC · e2b53ea5
      Stefan Assmann authored
      iavf_replace_primary_mac() utilizes queue_work() to schedule the
      watchdog task but that only ensures that the watchdog task is queued
      to run. To make sure the watchdog is executed asap use
      mod_delayed_work().
      
      Without this patch it may take up to 2s until the watchdog task gets
      executed, which may cause long delays when setting the MAC address.
      
      Fixes: a3e839d5
      
       ("iavf: Add usage of new virtchnl format to set default MAC")
      Signed-off-by: default avatarStefan Assmann <sassmann@kpanic.de>
      Reviewed-by: default avatarMichal Schmidt <mschmidt@redhat.com>
      Tested-by: default avatarMichal Schmidt <mschmidt@redhat.com>
      Tested-by: default avatarRafal Romanowski <rafal.romanowski@intel.com>
      Signed-off-by: default avatarTony Nguyen <anthony.l.nguyen@intel.com>
      e2b53ea5
    • Marcin Szycik's avatar
      iavf: Move netdev_update_features() into watchdog task · 7598f4b4
      Marcin Szycik authored
      
      
      Remove netdev_update_features() from iavf_adminq_task(), as it can cause
      deadlocks due to needing rtnl_lock. Instead use the
      IAVF_FLAG_SETUP_NETDEV_FEATURES flag to indicate that netdev features need
      to be updated in the watchdog task. iavf_set_vlan_offload_features()
      and iavf_set_queue_vlan_tag_loc() can be called directly from
      iavf_virtchnl_completion().
      
      Suggested-by: default avatarPhani Burra <phani.r.burra@intel.com>
      Signed-off-by: default avatarMarcin Szycik <marcin.szycik@linux.intel.com>
      Reviewed-by: default avatarAlexander Lobakin <alexandr.lobakin@intel.com>
      Tested-by: default avatarMarek Szlosek <marek.szlosek@intel.com>
      Signed-off-by: default avatarTony Nguyen <anthony.l.nguyen@intel.com>
      7598f4b4
    • Michal Schmidt's avatar
      iavf: fix temporary deadlock and failure to set MAC address · 4411a608
      Michal Schmidt authored
      We are seeing an issue where setting the MAC address on iavf fails with
      EAGAIN after the 2.5s timeout expires in iavf_set_mac().
      
      There is the following deadlock scenario:
      
      iavf_set_mac(), holding rtnl_lock, waits on:
        iavf_watchdog_task (within iavf_wq) to send a message to the PF,
       and
        iavf_adminq_task (within iavf_wq) to receive a response from the PF.
      In this adapter state (>=__IAVF_DOWN), these tasks do not need to take
      rtnl_lock, but iavf_wq is a global single-threaded workqueue, so they
      may get stuck waiting for another adapter's iavf_watchdog_task to run
      iavf_init_config_adapter(), which does take rtnl_lock.
      
      The deadlock resolves itself by the timeout in iavf_set_mac(),
      which results in EAGAIN returned to userspace.
      
      Let's break the deadlock loop by changing iavf_wq into a per-adapter
      workqueue, so that one adapter's tasks are not blocked by another's.
      
      Fixes: 35a2443d
      
       ("iavf: Add waiting for response from PF in set mac")
      Co-developed-by: default avatarIvan Vecera <ivecera@redhat.com>
      Signed-off-by: default avatarIvan Vecera <ivecera@redhat.com>
      Signed-off-by: default avatarMichal Schmidt <mschmidt@redhat.com>
      Tested-by: default avatarRafal Romanowski <rafal.romanowski@intel.com>
      Signed-off-by: default avatarTony Nguyen <anthony.l.nguyen@intel.com>
      4411a608
    • Jakub Kicinski's avatar
      Revert "Merge branch 'octeontx2-af-CPT'" · 45a919bb
      Jakub Kicinski authored
      This reverts commit b4fbf0b2, reversing
      changes made to 6c977c5c
      
      .
      
      This seems like net-next material.
      
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      45a919bb
  5. Jan 20, 2023
    • David Morley's avatar
      tcp: fix rate_app_limited to default to 1 · 300b655d
      David Morley authored
      The initial default value of 0 for tp->rate_app_limited was incorrect,
      since a flow is indeed application-limited until it first sends
      data. Fixing the default to be 1 is generally correct but also
      specifically will help user-space applications avoid using the initial
      tcpi_delivery_rate value of 0 that persists until the connection has
      some non-zero bandwidth sample.
      
      Fixes: eb8329e0
      
       ("tcp: export data delivery rate")
      Suggested-by: default avatarYuchung Cheng <ycheng@google.com>
      Signed-off-by: default avatarDavid Morley <morleyd@google.com>
      Signed-off-by: default avatarNeal Cardwell <ncardwell@google.com>
      Tested-by: default avatarDavid Morley <morleyd@google.com>
      Reviewed-by: default avatarEric Dumazet <edumazet@google.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      300b655d
    • Kees Cook's avatar
      bnxt: Do not read past the end of test names · d3e599c0
      Kees Cook authored
      
      
      Test names were being concatenated based on a offset beyond the end of
      the first name, which tripped the buffer overflow detection logic:
      
       detected buffer overflow in strnlen
       [...]
       Call Trace:
       bnxt_ethtool_init.cold+0x18/0x18
      
      Refactor struct hwrm_selftest_qlist_output to use an actual array,
      and adjust the concatenation to use snprintf() rather than a series of
      strncat() calls.
      
      Reported-by: default avatarNiklas Cassel <Niklas.Cassel@wdc.com>
      Link: https://lore.kernel.org/lkml/Y8F%2F1w1AZTvLglFX@x1-carbon/
      Tested-by: default avatarNiklas Cassel <Niklas.Cassel@wdc.com>
      Fixes: eb513658
      
       ("bnxt_en: Add basic ethtool -t selftest support.")
      Cc: Michael Chan <michael.chan@broadcom.com>
      Cc: "David S. Miller" <davem@davemloft.net>
      Cc: Eric Dumazet <edumazet@google.com>
      Cc: Jakub Kicinski <kuba@kernel.org>
      Cc: Paolo Abeni <pabeni@redhat.com>
      Cc: netdev@vger.kernel.org
      Signed-off-by: default avatarKees Cook <keescook@chromium.org>
      Reviewed-by: default avatarMichael Chan <michael.chan@broadcom.com>
      Reviewed-by: default avatarNiklas Cassel <niklas.cassel@wdc.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      d3e599c0
    • Andrew Halaney's avatar
      net: stmmac: enable all safety features by default · fdfc76a1
      Andrew Halaney authored
      In the original implementation of dwmac5
      commit 8bf993a5 ("net: stmmac: Add support for DWMAC5 and implement Safety Features")
      all safety features were enabled by default.
      
      Later it seems some implementations didn't have support for all the
      features, so in
      commit 5ac712dc ("net: stmmac: enable platform specific safety features")
      the safety_feat_cfg structure was added to the callback and defined for
      some platforms to selectively enable these safety features.
      
      The problem is that only certain platforms were given that software
      support. If the automotive safety package bit is set in the hardware
      features register the safety feature callback is called for the platform,
      and for platforms that didn't get a safety_feat_cfg defined this results
      in the following NULL pointer dereference:
      
      [    7.933303] Call trace:
      [    7.935812]  dwmac5_safety_feat_config+0x20/0x170 [stmmac]
      [    7.941455]  __stmmac_open+0x16c/0x474 [stmmac]
      [    7.946117]  stmmac_open+0x38/0x70 [stmmac]
      [    7.950414]  __dev_open+0x100/0x1dc
      [    7.954006]  __dev_change_flags+0x18c/0x204
      [    7.958297]  dev_change_flags+0x24/0x6c
      [    7.962237]  do_setlink+0x2b8/0xfa4
      [    7.965827]  __rtnl_newlink+0x4ec/0x840
      [    7.969766]  rtnl_newlink+0x50/0x80
      [    7.973353]  rtnetlink_rcv_msg+0x12c/0x374
      [    7.977557]  netlink_rcv_skb+0x5c/0x130
      [    7.981500]  rtnetlink_rcv+0x18/0x2c
      [    7.985172]  netlink_unicast+0x2e8/0x340
      [    7.989197]  netlink_sendmsg+0x1a8/0x420
      [    7.993222]  ____sys_sendmsg+0x218/0x280
      [    7.997249]  ___sys_sendmsg+0xac/0x100
      [    8.001103]  __sys_sendmsg+0x84/0xe0
      [    8.004776]  __arm64_sys_sendmsg+0x24/0x30
      [    8.008983]  invoke_syscall+0x48/0x114
      [    8.012840]  el0_svc_common.constprop.0+0xcc/0xec
      [    8.017665]  do_el0_svc+0x38/0xb0
      [    8.021071]  el0_svc+0x2c/0x84
      [    8.024212]  el0t_64_sync_handler+0xf4/0x120
      [    8.028598]  el0t_64_sync+0x190/0x194
      
      Go back to the original behavior, if the automotive safety package
      is found to be supported in hardware enable all the features unless
      safety_feat_cfg is passed in saying this particular platform only
      supports a subset of the features.
      
      Fixes: 5ac712dc
      
       ("net: stmmac: enable platform specific safety features")
      Reported-by: default avatarNing Cai <ncai@quicinc.com>
      Signed-off-by: default avatarAndrew Halaney <ahalaney@redhat.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      fdfc76a1
    • David S. Miller's avatar
      Merge branch 'octeontx2-af-CPT' · b4fbf0b2
      David S. Miller authored
      
      
      Srujana Challa says:
      
      ====================
      octeontx2-af: Miscellaneous changes for CPT
      
      This patchset consists of miscellaneous changes for CPT.
      - Adds a new mailbox to reset the requested CPT LF.
      - Modify FLR sequence as per HW team suggested.
      - Adds support to recover CPT engines when they gets fault.
      - Updates CPT inbound inline IPsec configuration mailbox,
        as per new generation of the OcteonTX2 chips.
      - Adds a new mailbox to return CPT FLT Interrupt info.
      
      ---
      v2:
      - Addressed a review comment.
      v1:
      - Dropped patch "octeontx2-af: Fix interrupt name strings completely"
        to submit to net.
      ---
      ====================
      
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b4fbf0b2
    • Srujana Challa's avatar
      octeontx2-af: add mbox to return CPT_AF_FLT_INT info · 8299ffe3
      Srujana Challa authored
      
      
      CPT HW would trigger the CPT AF FLT interrupt when CPT engines
      hits some uncorrectable errors and AF is the one which receives
      the interrupt and recovers the engines.
      This patch adds a mailbox for CPT VFs to request for CPT faulted
      and recovered engines info.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      8299ffe3
    • Srujana Challa's avatar
      octeontx2-af: update cpt lf alloc mailbox · c0688ec0
      Srujana Challa authored
      
      
      The CN10K CPT coprocessor contains a context processor
      to accelerate updates to the IPsec security association
      contexts. The context processor contains a context cache.
      This patch updates CPT LF ALLOC mailbox to config ctx_ilen
      requested by VFs. CPT_LF_ALLOC:ctx_ilen is the size of
      initial context fetch.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      c0688ec0
    • Nithin Dabilpuram's avatar
      octeontx2-af: restore rxc conf after teardown sequence · d5b2e0a2
      Nithin Dabilpuram authored
      
      
      CN10K CPT coprocessor includes a component named RXC which
      is responsible for reassembly of inner IP packets. RXC has
      the feature to evict oldest entries based on age/threshold.
      The age/threshold is being set to minimum values to evict
      all entries at the time of teardown.
      This patch adds code to restore timeout and threshold config
      after teardown sequence is complete as it is global config.
      
      Signed-off-by: default avatarNithin Dabilpuram <ndabilpuram@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      d5b2e0a2
    • Srujana Challa's avatar
      octeontx2-af: optimize cpt pf identification · 9adb04ff
      Srujana Challa authored
      
      
      Optimize CPT PF identification in mbox handling for faster
      mbox response by doing it at AF driver probe instead of
      every mbox message.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      9adb04ff
    • Srujana Challa's avatar
      octeontx2-af: modify FLR sequence for CPT · 1286c50a
      Srujana Challa authored
      
      
      On OcteonTX2 platform CPT instruction enqueue is only
      possible via LMTST operations.
      The existing FLR sequence mentioned in HRM requires
      a dummy LMTST to CPT but LMTST can't be submitted from
      AF driver. So, HW team provided a new sequence to avoid
      dummy LMTST. This patch adds code for the same.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      1286c50a
    • Srujana Challa's avatar
      octeontx2-af: add mbox for CPT LF reset · f58cf765
      Srujana Challa authored
      
      
      On OcteonTX2 SoC, the admin function (AF) is the only one with all
      priviliges to configure HW and alloc resources, PFs and it's VFs
      have to request AF via mailbox for all their needs.
      This patch adds a new mailbox for CPT VFs to request for CPT LF
      reset.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      f58cf765
    • Srujana Challa's avatar
      octeontx2-af: recover CPT engine when it gets fault · 07ea567d
      Srujana Challa authored
      
      
      When CPT engine has uncorrectable errors, it will get halted and
      must be disabled and re-enabled. This patch adds code for the same.
      
      Signed-off-by: default avatarSrujana Challa <schalla@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      07ea567d
    • Linus Torvalds's avatar
      Merge tag 'perf-tools-fixes-for-v6.2-3-2023-01-19' of... · 4a0c7a68
      Linus Torvalds authored
      Merge tag 'perf-tools-fixes-for-v6.2-3-2023-01-19' of git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux
      
      Pull perf tools fixes from Arnaldo Carvalho de Melo:
      
       - Prevent reading into undefined memory in the expression lexer,
         accounting for a trailer backslash followed by the null byte.
      
       - Fix file mode when copying files to the build id cache, the problem
         happens when the cache directory is in a different file system than
         the file being cached, otherwise the mode was preserved as only a
         hard link would be done to save space.
      
       - Fix a related build-id 'perf test' entry that checked that permission
         when caching PE (Portable Executable) files, used when profiling
         Windows executables under wine.
      
       - Sync the tools/ copies of kvm headers, build_bug.h, socket.h and
         arm64's cputype.h with the kernel sources.
      
      * tag 'perf-tools-fixes-for-v6.2-3-2023-01-19' of git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux:
        perf test build-id: Fix test check for PE file
        perf buildid-cache: Fix the file mode with copyfile() while adding file to build-id cache
        perf expr: Prevent normalize() from reading into undefined memory in the expression lexer
        tools headers: Syncronize linux/build_bug.h with the kernel sources
        perf beauty: Update copy of linux/socket.h with the kernel sources
        tools headers arm64: Sync arm64's cputype.h with the kernel sources
        tools kvm headers arm64: Update KVM header from the kernel sources
        tools headers UAPI: Sync x86's asm/kvm.h with the kernel sources
        tools headers UAPI: Sync linux/kvm.h with the kernel sources
      4a0c7a68