1. 13 2月, 2023 3 次提交
  2. 11 2月, 2023 8 次提交
  3. 10 2月, 2023 13 次提交
    • R
      vmxnet3: move rss code block under eop descriptor · ec76d0c2
      Ronak Doshi 提交于
      Commit b3973bb4 ("vmxnet3: set correct hash type based on
      rss information") added hashType information into skb. However,
      rssType field is populated for eop descriptor. This can lead
      to incorrectly reporting of hashType for packets which use
      multiple rx descriptors. Multiple rx descriptors are used
      for Jumbo frame or LRO packets, which can hit this issue.
      
      This patch moves the RSS codeblock under eop descritor.
      
      Cc: stable@vger.kernel.org
      Fixes: b3973bb4 ("vmxnet3: set correct hash type based on rss information")
      Signed-off-by: NRonak Doshi <doshir@vmware.com>
      Acked-by: NPeng Li <lpeng@vmware.com>
      Acked-by: NGuolin Yang <gyang@vmware.com>
      Link: https://lore.kernel.org/r/20230208223900.5794-1-doshir@vmware.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      ec76d0c2
    • E
      net: initialize net->notrefcnt_tracker earlier · 6e77a5a4
      Eric Dumazet 提交于
      syzbot was able to trigger a warning [1] from net_free()
      calling ref_tracker_dir_exit(&net->notrefcnt_tracker)
      while the corresponding ref_tracker_dir_init() has not been
      done yet.
      
      copy_net_ns() can indeed bypass the call to setup_net()
      in some error conditions.
      
      Note:
      
      We might factorize/move more code in preinit_net() in the future.
      
      [1]
      INFO: trying to register non-static key.
      The code is fine but needs lockdep annotation, or maybe
      you didn't initialize this object before use?
      turning off the locking correctness validator.
      CPU: 0 PID: 5817 Comm: syz-executor.3 Not tainted 6.2.0-rc7-next-20230208-syzkaller #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023
      Call Trace:
      <TASK>
      __dump_stack lib/dump_stack.c:88 [inline]
      dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
      assign_lock_key kernel/locking/lockdep.c:982 [inline]
      register_lock_class+0xdb6/0x1120 kernel/locking/lockdep.c:1295
      __lock_acquire+0x10a/0x5df0 kernel/locking/lockdep.c:4951
      lock_acquire.part.0+0x11c/0x370 kernel/locking/lockdep.c:5691
      __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
      _raw_spin_lock_irqsave+0x3d/0x60 kernel/locking/spinlock.c:162
      ref_tracker_dir_exit+0x52/0x600 lib/ref_tracker.c:24
      net_free net/core/net_namespace.c:442 [inline]
      net_free+0x98/0xd0 net/core/net_namespace.c:436
      copy_net_ns+0x4f3/0x6b0 net/core/net_namespace.c:493
      create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
      unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:228
      ksys_unshare+0x449/0x920 kernel/fork.c:3205
      __do_sys_unshare kernel/fork.c:3276 [inline]
      __se_sys_unshare kernel/fork.c:3274 [inline]
      __x64_sys_unshare+0x31/0x40 kernel/fork.c:3274
      do_syscall_x64 arch/x86/entry/common.c:50 [inline]
      do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
      
      Fixes: 0cafd77d ("net: add a refcount tracker for kernel sockets")
      Reported-by: Nsyzbot <syzkaller@googlegroups.com>
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Link: https://lore.kernel.org/r/20230208182123.3821604-1-edumazet@google.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      6e77a5a4
    • J
      Merge branch 'ipv6-fix-socket-connection-with-dscp-fib-rules' · e8ac615f
      Jakub Kicinski 提交于
      Guillaume Nault says:
      
      ====================
      ipv6: Fix socket connection with DSCP fib-rules.
      
      The "flowlabel" field of struct flowi6 is used to store both the actual
      flow label and the DS Field (or Traffic Class). However the .connect
      handlers of datagram and TCP sockets don't set the DS Field part when
      doing their route lookup. This breaks fib-rules that match on DSCP.
      ====================
      
      Link: https://lore.kernel.org/r/cover.1675875519.git.gnault@redhat.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      e8ac615f
    • G
      selftests: fib_rule_tests: Test UDP and TCP connections with DSCP rules. · c21a20d9
      Guillaume Nault 提交于
      Add the fib_rule6_send and fib_rule4_send tests to verify that DSCP
      values are properly taken into account when UDP or TCP sockets try to
      connect().
      
      Tests are done with nettest, which needs a new option to specify
      the DS Field value of the socket being tested. This new option is
      named '-Q', in reference to the similar option used by ping.
      Signed-off-by: NGuillaume Nault <gnault@redhat.com>
      Reviewed-by: NDavid Ahern <dsahern@kernel.org>
      Signed-off-by: NJakub Kicinski <kuba@kernel.org>
      c21a20d9
    • G
      ipv6: Fix tcp socket connection with DSCP. · 8230680f
      Guillaume Nault 提交于
      Take into account the IPV6_TCLASS socket option (DSCP) in
      tcp_v6_connect(). Otherwise fib6_rule_match() can't properly
      match the DSCP value, resulting in invalid route lookup.
      
      For example:
      
        ip route add unreachable table main 2001:db8::10/124
      
        ip route add table 100 2001:db8::10/124 dev eth0
        ip -6 rule add dsfield 0x04 table 100
      
        echo test | socat - TCP6:[2001:db8::11]:54321,ipv6-tclass=0x04
      
      Without this patch, socat fails at connect() time ("No route to host")
      because the fib-rule doesn't jump to table 100 and the lookup ends up
      being done in the main table.
      
      Fixes: 2cc67cc7 ("[IPV6] ROUTE: Routing by Traffic Class.")
      Signed-off-by: NGuillaume Nault <gnault@redhat.com>
      Reviewed-by: NEric Dumazet <edumazet@google.com>
      Reviewed-by: NDavid Ahern <dsahern@kernel.org>
      Signed-off-by: NJakub Kicinski <kuba@kernel.org>
      8230680f
    • G
      ipv6: Fix datagram socket connection with DSCP. · e010ae08
      Guillaume Nault 提交于
      Take into account the IPV6_TCLASS socket option (DSCP) in
      ip6_datagram_flow_key_init(). Otherwise fib6_rule_match() can't
      properly match the DSCP value, resulting in invalid route lookup.
      
      For example:
      
        ip route add unreachable table main 2001:db8::10/124
      
        ip route add table 100 2001:db8::10/124 dev eth0
        ip -6 rule add dsfield 0x04 table 100
      
        echo test | socat - UDP6:[2001:db8::11]:54321,ipv6-tclass=0x04
      
      Without this patch, socat fails at connect() time ("No route to host")
      because the fib-rule doesn't jump to table 100 and the lookup ends up
      being done in the main table.
      
      Fixes: 2cc67cc7 ("[IPV6] ROUTE: Routing by Traffic Class.")
      Signed-off-by: NGuillaume Nault <gnault@redhat.com>
      Reviewed-by: NEric Dumazet <edumazet@google.com>
      Reviewed-by: NDavid Ahern <dsahern@kernel.org>
      Signed-off-by: NJakub Kicinski <kuba@kernel.org>
      e010ae08
    • J
      Merge branch 'nfp-fix-schedule-in-atomic-context-when-offloading-sa' · 6e16e67a
      Jakub Kicinski 提交于
      Simon Horman says:
      
      ====================
      nfp: fix schedule in atomic context when offloading sa
      
      Yinjun Zhang says:
      
      IPsec offloading callbacks may be called in atomic context, sleep is
      not allowed in the implementation. Now use workqueue mechanism to
      avoid this issue.
      
      Extend existing workqueue mechanism for multicast configuration only
      to universal use, so that all configuring through mailbox asynchoronously
      can utilize it.
      
      Also fix another two incorrect use of mailbox in IPsec:
       1. Need lock for race condition when accessing mbox
       2. Offset of mbox access should depends on tlv caps
      ====================
      
      Link: https://lore.kernel.org/r/20230208102258.29639-1-simon.horman@corigine.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      6e16e67a
    • Y
      nfp: fix schedule in atomic context when offloading sa · 71f814cd
      Yinjun Zhang 提交于
      IPsec offloading callbacks may be called in atomic context, sleep is
      not allowed in the implementation. Now use workqueue mechanism to
      avoid this issue.
      
      Extend existing workqueue mechanism for multicast configuration only
      to universal use, so that all configuring through mailbox asynchronously
      can utilize it.
      
      Fixes: 859a497f ("nfp: implement xfrm callbacks and expose ipsec offload feature to upper layer")
      Signed-off-by: NYinjun Zhang <yinjun.zhang@corigine.com>
      Signed-off-by: NSimon Horman <simon.horman@corigine.com>
      Signed-off-by: NJakub Kicinski <kuba@kernel.org>
      71f814cd
    • Y
      nfp: fix incorrect use of mbox in IPsec code · 7a13a2ee
      Yinjun Zhang 提交于
      The mailbox configuration mechanism requires writing several registers,
      which shouldn't be interrupted, so need lock to avoid race condition.
      
      The base offset of mailbox configuration registers is not fixed, it
      depends on TLV caps read from application firmware.
      
      Fixes: 859a497f ("nfp: implement xfrm callbacks and expose ipsec offload feature to upper layer")
      Signed-off-by: NYinjun Zhang <yinjun.zhang@corigine.com>
      Signed-off-by: NSimon Horman <simon.horman@corigine.com>
      Signed-off-by: NJakub Kicinski <kuba@kernel.org>
      7a13a2ee
    • R
      net: bgmac: fix BCM5358 support by setting correct flags · d61615c3
      Rafał Miłecki 提交于
      Code blocks handling BCMA_CHIP_ID_BCM5357 and BCMA_CHIP_ID_BCM53572 were
      incorrectly unified. Chip package values are not unique and cannot be
      checked independently. They are meaningful only in a context of a given
      chip.
      
      Packages BCM5358 and BCM47188 share the same value but then belong to
      different chips. Code unification resulted in treating BCM5358 as
      BCM47188 and broke its initialization.
      
      Link: https://github.com/openwrt/openwrt/issues/8278
      Fixes: cb1b0f90 ("net: ethernet: bgmac: unify code of the same family")
      Cc: Jon Mason <jdmason@kudzu.us>
      Signed-off-by: NRafał Miłecki <rafal@milecki.pl>
      Reviewed-by: NFlorian Fainelli <f.fainelli@gmail.com>
      Link: https://lore.kernel.org/r/20230208091637.16291-1-zajec5@gmail.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      d61615c3
    • L
      Merge tag 'net-6.2-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net · 35674e78
      Linus Torvalds 提交于
      Pull networking fixes from Paolo Abeni:
       "Including fixes from can and ipsec subtrees.
      
        Current release - regressions:
      
         - sched: fix off by one in htb_activate_prios()
      
         - eth: mana: fix accessing freed irq affinity_hint
      
         - eth: ice: fix out-of-bounds KASAN warning in virtchnl
      
        Current release - new code bugs:
      
         - eth: mtk_eth_soc: enable special tag when any MAC uses DSA
      
        Previous releases - always broken:
      
         - core: fix sk->sk_txrehash default
      
         - neigh: make sure used and confirmed times are valid
      
         - mptcp: be careful on subflow status propagation on errors
      
         - xfrm: prevent potential spectre v1 gadget in xfrm_xlate32_attr()
      
         - phylink: move phy_device_free() to correctly release phy device
      
         - eth: mlx5:
            - fix crash unsetting rx-vlan-filter in switchdev mode
            - fix hang on firmware reset
            - serialize module cleanup with reload and remove"
      
      * tag 'net-6.2-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (57 commits)
        selftests: forwarding: lib: quote the sysctl values
        net: mscc: ocelot: fix all IPv6 getting trapped to CPU when PTP timestamping is used
        rds: rds_rm_zerocopy_callback() use list_first_entry()
        net: txgbe: Update support email address
        selftests: Fix failing VXLAN VNI filtering test
        selftests: mptcp: stop tests earlier
        selftests: mptcp: allow more slack for slow test-case
        mptcp: be careful on subflow status propagation on errors
        mptcp: fix locking for in-kernel listener creation
        mptcp: fix locking for setsockopt corner-case
        mptcp: do not wait for bare sockets' timeout
        net: ethernet: mtk_eth_soc: fix DSA TX tag hwaccel for switch port 0
        nfp: ethtool: fix the bug of setting unsupported port speed
        txhash: fix sk->sk_txrehash default
        net: ethernet: mtk_eth_soc: fix wrong parameters order in __xdp_rxq_info_reg()
        net: ethernet: mtk_eth_soc: enable special tag when any MAC uses DSA
        net: sched: sch: Fix off by one in htb_activate_prios()
        igc: Add ndo_tx_timeout support
        net: mana: Fix accessing freed irq affinity_hint
        hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC
        ...
      35674e78
    • L
      Merge tag 'for-linus-2023020901' of git://git.kernel.org/pub/scm/linux/kernel/git/hid/hid · 0b028189
      Linus Torvalds 提交于
      Pull HID fixes from Benjamin Tissoires:
      
       - fix potential infinite loop with a badly crafted HID device (Xin
         Zhao)
      
       - fix regression from 6.1 in USB logitech devices potentially making
         their mouse wheel not working (Bastien Nocera)
      
       - clean up in AMD sensors, which fixes a long time resume bug (Mario
         Limonciello)
      
       - few device small fixes and quirks
      
      * tag 'for-linus-2023020901' of git://git.kernel.org/pub/scm/linux/kernel/git/hid/hid:
        HID: Ignore battery for ELAN touchscreen 29DF on HP
        HID: amd_sfh: if no sensors are enabled, clean up
        HID: logitech: Disable hi-res scrolling on USB
        HID: core: Fix deadloop in hid_apply_multiplier.
        HID: Ignore battery for Elan touchscreen on Asus TP420IA
        HID: elecom: add support for TrackBall 056E:011C
      0b028189
    • L
      Merge tag '6.2-rc8-smb3-client-fix' of git://git.samba.org/sfrench/cifs-2.6 · 94a1f56d
      Linus Torvalds 提交于
      Pull cifx fix from Steve French:
       "Small fix for use after free"
      
      * tag '6.2-rc8-smb3-client-fix' of git://git.samba.org/sfrench/cifs-2.6:
        cifs: Fix use-after-free in rdata->read_into_pages()
      94a1f56d
  4. 09 2月, 2023 7 次提交
    • H
      selftests: forwarding: lib: quote the sysctl values · 3a082086
      Hangbin Liu 提交于
      When set/restore sysctl value, we should quote the value as some keys
      may have multi values, e.g. net.ipv4.ping_group_range
      
      Fixes: f5ae5778 ("selftests: forwarding: lib: Add sysctl_set(), sysctl_restore()")
      Signed-off-by: NHangbin Liu <liuhangbin@gmail.com>
      Reviewed-by: NPetr Machata <petrm@nvidia.com>
      Link: https://lore.kernel.org/r/20230208032110.879205-1-liuhangbin@gmail.comSigned-off-by: NPaolo Abeni <pabeni@redhat.com>
      3a082086
    • V
      net: mscc: ocelot: fix all IPv6 getting trapped to CPU when PTP timestamping is used · 2fcde9fe
      Vladimir Oltean 提交于
      While running this selftest which usually passes:
      
      ~/selftests/drivers/net/dsa# ./local_termination.sh eno0 swp0
      TEST: swp0: Unicast IPv4 to primary MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to macvlan MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, promisc            [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, allmulti           [ OK ]
      TEST: swp0: Multicast IPv4 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group                         [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, allmulti               [ OK ]
      TEST: swp0: Multicast IPv6 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group                         [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group, allmulti               [ OK ]
      
      if I start PTP timestamping then run it again (debug prints added by me),
      the unknown IPv6 MC traffic is seen by the CPU port even when it should
      have been dropped:
      
      ~/selftests/drivers/net/dsa# ptp4l -i swp0 -2 -P -m
      ptp4l[225.410]: selected /dev/ptp1 as PTP clock
      [  225.445746] mscc_felix 0000:00:00.5: ocelot_l2_ptp_trap_add: port 0 adding L2 PTP trap
      [  225.453815] mscc_felix 0000:00:00.5: ocelot_ipv4_ptp_trap_add: port 0 adding IPv4 PTP event trap
      [  225.462703] mscc_felix 0000:00:00.5: ocelot_ipv4_ptp_trap_add: port 0 adding IPv4 PTP general trap
      [  225.471768] mscc_felix 0000:00:00.5: ocelot_ipv6_ptp_trap_add: port 0 adding IPv6 PTP event trap
      [  225.480651] mscc_felix 0000:00:00.5: ocelot_ipv6_ptp_trap_add: port 0 adding IPv6 PTP general trap
      ptp4l[225.488]: port 1: INITIALIZING to LISTENING on INIT_COMPLETE
      ptp4l[225.488]: port 0: INITIALIZING to LISTENING on INIT_COMPLETE
      ^C
      ~/selftests/drivers/net/dsa# ./local_termination.sh eno0 swp0
      TEST: swp0: Unicast IPv4 to primary MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to macvlan MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, promisc            [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, allmulti           [ OK ]
      TEST: swp0: Multicast IPv4 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group                         [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, allmulti               [ OK ]
      TEST: swp0: Multicast IPv6 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group                         [FAIL]
              reception succeeded, but should have failed
      TEST: swp0: Multicast IPv6 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group, allmulti               [ OK ]
      
      The PGID_MCIPV6 is configured correctly to not flood to the CPU,
      I checked that.
      
      Furthermore, when I disable back PTP RX timestamping (ptp4l doesn't do
      that when it exists), packets are RX filtered again as they should be:
      
      ~/selftests/drivers/net/dsa# hwstamp_ctl -i swp0 -r 0
      [  218.202854] mscc_felix 0000:00:00.5: ocelot_l2_ptp_trap_del: port 0 removing L2 PTP trap
      [  218.212656] mscc_felix 0000:00:00.5: ocelot_ipv4_ptp_trap_del: port 0 removing IPv4 PTP event trap
      [  218.222975] mscc_felix 0000:00:00.5: ocelot_ipv4_ptp_trap_del: port 0 removing IPv4 PTP general trap
      [  218.233133] mscc_felix 0000:00:00.5: ocelot_ipv6_ptp_trap_del: port 0 removing IPv6 PTP event trap
      [  218.242251] mscc_felix 0000:00:00.5: ocelot_ipv6_ptp_trap_del: port 0 removing IPv6 PTP general trap
      current settings:
      tx_type 1
      rx_filter 12
      new settings:
      tx_type 1
      rx_filter 0
      ~/selftests/drivers/net/dsa# ./local_termination.sh eno0 swp0
      TEST: swp0: Unicast IPv4 to primary MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to macvlan MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address                     [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, promisc            [ OK ]
      TEST: swp0: Unicast IPv4 to unknown MAC address, allmulti           [ OK ]
      TEST: swp0: Multicast IPv4 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group                         [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv4 to unknown group, allmulti               [ OK ]
      TEST: swp0: Multicast IPv6 to joined group                          [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group                         [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group, promisc                [ OK ]
      TEST: swp0: Multicast IPv6 to unknown group, allmulti               [ OK ]
      
      So it's clear that something in the PTP RX trapping logic went wrong.
      
      Looking a bit at the code, I can see that there are 4 typos, which
      populate "ipv4" VCAP IS2 key filter fields for IPv6 keys.
      
      VCAP IS2 keys of type OCELOT_VCAP_KEY_IPV4 and OCELOT_VCAP_KEY_IPV6 are
      handled by is2_entry_set(). OCELOT_VCAP_KEY_IPV4 looks at
      &filter->key.ipv4, and OCELOT_VCAP_KEY_IPV6 at &filter->key.ipv6.
      Simply put, when we populate the wrong key field, &filter->key.ipv6
      fields "proto.mask" and "proto.value" remain all zeroes (or "don't care").
      So is2_entry_set() will enter the "else" of this "if" condition:
      
      	if (msk == 0xff && (val == IPPROTO_TCP || val == IPPROTO_UDP))
      
      and proceed to ignore the "proto" field. The resulting rule will match
      on all IPv6 traffic, trapping it to the CPU.
      
      This is the reason why the local_termination.sh selftest sees it,
      because control traps are stronger than the PGID_MCIPV6 used for
      flooding (from the forwarding data path).
      
      But the problem is in fact much deeper. We trap all IPv6 traffic to the
      CPU, but if we're bridged, we set skb->offload_fwd_mark = 1, so software
      forwarding will not take place and IPv6 traffic will never reach its
      destination.
      
      The fix is simple - correct the typos.
      
      I was intentionally inaccurate in the commit message about the breakage
      occurring when any PTP timestamping is enabled. In fact it only happens
      when L4 timestamping is requested (HWTSTAMP_FILTER_PTP_V2_EVENT or
      HWTSTAMP_FILTER_PTP_V2_L4_EVENT). But ptp4l requests a larger RX
      timestamping filter than it needs for "-2": HWTSTAMP_FILTER_PTP_V2_EVENT.
      I wanted people skimming through git logs to not think that the bug
      doesn't affect them because they only use ptp4l in L2 mode.
      
      Fixes: 96ca08c0 ("net: mscc: ocelot: set up traps for PTP packets")
      Signed-off-by: NVladimir Oltean <vladimir.oltean@nxp.com>
      Reviewed-by: NSimon Horman <simon.horman@corigine.com>
      Link: https://lore.kernel.org/r/20230207183117.1745754-1-vladimir.oltean@nxp.comSigned-off-by: NPaolo Abeni <pabeni@redhat.com>
      2fcde9fe
    • P
      rds: rds_rm_zerocopy_callback() use list_first_entry() · f753a689
      Pietro Borrello 提交于
      rds_rm_zerocopy_callback() uses list_entry() on the head of a list
      causing a type confusion.
      Use list_first_entry() to actually access the first element of the
      rs_zcookie_queue list.
      
      Fixes: 9426bbc6 ("rds: use list structure to track information for zerocopy completion notification")
      Reviewed-by: NWillem de Bruijn <willemb@google.com>
      Signed-off-by: NPietro Borrello <borrello@diag.uniroma1.it>
      Link: https://lore.kernel.org/r/20230202-rds-zerocopy-v3-1-83b0df974f9a@diag.uniroma1.itSigned-off-by: NPaolo Abeni <pabeni@redhat.com>
      f753a689
    • J
      Merge tag 'ipsec-2023-02-08' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec · 646be03e
      Jakub Kicinski 提交于
      Steffen Klassert says:
      
      ====================
      ipsec 2023-02-08
      
      1) Fix policy checks for nested IPsec tunnels when using
         xfrm interfaces. From Benedict Wong.
      
      2) Fix netlink message expression on 32=>64-bit
         messages translators. From Anastasia Belova.
      
      3) Prevent potential spectre v1 gadget in xfrm_xlate32_attr.
         From Eric Dumazet.
      
      4) Always consistently use time64_t in xfrm_timer_handler.
         From Eric Dumazet.
      
      5) Fix KCSAN reported bug: Multiple cpus can update use_time
         at the same time. From Eric Dumazet.
      
      6) Fix SCP copy from IPv4 to IPv6 on interfamily tunnel.
         From Christian Hopps.
      
      * tag 'ipsec-2023-02-08' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec:
        xfrm: fix bug with DSCP copy to v6 from v4 tunnel
        xfrm: annotate data-race around use_time
        xfrm: consistently use time64_t in xfrm_timer_handler()
        xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()
        xfrm: compat: change expression for switch in xfrm_xlate64
        Fix XFRM-I support for nested ESP tunnels
      ====================
      
      Link: https://lore.kernel.org/r/20230208114322.266510-1-steffen.klassert@secunet.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      646be03e
    • J
      net: txgbe: Update support email address · 363d7c22
      Jiawen Wu 提交于
      Update new email address for Wangxun 10Gb NIC support team.
      Signed-off-by: NJiawen Wu <jiawenwu@trustnetic.com>
      Link: https://lore.kernel.org/r/20230208023035.3371250-1-jiawenwu@trustnetic.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      363d7c22
    • J
      Merge tag 'mlx5-fixes-2023-02-07' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux · ff8ced4e
      Jakub Kicinski 提交于
      Saeed Mahameed says:
      
      ====================
      mlx5 fixes 2023-02-07
      
      This series provides bug fixes to mlx5 driver.
      
      * tag 'mlx5-fixes-2023-02-07' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux:
        net/mlx5: Serialize module cleanup with reload and remove
        net/mlx5: fw_tracer, Zero consumer index when reloading the tracer
        net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers
        net/mlx5: Expose SF firmware pages counter
        net/mlx5: Store page counters in a single array
        net/mlx5e: IPoIB, Show unknown speed instead of error
        net/mlx5e: Fix crash unsetting rx-vlan-filter in switchdev mode
        net/mlx5: Bridge, fix ageing of peer FDB entries
        net/mlx5: DR, Fix potential race in dr_rule_create_rule_nic
        net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change
      ====================
      
      Link: https://lore.kernel.org/r/20230208030302.95378-1-saeed@kernel.orgSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      ff8ced4e
    • I
      selftests: Fix failing VXLAN VNI filtering test · b963d9d5
      Ido Schimmel 提交于
      iproute2 does not recognize the "group6" and "remote6" keywords. Fix by
      using "group" and "remote" instead.
      
      Before:
      
       # ./test_vxlan_vnifiltering.sh
       [...]
       Tests passed:  25
       Tests failed:   2
      
      After:
      
       # ./test_vxlan_vnifiltering.sh
       [...]
       Tests passed:  27
       Tests failed:   0
      
      Fixes: 3edf5f66 ("selftests: add new tests for vxlan vnifiltering")
      Signed-off-by: NIdo Schimmel <idosch@nvidia.com>
      Reviewed-by: NAlexander Duyck <alexanderduyck@fb.com>
      Link: https://lore.kernel.org/r/20230207141819.256689-1-idosch@nvidia.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      b963d9d5
  5. 08 2月, 2023 9 次提交