mirror of
https://github.com/torvalds/linux.git
synced 2026-03-08 03:24:45 +01:00
Including fixes from Netfilter.
Current release - new code bugs:
- net: fix backlog_unlock_irq_restore() vs CONFIG_PREEMPT_RT
- eth: mlx5e: XSK, Fix unintended ICOSQ change
- phy_port: correctly recompute the port's linkmodes
- vsock: prevent child netns mode switch from local to global
- couple of kconfig fixes for new symbols
Previous releases - regressions:
- nfc: nci: fix false-positive parameter validation for packet data
- net: do not delay zero-copy skbs in skb_attempt_defer_free()
Previous releases - always broken:
- mctp: ensure our nlmsg responses to user space are zero-initialised
- ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data()
- fixes for ICMP rate limiting
Misc:
- intel: fix PCI device ID conflict between i40e and ipw2200
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
-----BEGIN PGP SIGNATURE-----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=qSCj
-----END PGP SIGNATURE-----
Merge tag 'net-7.0-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net
Pull networking fixes from Jakub Kicinski:
"Including fixes from Netfilter.
Current release - new code bugs:
- net: fix backlog_unlock_irq_restore() vs CONFIG_PREEMPT_RT
- eth: mlx5e: XSK, Fix unintended ICOSQ change
- phy_port: correctly recompute the port's linkmodes
- vsock: prevent child netns mode switch from local to global
- couple of kconfig fixes for new symbols
Previous releases - regressions:
- nfc: nci: fix false-positive parameter validation for packet data
- net: do not delay zero-copy skbs in skb_attempt_defer_free()
Previous releases - always broken:
- mctp: ensure our nlmsg responses to user space are zero-initialised
- ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data()
- fixes for ICMP rate limiting
Misc:
- intel: fix PCI device ID conflict between i40e and ipw2200"
* tag 'net-7.0-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (85 commits)
net: nfc: nci: Fix parameter validation for packet data
net/mlx5e: Use unsigned for mlx5e_get_max_num_channels
net/mlx5e: Fix deadlocks between devlink and netdev instance locks
net/mlx5e: MACsec, add ASO poll loop in macsec_aso_set_arm_event
net/mlx5: Fix misidentification of write combining CQE during poll loop
net/mlx5e: Fix misidentification of ASO CQE during poll loop
net/mlx5: Fix multiport device check over light SFs
bonding: alb: fix UAF in rlb_arp_recv during bond up/down
bnge: fix reserving resources from FW
eth: fbnic: Advertise supported XDP features.
rds: tcp: fix uninit-value in __inet_bind
net/rds: Fix NULL pointer dereference in rds_tcp_accept_one
octeontx2-af: Fix default entries mcam entry action
net/mlx5e: XSK, Fix unintended ICOSQ change
ipv6: icmp: icmpv6_xrlim_allow() optimization if net.ipv6.icmp.ratelimit is zero
ipv4: icmp: icmpv4_xrlim_allow() optimization if net.ipv4.icmp_ratelimit is zero
ipv6: icmp: remove obsolete code in icmpv6_xrlim_allow()
inet: move icmp_global_{credit,stamp} to a separate cache line
icmp: prevent possible overflow in icmp_global_allow()
selftests/net: packetdrill: add ipv4-mapped-ipv6 tests
...
This commit is contained in:
commit
8bf22c33e7
103 changed files with 1140 additions and 694 deletions
|
|
@ -40,8 +40,8 @@ Table : Subdirectories in /proc/sys/net
|
|||
bridge Bridging rose X.25 PLP layer
|
||||
core General parameter tipc TIPC
|
||||
ethernet Ethernet protocol unix Unix domain sockets
|
||||
ipv4 IP version 4 x25 X.25 protocol
|
||||
ipv6 IP version 6
|
||||
ipv4 IP version 4 vsock VSOCK sockets
|
||||
ipv6 IP version 6 x25 X.25 protocol
|
||||
========= =================== = ========== ===================
|
||||
|
||||
1. /proc/sys/net/core - Network core options
|
||||
|
|
@ -551,3 +551,51 @@ originally may have been issued in the correct sequential order.
|
|||
If named_timeout is nonzero, failed topology updates will be placed on a defer
|
||||
queue until another event arrives that clears the error, or until the timeout
|
||||
expires. Value is in milliseconds.
|
||||
|
||||
6. /proc/sys/net/vsock - VSOCK sockets
|
||||
--------------------------------------
|
||||
|
||||
VSOCK sockets (AF_VSOCK) provide communication between virtual machines and
|
||||
their hosts. The behavior of VSOCK sockets in a network namespace is determined
|
||||
by the namespace's mode (``global`` or ``local``), which controls how CIDs
|
||||
(Context IDs) are allocated and how sockets interact across namespaces.
|
||||
|
||||
ns_mode
|
||||
-------
|
||||
|
||||
Read-only. Reports the current namespace's mode, set at namespace creation
|
||||
and immutable thereafter.
|
||||
|
||||
Values:
|
||||
|
||||
- ``global`` - the namespace shares system-wide CID allocation and
|
||||
its sockets can reach any VM or socket in any global namespace.
|
||||
Sockets in this namespace cannot reach sockets in local
|
||||
namespaces.
|
||||
- ``local`` - the namespace has private CID allocation and its
|
||||
sockets can only connect to VMs or sockets within the same
|
||||
namespace.
|
||||
|
||||
The init_net mode is always ``global``.
|
||||
|
||||
child_ns_mode
|
||||
-------------
|
||||
|
||||
Controls what mode newly created child namespaces will inherit. At namespace
|
||||
creation, ``ns_mode`` is inherited from the parent's ``child_ns_mode``. The
|
||||
initial value matches the namespace's own ``ns_mode``.
|
||||
|
||||
Values:
|
||||
|
||||
- ``global`` - child namespaces will share system-wide CID allocation
|
||||
and their sockets will be able to reach any VM or socket in any
|
||||
global namespace.
|
||||
- ``local`` - child namespaces will have private CID allocation and
|
||||
their sockets will only be able to connect within their own
|
||||
namespace.
|
||||
|
||||
Changing ``child_ns_mode`` only affects namespaces created after the change;
|
||||
it does not modify the current namespace or any existing children.
|
||||
|
||||
A namespace with ``ns_mode`` set to ``local`` cannot change
|
||||
``child_ns_mode`` to ``global`` (returns ``-EPERM``).
|
||||
|
|
|
|||
|
|
@ -3234,12 +3234,13 @@ enhanced_dad - BOOLEAN
|
|||
===========
|
||||
|
||||
ratelimit - INTEGER
|
||||
Limit the maximal rates for sending ICMPv6 messages.
|
||||
Limit the maximal rates for sending ICMPv6 messages to a particular
|
||||
peer.
|
||||
|
||||
0 to disable any limiting,
|
||||
otherwise the minimal space between responses in milliseconds.
|
||||
otherwise the space between responses in milliseconds.
|
||||
|
||||
Default: 1000
|
||||
Default: 100
|
||||
|
||||
ratemask - list of comma separated ranges
|
||||
For ICMPv6 message types matching the ranges in the ratemask, limit
|
||||
|
|
|
|||
|
|
@ -373,6 +373,10 @@ fore200e_shutdown(struct fore200e* fore200e)
|
|||
fallthrough;
|
||||
case FORE200E_STATE_IRQ:
|
||||
free_irq(fore200e->irq, fore200e->atm_dev);
|
||||
#ifdef FORE200E_USE_TASKLET
|
||||
tasklet_kill(&fore200e->tx_tasklet);
|
||||
tasklet_kill(&fore200e->rx_tasklet);
|
||||
#endif
|
||||
|
||||
fallthrough;
|
||||
case FORE200E_STATE_ALLOC_BUF:
|
||||
|
|
|
|||
|
|
@ -91,6 +91,8 @@ zl3073x_ref_freq_set(struct zl3073x_ref *ref, u32 freq)
|
|||
|
||||
ref->freq_base = base;
|
||||
ref->freq_mult = mult;
|
||||
ref->freq_ratio_m = 1;
|
||||
ref->freq_ratio_n = 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -333,6 +333,7 @@ config MACSEC
|
|||
|
||||
config NETCONSOLE
|
||||
tristate "Network console logging support"
|
||||
depends on PRINTK
|
||||
help
|
||||
If you want to log kernel messages over the network, enable this.
|
||||
See <file:Documentation/networking/netconsole.rst> for details.
|
||||
|
|
|
|||
|
|
@ -115,6 +115,8 @@ static const struct attribute_group com20020_state_group = {
|
|||
.attrs = com20020_state_attrs,
|
||||
};
|
||||
|
||||
static struct com20020_pci_card_info card_info_2p5mbit;
|
||||
|
||||
static void com20020pci_remove(struct pci_dev *pdev);
|
||||
|
||||
static int com20020pci_probe(struct pci_dev *pdev,
|
||||
|
|
@ -140,7 +142,7 @@ static int com20020pci_probe(struct pci_dev *pdev,
|
|||
|
||||
ci = (struct com20020_pci_card_info *)id->driver_data;
|
||||
if (!ci)
|
||||
return -EINVAL;
|
||||
ci = &card_info_2p5mbit;
|
||||
|
||||
priv->ci = ci;
|
||||
mm = &ci->misc_map;
|
||||
|
|
@ -347,6 +349,18 @@ static struct com20020_pci_card_info card_info_5mbit = {
|
|||
.flags = ARC_IS_5MBIT,
|
||||
};
|
||||
|
||||
static struct com20020_pci_card_info card_info_2p5mbit = {
|
||||
.name = "ARC-PCI",
|
||||
.devcount = 1,
|
||||
.chan_map_tbl = {
|
||||
{
|
||||
.bar = 2,
|
||||
.offset = 0x00,
|
||||
.size = 0x08,
|
||||
},
|
||||
},
|
||||
};
|
||||
|
||||
static struct com20020_pci_card_info card_info_sohard = {
|
||||
.name = "SOHARD SH ARC-PCI",
|
||||
.devcount = 1,
|
||||
|
|
|
|||
|
|
@ -4343,9 +4343,13 @@ static int bond_close(struct net_device *bond_dev)
|
|||
|
||||
bond_work_cancel_all(bond);
|
||||
bond->send_peer_notif = 0;
|
||||
WRITE_ONCE(bond->recv_probe, NULL);
|
||||
|
||||
/* Wait for any in-flight RX handlers */
|
||||
synchronize_net();
|
||||
|
||||
if (bond_is_lb(bond))
|
||||
bond_alb_deinitialize(bond);
|
||||
bond->recv_probe = NULL;
|
||||
|
||||
if (BOND_MODE(bond) == BOND_MODE_8023AD &&
|
||||
bond->params.broadcast_neighbor)
|
||||
|
|
|
|||
|
|
@ -2,7 +2,6 @@
|
|||
config NET_DSA_MXL862
|
||||
tristate "MaxLinear MxL862xx"
|
||||
depends on NET_DSA
|
||||
select MAXLINEAR_GPHY
|
||||
select NET_DSA_TAG_MXL_862XX
|
||||
help
|
||||
This enables support for the MaxLinear MxL862xx switch family.
|
||||
|
|
|
|||
|
|
@ -442,7 +442,7 @@ __bnge_hwrm_reserve_pf_rings(struct bnge_dev *bd, struct bnge_hw_rings *hwr)
|
|||
struct hwrm_func_cfg_input *req;
|
||||
u32 enables = 0;
|
||||
|
||||
if (bnge_hwrm_req_init(bd, req, HWRM_FUNC_QCFG))
|
||||
if (bnge_hwrm_req_init(bd, req, HWRM_FUNC_CFG))
|
||||
return NULL;
|
||||
|
||||
req->fid = cpu_to_le16(0xffff);
|
||||
|
|
|
|||
|
|
@ -16,7 +16,6 @@
|
|||
#include <linux/etherdevice.h>
|
||||
#include <linux/if.h>
|
||||
#include <net/ip.h>
|
||||
#include <net/netdev_queues.h>
|
||||
#include <linux/skbuff.h>
|
||||
#include <net/page_pool/helpers.h>
|
||||
|
||||
|
|
|
|||
|
|
@ -423,7 +423,7 @@ static int ec_bhf_open(struct net_device *net_dev)
|
|||
|
||||
error_rx_free:
|
||||
dma_free_coherent(dev, priv->rx_buf.alloc_len, priv->rx_buf.alloc,
|
||||
priv->rx_buf.alloc_len);
|
||||
priv->rx_buf.alloc_phys);
|
||||
out:
|
||||
return err;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -75,7 +75,13 @@ static const struct pci_device_id i40e_pci_tbl[] = {
|
|||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_10G_BASE_T4), 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_10G_BASE_T_BC), 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_10G_SFP), 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_10G_B), 0},
|
||||
/*
|
||||
* This ID conflicts with ipw2200, but the devices can be differentiated
|
||||
* because i40e devices use PCI_CLASS_NETWORK_ETHERNET and ipw2200
|
||||
* devices use PCI_CLASS_NETWORK_OTHER.
|
||||
*/
|
||||
{PCI_DEVICE(PCI_VENDOR_ID_INTEL, I40E_DEV_ID_10G_B),
|
||||
PCI_CLASS_NETWORK_ETHERNET << 8, 0xffff00, 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_KX_X722), 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_QSFP_X722), 0},
|
||||
{PCI_VDEVICE(INTEL, I40E_DEV_ID_SFP_X722), 0},
|
||||
|
|
|
|||
|
|
@ -1042,32 +1042,35 @@ void rvu_npc_update_flowkey_alg_idx(struct rvu *rvu, u16 pcifunc, int nixlf,
|
|||
rvu_write64(rvu, blkaddr,
|
||||
NPC_AF_MCAMEX_BANKX_ACTION(index, bank), *(u64 *)&action);
|
||||
|
||||
/* update the VF flow rule action with the VF default entry action */
|
||||
if (mcam_index < 0)
|
||||
npc_update_vf_flow_entry(rvu, mcam, blkaddr, pcifunc,
|
||||
*(u64 *)&action);
|
||||
|
||||
/* update the action change in default rule */
|
||||
pfvf = rvu_get_pfvf(rvu, pcifunc);
|
||||
if (pfvf->def_ucast_rule)
|
||||
pfvf->def_ucast_rule->rx_action = action;
|
||||
|
||||
index = npc_get_nixlf_mcam_index(mcam, pcifunc,
|
||||
nixlf, NIXLF_PROMISC_ENTRY);
|
||||
if (mcam_index < 0) {
|
||||
/* update the VF flow rule action with the VF default
|
||||
* entry action
|
||||
*/
|
||||
npc_update_vf_flow_entry(rvu, mcam, blkaddr, pcifunc,
|
||||
*(u64 *)&action);
|
||||
|
||||
/* If PF's promiscuous entry is enabled,
|
||||
* Set RSS action for that entry as well
|
||||
*/
|
||||
npc_update_rx_action_with_alg_idx(rvu, action, pfvf, index, blkaddr,
|
||||
alg_idx);
|
||||
index = npc_get_nixlf_mcam_index(mcam, pcifunc,
|
||||
nixlf, NIXLF_PROMISC_ENTRY);
|
||||
|
||||
index = npc_get_nixlf_mcam_index(mcam, pcifunc,
|
||||
nixlf, NIXLF_ALLMULTI_ENTRY);
|
||||
/* If PF's allmulti entry is enabled,
|
||||
* Set RSS action for that entry as well
|
||||
*/
|
||||
npc_update_rx_action_with_alg_idx(rvu, action, pfvf, index, blkaddr,
|
||||
alg_idx);
|
||||
/* If PF's promiscuous entry is enabled,
|
||||
* Set RSS action for that entry as well
|
||||
*/
|
||||
npc_update_rx_action_with_alg_idx(rvu, action, pfvf, index,
|
||||
blkaddr, alg_idx);
|
||||
|
||||
index = npc_get_nixlf_mcam_index(mcam, pcifunc,
|
||||
nixlf, NIXLF_ALLMULTI_ENTRY);
|
||||
/* If PF's allmulti entry is enabled,
|
||||
* Set RSS action for that entry as well
|
||||
*/
|
||||
npc_update_rx_action_with_alg_idx(rvu, action, pfvf, index,
|
||||
blkaddr, alg_idx);
|
||||
}
|
||||
}
|
||||
|
||||
void npc_enadis_default_mce_entry(struct rvu *rvu, u16 pcifunc,
|
||||
|
|
|
|||
|
|
@ -180,7 +180,8 @@ static inline u16 mlx5_min_rx_wqes(int wq_type, u32 wq_size)
|
|||
}
|
||||
|
||||
/* Use this function to get max num channels (rxqs/txqs) only to create netdev */
|
||||
static inline int mlx5e_get_max_num_channels(struct mlx5_core_dev *mdev)
|
||||
static inline unsigned int
|
||||
mlx5e_get_max_num_channels(struct mlx5_core_dev *mdev)
|
||||
{
|
||||
return is_kdump_kernel() ?
|
||||
MLX5E_MIN_NUM_CHANNELS :
|
||||
|
|
@ -1103,6 +1104,7 @@ int mlx5e_open_locked(struct net_device *netdev);
|
|||
int mlx5e_close_locked(struct net_device *netdev);
|
||||
|
||||
void mlx5e_trigger_napi_icosq(struct mlx5e_channel *c);
|
||||
void mlx5e_trigger_napi_async_icosq(struct mlx5e_channel *c);
|
||||
void mlx5e_trigger_napi_sched(struct napi_struct *napi);
|
||||
|
||||
int mlx5e_open_channels(struct mlx5e_priv *priv,
|
||||
|
|
|
|||
|
|
@ -457,22 +457,8 @@ static void mlx5e_ptpsq_unhealthy_work(struct work_struct *work)
|
|||
{
|
||||
struct mlx5e_ptpsq *ptpsq =
|
||||
container_of(work, struct mlx5e_ptpsq, report_unhealthy_work);
|
||||
struct mlx5e_txqsq *sq = &ptpsq->txqsq;
|
||||
|
||||
/* Recovering the PTP SQ means re-enabling NAPI, which requires the
|
||||
* netdev instance lock. However, SQ closing has to wait for this work
|
||||
* task to finish while also holding the same lock. So either get the
|
||||
* lock or find that the SQ is no longer enabled and thus this work is
|
||||
* not relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(sq->netdev)) {
|
||||
if (!test_bit(MLX5E_SQ_STATE_ENABLED, &sq->state))
|
||||
return;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
mlx5e_reporter_tx_ptpsq_unhealthy(ptpsq);
|
||||
netdev_unlock(sq->netdev);
|
||||
}
|
||||
|
||||
static int mlx5e_ptp_open_txqsq(struct mlx5e_ptp *c, u32 tisn,
|
||||
|
|
|
|||
|
|
@ -1,6 +1,8 @@
|
|||
// SPDX-License-Identifier: GPL-2.0
|
||||
// Copyright (c) 2019 Mellanox Technologies.
|
||||
|
||||
#include <net/netdev_lock.h>
|
||||
|
||||
#include "health.h"
|
||||
#include "params.h"
|
||||
#include "txrx.h"
|
||||
|
|
@ -177,6 +179,16 @@ static int mlx5e_rx_reporter_timeout_recover(void *ctx)
|
|||
rq = ctx;
|
||||
priv = rq->priv;
|
||||
|
||||
/* Acquire netdev instance lock to synchronize with channel close and
|
||||
* reopen flows. Either successfully obtain the lock, or detect that
|
||||
* channels are closing for another reason, making this work no longer
|
||||
* necessary.
|
||||
*/
|
||||
while (!netdev_trylock(rq->netdev)) {
|
||||
if (!test_bit(MLX5E_STATE_CHANNELS_ACTIVE, &rq->priv->state))
|
||||
return 0;
|
||||
msleep(20);
|
||||
}
|
||||
mutex_lock(&priv->state_lock);
|
||||
|
||||
eq = rq->cq.mcq.eq;
|
||||
|
|
@ -186,6 +198,7 @@ static int mlx5e_rx_reporter_timeout_recover(void *ctx)
|
|||
clear_bit(MLX5E_SQ_STATE_ENABLED, &rq->icosq->state);
|
||||
|
||||
mutex_unlock(&priv->state_lock);
|
||||
netdev_unlock(rq->netdev);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,6 +1,8 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0 */
|
||||
/* Copyright (c) 2019 Mellanox Technologies. */
|
||||
|
||||
#include <net/netdev_lock.h>
|
||||
|
||||
#include "health.h"
|
||||
#include "en/ptp.h"
|
||||
#include "en/devlink.h"
|
||||
|
|
@ -79,6 +81,18 @@ static int mlx5e_tx_reporter_err_cqe_recover(void *ctx)
|
|||
if (!test_bit(MLX5E_SQ_STATE_RECOVERING, &sq->state))
|
||||
return 0;
|
||||
|
||||
/* Recovering queues means re-enabling NAPI, which requires the netdev
|
||||
* instance lock. However, SQ closing flows have to wait for work tasks
|
||||
* to finish while also holding the netdev instance lock. So either get
|
||||
* the lock or find that the SQ is no longer enabled and thus this work
|
||||
* is not relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(dev)) {
|
||||
if (!test_bit(MLX5E_SQ_STATE_ENABLED, &sq->state))
|
||||
return 0;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
err = mlx5_core_query_sq_state(mdev, sq->sqn, &state);
|
||||
if (err) {
|
||||
netdev_err(dev, "Failed to query SQ 0x%x state. err = %d\n",
|
||||
|
|
@ -114,9 +128,11 @@ static int mlx5e_tx_reporter_err_cqe_recover(void *ctx)
|
|||
else
|
||||
mlx5e_trigger_napi_sched(sq->cq.napi);
|
||||
|
||||
netdev_unlock(dev);
|
||||
return 0;
|
||||
out:
|
||||
clear_bit(MLX5E_SQ_STATE_RECOVERING, &sq->state);
|
||||
netdev_unlock(dev);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
|
@ -137,10 +153,24 @@ static int mlx5e_tx_reporter_timeout_recover(void *ctx)
|
|||
sq = to_ctx->sq;
|
||||
eq = sq->cq.mcq.eq;
|
||||
priv = sq->priv;
|
||||
|
||||
/* Recovering the TX queues implies re-enabling NAPI, which requires
|
||||
* the netdev instance lock.
|
||||
* However, channel closing flows have to wait for this work to finish
|
||||
* while holding the same lock. So either get the lock or find that
|
||||
* channels are being closed for other reason and this work is not
|
||||
* relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(sq->netdev)) {
|
||||
if (!test_bit(MLX5E_STATE_CHANNELS_ACTIVE, &priv->state))
|
||||
return 0;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
err = mlx5e_health_channel_eq_recover(sq->netdev, eq, sq->cq.ch_stats);
|
||||
if (!err) {
|
||||
to_ctx->status = 0; /* this sq recovered */
|
||||
return err;
|
||||
goto out;
|
||||
}
|
||||
|
||||
mutex_lock(&priv->state_lock);
|
||||
|
|
@ -148,7 +178,7 @@ static int mlx5e_tx_reporter_timeout_recover(void *ctx)
|
|||
mutex_unlock(&priv->state_lock);
|
||||
if (!err) {
|
||||
to_ctx->status = 1; /* all channels recovered */
|
||||
return err;
|
||||
goto out;
|
||||
}
|
||||
|
||||
to_ctx->status = err;
|
||||
|
|
@ -156,7 +186,8 @@ static int mlx5e_tx_reporter_timeout_recover(void *ctx)
|
|||
netdev_err(priv->netdev,
|
||||
"mlx5e_safe_reopen_channels failed recovering from a tx_timeout, err(%d).\n",
|
||||
err);
|
||||
|
||||
out:
|
||||
netdev_unlock(sq->netdev);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
|
@ -173,10 +204,22 @@ static int mlx5e_tx_reporter_ptpsq_unhealthy_recover(void *ctx)
|
|||
return 0;
|
||||
|
||||
priv = ptpsq->txqsq.priv;
|
||||
netdev = priv->netdev;
|
||||
|
||||
/* Recovering the PTP SQ means re-enabling NAPI, which requires the
|
||||
* netdev instance lock. However, SQ closing has to wait for this work
|
||||
* task to finish while also holding the same lock. So either get the
|
||||
* lock or find that the SQ is no longer enabled and thus this work is
|
||||
* not relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(netdev)) {
|
||||
if (!test_bit(MLX5E_SQ_STATE_ENABLED, &ptpsq->txqsq.state))
|
||||
return 0;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
mutex_lock(&priv->state_lock);
|
||||
chs = &priv->channels;
|
||||
netdev = priv->netdev;
|
||||
|
||||
carrier_ok = netif_carrier_ok(netdev);
|
||||
netif_carrier_off(netdev);
|
||||
|
|
@ -193,6 +236,7 @@ static int mlx5e_tx_reporter_ptpsq_unhealthy_recover(void *ctx)
|
|||
netif_carrier_on(netdev);
|
||||
|
||||
mutex_unlock(&priv->state_lock);
|
||||
netdev_unlock(netdev);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,6 +1,7 @@
|
|||
// SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB
|
||||
// Copyright (c) 2021, NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||
|
||||
#include <linux/iopoll.h>
|
||||
#include <linux/math64.h>
|
||||
#include "lib/aso.h"
|
||||
#include "en/tc/post_act.h"
|
||||
|
|
@ -115,7 +116,6 @@ mlx5e_tc_meter_modify(struct mlx5_core_dev *mdev,
|
|||
struct mlx5e_flow_meters *flow_meters;
|
||||
u8 cir_man, cir_exp, cbs_man, cbs_exp;
|
||||
struct mlx5_aso_wqe *aso_wqe;
|
||||
unsigned long expires;
|
||||
struct mlx5_aso *aso;
|
||||
u64 rate, burst;
|
||||
u8 ds_cnt;
|
||||
|
|
@ -187,12 +187,8 @@ mlx5e_tc_meter_modify(struct mlx5_core_dev *mdev,
|
|||
mlx5_aso_post_wqe(aso, true, &aso_wqe->ctrl);
|
||||
|
||||
/* With newer FW, the wait for the first ASO WQE is more than 2us, put the wait 10ms. */
|
||||
expires = jiffies + msecs_to_jiffies(10);
|
||||
do {
|
||||
err = mlx5_aso_poll_cq(aso, true);
|
||||
if (err)
|
||||
usleep_range(2, 10);
|
||||
} while (err && time_is_after_jiffies(expires));
|
||||
read_poll_timeout(mlx5_aso_poll_cq, err, !err, 10, 10 * USEC_PER_MSEC,
|
||||
false, aso, true);
|
||||
mutex_unlock(&flow_meters->aso_lock);
|
||||
|
||||
return err;
|
||||
|
|
|
|||
|
|
@ -127,7 +127,7 @@ static int mlx5e_xsk_enable_locked(struct mlx5e_priv *priv,
|
|||
goto err_remove_pool;
|
||||
|
||||
mlx5e_activate_xsk(c);
|
||||
mlx5e_trigger_napi_icosq(c);
|
||||
mlx5e_trigger_napi_async_icosq(c);
|
||||
|
||||
/* Don't wait for WQEs, because the newer xdpsock sample doesn't provide
|
||||
* any Fill Ring entries at the setup stage.
|
||||
|
|
@ -179,7 +179,7 @@ static int mlx5e_xsk_disable_locked(struct mlx5e_priv *priv, u16 ix)
|
|||
c = priv->channels.c[ix];
|
||||
|
||||
mlx5e_activate_rq(&c->rq);
|
||||
mlx5e_trigger_napi_icosq(c);
|
||||
mlx5e_trigger_napi_async_icosq(c);
|
||||
mlx5e_wait_for_min_rx_wqes(&c->rq, MLX5E_RQ_WQES_TIMEOUT);
|
||||
|
||||
mlx5e_rx_res_xsk_update(priv->rx_res, &priv->channels, ix, false);
|
||||
|
|
|
|||
|
|
@ -34,7 +34,7 @@ int mlx5e_xsk_wakeup(struct net_device *dev, u32 qid, u32 flags)
|
|||
&c->async_icosq->state))
|
||||
return 0;
|
||||
|
||||
mlx5e_trigger_napi_icosq(c);
|
||||
mlx5e_trigger_napi_async_icosq(c);
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
|
|
|||
|
|
@ -5,6 +5,7 @@
|
|||
#include <linux/mlx5/mlx5_ifc.h>
|
||||
#include <linux/xarray.h>
|
||||
#include <linux/if_vlan.h>
|
||||
#include <linux/iopoll.h>
|
||||
|
||||
#include "en.h"
|
||||
#include "lib/aso.h"
|
||||
|
|
@ -1385,7 +1386,8 @@ static int macsec_aso_set_arm_event(struct mlx5_core_dev *mdev, struct mlx5e_mac
|
|||
MLX5_ACCESS_ASO_OPC_MOD_MACSEC);
|
||||
macsec_aso_build_ctrl(aso, &aso_wqe->aso_ctrl, in);
|
||||
mlx5_aso_post_wqe(maso, false, &aso_wqe->ctrl);
|
||||
err = mlx5_aso_poll_cq(maso, false);
|
||||
read_poll_timeout(mlx5_aso_poll_cq, err, !err, 10, 10 * USEC_PER_MSEC,
|
||||
false, maso, false);
|
||||
mutex_unlock(&aso->aso_lock);
|
||||
|
||||
return err;
|
||||
|
|
@ -1397,7 +1399,6 @@ static int macsec_aso_query(struct mlx5_core_dev *mdev, struct mlx5e_macsec *mac
|
|||
struct mlx5e_macsec_aso *aso;
|
||||
struct mlx5_aso_wqe *aso_wqe;
|
||||
struct mlx5_aso *maso;
|
||||
unsigned long expires;
|
||||
int err;
|
||||
|
||||
aso = &macsec->aso;
|
||||
|
|
@ -1411,12 +1412,8 @@ static int macsec_aso_query(struct mlx5_core_dev *mdev, struct mlx5e_macsec *mac
|
|||
macsec_aso_build_wqe_ctrl_seg(aso, &aso_wqe->aso_ctrl, NULL);
|
||||
|
||||
mlx5_aso_post_wqe(maso, false, &aso_wqe->ctrl);
|
||||
expires = jiffies + msecs_to_jiffies(10);
|
||||
do {
|
||||
err = mlx5_aso_poll_cq(maso, false);
|
||||
if (err)
|
||||
usleep_range(2, 10);
|
||||
} while (err && time_is_after_jiffies(expires));
|
||||
read_poll_timeout(mlx5_aso_poll_cq, err, !err, 10, 10 * USEC_PER_MSEC,
|
||||
false, maso, false);
|
||||
|
||||
if (err)
|
||||
goto err_out;
|
||||
|
|
|
|||
|
|
@ -631,19 +631,7 @@ static void mlx5e_rq_timeout_work(struct work_struct *timeout_work)
|
|||
struct mlx5e_rq,
|
||||
rx_timeout_work);
|
||||
|
||||
/* Acquire netdev instance lock to synchronize with channel close and
|
||||
* reopen flows. Either successfully obtain the lock, or detect that
|
||||
* channels are closing for another reason, making this work no longer
|
||||
* necessary.
|
||||
*/
|
||||
while (!netdev_trylock(rq->netdev)) {
|
||||
if (!test_bit(MLX5E_STATE_CHANNELS_ACTIVE, &rq->priv->state))
|
||||
return;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
mlx5e_reporter_rx_timeout(rq);
|
||||
netdev_unlock(rq->netdev);
|
||||
}
|
||||
|
||||
static int mlx5e_alloc_mpwqe_rq_drop_page(struct mlx5e_rq *rq)
|
||||
|
|
@ -1952,20 +1940,7 @@ void mlx5e_tx_err_cqe_work(struct work_struct *recover_work)
|
|||
struct mlx5e_txqsq *sq = container_of(recover_work, struct mlx5e_txqsq,
|
||||
recover_work);
|
||||
|
||||
/* Recovering queues means re-enabling NAPI, which requires the netdev
|
||||
* instance lock. However, SQ closing flows have to wait for work tasks
|
||||
* to finish while also holding the netdev instance lock. So either get
|
||||
* the lock or find that the SQ is no longer enabled and thus this work
|
||||
* is not relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(sq->netdev)) {
|
||||
if (!test_bit(MLX5E_SQ_STATE_ENABLED, &sq->state))
|
||||
return;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
mlx5e_reporter_tx_err_cqe(sq);
|
||||
netdev_unlock(sq->netdev);
|
||||
}
|
||||
|
||||
static struct dim_cq_moder mlx5e_get_def_tx_moderation(u8 cq_period_mode)
|
||||
|
|
@ -2744,16 +2719,26 @@ static int mlx5e_channel_stats_alloc(struct mlx5e_priv *priv, int ix, int cpu)
|
|||
|
||||
void mlx5e_trigger_napi_icosq(struct mlx5e_channel *c)
|
||||
{
|
||||
struct mlx5e_icosq *sq = &c->icosq;
|
||||
bool locked;
|
||||
|
||||
if (!test_and_set_bit(MLX5E_SQ_STATE_LOCK_NEEDED, &c->icosq.state))
|
||||
synchronize_net();
|
||||
set_bit(MLX5E_SQ_STATE_LOCK_NEEDED, &sq->state);
|
||||
synchronize_net();
|
||||
|
||||
locked = mlx5e_icosq_sync_lock(&c->icosq);
|
||||
mlx5e_trigger_irq(&c->icosq);
|
||||
mlx5e_icosq_sync_unlock(&c->icosq, locked);
|
||||
locked = mlx5e_icosq_sync_lock(sq);
|
||||
mlx5e_trigger_irq(sq);
|
||||
mlx5e_icosq_sync_unlock(sq, locked);
|
||||
|
||||
clear_bit(MLX5E_SQ_STATE_LOCK_NEEDED, &c->icosq.state);
|
||||
clear_bit(MLX5E_SQ_STATE_LOCK_NEEDED, &sq->state);
|
||||
}
|
||||
|
||||
void mlx5e_trigger_napi_async_icosq(struct mlx5e_channel *c)
|
||||
{
|
||||
struct mlx5e_icosq *sq = c->async_icosq;
|
||||
|
||||
spin_lock_bh(&sq->lock);
|
||||
mlx5e_trigger_irq(sq);
|
||||
spin_unlock_bh(&sq->lock);
|
||||
}
|
||||
|
||||
void mlx5e_trigger_napi_sched(struct napi_struct *napi)
|
||||
|
|
@ -2836,7 +2821,7 @@ static int mlx5e_open_channel(struct mlx5e_priv *priv, int ix,
|
|||
netif_napi_add_config_locked(netdev, &c->napi, mlx5e_napi_poll, ix);
|
||||
netif_napi_set_irq_locked(&c->napi, irq);
|
||||
|
||||
async_icosq_needed = !!xsk_pool || priv->ktls_rx_was_enabled;
|
||||
async_icosq_needed = !!params->xdp_prog || priv->ktls_rx_was_enabled;
|
||||
err = mlx5e_open_queues(c, params, cparam, async_icosq_needed);
|
||||
if (unlikely(err))
|
||||
goto err_napi_del;
|
||||
|
|
@ -5105,19 +5090,6 @@ static void mlx5e_tx_timeout_work(struct work_struct *work)
|
|||
struct net_device *netdev = priv->netdev;
|
||||
int i;
|
||||
|
||||
/* Recovering the TX queues implies re-enabling NAPI, which requires
|
||||
* the netdev instance lock.
|
||||
* However, channel closing flows have to wait for this work to finish
|
||||
* while holding the same lock. So either get the lock or find that
|
||||
* channels are being closed for other reason and this work is not
|
||||
* relevant anymore.
|
||||
*/
|
||||
while (!netdev_trylock(netdev)) {
|
||||
if (!test_bit(MLX5E_STATE_CHANNELS_ACTIVE, &priv->state))
|
||||
return;
|
||||
msleep(20);
|
||||
}
|
||||
|
||||
for (i = 0; i < netdev->real_num_tx_queues; i++) {
|
||||
struct netdev_queue *dev_queue =
|
||||
netdev_get_tx_queue(netdev, i);
|
||||
|
|
@ -5130,8 +5102,6 @@ static void mlx5e_tx_timeout_work(struct work_struct *work)
|
|||
/* break if tried to reopened channels */
|
||||
break;
|
||||
}
|
||||
|
||||
netdev_unlock(netdev);
|
||||
}
|
||||
|
||||
static void mlx5e_tx_timeout(struct net_device *dev, unsigned int txqueue)
|
||||
|
|
|
|||
|
|
@ -2,6 +2,7 @@
|
|||
// Copyright (c) 2024, NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||
|
||||
#include <linux/io.h>
|
||||
#include <linux/iopoll.h>
|
||||
#include <linux/mlx5/transobj.h>
|
||||
#include "lib/clock.h"
|
||||
#include "mlx5_core.h"
|
||||
|
|
@ -15,7 +16,7 @@
|
|||
#define TEST_WC_NUM_WQES 255
|
||||
#define TEST_WC_LOG_CQ_SZ (order_base_2(TEST_WC_NUM_WQES))
|
||||
#define TEST_WC_SQ_LOG_WQ_SZ TEST_WC_LOG_CQ_SZ
|
||||
#define TEST_WC_POLLING_MAX_TIME_JIFFIES msecs_to_jiffies(100)
|
||||
#define TEST_WC_POLLING_MAX_TIME_USEC (100 * USEC_PER_MSEC)
|
||||
|
||||
struct mlx5_wc_cq {
|
||||
/* data path - accessed per cqe */
|
||||
|
|
@ -359,7 +360,6 @@ static int mlx5_wc_poll_cq(struct mlx5_wc_sq *sq)
|
|||
static void mlx5_core_test_wc(struct mlx5_core_dev *mdev)
|
||||
{
|
||||
unsigned int offset = 0;
|
||||
unsigned long expires;
|
||||
struct mlx5_wc_sq *sq;
|
||||
int i, err;
|
||||
|
||||
|
|
@ -389,13 +389,9 @@ static void mlx5_core_test_wc(struct mlx5_core_dev *mdev)
|
|||
|
||||
mlx5_wc_post_nop(sq, &offset, true);
|
||||
|
||||
expires = jiffies + TEST_WC_POLLING_MAX_TIME_JIFFIES;
|
||||
do {
|
||||
err = mlx5_wc_poll_cq(sq);
|
||||
if (err)
|
||||
usleep_range(2, 10);
|
||||
} while (mdev->wc_state == MLX5_WC_STATE_UNINITIALIZED &&
|
||||
time_is_after_jiffies(expires));
|
||||
poll_timeout_us(mlx5_wc_poll_cq(sq),
|
||||
mdev->wc_state != MLX5_WC_STATE_UNINITIALIZED, 10,
|
||||
TEST_WC_POLLING_MAX_TIME_USEC, false);
|
||||
|
||||
mlx5_wc_destroy_sq(sq);
|
||||
|
||||
|
|
|
|||
|
|
@ -1145,6 +1145,9 @@ ipv6_flow:
|
|||
return -EINVAL;
|
||||
}
|
||||
|
||||
dest |= FIELD_PREP(FBNIC_RPC_ACT_TBL0_DMA_HINT,
|
||||
FBNIC_RCD_HDR_AL_DMA_HINT_L4);
|
||||
|
||||
/* Write action table values */
|
||||
act_tcam->dest = dest;
|
||||
act_tcam->rss_en_mask = fbnic_flow_hash_2_rss_en_mask(fbn, hash_idx);
|
||||
|
|
|
|||
|
|
@ -51,8 +51,6 @@ int fbnic_fw_log_init(struct fbnic_dev *fbd)
|
|||
log->data_start = data;
|
||||
log->data_end = data + FBNIC_FW_LOG_SIZE;
|
||||
|
||||
fbnic_fw_log_enable(fbd, true);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
|
@ -63,7 +61,6 @@ void fbnic_fw_log_free(struct fbnic_dev *fbd)
|
|||
if (!fbnic_fw_log_ready(fbd))
|
||||
return;
|
||||
|
||||
fbnic_fw_log_disable(fbd);
|
||||
INIT_LIST_HEAD(&log->entries);
|
||||
log->size = 0;
|
||||
vfree(log->data_start);
|
||||
|
|
|
|||
|
|
@ -262,6 +262,23 @@ static int fbnic_set_mac(struct net_device *netdev, void *p)
|
|||
return 0;
|
||||
}
|
||||
|
||||
static int fbnic_change_mtu(struct net_device *dev, int new_mtu)
|
||||
{
|
||||
struct fbnic_net *fbn = netdev_priv(dev);
|
||||
|
||||
if (fbnic_check_split_frames(fbn->xdp_prog, new_mtu, fbn->hds_thresh)) {
|
||||
dev_err(&dev->dev,
|
||||
"MTU %d is larger than HDS threshold %d in XDP mode\n",
|
||||
new_mtu, fbn->hds_thresh);
|
||||
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
WRITE_ONCE(dev->mtu, new_mtu);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void fbnic_clear_rx_mode(struct fbnic_dev *fbd)
|
||||
{
|
||||
struct net_device *netdev = fbd->netdev;
|
||||
|
|
@ -533,6 +550,7 @@ static const struct net_device_ops fbnic_netdev_ops = {
|
|||
.ndo_start_xmit = fbnic_xmit_frame,
|
||||
.ndo_features_check = fbnic_features_check,
|
||||
.ndo_set_mac_address = fbnic_set_mac,
|
||||
.ndo_change_mtu = fbnic_change_mtu,
|
||||
.ndo_set_rx_mode = fbnic_set_rx_mode,
|
||||
.ndo_get_stats64 = fbnic_get_stats64,
|
||||
.ndo_bpf = fbnic_bpf,
|
||||
|
|
@ -787,6 +805,8 @@ struct net_device *fbnic_netdev_alloc(struct fbnic_dev *fbd)
|
|||
netdev->hw_enc_features |= netdev->features;
|
||||
netdev->features |= NETIF_F_NTUPLE;
|
||||
|
||||
netdev->xdp_features = NETDEV_XDP_ACT_BASIC | NETDEV_XDP_ACT_RX_SG;
|
||||
|
||||
netdev->min_mtu = IPV6_MIN_MTU;
|
||||
netdev->max_mtu = FBNIC_MAX_JUMBO_FRAME_SIZE - ETH_HLEN;
|
||||
|
||||
|
|
|
|||
|
|
@ -311,11 +311,17 @@ static int fbnic_probe(struct pci_dev *pdev, const struct pci_device_id *ent)
|
|||
goto free_irqs;
|
||||
}
|
||||
|
||||
err = fbnic_fw_log_init(fbd);
|
||||
if (err)
|
||||
dev_warn(fbd->dev,
|
||||
"Unable to initialize firmware log buffer: %d\n",
|
||||
err);
|
||||
|
||||
err = fbnic_fw_request_mbx(fbd);
|
||||
if (err) {
|
||||
dev_err(&pdev->dev,
|
||||
"Firmware mailbox initialization failure\n");
|
||||
goto free_irqs;
|
||||
goto free_fw_log;
|
||||
}
|
||||
|
||||
/* Send the request to enable the FW logging to host. Note if this
|
||||
|
|
@ -323,11 +329,7 @@ static int fbnic_probe(struct pci_dev *pdev, const struct pci_device_id *ent)
|
|||
* possible the FW is just too old to support the logging and needs
|
||||
* to be updated.
|
||||
*/
|
||||
err = fbnic_fw_log_init(fbd);
|
||||
if (err)
|
||||
dev_warn(fbd->dev,
|
||||
"Unable to initialize firmware log buffer: %d\n",
|
||||
err);
|
||||
fbnic_fw_log_enable(fbd, true);
|
||||
|
||||
fbnic_devlink_register(fbd);
|
||||
fbnic_devlink_otp_check(fbd, "error detected during probe");
|
||||
|
|
@ -374,6 +376,8 @@ init_failure_mode:
|
|||
* firmware updates for fixes.
|
||||
*/
|
||||
return 0;
|
||||
free_fw_log:
|
||||
fbnic_fw_log_free(fbd);
|
||||
free_irqs:
|
||||
fbnic_free_irqs(fbd);
|
||||
err_destroy_health:
|
||||
|
|
@ -408,8 +412,9 @@ static void fbnic_remove(struct pci_dev *pdev)
|
|||
fbnic_hwmon_unregister(fbd);
|
||||
fbnic_dbg_fbd_exit(fbd);
|
||||
fbnic_devlink_unregister(fbd);
|
||||
fbnic_fw_log_free(fbd);
|
||||
fbnic_fw_log_disable(fbd);
|
||||
fbnic_fw_free_mbx(fbd);
|
||||
fbnic_fw_log_free(fbd);
|
||||
fbnic_free_irqs(fbd);
|
||||
|
||||
fbnic_devlink_health_destroy(fbd);
|
||||
|
|
|
|||
|
|
@ -338,9 +338,8 @@ void fbnic_rss_reinit(struct fbnic_dev *fbd, struct fbnic_net *fbn)
|
|||
else if (tstamp_mask & (1u << flow_type))
|
||||
dest |= FBNIC_RPC_ACT_TBL0_TS_ENA;
|
||||
|
||||
if (act1_value[flow_type] & FBNIC_RPC_TCAM_ACT1_L4_VALID)
|
||||
dest |= FIELD_PREP(FBNIC_RPC_ACT_TBL0_DMA_HINT,
|
||||
FBNIC_RCD_HDR_AL_DMA_HINT_L4);
|
||||
dest |= FIELD_PREP(FBNIC_RPC_ACT_TBL0_DMA_HINT,
|
||||
FBNIC_RCD_HDR_AL_DMA_HINT_L4);
|
||||
|
||||
rss_en_mask = fbnic_flow_hash_2_rss_en_mask(fbn, flow_type);
|
||||
|
||||
|
|
|
|||
|
|
@ -2591,7 +2591,8 @@ write_ctl:
|
|||
}
|
||||
|
||||
static void fbnic_config_drop_mode_rcq(struct fbnic_napi_vector *nv,
|
||||
struct fbnic_ring *rcq, bool tx_pause)
|
||||
struct fbnic_ring *rcq, bool tx_pause,
|
||||
bool hdr_split)
|
||||
{
|
||||
struct fbnic_net *fbn = netdev_priv(nv->napi.dev);
|
||||
u32 drop_mode, rcq_ctl;
|
||||
|
|
@ -2604,22 +2605,26 @@ static void fbnic_config_drop_mode_rcq(struct fbnic_napi_vector *nv,
|
|||
/* Specify packet layout */
|
||||
rcq_ctl = FIELD_PREP(FBNIC_QUEUE_RDE_CTL0_DROP_MODE_MASK, drop_mode) |
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL0_MIN_HROOM_MASK, FBNIC_RX_HROOM) |
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL0_MIN_TROOM_MASK, FBNIC_RX_TROOM);
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL0_MIN_TROOM_MASK, FBNIC_RX_TROOM) |
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL0_EN_HDR_SPLIT, hdr_split);
|
||||
|
||||
fbnic_ring_wr32(rcq, FBNIC_QUEUE_RDE_CTL0, rcq_ctl);
|
||||
}
|
||||
|
||||
void fbnic_config_drop_mode(struct fbnic_net *fbn, bool tx_pause)
|
||||
void fbnic_config_drop_mode(struct fbnic_net *fbn, bool txp)
|
||||
{
|
||||
bool hds;
|
||||
int i, t;
|
||||
|
||||
hds = fbn->hds_thresh < FBNIC_HDR_BYTES_MIN;
|
||||
|
||||
for (i = 0; i < fbn->num_napi; i++) {
|
||||
struct fbnic_napi_vector *nv = fbn->napi[i];
|
||||
|
||||
for (t = 0; t < nv->rxt_count; t++) {
|
||||
struct fbnic_q_triad *qt = &nv->qt[nv->txt_count + t];
|
||||
|
||||
fbnic_config_drop_mode_rcq(nv, &qt->cmpl, tx_pause);
|
||||
fbnic_config_drop_mode_rcq(nv, &qt->cmpl, txp, hds);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -2670,20 +2675,18 @@ static void fbnic_enable_rcq(struct fbnic_napi_vector *nv,
|
|||
{
|
||||
struct fbnic_net *fbn = netdev_priv(nv->napi.dev);
|
||||
u32 log_size = fls(rcq->size_mask);
|
||||
u32 hds_thresh = fbn->hds_thresh;
|
||||
u32 rcq_ctl = 0;
|
||||
|
||||
fbnic_config_drop_mode_rcq(nv, rcq, fbn->tx_pause);
|
||||
bool hdr_split;
|
||||
u32 hds_thresh;
|
||||
|
||||
/* Force lower bound on MAX_HEADER_BYTES. Below this, all frames should
|
||||
* be split at L4. It would also result in the frames being split at
|
||||
* L2/L3 depending on the frame size.
|
||||
*/
|
||||
if (fbn->hds_thresh < FBNIC_HDR_BYTES_MIN) {
|
||||
rcq_ctl = FBNIC_QUEUE_RDE_CTL0_EN_HDR_SPLIT;
|
||||
hds_thresh = FBNIC_HDR_BYTES_MIN;
|
||||
}
|
||||
hdr_split = fbn->hds_thresh < FBNIC_HDR_BYTES_MIN;
|
||||
fbnic_config_drop_mode_rcq(nv, rcq, fbn->tx_pause, hdr_split);
|
||||
|
||||
hds_thresh = max(fbn->hds_thresh, FBNIC_HDR_BYTES_MIN);
|
||||
rcq_ctl |= FIELD_PREP(FBNIC_QUEUE_RDE_CTL1_PADLEN_MASK, FBNIC_RX_PAD) |
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL1_MAX_HDR_MASK, hds_thresh) |
|
||||
FIELD_PREP(FBNIC_QUEUE_RDE_CTL1_PAYLD_OFF_MASK,
|
||||
|
|
|
|||
|
|
@ -66,7 +66,7 @@ struct fbnic_net;
|
|||
(4096 - FBNIC_RX_HROOM - FBNIC_RX_TROOM - FBNIC_RX_PAD)
|
||||
#define FBNIC_HDS_THRESH_DEFAULT \
|
||||
(1536 - FBNIC_RX_PAD)
|
||||
#define FBNIC_HDR_BYTES_MIN 128
|
||||
#define FBNIC_HDR_BYTES_MIN 256
|
||||
|
||||
struct fbnic_pkt_buff {
|
||||
struct xdp_buff buff;
|
||||
|
|
|
|||
|
|
@ -576,7 +576,7 @@ static int sparx5_ptp_adjtime(struct ptp_clock_info *ptp, s64 delta)
|
|||
static struct ptp_clock_info sparx5_ptp_clock_info = {
|
||||
.owner = THIS_MODULE,
|
||||
.name = "sparx5 ptp",
|
||||
.max_adj = 200000,
|
||||
.max_adj = 10000000,
|
||||
.gettime64 = sparx5_ptp_gettime64,
|
||||
.settime64 = sparx5_ptp_settime64,
|
||||
.adjtime = sparx5_ptp_adjtime,
|
||||
|
|
|
|||
|
|
@ -35,7 +35,7 @@
|
|||
#define SPX5_SE_BURST_UNIT 4096
|
||||
|
||||
/* Dwrr */
|
||||
#define SPX5_DWRR_COST_MAX 63
|
||||
#define SPX5_DWRR_COST_MAX 31
|
||||
|
||||
struct sparx5_shaper {
|
||||
u32 mode;
|
||||
|
|
|
|||
|
|
@ -551,7 +551,28 @@ static int ocelot_port_stop(struct net_device *dev)
|
|||
return 0;
|
||||
}
|
||||
|
||||
static netdev_tx_t ocelot_port_xmit(struct sk_buff *skb, struct net_device *dev)
|
||||
static bool ocelot_xmit_timestamp(struct ocelot *ocelot, int port,
|
||||
struct sk_buff *skb, u32 *rew_op)
|
||||
{
|
||||
if (ocelot->ptp && (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) {
|
||||
struct sk_buff *clone = NULL;
|
||||
|
||||
if (ocelot_port_txtstamp_request(ocelot, port, skb, &clone)) {
|
||||
kfree_skb(skb);
|
||||
return false;
|
||||
}
|
||||
|
||||
if (clone)
|
||||
OCELOT_SKB_CB(skb)->clone = clone;
|
||||
|
||||
*rew_op = ocelot_ptp_rew_op(skb);
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
static netdev_tx_t ocelot_port_xmit_fdma(struct sk_buff *skb,
|
||||
struct net_device *dev)
|
||||
{
|
||||
struct ocelot_port_private *priv = netdev_priv(dev);
|
||||
struct ocelot_port *ocelot_port = &priv->port;
|
||||
|
|
@ -559,36 +580,52 @@ static netdev_tx_t ocelot_port_xmit(struct sk_buff *skb, struct net_device *dev)
|
|||
int port = priv->port.index;
|
||||
u32 rew_op = 0;
|
||||
|
||||
if (!static_branch_unlikely(&ocelot_fdma_enabled) &&
|
||||
!ocelot_can_inject(ocelot, 0))
|
||||
return NETDEV_TX_BUSY;
|
||||
if (!ocelot_xmit_timestamp(ocelot, port, skb, &rew_op))
|
||||
return NETDEV_TX_OK;
|
||||
|
||||
/* Check if timestamping is needed */
|
||||
if (ocelot->ptp && (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) {
|
||||
struct sk_buff *clone = NULL;
|
||||
|
||||
if (ocelot_port_txtstamp_request(ocelot, port, skb, &clone)) {
|
||||
kfree_skb(skb);
|
||||
return NETDEV_TX_OK;
|
||||
}
|
||||
|
||||
if (clone)
|
||||
OCELOT_SKB_CB(skb)->clone = clone;
|
||||
|
||||
rew_op = ocelot_ptp_rew_op(skb);
|
||||
}
|
||||
|
||||
if (static_branch_unlikely(&ocelot_fdma_enabled)) {
|
||||
ocelot_fdma_inject_frame(ocelot, port, rew_op, skb, dev);
|
||||
} else {
|
||||
ocelot_port_inject_frame(ocelot, port, 0, rew_op, skb);
|
||||
|
||||
consume_skb(skb);
|
||||
}
|
||||
ocelot_fdma_inject_frame(ocelot, port, rew_op, skb, dev);
|
||||
|
||||
return NETDEV_TX_OK;
|
||||
}
|
||||
|
||||
static netdev_tx_t ocelot_port_xmit_inj(struct sk_buff *skb,
|
||||
struct net_device *dev)
|
||||
{
|
||||
struct ocelot_port_private *priv = netdev_priv(dev);
|
||||
struct ocelot_port *ocelot_port = &priv->port;
|
||||
struct ocelot *ocelot = ocelot_port->ocelot;
|
||||
int port = priv->port.index;
|
||||
u32 rew_op = 0;
|
||||
|
||||
ocelot_lock_inj_grp(ocelot, 0);
|
||||
|
||||
if (!ocelot_can_inject(ocelot, 0)) {
|
||||
ocelot_unlock_inj_grp(ocelot, 0);
|
||||
return NETDEV_TX_BUSY;
|
||||
}
|
||||
|
||||
if (!ocelot_xmit_timestamp(ocelot, port, skb, &rew_op)) {
|
||||
ocelot_unlock_inj_grp(ocelot, 0);
|
||||
return NETDEV_TX_OK;
|
||||
}
|
||||
|
||||
ocelot_port_inject_frame(ocelot, port, 0, rew_op, skb);
|
||||
|
||||
ocelot_unlock_inj_grp(ocelot, 0);
|
||||
|
||||
consume_skb(skb);
|
||||
|
||||
return NETDEV_TX_OK;
|
||||
}
|
||||
|
||||
static netdev_tx_t ocelot_port_xmit(struct sk_buff *skb, struct net_device *dev)
|
||||
{
|
||||
if (static_branch_unlikely(&ocelot_fdma_enabled))
|
||||
return ocelot_port_xmit_fdma(skb, dev);
|
||||
|
||||
return ocelot_port_xmit_inj(skb, dev);
|
||||
}
|
||||
|
||||
enum ocelot_action_type {
|
||||
OCELOT_MACT_LEARN,
|
||||
OCELOT_MACT_FORGET,
|
||||
|
|
|
|||
|
|
@ -688,9 +688,9 @@ static int myri10ge_get_firmware_capabilities(struct myri10ge_priv *mgp)
|
|||
|
||||
/* probe for IPv6 TSO support */
|
||||
mgp->features = NETIF_F_SG | NETIF_F_HW_CSUM | NETIF_F_TSO;
|
||||
cmd.data0 = 0,
|
||||
cmd.data1 = 0,
|
||||
cmd.data2 = 0,
|
||||
cmd.data0 = 0;
|
||||
cmd.data1 = 0;
|
||||
cmd.data2 = 0;
|
||||
status = myri10ge_send_cmd(mgp, MXGEFW_CMD_GET_MAX_TSO6_HDR_SIZE,
|
||||
&cmd, 0);
|
||||
if (status == 0) {
|
||||
|
|
@ -821,9 +821,9 @@ static int myri10ge_change_pause(struct myri10ge_priv *mgp, int pause)
|
|||
int status, ctl;
|
||||
|
||||
ctl = pause ? MXGEFW_ENABLE_FLOW_CONTROL : MXGEFW_DISABLE_FLOW_CONTROL;
|
||||
cmd.data0 = 0,
|
||||
cmd.data1 = 0,
|
||||
cmd.data2 = 0,
|
||||
cmd.data0 = 0;
|
||||
cmd.data1 = 0;
|
||||
cmd.data2 = 0;
|
||||
status = myri10ge_send_cmd(mgp, ctl, &cmd, 0);
|
||||
|
||||
if (status) {
|
||||
|
|
|
|||
|
|
@ -5040,13 +5040,27 @@ static unsigned int stmmac_rx_buf2_len(struct stmmac_priv *priv,
|
|||
if (!priv->sph_active)
|
||||
return 0;
|
||||
|
||||
/* Not last descriptor */
|
||||
if (status & rx_not_ls)
|
||||
/* For GMAC4, when split header is enabled, in some rare cases, the
|
||||
* hardware does not fill buf2 of the first descriptor with payload.
|
||||
* Thus we cannot assume buf2 is always fully filled if it is not
|
||||
* the last descriptor. Otherwise, the length of buf2 of the second
|
||||
* descriptor will be calculated wrong and cause an oops.
|
||||
*
|
||||
* If this is the last descriptor, 'plen' is the length of the
|
||||
* received packet that was transferred to system memory.
|
||||
* Otherwise, it is the accumulated number of bytes that have been
|
||||
* transferred for the current packet.
|
||||
*
|
||||
* Thus 'plen - len' always gives the correct length of buf2.
|
||||
*/
|
||||
|
||||
/* Not GMAC4 and not last descriptor */
|
||||
if (priv->plat->core_type != DWMAC_CORE_GMAC4 && (status & rx_not_ls))
|
||||
return priv->dma_conf.dma_buf_sz;
|
||||
|
||||
/* GMAC4 or last descriptor */
|
||||
plen = stmmac_get_rx_frame_len(priv, p, coe);
|
||||
|
||||
/* Last descriptor */
|
||||
return plen - len;
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -1572,6 +1572,11 @@ destroy_macvlan_port:
|
|||
if (create)
|
||||
macvlan_port_destroy(port->dev);
|
||||
}
|
||||
/* @dev might have been made visible before an error was detected.
|
||||
* Make sure to observe an RCU grace period before our caller
|
||||
* (rtnl_newlink()) frees it.
|
||||
*/
|
||||
synchronize_net();
|
||||
return err;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(macvlan_common_newlink);
|
||||
|
|
|
|||
|
|
@ -355,6 +355,7 @@ netdev_tx_t ovpn_net_xmit(struct sk_buff *skb, struct net_device *dev)
|
|||
struct ovpn_priv *ovpn = netdev_priv(dev);
|
||||
struct sk_buff *segments, *curr, *next;
|
||||
struct sk_buff_head skb_list;
|
||||
unsigned int tx_bytes = 0;
|
||||
struct ovpn_peer *peer;
|
||||
__be16 proto;
|
||||
int ret;
|
||||
|
|
@ -365,7 +366,27 @@ netdev_tx_t ovpn_net_xmit(struct sk_buff *skb, struct net_device *dev)
|
|||
/* verify IP header size in network packet */
|
||||
proto = ovpn_ip_check_protocol(skb);
|
||||
if (unlikely(!proto || skb->protocol != proto))
|
||||
goto drop;
|
||||
goto drop_no_peer;
|
||||
|
||||
/* retrieve peer serving the destination IP of this packet */
|
||||
peer = ovpn_peer_get_by_dst(ovpn, skb);
|
||||
if (unlikely(!peer)) {
|
||||
switch (skb->protocol) {
|
||||
case htons(ETH_P_IP):
|
||||
net_dbg_ratelimited("%s: no peer to send data to dst=%pI4\n",
|
||||
netdev_name(ovpn->dev),
|
||||
&ip_hdr(skb)->daddr);
|
||||
break;
|
||||
case htons(ETH_P_IPV6):
|
||||
net_dbg_ratelimited("%s: no peer to send data to dst=%pI6c\n",
|
||||
netdev_name(ovpn->dev),
|
||||
&ipv6_hdr(skb)->daddr);
|
||||
break;
|
||||
}
|
||||
goto drop_no_peer;
|
||||
}
|
||||
/* dst was needed for peer selection - it can now be dropped */
|
||||
skb_dst_drop(skb);
|
||||
|
||||
if (skb_is_gso(skb)) {
|
||||
segments = skb_gso_segment(skb, 0);
|
||||
|
|
@ -394,36 +415,28 @@ netdev_tx_t ovpn_net_xmit(struct sk_buff *skb, struct net_device *dev)
|
|||
continue;
|
||||
}
|
||||
|
||||
/* only count what we actually send */
|
||||
tx_bytes += curr->len;
|
||||
__skb_queue_tail(&skb_list, curr);
|
||||
}
|
||||
|
||||
/* no segments survived: don't jump to 'drop' because we already
|
||||
* incremented the counter for each failure in the loop
|
||||
*/
|
||||
if (unlikely(skb_queue_empty(&skb_list))) {
|
||||
ovpn_peer_put(peer);
|
||||
return NETDEV_TX_OK;
|
||||
}
|
||||
skb_list.prev->next = NULL;
|
||||
|
||||
/* retrieve peer serving the destination IP of this packet */
|
||||
peer = ovpn_peer_get_by_dst(ovpn, skb);
|
||||
if (unlikely(!peer)) {
|
||||
switch (skb->protocol) {
|
||||
case htons(ETH_P_IP):
|
||||
net_dbg_ratelimited("%s: no peer to send data to dst=%pI4\n",
|
||||
netdev_name(ovpn->dev),
|
||||
&ip_hdr(skb)->daddr);
|
||||
break;
|
||||
case htons(ETH_P_IPV6):
|
||||
net_dbg_ratelimited("%s: no peer to send data to dst=%pI6c\n",
|
||||
netdev_name(ovpn->dev),
|
||||
&ipv6_hdr(skb)->daddr);
|
||||
break;
|
||||
}
|
||||
goto drop;
|
||||
}
|
||||
/* dst was needed for peer selection - it can now be dropped */
|
||||
skb_dst_drop(skb);
|
||||
|
||||
ovpn_peer_stats_increment_tx(&peer->vpn_stats, skb->len);
|
||||
ovpn_peer_stats_increment_tx(&peer->vpn_stats, tx_bytes);
|
||||
ovpn_send(ovpn, skb_list.next, peer);
|
||||
|
||||
return NETDEV_TX_OK;
|
||||
|
||||
drop:
|
||||
ovpn_peer_put(peer);
|
||||
drop_no_peer:
|
||||
dev_dstats_tx_dropped(ovpn->dev);
|
||||
skb_tx_error(skb);
|
||||
kfree_skb_list(skb);
|
||||
|
|
|
|||
|
|
@ -200,24 +200,6 @@ struct ovpn_socket *ovpn_socket_new(struct socket *sock, struct ovpn_peer *peer)
|
|||
ovpn_sock->sk = sk;
|
||||
kref_init(&ovpn_sock->refcount);
|
||||
|
||||
/* the newly created ovpn_socket is holding reference to sk,
|
||||
* therefore we increase its refcounter.
|
||||
*
|
||||
* This ovpn_socket instance is referenced by all peers
|
||||
* using the same socket.
|
||||
*
|
||||
* ovpn_socket_release() will take care of dropping the reference.
|
||||
*/
|
||||
sock_hold(sk);
|
||||
|
||||
ret = ovpn_socket_attach(ovpn_sock, sock, peer);
|
||||
if (ret < 0) {
|
||||
sock_put(sk);
|
||||
kfree(ovpn_sock);
|
||||
ovpn_sock = ERR_PTR(ret);
|
||||
goto sock_release;
|
||||
}
|
||||
|
||||
/* TCP sockets are per-peer, therefore they are linked to their unique
|
||||
* peer
|
||||
*/
|
||||
|
|
@ -234,7 +216,28 @@ struct ovpn_socket *ovpn_socket_new(struct socket *sock, struct ovpn_peer *peer)
|
|||
GFP_KERNEL);
|
||||
}
|
||||
|
||||
rcu_assign_sk_user_data(sk, ovpn_sock);
|
||||
/* the newly created ovpn_socket is holding reference to sk,
|
||||
* therefore we increase its refcounter.
|
||||
*
|
||||
* This ovpn_socket instance is referenced by all peers
|
||||
* using the same socket.
|
||||
*
|
||||
* ovpn_socket_release() will take care of dropping the reference.
|
||||
*/
|
||||
sock_hold(sk);
|
||||
|
||||
ret = ovpn_socket_attach(ovpn_sock, sock, peer);
|
||||
if (ret < 0) {
|
||||
if (sk->sk_protocol == IPPROTO_TCP)
|
||||
ovpn_peer_put(peer);
|
||||
else if (sk->sk_protocol == IPPROTO_UDP)
|
||||
netdev_put(peer->ovpn->dev, &ovpn_sock->dev_tracker);
|
||||
|
||||
sock_put(sk);
|
||||
kfree(ovpn_sock);
|
||||
ovpn_sock = ERR_PTR(ret);
|
||||
}
|
||||
|
||||
sock_release:
|
||||
release_sock(sk);
|
||||
return ovpn_sock;
|
||||
|
|
|
|||
|
|
@ -199,7 +199,19 @@ void ovpn_tcp_socket_detach(struct ovpn_socket *ovpn_sock)
|
|||
sk->sk_data_ready = peer->tcp.sk_cb.sk_data_ready;
|
||||
sk->sk_write_space = peer->tcp.sk_cb.sk_write_space;
|
||||
sk->sk_prot = peer->tcp.sk_cb.prot;
|
||||
sk->sk_socket->ops = peer->tcp.sk_cb.ops;
|
||||
|
||||
/* tcp_close() may race this function and could set
|
||||
* sk->sk_socket to NULL. It does so by invoking
|
||||
* sock_orphan(), which holds sk_callback_lock before
|
||||
* doing the assignment.
|
||||
*
|
||||
* For this reason we acquire the same lock to avoid
|
||||
* sk_socket to disappear under our feet
|
||||
*/
|
||||
write_lock_bh(&sk->sk_callback_lock);
|
||||
if (sk->sk_socket)
|
||||
sk->sk_socket->ops = peer->tcp.sk_cb.ops;
|
||||
write_unlock_bh(&sk->sk_callback_lock);
|
||||
|
||||
rcu_assign_sk_user_data(sk, NULL);
|
||||
}
|
||||
|
|
@ -487,6 +499,7 @@ int ovpn_tcp_socket_attach(struct ovpn_socket *ovpn_sock,
|
|||
/* make sure no pre-existing encapsulation handler exists */
|
||||
if (ovpn_sock->sk->sk_user_data)
|
||||
return -EBUSY;
|
||||
rcu_assign_sk_user_data(ovpn_sock->sk, ovpn_sock);
|
||||
|
||||
/* only a fully connected socket is expected. Connection should be
|
||||
* handled in userspace
|
||||
|
|
@ -495,13 +508,14 @@ int ovpn_tcp_socket_attach(struct ovpn_socket *ovpn_sock,
|
|||
net_err_ratelimited("%s: provided TCP socket is not in ESTABLISHED state: %d\n",
|
||||
netdev_name(peer->ovpn->dev),
|
||||
ovpn_sock->sk->sk_state);
|
||||
return -EINVAL;
|
||||
ret = -EINVAL;
|
||||
goto err;
|
||||
}
|
||||
|
||||
ret = strp_init(&peer->tcp.strp, ovpn_sock->sk, &cb);
|
||||
if (ret < 0) {
|
||||
DEBUG_NET_WARN_ON_ONCE(1);
|
||||
return ret;
|
||||
goto err;
|
||||
}
|
||||
|
||||
INIT_WORK(&peer->tcp.defer_del_work, ovpn_tcp_peer_del_work);
|
||||
|
|
@ -536,6 +550,9 @@ int ovpn_tcp_socket_attach(struct ovpn_socket *ovpn_sock,
|
|||
strp_check_rcv(&peer->tcp.strp);
|
||||
|
||||
return 0;
|
||||
err:
|
||||
rcu_assign_sk_user_data(ovpn_sock->sk, NULL);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static void ovpn_tcp_close(struct sock *sk, long timeout)
|
||||
|
|
|
|||
|
|
@ -386,6 +386,7 @@ int ovpn_udp_socket_attach(struct ovpn_socket *ovpn_sock, struct socket *sock,
|
|||
struct ovpn_priv *ovpn)
|
||||
{
|
||||
struct udp_tunnel_sock_cfg cfg = {
|
||||
.sk_user_data = ovpn_sock,
|
||||
.encap_type = UDP_ENCAP_OVPNINUDP,
|
||||
.encap_rcv = ovpn_udp_encap_recv,
|
||||
.encap_destroy = ovpn_udp_encap_destroy,
|
||||
|
|
|
|||
|
|
@ -3499,6 +3499,9 @@ static int of_phy_ports(struct phy_device *phydev)
|
|||
|
||||
port->parent_type = PHY_PORT_PHY;
|
||||
port->phy = phydev;
|
||||
|
||||
linkmode_copy(port->supported, phydev->supported);
|
||||
|
||||
err = phy_add_port(phydev, port);
|
||||
if (err) {
|
||||
phy_port_destroy(port);
|
||||
|
|
|
|||
|
|
@ -53,7 +53,7 @@ struct phy_port *phy_of_parse_port(struct device_node *dn)
|
|||
enum ethtool_link_medium medium;
|
||||
struct phy_port *port;
|
||||
const char *med_str;
|
||||
u32 pairs = 0, mediums = 0;
|
||||
u32 pairs = 0;
|
||||
int ret;
|
||||
|
||||
ret = fwnode_property_read_string(fwnode, "media", &med_str);
|
||||
|
|
@ -85,17 +85,12 @@ struct phy_port *phy_of_parse_port(struct device_node *dn)
|
|||
return ERR_PTR(-EINVAL);
|
||||
}
|
||||
|
||||
mediums |= BIT(medium);
|
||||
|
||||
if (!mediums)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
port = phy_port_alloc();
|
||||
if (!port)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
port->pairs = pairs;
|
||||
port->mediums = mediums;
|
||||
port->mediums = BIT(medium);
|
||||
|
||||
return port;
|
||||
}
|
||||
|
|
@ -113,16 +108,10 @@ EXPORT_SYMBOL_GPL(phy_of_parse_port);
|
|||
*/
|
||||
void phy_port_update_supported(struct phy_port *port)
|
||||
{
|
||||
__ETHTOOL_DECLARE_LINK_MODE_MASK(supported) = { 0 };
|
||||
__ETHTOOL_DECLARE_LINK_MODE_MASK(supported) = {0};
|
||||
unsigned long mode;
|
||||
int i;
|
||||
|
||||
for_each_set_bit(i, &port->mediums, __ETHTOOL_LINK_MEDIUM_LAST) {
|
||||
linkmode_zero(supported);
|
||||
phy_caps_medium_get_supported(supported, i, port->pairs);
|
||||
linkmode_or(port->supported, port->supported, supported);
|
||||
}
|
||||
|
||||
/* If there's no pairs specified, we grab the default number of
|
||||
* pairs as the max of the default pairs for each linkmode
|
||||
*/
|
||||
|
|
@ -132,6 +121,22 @@ void phy_port_update_supported(struct phy_port *port)
|
|||
port->pairs = max_t(int, port->pairs,
|
||||
ethtool_linkmode_n_pairs(mode));
|
||||
|
||||
for_each_set_bit(i, &port->mediums, __ETHTOOL_LINK_MEDIUM_LAST) {
|
||||
__ETHTOOL_DECLARE_LINK_MODE_MASK(med_supported) = {0};
|
||||
|
||||
phy_caps_medium_get_supported(med_supported, i, port->pairs);
|
||||
linkmode_or(supported, supported, med_supported);
|
||||
}
|
||||
|
||||
/* If port->supported is already populated, filter it out with the
|
||||
* medium/pair support. Otherwise, let's just use this medium-based
|
||||
* support as the port's supported list.
|
||||
*/
|
||||
if (linkmode_empty(port->supported))
|
||||
linkmode_copy(port->supported, supported);
|
||||
else
|
||||
linkmode_and(port->supported, supported, port->supported);
|
||||
|
||||
/* Serdes ports supported through SFP may not have any medium set,
|
||||
* as they will output PHY_INTERFACE_MODE_XXX modes. In that case, derive
|
||||
* the supported list based on these interfaces
|
||||
|
|
|
|||
|
|
@ -58,6 +58,16 @@ static const char driver_name[] = "catc";
|
|||
#define CTRL_QUEUE 16 /* Max control requests in flight (power of two) */
|
||||
#define RX_PKT_SZ 1600 /* Max size of receive packet for F5U011 */
|
||||
|
||||
/*
|
||||
* USB endpoints.
|
||||
*/
|
||||
|
||||
enum catc_usb_ep {
|
||||
CATC_USB_EP_CONTROL = 0,
|
||||
CATC_USB_EP_BULK = 1,
|
||||
CATC_USB_EP_INT_IN = 2,
|
||||
};
|
||||
|
||||
/*
|
||||
* Control requests.
|
||||
*/
|
||||
|
|
@ -765,6 +775,13 @@ static int catc_probe(struct usb_interface *intf, const struct usb_device_id *id
|
|||
u8 broadcast[ETH_ALEN];
|
||||
u8 *macbuf;
|
||||
int pktsz, ret = -ENOMEM;
|
||||
static const u8 bulk_ep_addr[] = {
|
||||
CATC_USB_EP_BULK | USB_DIR_OUT,
|
||||
CATC_USB_EP_BULK | USB_DIR_IN,
|
||||
0};
|
||||
static const u8 int_ep_addr[] = {
|
||||
CATC_USB_EP_INT_IN | USB_DIR_IN,
|
||||
0};
|
||||
|
||||
macbuf = kmalloc(ETH_ALEN, GFP_KERNEL);
|
||||
if (!macbuf)
|
||||
|
|
@ -777,6 +794,14 @@ static int catc_probe(struct usb_interface *intf, const struct usb_device_id *id
|
|||
goto fail_mem;
|
||||
}
|
||||
|
||||
/* Verify that all required endpoints are present */
|
||||
if (!usb_check_bulk_endpoints(intf, bulk_ep_addr) ||
|
||||
!usb_check_int_endpoints(intf, int_ep_addr)) {
|
||||
dev_err(dev, "Missing or invalid endpoints\n");
|
||||
ret = -ENODEV;
|
||||
goto fail_mem;
|
||||
}
|
||||
|
||||
netdev = alloc_etherdev(sizeof(struct catc));
|
||||
if (!netdev)
|
||||
goto fail_mem;
|
||||
|
|
@ -821,14 +846,14 @@ static int catc_probe(struct usb_interface *intf, const struct usb_device_id *id
|
|||
usb_fill_control_urb(catc->ctrl_urb, usbdev, usb_sndctrlpipe(usbdev, 0),
|
||||
NULL, NULL, 0, catc_ctrl_done, catc);
|
||||
|
||||
usb_fill_bulk_urb(catc->tx_urb, usbdev, usb_sndbulkpipe(usbdev, 1),
|
||||
NULL, 0, catc_tx_done, catc);
|
||||
usb_fill_bulk_urb(catc->tx_urb, usbdev, usb_sndbulkpipe(usbdev, CATC_USB_EP_BULK),
|
||||
NULL, 0, catc_tx_done, catc);
|
||||
|
||||
usb_fill_bulk_urb(catc->rx_urb, usbdev, usb_rcvbulkpipe(usbdev, 1),
|
||||
catc->rx_buf, pktsz, catc_rx_done, catc);
|
||||
usb_fill_bulk_urb(catc->rx_urb, usbdev, usb_rcvbulkpipe(usbdev, CATC_USB_EP_BULK),
|
||||
catc->rx_buf, pktsz, catc_rx_done, catc);
|
||||
|
||||
usb_fill_int_urb(catc->irq_urb, usbdev, usb_rcvintpipe(usbdev, 2),
|
||||
catc->irq_buf, 2, catc_irq_done, catc, 1);
|
||||
usb_fill_int_urb(catc->irq_urb, usbdev, usb_rcvintpipe(usbdev, CATC_USB_EP_INT_IN),
|
||||
catc->irq_buf, 2, catc_irq_done, catc, 1);
|
||||
|
||||
if (!catc->is_f5u011) {
|
||||
u32 *buf;
|
||||
|
|
|
|||
|
|
@ -11387,7 +11387,13 @@ static const struct pci_device_id card_ids[] = {
|
|||
{PCI_VENDOR_ID_INTEL, 0x1043, 0x8086, 0x2754, 0, 0, 0},
|
||||
{PCI_VENDOR_ID_INTEL, 0x1043, 0x8086, 0x2761, 0, 0, 0},
|
||||
{PCI_VENDOR_ID_INTEL, 0x1043, 0x8086, 0x2762, 0, 0, 0},
|
||||
{PCI_VDEVICE(INTEL, 0x104f), 0},
|
||||
/*
|
||||
* This ID conflicts with i40e, but the devices can be differentiated
|
||||
* because i40e devices use PCI_CLASS_NETWORK_ETHERNET and ipw2200
|
||||
* devices use PCI_CLASS_NETWORK_OTHER.
|
||||
*/
|
||||
{PCI_DEVICE(PCI_VENDOR_ID_INTEL, 0x104f),
|
||||
PCI_CLASS_NETWORK_OTHER << 8, 0xffff00, 0},
|
||||
{PCI_VDEVICE(INTEL, 0x4220), 0}, /* BG */
|
||||
{PCI_VDEVICE(INTEL, 0x4221), 0}, /* BG */
|
||||
{PCI_VDEVICE(INTEL, 0x4223), 0}, /* ABG */
|
||||
|
|
|
|||
|
|
@ -735,10 +735,11 @@ static void connect(struct backend_info *be)
|
|||
*/
|
||||
requested_num_queues = xenbus_read_unsigned(dev->otherend,
|
||||
"multi-queue-num-queues", 1);
|
||||
if (requested_num_queues > xenvif_max_queues) {
|
||||
if (requested_num_queues > xenvif_max_queues ||
|
||||
requested_num_queues == 0) {
|
||||
/* buggy or malicious guest */
|
||||
xenbus_dev_fatal(dev, -EINVAL,
|
||||
"guest requested %u queues, exceeding the maximum of %u.",
|
||||
"guest requested %u queues, but valid range is 1 - %u.",
|
||||
requested_num_queues, xenvif_max_queues);
|
||||
return;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1282,12 +1282,12 @@ static inline bool mlx5_rl_is_supported(struct mlx5_core_dev *dev)
|
|||
static inline int mlx5_core_is_mp_slave(struct mlx5_core_dev *dev)
|
||||
{
|
||||
return MLX5_CAP_GEN(dev, affiliate_nic_vport_criteria) &&
|
||||
MLX5_CAP_GEN(dev, num_vhca_ports) <= 1;
|
||||
MLX5_CAP_GEN_MAX(dev, num_vhca_ports) <= 1;
|
||||
}
|
||||
|
||||
static inline int mlx5_core_is_mp_master(struct mlx5_core_dev *dev)
|
||||
{
|
||||
return MLX5_CAP_GEN(dev, num_vhca_ports) > 1;
|
||||
return MLX5_CAP_GEN_MAX(dev, num_vhca_ports) > 1;
|
||||
}
|
||||
|
||||
static inline int mlx5_core_mp_enabled(struct mlx5_core_dev *dev)
|
||||
|
|
|
|||
|
|
@ -7,7 +7,7 @@
|
|||
#include <linux/skbuff.h>
|
||||
#include <net/netfilter/nf_conntrack_expect.h>
|
||||
|
||||
extern unsigned int (*nf_nat_amanda_hook)(struct sk_buff *skb,
|
||||
extern unsigned int (__rcu *nf_nat_amanda_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
|
|
|
|||
|
|
@ -26,7 +26,7 @@ struct nf_ct_ftp_master {
|
|||
|
||||
/* For NAT to hook in when we find a packet which describes what other
|
||||
* connection we should expect. */
|
||||
extern unsigned int (*nf_nat_ftp_hook)(struct sk_buff *skb,
|
||||
extern unsigned int (__rcu *nf_nat_ftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
enum nf_ct_ftp_type type,
|
||||
unsigned int protoff,
|
||||
|
|
|
|||
|
|
@ -8,7 +8,7 @@
|
|||
|
||||
#define IRC_PORT 6667
|
||||
|
||||
extern unsigned int (*nf_nat_irc_hook)(struct sk_buff *skb,
|
||||
extern unsigned int (__rcu *nf_nat_irc_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
#include <linux/netfilter.h>
|
||||
#include <linux/skbuff.h>
|
||||
|
||||
extern int (*nf_nat_snmp_hook)(struct sk_buff *skb,
|
||||
extern int (__rcu *nf_nat_snmp_hook)(struct sk_buff *skb,
|
||||
unsigned int protoff,
|
||||
struct nf_conn *ct,
|
||||
enum ip_conntrack_info ctinfo);
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@ struct tftphdr {
|
|||
#define TFTP_OPCODE_ACK 4
|
||||
#define TFTP_OPCODE_ERROR 5
|
||||
|
||||
extern unsigned int (*nf_nat_tftp_hook)(struct sk_buff *skb,
|
||||
extern unsigned int (__rcu *nf_nat_tftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
struct nf_conntrack_expect *exp);
|
||||
|
||||
|
|
|
|||
|
|
@ -8,7 +8,8 @@
|
|||
|
||||
#define MIN_VALID_LIFETIME (2*3600) /* 2 hours */
|
||||
|
||||
#define TEMP_VALID_LIFETIME (7*86400) /* 1 week */
|
||||
/* TEMP_VALID_LIFETIME default value as specified in RFC 8981 3.8 */
|
||||
#define TEMP_VALID_LIFETIME (2*86400) /* 2 days */
|
||||
#define TEMP_PREFERRED_LIFETIME (86400) /* 24 hours */
|
||||
#define REGEN_MIN_ADVANCE (2) /* 2 seconds */
|
||||
#define REGEN_MAX_RETRY (3)
|
||||
|
|
|
|||
|
|
@ -60,6 +60,8 @@ void ioam6_fill_trace_data(struct sk_buff *skb,
|
|||
struct ioam6_trace_hdr *trace,
|
||||
bool is_input);
|
||||
|
||||
u8 ioam6_trace_compute_nodelen(u32 trace_type);
|
||||
|
||||
int ioam6_init(void);
|
||||
void ioam6_exit(void);
|
||||
|
||||
|
|
|
|||
|
|
@ -1213,12 +1213,15 @@ int ipv6_sock_mc_drop(struct sock *sk, int ifindex,
|
|||
|
||||
static inline int ip6_sock_set_v6only(struct sock *sk)
|
||||
{
|
||||
if (inet_sk(sk)->inet_num)
|
||||
return -EINVAL;
|
||||
int ret = 0;
|
||||
|
||||
lock_sock(sk);
|
||||
sk->sk_ipv6only = true;
|
||||
if (inet_sk(sk)->inet_num)
|
||||
ret = -EINVAL;
|
||||
else
|
||||
sk->sk_ipv6only = true;
|
||||
release_sock(sk);
|
||||
return 0;
|
||||
return ret;
|
||||
}
|
||||
|
||||
static inline void ip6_sock_set_recverr(struct sock *sk)
|
||||
|
|
|
|||
|
|
@ -88,6 +88,12 @@ struct netns_ipv4 {
|
|||
int sysctl_tcp_rcvbuf_low_rtt;
|
||||
__cacheline_group_end(netns_ipv4_read_rx);
|
||||
|
||||
/* ICMP rate limiter hot cache line. */
|
||||
__cacheline_group_begin_aligned(icmp);
|
||||
atomic_t icmp_global_credit;
|
||||
u32 icmp_global_stamp;
|
||||
__cacheline_group_end_aligned(icmp);
|
||||
|
||||
struct inet_timewait_death_row tcp_death_row;
|
||||
struct udp_table *udp_table;
|
||||
|
||||
|
|
@ -141,8 +147,7 @@ struct netns_ipv4 {
|
|||
int sysctl_icmp_ratemask;
|
||||
int sysctl_icmp_msgs_per_sec;
|
||||
int sysctl_icmp_msgs_burst;
|
||||
atomic_t icmp_global_credit;
|
||||
u32 icmp_global_stamp;
|
||||
|
||||
u32 ip_rt_min_pmtu;
|
||||
int ip_rt_mtu_expires;
|
||||
int ip_rt_min_advmss;
|
||||
|
|
|
|||
|
|
@ -5,6 +5,10 @@
|
|||
/* bridge-specific defines for netfilter.
|
||||
*/
|
||||
|
||||
#ifndef __KERNEL__
|
||||
#include <netinet/if_ether.h> /* for __UAPI_DEF_ETHHDR if defined */
|
||||
#endif
|
||||
|
||||
#include <linux/in.h>
|
||||
#include <linux/netfilter.h>
|
||||
#include <linux/if_ether.h>
|
||||
|
|
|
|||
|
|
@ -244,14 +244,11 @@ br_multicast_port_vid_to_port_ctx(struct net_bridge_port *port, u16 vid)
|
|||
|
||||
lockdep_assert_held_once(&port->br->multicast_lock);
|
||||
|
||||
if (!br_opt_get(port->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED))
|
||||
return NULL;
|
||||
|
||||
/* Take RCU to access the vlan. */
|
||||
rcu_read_lock();
|
||||
|
||||
vlan = br_vlan_find(nbp_vlan_group_rcu(port), vid);
|
||||
if (vlan && !br_multicast_port_ctx_vlan_disabled(&vlan->port_mcast_ctx))
|
||||
if (vlan)
|
||||
pmctx = &vlan->port_mcast_ctx;
|
||||
|
||||
rcu_read_unlock();
|
||||
|
|
@ -701,7 +698,10 @@ br_multicast_port_ngroups_inc_one(struct net_bridge_mcast_port *pmctx,
|
|||
u32 max = READ_ONCE(pmctx->mdb_max_entries);
|
||||
u32 n = READ_ONCE(pmctx->mdb_n_entries);
|
||||
|
||||
if (max && n >= max) {
|
||||
/* enforce the max limit when it's a port pmctx or a port-vlan pmctx
|
||||
* with snooping enabled
|
||||
*/
|
||||
if (!br_multicast_port_ctx_vlan_disabled(pmctx) && max && n >= max) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(extack, "%s is already in %u groups, and mcast_max_groups=%u",
|
||||
what, n, max);
|
||||
return -E2BIG;
|
||||
|
|
@ -736,9 +736,7 @@ static int br_multicast_port_ngroups_inc(struct net_bridge_port *port,
|
|||
return err;
|
||||
}
|
||||
|
||||
/* Only count on the VLAN context if VID is given, and if snooping on
|
||||
* that VLAN is enabled.
|
||||
*/
|
||||
/* Only count on the VLAN context if VID is given */
|
||||
if (!group->vid)
|
||||
return 0;
|
||||
|
||||
|
|
@ -2011,6 +2009,18 @@ void br_multicast_port_ctx_init(struct net_bridge_port *port,
|
|||
timer_setup(&pmctx->ip6_own_query.timer,
|
||||
br_ip6_multicast_port_query_expired, 0);
|
||||
#endif
|
||||
/* initialize mdb_n_entries if a new port vlan is being created */
|
||||
if (vlan) {
|
||||
struct net_bridge_port_group *pg;
|
||||
u32 n = 0;
|
||||
|
||||
spin_lock_bh(&port->br->multicast_lock);
|
||||
hlist_for_each_entry(pg, &port->mglist, mglist)
|
||||
if (pg->key.addr.vid == vlan->vid)
|
||||
n++;
|
||||
WRITE_ONCE(pmctx->mdb_n_entries, n);
|
||||
spin_unlock_bh(&port->br->multicast_lock);
|
||||
}
|
||||
}
|
||||
|
||||
void br_multicast_port_ctx_deinit(struct net_bridge_mcast_port *pmctx)
|
||||
|
|
@ -2094,25 +2104,6 @@ static void __br_multicast_enable_port_ctx(struct net_bridge_mcast_port *pmctx)
|
|||
br_ip4_multicast_add_router(brmctx, pmctx);
|
||||
br_ip6_multicast_add_router(brmctx, pmctx);
|
||||
}
|
||||
|
||||
if (br_multicast_port_ctx_is_vlan(pmctx)) {
|
||||
struct net_bridge_port_group *pg;
|
||||
u32 n = 0;
|
||||
|
||||
/* The mcast_n_groups counter might be wrong. First,
|
||||
* BR_VLFLAG_MCAST_ENABLED is toggled before temporary entries
|
||||
* are flushed, thus mcast_n_groups after the toggle does not
|
||||
* reflect the true values. And second, permanent entries added
|
||||
* while BR_VLFLAG_MCAST_ENABLED was disabled, are not reflected
|
||||
* either. Thus we have to refresh the counter.
|
||||
*/
|
||||
|
||||
hlist_for_each_entry(pg, &pmctx->port->mglist, mglist) {
|
||||
if (pg->key.addr.vid == pmctx->vlan->vid)
|
||||
n++;
|
||||
}
|
||||
WRITE_ONCE(pmctx->mdb_n_entries, n);
|
||||
}
|
||||
}
|
||||
|
||||
static void br_multicast_enable_port_ctx(struct net_bridge_mcast_port *pmctx)
|
||||
|
|
|
|||
|
|
@ -231,10 +231,13 @@ static bool use_backlog_threads(void)
|
|||
static inline void backlog_lock_irq_save(struct softnet_data *sd,
|
||||
unsigned long *flags)
|
||||
{
|
||||
if (IS_ENABLED(CONFIG_RPS) || use_backlog_threads())
|
||||
if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
|
||||
spin_lock_irqsave(&sd->input_pkt_queue.lock, *flags);
|
||||
else
|
||||
} else {
|
||||
local_irq_save(*flags);
|
||||
if (IS_ENABLED(CONFIG_RPS) || use_backlog_threads())
|
||||
spin_lock(&sd->input_pkt_queue.lock);
|
||||
}
|
||||
}
|
||||
|
||||
static inline void backlog_lock_irq_disable(struct softnet_data *sd)
|
||||
|
|
@ -248,9 +251,13 @@ static inline void backlog_lock_irq_disable(struct softnet_data *sd)
|
|||
static inline void backlog_unlock_irq_restore(struct softnet_data *sd,
|
||||
unsigned long flags)
|
||||
{
|
||||
if (IS_ENABLED(CONFIG_RPS) || use_backlog_threads())
|
||||
spin_unlock(&sd->input_pkt_queue.lock);
|
||||
local_irq_restore(flags);
|
||||
if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
|
||||
spin_unlock_irqrestore(&sd->input_pkt_queue.lock, flags);
|
||||
} else {
|
||||
if (IS_ENABLED(CONFIG_RPS) || use_backlog_threads())
|
||||
spin_unlock(&sd->input_pkt_queue.lock);
|
||||
local_irq_restore(flags);
|
||||
}
|
||||
}
|
||||
|
||||
static inline void backlog_unlock_irq_enable(struct softnet_data *sd)
|
||||
|
|
@ -737,7 +744,7 @@ static struct net_device_path *dev_fwd_path(struct net_device_path_stack *stack)
|
|||
{
|
||||
int k = stack->num_paths++;
|
||||
|
||||
if (WARN_ON_ONCE(k >= NET_DEVICE_PATH_STACK_MAX))
|
||||
if (k >= NET_DEVICE_PATH_STACK_MAX)
|
||||
return NULL;
|
||||
|
||||
return &stack->path[k];
|
||||
|
|
|
|||
|
|
@ -7266,10 +7266,15 @@ void skb_attempt_defer_free(struct sk_buff *skb)
|
|||
{
|
||||
struct skb_defer_node *sdn;
|
||||
unsigned long defer_count;
|
||||
int cpu = skb->alloc_cpu;
|
||||
unsigned int defer_max;
|
||||
bool kick;
|
||||
int cpu;
|
||||
|
||||
/* zero copy notifications should not be delayed. */
|
||||
if (skb_zcopy(skb))
|
||||
goto nodefer;
|
||||
|
||||
cpu = skb->alloc_cpu;
|
||||
if (cpu == raw_smp_processor_id() ||
|
||||
WARN_ON_ONCE(cpu >= nr_cpu_ids) ||
|
||||
!cpu_online(cpu)) {
|
||||
|
|
|
|||
|
|
@ -250,7 +250,8 @@ bool icmp_global_allow(struct net *net)
|
|||
if (delta < HZ / 50)
|
||||
return false;
|
||||
|
||||
incr = READ_ONCE(net->ipv4.sysctl_icmp_msgs_per_sec) * delta / HZ;
|
||||
incr = READ_ONCE(net->ipv4.sysctl_icmp_msgs_per_sec);
|
||||
incr = div_u64((u64)incr * delta, HZ);
|
||||
if (!incr)
|
||||
return false;
|
||||
|
||||
|
|
@ -315,23 +316,29 @@ static bool icmpv4_xrlim_allow(struct net *net, struct rtable *rt,
|
|||
struct dst_entry *dst = &rt->dst;
|
||||
struct inet_peer *peer;
|
||||
struct net_device *dev;
|
||||
int peer_timeout;
|
||||
bool rc = true;
|
||||
|
||||
if (!apply_ratelimit)
|
||||
return true;
|
||||
|
||||
peer_timeout = READ_ONCE(net->ipv4.sysctl_icmp_ratelimit);
|
||||
if (!peer_timeout)
|
||||
goto out;
|
||||
|
||||
/* No rate limit on loopback */
|
||||
rcu_read_lock();
|
||||
dev = dst_dev_rcu(dst);
|
||||
if (dev && (dev->flags & IFF_LOOPBACK))
|
||||
goto out;
|
||||
goto out_unlock;
|
||||
|
||||
peer = inet_getpeer_v4(net->ipv4.peers, fl4->daddr,
|
||||
l3mdev_master_ifindex_rcu(dev));
|
||||
rc = inet_peer_xrlim_allow(peer,
|
||||
READ_ONCE(net->ipv4.sysctl_icmp_ratelimit));
|
||||
out:
|
||||
rc = inet_peer_xrlim_allow(peer, peer_timeout);
|
||||
|
||||
out_unlock:
|
||||
rcu_read_unlock();
|
||||
out:
|
||||
if (!rc)
|
||||
__ICMP_INC_STATS(net, ICMP_MIB_RATELIMITHOST);
|
||||
else
|
||||
|
|
|
|||
|
|
@ -148,7 +148,7 @@ void ping_unhash(struct sock *sk)
|
|||
pr_debug("ping_unhash(isk=%p,isk->num=%u)\n", isk, isk->inet_num);
|
||||
spin_lock(&ping_table.lock);
|
||||
if (sk_del_node_init_rcu(sk)) {
|
||||
isk->inet_num = 0;
|
||||
WRITE_ONCE(isk->inet_num, 0);
|
||||
isk->inet_sport = 0;
|
||||
sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
|
||||
}
|
||||
|
|
@ -181,31 +181,35 @@ static struct sock *ping_lookup(struct net *net, struct sk_buff *skb, u16 ident)
|
|||
}
|
||||
|
||||
sk_for_each_rcu(sk, hslot) {
|
||||
int bound_dev_if;
|
||||
|
||||
if (!net_eq(sock_net(sk), net))
|
||||
continue;
|
||||
isk = inet_sk(sk);
|
||||
|
||||
pr_debug("iterate\n");
|
||||
if (isk->inet_num != ident)
|
||||
if (READ_ONCE(isk->inet_num) != ident)
|
||||
continue;
|
||||
|
||||
bound_dev_if = READ_ONCE(sk->sk_bound_dev_if);
|
||||
if (skb->protocol == htons(ETH_P_IP) &&
|
||||
sk->sk_family == AF_INET) {
|
||||
pr_debug("found: %p: num=%d, daddr=%pI4, dif=%d\n", sk,
|
||||
(int) isk->inet_num, &isk->inet_rcv_saddr,
|
||||
sk->sk_bound_dev_if);
|
||||
__be32 rcv_saddr = READ_ONCE(isk->inet_rcv_saddr);
|
||||
|
||||
if (isk->inet_rcv_saddr &&
|
||||
isk->inet_rcv_saddr != ip_hdr(skb)->daddr)
|
||||
pr_debug("found: %p: num=%d, daddr=%pI4, dif=%d\n", sk,
|
||||
ident, &rcv_saddr,
|
||||
bound_dev_if);
|
||||
|
||||
if (rcv_saddr && rcv_saddr != ip_hdr(skb)->daddr)
|
||||
continue;
|
||||
#if IS_ENABLED(CONFIG_IPV6)
|
||||
} else if (skb->protocol == htons(ETH_P_IPV6) &&
|
||||
sk->sk_family == AF_INET6) {
|
||||
|
||||
pr_debug("found: %p: num=%d, daddr=%pI6c, dif=%d\n", sk,
|
||||
(int) isk->inet_num,
|
||||
ident,
|
||||
&sk->sk_v6_rcv_saddr,
|
||||
sk->sk_bound_dev_if);
|
||||
bound_dev_if);
|
||||
|
||||
if (!ipv6_addr_any(&sk->sk_v6_rcv_saddr) &&
|
||||
!ipv6_addr_equal(&sk->sk_v6_rcv_saddr,
|
||||
|
|
@ -216,8 +220,8 @@ static struct sock *ping_lookup(struct net *net, struct sk_buff *skb, u16 ident)
|
|||
continue;
|
||||
}
|
||||
|
||||
if (sk->sk_bound_dev_if && sk->sk_bound_dev_if != dif &&
|
||||
sk->sk_bound_dev_if != sdif)
|
||||
if (bound_dev_if && bound_dev_if != dif &&
|
||||
bound_dev_if != sdif)
|
||||
continue;
|
||||
|
||||
goto exit;
|
||||
|
|
@ -392,7 +396,9 @@ static void ping_set_saddr(struct sock *sk, struct sockaddr_unsized *saddr)
|
|||
if (saddr->sa_family == AF_INET) {
|
||||
struct inet_sock *isk = inet_sk(sk);
|
||||
struct sockaddr_in *addr = (struct sockaddr_in *) saddr;
|
||||
isk->inet_rcv_saddr = isk->inet_saddr = addr->sin_addr.s_addr;
|
||||
|
||||
isk->inet_saddr = addr->sin_addr.s_addr;
|
||||
WRITE_ONCE(isk->inet_rcv_saddr, addr->sin_addr.s_addr);
|
||||
#if IS_ENABLED(CONFIG_IPV6)
|
||||
} else if (saddr->sa_family == AF_INET6) {
|
||||
struct sockaddr_in6 *addr = (struct sockaddr_in6 *) saddr;
|
||||
|
|
@ -850,7 +856,8 @@ int ping_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, int flags,
|
|||
struct sk_buff *skb;
|
||||
int copied, err;
|
||||
|
||||
pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk, isk->inet_num);
|
||||
pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk,
|
||||
READ_ONCE(isk->inet_num));
|
||||
|
||||
err = -EOPNOTSUPP;
|
||||
if (flags & MSG_OOB)
|
||||
|
|
|
|||
|
|
@ -952,7 +952,7 @@ static int __net_init inet6_net_init(struct net *net)
|
|||
int err = 0;
|
||||
|
||||
net->ipv6.sysctl.bindv6only = 0;
|
||||
net->ipv6.sysctl.icmpv6_time = 1*HZ;
|
||||
net->ipv6.sysctl.icmpv6_time = HZ / 10;
|
||||
net->ipv6.sysctl.icmpv6_echo_ignore_all = 0;
|
||||
net->ipv6.sysctl.icmpv6_echo_ignore_multicast = 0;
|
||||
net->ipv6.sysctl.icmpv6_echo_ignore_anycast = 0;
|
||||
|
|
|
|||
|
|
@ -931,6 +931,11 @@ static bool ipv6_hop_ioam(struct sk_buff *skb, int optoff)
|
|||
if (hdr->opt_len < 2 + sizeof(*trace) + trace->remlen * 4)
|
||||
goto drop;
|
||||
|
||||
/* Inconsistent Pre-allocated Trace header */
|
||||
if (trace->nodelen !=
|
||||
ioam6_trace_compute_nodelen(be32_to_cpu(trace->type_be32)))
|
||||
goto drop;
|
||||
|
||||
/* Ignore if the IOAM namespace is unknown */
|
||||
ns = ioam6_namespace(dev_net(skb->dev), trace->namespace_id);
|
||||
if (!ns)
|
||||
|
|
|
|||
|
|
@ -217,16 +217,15 @@ static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
|
|||
} else if (dev && (dev->flags & IFF_LOOPBACK)) {
|
||||
res = true;
|
||||
} else {
|
||||
struct rt6_info *rt = dst_rt6_info(dst);
|
||||
int tmo = net->ipv6.sysctl.icmpv6_time;
|
||||
int tmo = READ_ONCE(net->ipv6.sysctl.icmpv6_time);
|
||||
struct inet_peer *peer;
|
||||
|
||||
/* Give more bandwidth to wider prefixes. */
|
||||
if (rt->rt6i_dst.plen < 128)
|
||||
tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
|
||||
|
||||
peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr);
|
||||
res = inet_peer_xrlim_allow(peer, tmo);
|
||||
if (!tmo) {
|
||||
res = true;
|
||||
} else {
|
||||
peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr);
|
||||
res = inet_peer_xrlim_allow(peer, tmo);
|
||||
}
|
||||
}
|
||||
rcu_read_unlock();
|
||||
if (!res)
|
||||
|
|
|
|||
|
|
@ -690,6 +690,20 @@ struct ioam6_namespace *ioam6_namespace(struct net *net, __be16 id)
|
|||
return rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params);
|
||||
}
|
||||
|
||||
#define IOAM6_MASK_SHORT_FIELDS 0xff1ffc00
|
||||
#define IOAM6_MASK_WIDE_FIELDS 0x00e00000
|
||||
|
||||
u8 ioam6_trace_compute_nodelen(u32 trace_type)
|
||||
{
|
||||
u8 nodelen = hweight32(trace_type & IOAM6_MASK_SHORT_FIELDS)
|
||||
* (sizeof(__be32) / 4);
|
||||
|
||||
nodelen += hweight32(trace_type & IOAM6_MASK_WIDE_FIELDS)
|
||||
* (sizeof(__be64) / 4);
|
||||
|
||||
return nodelen;
|
||||
}
|
||||
|
||||
static void __ioam6_fill_trace_data(struct sk_buff *skb,
|
||||
struct ioam6_namespace *ns,
|
||||
struct ioam6_trace_hdr *trace,
|
||||
|
|
|
|||
|
|
@ -22,9 +22,6 @@
|
|||
#include <net/ip6_route.h>
|
||||
#include <net/addrconf.h>
|
||||
|
||||
#define IOAM6_MASK_SHORT_FIELDS 0xff100000
|
||||
#define IOAM6_MASK_WIDE_FIELDS 0xe00000
|
||||
|
||||
struct ioam6_lwt_encap {
|
||||
struct ipv6_hopopt_hdr eh;
|
||||
u8 pad[2]; /* 2-octet padding for 4n-alignment */
|
||||
|
|
@ -93,13 +90,8 @@ static bool ioam6_validate_trace_hdr(struct ioam6_trace_hdr *trace)
|
|||
trace->type.bit21 | trace->type.bit23)
|
||||
return false;
|
||||
|
||||
trace->nodelen = 0;
|
||||
fields = be32_to_cpu(trace->type_be32);
|
||||
|
||||
trace->nodelen += hweight32(fields & IOAM6_MASK_SHORT_FIELDS)
|
||||
* (sizeof(__be32) / 4);
|
||||
trace->nodelen += hweight32(fields & IOAM6_MASK_WIDE_FIELDS)
|
||||
* (sizeof(__be64) / 4);
|
||||
trace->nodelen = ioam6_trace_compute_nodelen(fields);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1139,7 +1139,7 @@ static int fib6_add_rt2node(struct fib6_node *fn, struct fib6_info *rt,
|
|||
fib6_add_gc_list(iter);
|
||||
}
|
||||
if (!(rt->fib6_flags & (RTF_ADDRCONF | RTF_PREFIX_RT)) &&
|
||||
!iter->fib6_nh->fib_nh_gw_family) {
|
||||
(iter->nh || !iter->fib6_nh->fib_nh_gw_family)) {
|
||||
iter->fib6_flags &= ~RTF_ADDRCONF;
|
||||
iter->fib6_flags &= ~RTF_PREFIX_RT;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -70,6 +70,7 @@ static int mctp_fill_addrinfo(struct sk_buff *skb,
|
|||
return -EMSGSIZE;
|
||||
|
||||
hdr = nlmsg_data(nlh);
|
||||
memset(hdr, 0, sizeof(*hdr));
|
||||
hdr->ifa_family = AF_MCTP;
|
||||
hdr->ifa_prefixlen = 0;
|
||||
hdr->ifa_flags = 0;
|
||||
|
|
|
|||
|
|
@ -218,6 +218,7 @@ static int mctp_fill_neigh(struct sk_buff *skb, u32 portid, u32 seq, int event,
|
|||
return -EMSGSIZE;
|
||||
|
||||
hdr = nlmsg_data(nlh);
|
||||
memset(hdr, 0, sizeof(*hdr));
|
||||
hdr->ndm_family = AF_MCTP;
|
||||
hdr->ndm_ifindex = dev->ifindex;
|
||||
hdr->ndm_state = 0; // TODO other state bits?
|
||||
|
|
|
|||
|
|
@ -1643,6 +1643,7 @@ static int mctp_fill_rtinfo(struct sk_buff *skb, struct mctp_route *rt,
|
|||
return -EMSGSIZE;
|
||||
|
||||
hdr = nlmsg_data(nlh);
|
||||
memset(hdr, 0, sizeof(*hdr));
|
||||
hdr->rtm_family = AF_MCTP;
|
||||
|
||||
/* we use the _len fields as a number of EIDs, rather than
|
||||
|
|
|
|||
|
|
@ -10,7 +10,8 @@
|
|||
#include <net/ip_vs.h>
|
||||
|
||||
static int
|
||||
sctp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp);
|
||||
sctp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int sctphoff);
|
||||
|
||||
static int
|
||||
sctp_conn_schedule(struct netns_ipvs *ipvs, int af, struct sk_buff *skb,
|
||||
|
|
@ -108,7 +109,7 @@ sctp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!sctp_csum_check(cp->af, skb, pp))
|
||||
if (!sctp_csum_check(cp->af, skb, pp, sctphoff))
|
||||
return 0;
|
||||
|
||||
/* Call application helper if needed */
|
||||
|
|
@ -156,7 +157,7 @@ sctp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!sctp_csum_check(cp->af, skb, pp))
|
||||
if (!sctp_csum_check(cp->af, skb, pp, sctphoff))
|
||||
return 0;
|
||||
|
||||
/* Call application helper if needed */
|
||||
|
|
@ -185,19 +186,12 @@ sctp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
}
|
||||
|
||||
static int
|
||||
sctp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp)
|
||||
sctp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int sctphoff)
|
||||
{
|
||||
unsigned int sctphoff;
|
||||
struct sctphdr *sh;
|
||||
__le32 cmp, val;
|
||||
|
||||
#ifdef CONFIG_IP_VS_IPV6
|
||||
if (af == AF_INET6)
|
||||
sctphoff = sizeof(struct ipv6hdr);
|
||||
else
|
||||
#endif
|
||||
sctphoff = ip_hdrlen(skb);
|
||||
|
||||
sh = (struct sctphdr *)(skb->data + sctphoff);
|
||||
cmp = sh->checksum;
|
||||
val = sctp_compute_cksum(skb, sctphoff);
|
||||
|
|
|
|||
|
|
@ -28,7 +28,8 @@
|
|||
#include <net/ip_vs.h>
|
||||
|
||||
static int
|
||||
tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp);
|
||||
tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int tcphoff);
|
||||
|
||||
static int
|
||||
tcp_conn_schedule(struct netns_ipvs *ipvs, int af, struct sk_buff *skb,
|
||||
|
|
@ -165,7 +166,7 @@ tcp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!tcp_csum_check(cp->af, skb, pp))
|
||||
if (!tcp_csum_check(cp->af, skb, pp, tcphoff))
|
||||
return 0;
|
||||
|
||||
/* Call application helper if needed */
|
||||
|
|
@ -243,7 +244,7 @@ tcp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!tcp_csum_check(cp->af, skb, pp))
|
||||
if (!tcp_csum_check(cp->af, skb, pp, tcphoff))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
|
|
@ -300,17 +301,9 @@ tcp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
|
||||
|
||||
static int
|
||||
tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp)
|
||||
tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int tcphoff)
|
||||
{
|
||||
unsigned int tcphoff;
|
||||
|
||||
#ifdef CONFIG_IP_VS_IPV6
|
||||
if (af == AF_INET6)
|
||||
tcphoff = sizeof(struct ipv6hdr);
|
||||
else
|
||||
#endif
|
||||
tcphoff = ip_hdrlen(skb);
|
||||
|
||||
switch (skb->ip_summed) {
|
||||
case CHECKSUM_NONE:
|
||||
skb->csum = skb_checksum(skb, tcphoff, skb->len - tcphoff, 0);
|
||||
|
|
@ -321,7 +314,7 @@ tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp)
|
|||
if (csum_ipv6_magic(&ipv6_hdr(skb)->saddr,
|
||||
&ipv6_hdr(skb)->daddr,
|
||||
skb->len - tcphoff,
|
||||
ipv6_hdr(skb)->nexthdr,
|
||||
IPPROTO_TCP,
|
||||
skb->csum)) {
|
||||
IP_VS_DBG_RL_PKT(0, af, pp, skb, 0,
|
||||
"Failed checksum for");
|
||||
|
|
|
|||
|
|
@ -24,7 +24,8 @@
|
|||
#include <net/ip6_checksum.h>
|
||||
|
||||
static int
|
||||
udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp);
|
||||
udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int udphoff);
|
||||
|
||||
static int
|
||||
udp_conn_schedule(struct netns_ipvs *ipvs, int af, struct sk_buff *skb,
|
||||
|
|
@ -154,7 +155,7 @@ udp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!udp_csum_check(cp->af, skb, pp))
|
||||
if (!udp_csum_check(cp->af, skb, pp, udphoff))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
|
|
@ -237,7 +238,7 @@ udp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
int ret;
|
||||
|
||||
/* Some checks before mangling */
|
||||
if (!udp_csum_check(cp->af, skb, pp))
|
||||
if (!udp_csum_check(cp->af, skb, pp, udphoff))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
|
|
@ -296,17 +297,10 @@ udp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|||
|
||||
|
||||
static int
|
||||
udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp)
|
||||
udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
unsigned int udphoff)
|
||||
{
|
||||
struct udphdr _udph, *uh;
|
||||
unsigned int udphoff;
|
||||
|
||||
#ifdef CONFIG_IP_VS_IPV6
|
||||
if (af == AF_INET6)
|
||||
udphoff = sizeof(struct ipv6hdr);
|
||||
else
|
||||
#endif
|
||||
udphoff = ip_hdrlen(skb);
|
||||
|
||||
uh = skb_header_pointer(skb, udphoff, sizeof(_udph), &_udph);
|
||||
if (uh == NULL)
|
||||
|
|
@ -324,7 +318,7 @@ udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp)
|
|||
if (csum_ipv6_magic(&ipv6_hdr(skb)->saddr,
|
||||
&ipv6_hdr(skb)->daddr,
|
||||
skb->len - udphoff,
|
||||
ipv6_hdr(skb)->nexthdr,
|
||||
IPPROTO_UDP,
|
||||
skb->csum)) {
|
||||
IP_VS_DBG_RL_PKT(0, af, pp, skb, 0,
|
||||
"Failed checksum for");
|
||||
|
|
|
|||
|
|
@ -294,6 +294,12 @@ static inline bool decrement_ttl(struct netns_ipvs *ipvs,
|
|||
return true;
|
||||
}
|
||||
|
||||
/* rt has device that is down */
|
||||
static bool rt_dev_is_down(const struct net_device *dev)
|
||||
{
|
||||
return dev && !netif_running(dev);
|
||||
}
|
||||
|
||||
/* Get route to destination or remote server */
|
||||
static int
|
||||
__ip_vs_get_out_rt(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb,
|
||||
|
|
@ -309,9 +315,11 @@ __ip_vs_get_out_rt(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb,
|
|||
|
||||
if (dest) {
|
||||
dest_dst = __ip_vs_dst_check(dest);
|
||||
if (likely(dest_dst))
|
||||
if (likely(dest_dst)) {
|
||||
rt = dst_rtable(dest_dst->dst_cache);
|
||||
else {
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.ip;
|
||||
} else {
|
||||
dest_dst = ip_vs_dest_dst_alloc();
|
||||
spin_lock_bh(&dest->dst_lock);
|
||||
if (!dest_dst) {
|
||||
|
|
@ -327,14 +335,22 @@ __ip_vs_get_out_rt(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb,
|
|||
ip_vs_dest_dst_free(dest_dst);
|
||||
goto err_unreach;
|
||||
}
|
||||
__ip_vs_dst_set(dest, dest_dst, &rt->dst, 0);
|
||||
/* It is forbidden to attach dest->dest_dst if
|
||||
* device is going down.
|
||||
*/
|
||||
if (!rt_dev_is_down(dst_dev_rcu(&rt->dst)))
|
||||
__ip_vs_dst_set(dest, dest_dst, &rt->dst, 0);
|
||||
else
|
||||
noref = 0;
|
||||
spin_unlock_bh(&dest->dst_lock);
|
||||
IP_VS_DBG(10, "new dst %pI4, src %pI4, refcnt=%d\n",
|
||||
&dest->addr.ip, &dest_dst->dst_saddr.ip,
|
||||
rcuref_read(&rt->dst.__rcuref));
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.ip;
|
||||
if (!noref)
|
||||
ip_vs_dest_dst_free(dest_dst);
|
||||
}
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.ip;
|
||||
} else {
|
||||
noref = 0;
|
||||
|
||||
|
|
@ -471,9 +487,11 @@ __ip_vs_get_out_rt_v6(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb,
|
|||
|
||||
if (dest) {
|
||||
dest_dst = __ip_vs_dst_check(dest);
|
||||
if (likely(dest_dst))
|
||||
if (likely(dest_dst)) {
|
||||
rt = dst_rt6_info(dest_dst->dst_cache);
|
||||
else {
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.in6;
|
||||
} else {
|
||||
u32 cookie;
|
||||
|
||||
dest_dst = ip_vs_dest_dst_alloc();
|
||||
|
|
@ -494,14 +512,22 @@ __ip_vs_get_out_rt_v6(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb,
|
|||
}
|
||||
rt = dst_rt6_info(dst);
|
||||
cookie = rt6_get_cookie(rt);
|
||||
__ip_vs_dst_set(dest, dest_dst, &rt->dst, cookie);
|
||||
/* It is forbidden to attach dest->dest_dst if
|
||||
* device is going down.
|
||||
*/
|
||||
if (!rt_dev_is_down(dst_dev_rcu(&rt->dst)))
|
||||
__ip_vs_dst_set(dest, dest_dst, &rt->dst, cookie);
|
||||
else
|
||||
noref = 0;
|
||||
spin_unlock_bh(&dest->dst_lock);
|
||||
IP_VS_DBG(10, "new dst %pI6, src %pI6, refcnt=%d\n",
|
||||
&dest->addr.in6, &dest_dst->dst_saddr.in6,
|
||||
rcuref_read(&rt->dst.__rcuref));
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.in6;
|
||||
if (!noref)
|
||||
ip_vs_dest_dst_free(dest_dst);
|
||||
}
|
||||
if (ret_saddr)
|
||||
*ret_saddr = dest_dst->dst_saddr.in6;
|
||||
} else {
|
||||
noref = 0;
|
||||
dst = __ip_vs_route_output_v6(net, daddr, ret_saddr, do_xfrm,
|
||||
|
|
|
|||
|
|
@ -37,13 +37,13 @@ MODULE_PARM_DESC(master_timeout, "timeout for the master connection");
|
|||
module_param(ts_algo, charp, 0400);
|
||||
MODULE_PARM_DESC(ts_algo, "textsearch algorithm to use (default kmp)");
|
||||
|
||||
unsigned int (*nf_nat_amanda_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp)
|
||||
__read_mostly;
|
||||
unsigned int (__rcu *nf_nat_amanda_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp)
|
||||
__read_mostly;
|
||||
EXPORT_SYMBOL_GPL(nf_nat_amanda_hook);
|
||||
|
||||
enum amanda_strings {
|
||||
|
|
|
|||
|
|
@ -43,13 +43,13 @@ module_param_array(ports, ushort, &ports_c, 0400);
|
|||
static bool loose;
|
||||
module_param(loose, bool, 0600);
|
||||
|
||||
unsigned int (*nf_nat_ftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
enum nf_ct_ftp_type type,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp);
|
||||
unsigned int (__rcu *nf_nat_ftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
enum nf_ct_ftp_type type,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp);
|
||||
EXPORT_SYMBOL_GPL(nf_nat_ftp_hook);
|
||||
|
||||
static int try_rfc959(const char *, size_t, struct nf_conntrack_man *,
|
||||
|
|
|
|||
|
|
@ -1187,13 +1187,13 @@ static struct nf_conntrack_expect *find_expect(struct nf_conn *ct,
|
|||
{
|
||||
struct net *net = nf_ct_net(ct);
|
||||
struct nf_conntrack_expect *exp;
|
||||
struct nf_conntrack_tuple tuple;
|
||||
struct nf_conntrack_tuple tuple = {
|
||||
.src.l3num = nf_ct_l3num(ct),
|
||||
.dst.protonum = IPPROTO_TCP,
|
||||
.dst.u.tcp.port = port,
|
||||
};
|
||||
|
||||
memset(&tuple.src.u3, 0, sizeof(tuple.src.u3));
|
||||
tuple.src.u.tcp.port = 0;
|
||||
memcpy(&tuple.dst.u3, addr, sizeof(tuple.dst.u3));
|
||||
tuple.dst.u.tcp.port = port;
|
||||
tuple.dst.protonum = IPPROTO_TCP;
|
||||
|
||||
exp = __nf_ct_expect_find(net, nf_ct_zone(ct), &tuple);
|
||||
if (exp && exp->master == ct)
|
||||
|
|
|
|||
|
|
@ -30,12 +30,13 @@ static unsigned int dcc_timeout __read_mostly = 300;
|
|||
static char *irc_buffer;
|
||||
static DEFINE_SPINLOCK(irc_buffer_lock);
|
||||
|
||||
unsigned int (*nf_nat_irc_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp) __read_mostly;
|
||||
unsigned int (__rcu *nf_nat_irc_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
unsigned int protoff,
|
||||
unsigned int matchoff,
|
||||
unsigned int matchlen,
|
||||
struct nf_conntrack_expect *exp)
|
||||
__read_mostly;
|
||||
EXPORT_SYMBOL_GPL(nf_nat_irc_hook);
|
||||
|
||||
#define HELPER_NAME "irc"
|
||||
|
|
|
|||
|
|
@ -25,10 +25,10 @@ static unsigned int timeout __read_mostly = 30;
|
|||
module_param(timeout, uint, 0400);
|
||||
MODULE_PARM_DESC(timeout, "timeout for master connection/replies in seconds");
|
||||
|
||||
int (*nf_nat_snmp_hook)(struct sk_buff *skb,
|
||||
unsigned int protoff,
|
||||
struct nf_conn *ct,
|
||||
enum ip_conntrack_info ctinfo);
|
||||
int (__rcu *nf_nat_snmp_hook)(struct sk_buff *skb,
|
||||
unsigned int protoff,
|
||||
struct nf_conn *ct,
|
||||
enum ip_conntrack_info ctinfo);
|
||||
EXPORT_SYMBOL_GPL(nf_nat_snmp_hook);
|
||||
|
||||
static int snmp_conntrack_help(struct sk_buff *skb, unsigned int protoff,
|
||||
|
|
|
|||
|
|
@ -32,9 +32,10 @@ static unsigned int ports_c;
|
|||
module_param_array(ports, ushort, &ports_c, 0400);
|
||||
MODULE_PARM_DESC(ports, "Port numbers of TFTP servers");
|
||||
|
||||
unsigned int (*nf_nat_tftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
struct nf_conntrack_expect *exp) __read_mostly;
|
||||
unsigned int (__rcu *nf_nat_tftp_hook)(struct sk_buff *skb,
|
||||
enum ip_conntrack_info ctinfo,
|
||||
struct nf_conntrack_expect *exp)
|
||||
__read_mostly;
|
||||
EXPORT_SYMBOL_GPL(nf_nat_tftp_hook);
|
||||
|
||||
static int tftp_help(struct sk_buff *skb,
|
||||
|
|
|
|||
|
|
@ -2823,6 +2823,7 @@ static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 policy,
|
|||
|
||||
err_register_hook:
|
||||
nft_chain_del(chain);
|
||||
synchronize_rcu();
|
||||
err_chain_add:
|
||||
nft_trans_destroy(trans);
|
||||
err_trans:
|
||||
|
|
@ -3901,23 +3902,6 @@ done:
|
|||
return skb->len;
|
||||
}
|
||||
|
||||
static int nf_tables_dumpreset_rules(struct sk_buff *skb,
|
||||
struct netlink_callback *cb)
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(sock_net(skb->sk));
|
||||
int ret;
|
||||
|
||||
/* Mutex is held is to prevent that two concurrent dump-and-reset calls
|
||||
* do not underrun counters and quotas. The commit_mutex is used for
|
||||
* the lack a better lock, this is not transaction path.
|
||||
*/
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
ret = nf_tables_dump_rules(skb, cb);
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int nf_tables_dump_rules_start(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_rule_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
|
@ -3937,18 +3921,12 @@ static int nf_tables_dump_rules_start(struct netlink_callback *cb)
|
|||
return -ENOMEM;
|
||||
}
|
||||
}
|
||||
if (NFNL_MSG_TYPE(cb->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
|
||||
ctx->reset = true;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nf_tables_dumpreset_rules_start(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_rule_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
||||
ctx->reset = true;
|
||||
|
||||
return nf_tables_dump_rules_start(cb);
|
||||
}
|
||||
|
||||
static int nf_tables_dump_rules_done(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_rule_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
|
@ -4012,6 +3990,8 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
|
|||
u32 portid = NETLINK_CB(skb).portid;
|
||||
struct net *net = info->net;
|
||||
struct sk_buff *skb2;
|
||||
bool reset = false;
|
||||
char *buf;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
|
|
@ -4025,46 +4005,15 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
|
|||
return nft_netlink_dump_start_rcu(info->sk, skb, info->nlh, &c);
|
||||
}
|
||||
|
||||
skb2 = nf_tables_getrule_single(portid, info, nla, false);
|
||||
if (NFNL_MSG_TYPE(info->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
|
||||
reset = true;
|
||||
|
||||
skb2 = nf_tables_getrule_single(portid, info, nla, reset);
|
||||
if (IS_ERR(skb2))
|
||||
return PTR_ERR(skb2);
|
||||
|
||||
return nfnetlink_unicast(skb2, net, portid);
|
||||
}
|
||||
|
||||
static int nf_tables_getrule_reset(struct sk_buff *skb,
|
||||
const struct nfnl_info *info,
|
||||
const struct nlattr * const nla[])
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(info->net);
|
||||
u32 portid = NETLINK_CB(skb).portid;
|
||||
struct net *net = info->net;
|
||||
struct sk_buff *skb2;
|
||||
char *buf;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
.start= nf_tables_dumpreset_rules_start,
|
||||
.dump = nf_tables_dumpreset_rules,
|
||||
.done = nf_tables_dump_rules_done,
|
||||
.module = THIS_MODULE,
|
||||
.data = (void *)nla,
|
||||
};
|
||||
|
||||
return nft_netlink_dump_start_rcu(info->sk, skb, info->nlh, &c);
|
||||
}
|
||||
|
||||
if (!try_module_get(THIS_MODULE))
|
||||
return -EINVAL;
|
||||
rcu_read_unlock();
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
skb2 = nf_tables_getrule_single(portid, info, nla, true);
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
rcu_read_lock();
|
||||
module_put(THIS_MODULE);
|
||||
|
||||
if (IS_ERR(skb2))
|
||||
return PTR_ERR(skb2);
|
||||
if (!reset)
|
||||
return nfnetlink_unicast(skb2, net, portid);
|
||||
|
||||
buf = kasprintf(GFP_ATOMIC, "%.*s:%u",
|
||||
nla_len(nla[NFTA_RULE_TABLE]),
|
||||
|
|
@ -6324,6 +6273,10 @@ static int nf_tables_dump_set(struct sk_buff *skb, struct netlink_callback *cb)
|
|||
nla_nest_end(skb, nest);
|
||||
nlmsg_end(skb, nlh);
|
||||
|
||||
if (dump_ctx->reset && args.iter.count > args.iter.skip)
|
||||
audit_log_nft_set_reset(table, cb->seq,
|
||||
args.iter.count - args.iter.skip);
|
||||
|
||||
rcu_read_unlock();
|
||||
|
||||
if (args.iter.err && args.iter.err != -EMSGSIZE)
|
||||
|
|
@ -6339,26 +6292,6 @@ nla_put_failure:
|
|||
return -ENOSPC;
|
||||
}
|
||||
|
||||
static int nf_tables_dumpreset_set(struct sk_buff *skb,
|
||||
struct netlink_callback *cb)
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(sock_net(skb->sk));
|
||||
struct nft_set_dump_ctx *dump_ctx = cb->data;
|
||||
int ret, skip = cb->args[0];
|
||||
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
|
||||
ret = nf_tables_dump_set(skb, cb);
|
||||
|
||||
if (cb->args[0] > skip)
|
||||
audit_log_nft_set_reset(dump_ctx->ctx.table, cb->seq,
|
||||
cb->args[0] - skip);
|
||||
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int nf_tables_dump_set_start(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_set_dump_ctx *dump_ctx = cb->data;
|
||||
|
|
@ -6602,8 +6535,13 @@ static int nf_tables_getsetelem(struct sk_buff *skb,
|
|||
{
|
||||
struct netlink_ext_ack *extack = info->extack;
|
||||
struct nft_set_dump_ctx dump_ctx;
|
||||
int rem, err = 0, nelems = 0;
|
||||
struct net *net = info->net;
|
||||
struct nlattr *attr;
|
||||
int rem, err = 0;
|
||||
bool reset = false;
|
||||
|
||||
if (NFNL_MSG_TYPE(info->nlh->nlmsg_type) == NFT_MSG_GETSETELEM_RESET)
|
||||
reset = true;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
|
|
@ -6613,7 +6551,7 @@ static int nf_tables_getsetelem(struct sk_buff *skb,
|
|||
.module = THIS_MODULE,
|
||||
};
|
||||
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, false);
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, reset);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
|
|
@ -6624,75 +6562,21 @@ static int nf_tables_getsetelem(struct sk_buff *skb,
|
|||
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
|
||||
return -EINVAL;
|
||||
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, false);
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, reset);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
nla_for_each_nested(attr, nla[NFTA_SET_ELEM_LIST_ELEMENTS], rem) {
|
||||
err = nft_get_set_elem(&dump_ctx.ctx, dump_ctx.set, attr, false);
|
||||
if (err < 0) {
|
||||
NL_SET_BAD_ATTR(extack, attr);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
static int nf_tables_getsetelem_reset(struct sk_buff *skb,
|
||||
const struct nfnl_info *info,
|
||||
const struct nlattr * const nla[])
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(info->net);
|
||||
struct netlink_ext_ack *extack = info->extack;
|
||||
struct nft_set_dump_ctx dump_ctx;
|
||||
int rem, err = 0, nelems = 0;
|
||||
struct nlattr *attr;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
.start = nf_tables_dump_set_start,
|
||||
.dump = nf_tables_dumpreset_set,
|
||||
.done = nf_tables_dump_set_done,
|
||||
.module = THIS_MODULE,
|
||||
};
|
||||
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, true);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
c.data = &dump_ctx;
|
||||
return nft_netlink_dump_start_rcu(info->sk, skb, info->nlh, &c);
|
||||
}
|
||||
|
||||
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
|
||||
return -EINVAL;
|
||||
|
||||
if (!try_module_get(THIS_MODULE))
|
||||
return -EINVAL;
|
||||
rcu_read_unlock();
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
rcu_read_lock();
|
||||
|
||||
err = nft_set_dump_ctx_init(&dump_ctx, skb, info, nla, true);
|
||||
if (err)
|
||||
goto out_unlock;
|
||||
|
||||
nla_for_each_nested(attr, nla[NFTA_SET_ELEM_LIST_ELEMENTS], rem) {
|
||||
err = nft_get_set_elem(&dump_ctx.ctx, dump_ctx.set, attr, true);
|
||||
err = nft_get_set_elem(&dump_ctx.ctx, dump_ctx.set, attr, reset);
|
||||
if (err < 0) {
|
||||
NL_SET_BAD_ATTR(extack, attr);
|
||||
break;
|
||||
}
|
||||
nelems++;
|
||||
}
|
||||
audit_log_nft_set_reset(dump_ctx.ctx.table, nft_base_seq(info->net), nelems);
|
||||
|
||||
out_unlock:
|
||||
rcu_read_unlock();
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
rcu_read_lock();
|
||||
module_put(THIS_MODULE);
|
||||
if (reset)
|
||||
audit_log_nft_set_reset(dump_ctx.ctx.table, nft_base_seq(net),
|
||||
nelems);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
|
@ -8564,19 +8448,6 @@ cont:
|
|||
return skb->len;
|
||||
}
|
||||
|
||||
static int nf_tables_dumpreset_obj(struct sk_buff *skb,
|
||||
struct netlink_callback *cb)
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(sock_net(skb->sk));
|
||||
int ret;
|
||||
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
ret = nf_tables_dump_obj(skb, cb);
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int nf_tables_dump_obj_start(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_obj_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
|
@ -8593,18 +8464,12 @@ static int nf_tables_dump_obj_start(struct netlink_callback *cb)
|
|||
if (nla[NFTA_OBJ_TYPE])
|
||||
ctx->type = ntohl(nla_get_be32(nla[NFTA_OBJ_TYPE]));
|
||||
|
||||
if (NFNL_MSG_TYPE(cb->nlh->nlmsg_type) == NFT_MSG_GETOBJ_RESET)
|
||||
ctx->reset = true;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nf_tables_dumpreset_obj_start(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_obj_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
||||
ctx->reset = true;
|
||||
|
||||
return nf_tables_dump_obj_start(cb);
|
||||
}
|
||||
|
||||
static int nf_tables_dump_obj_done(struct netlink_callback *cb)
|
||||
{
|
||||
struct nft_obj_dump_ctx *ctx = (void *)cb->ctx;
|
||||
|
|
@ -8665,7 +8530,10 @@ static int nf_tables_getobj(struct sk_buff *skb, const struct nfnl_info *info,
|
|||
const struct nlattr * const nla[])
|
||||
{
|
||||
u32 portid = NETLINK_CB(skb).portid;
|
||||
struct net *net = info->net;
|
||||
struct sk_buff *skb2;
|
||||
bool reset = false;
|
||||
char *buf;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
|
|
@ -8679,46 +8547,15 @@ static int nf_tables_getobj(struct sk_buff *skb, const struct nfnl_info *info,
|
|||
return nft_netlink_dump_start_rcu(info->sk, skb, info->nlh, &c);
|
||||
}
|
||||
|
||||
skb2 = nf_tables_getobj_single(portid, info, nla, false);
|
||||
if (NFNL_MSG_TYPE(info->nlh->nlmsg_type) == NFT_MSG_GETOBJ_RESET)
|
||||
reset = true;
|
||||
|
||||
skb2 = nf_tables_getobj_single(portid, info, nla, reset);
|
||||
if (IS_ERR(skb2))
|
||||
return PTR_ERR(skb2);
|
||||
|
||||
return nfnetlink_unicast(skb2, info->net, portid);
|
||||
}
|
||||
|
||||
static int nf_tables_getobj_reset(struct sk_buff *skb,
|
||||
const struct nfnl_info *info,
|
||||
const struct nlattr * const nla[])
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(info->net);
|
||||
u32 portid = NETLINK_CB(skb).portid;
|
||||
struct net *net = info->net;
|
||||
struct sk_buff *skb2;
|
||||
char *buf;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
struct netlink_dump_control c = {
|
||||
.start = nf_tables_dumpreset_obj_start,
|
||||
.dump = nf_tables_dumpreset_obj,
|
||||
.done = nf_tables_dump_obj_done,
|
||||
.module = THIS_MODULE,
|
||||
.data = (void *)nla,
|
||||
};
|
||||
|
||||
return nft_netlink_dump_start_rcu(info->sk, skb, info->nlh, &c);
|
||||
}
|
||||
|
||||
if (!try_module_get(THIS_MODULE))
|
||||
return -EINVAL;
|
||||
rcu_read_unlock();
|
||||
mutex_lock(&nft_net->commit_mutex);
|
||||
skb2 = nf_tables_getobj_single(portid, info, nla, true);
|
||||
mutex_unlock(&nft_net->commit_mutex);
|
||||
rcu_read_lock();
|
||||
module_put(THIS_MODULE);
|
||||
|
||||
if (IS_ERR(skb2))
|
||||
return PTR_ERR(skb2);
|
||||
if (!reset)
|
||||
return nfnetlink_unicast(skb2, net, NETLINK_CB(skb).portid);
|
||||
|
||||
buf = kasprintf(GFP_ATOMIC, "%.*s:%u",
|
||||
nla_len(nla[NFTA_OBJ_TABLE]),
|
||||
|
|
@ -10037,7 +9874,7 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
|
|||
.policy = nft_rule_policy,
|
||||
},
|
||||
[NFT_MSG_GETRULE_RESET] = {
|
||||
.call = nf_tables_getrule_reset,
|
||||
.call = nf_tables_getrule,
|
||||
.type = NFNL_CB_RCU,
|
||||
.attr_count = NFTA_RULE_MAX,
|
||||
.policy = nft_rule_policy,
|
||||
|
|
@ -10091,7 +9928,7 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
|
|||
.policy = nft_set_elem_list_policy,
|
||||
},
|
||||
[NFT_MSG_GETSETELEM_RESET] = {
|
||||
.call = nf_tables_getsetelem_reset,
|
||||
.call = nf_tables_getsetelem,
|
||||
.type = NFNL_CB_RCU,
|
||||
.attr_count = NFTA_SET_ELEM_LIST_MAX,
|
||||
.policy = nft_set_elem_list_policy,
|
||||
|
|
@ -10137,7 +9974,7 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
|
|||
.policy = nft_obj_policy,
|
||||
},
|
||||
[NFT_MSG_GETOBJ_RESET] = {
|
||||
.call = nf_tables_getobj_reset,
|
||||
.call = nf_tables_getobj,
|
||||
.type = NFNL_CB_RCU,
|
||||
.attr_count = NFTA_OBJ_MAX,
|
||||
.policy = nft_obj_policy,
|
||||
|
|
|
|||
|
|
@ -32,6 +32,9 @@ struct nft_counter_percpu_priv {
|
|||
|
||||
static DEFINE_PER_CPU(struct u64_stats_sync, nft_counter_sync);
|
||||
|
||||
/* control plane only: sync fetch+reset */
|
||||
static DEFINE_SPINLOCK(nft_counter_lock);
|
||||
|
||||
static inline void nft_counter_do_eval(struct nft_counter_percpu_priv *priv,
|
||||
struct nft_regs *regs,
|
||||
const struct nft_pktinfo *pkt)
|
||||
|
|
@ -148,13 +151,25 @@ static void nft_counter_fetch(struct nft_counter_percpu_priv *priv,
|
|||
}
|
||||
}
|
||||
|
||||
static void nft_counter_fetch_and_reset(struct nft_counter_percpu_priv *priv,
|
||||
struct nft_counter_tot *total)
|
||||
{
|
||||
spin_lock(&nft_counter_lock);
|
||||
nft_counter_fetch(priv, total);
|
||||
nft_counter_reset(priv, total);
|
||||
spin_unlock(&nft_counter_lock);
|
||||
}
|
||||
|
||||
static int nft_counter_do_dump(struct sk_buff *skb,
|
||||
struct nft_counter_percpu_priv *priv,
|
||||
bool reset)
|
||||
{
|
||||
struct nft_counter_tot total;
|
||||
|
||||
nft_counter_fetch(priv, &total);
|
||||
if (unlikely(reset))
|
||||
nft_counter_fetch_and_reset(priv, &total);
|
||||
else
|
||||
nft_counter_fetch(priv, &total);
|
||||
|
||||
if (nla_put_be64(skb, NFTA_COUNTER_BYTES, cpu_to_be64(total.bytes),
|
||||
NFTA_COUNTER_PAD) ||
|
||||
|
|
@ -162,9 +177,6 @@ static int nft_counter_do_dump(struct sk_buff *skb,
|
|||
NFTA_COUNTER_PAD))
|
||||
goto nla_put_failure;
|
||||
|
||||
if (reset)
|
||||
nft_counter_reset(priv, &total);
|
||||
|
||||
return 0;
|
||||
|
||||
nla_put_failure:
|
||||
|
|
|
|||
|
|
@ -140,11 +140,16 @@ static int nft_quota_do_dump(struct sk_buff *skb, struct nft_quota *priv,
|
|||
u64 consumed, consumed_cap, quota;
|
||||
u32 flags = priv->flags;
|
||||
|
||||
/* Since we inconditionally increment consumed quota for each packet
|
||||
/* Since we unconditionally increment consumed quota for each packet
|
||||
* that we see, don't go over the quota boundary in what we send to
|
||||
* userspace.
|
||||
*/
|
||||
consumed = atomic64_read(priv->consumed);
|
||||
if (reset) {
|
||||
consumed = atomic64_xchg(priv->consumed, 0);
|
||||
clear_bit(NFT_QUOTA_DEPLETED_BIT, &priv->flags);
|
||||
} else {
|
||||
consumed = atomic64_read(priv->consumed);
|
||||
}
|
||||
quota = atomic64_read(&priv->quota);
|
||||
if (consumed >= quota) {
|
||||
consumed_cap = quota;
|
||||
|
|
@ -160,10 +165,6 @@ static int nft_quota_do_dump(struct sk_buff *skb, struct nft_quota *priv,
|
|||
nla_put_be32(skb, NFTA_QUOTA_FLAGS, htonl(flags)))
|
||||
goto nla_put_failure;
|
||||
|
||||
if (reset) {
|
||||
atomic64_sub(consumed, priv->consumed);
|
||||
clear_bit(NFT_QUOTA_DEPLETED_BIT, &priv->flags);
|
||||
}
|
||||
return 0;
|
||||
|
||||
nla_put_failure:
|
||||
|
|
|
|||
|
|
@ -58,7 +58,7 @@ static int nci_core_conn_credits_ntf_packet(struct nci_dev *ndev,
|
|||
struct nci_conn_info *conn_info;
|
||||
int i;
|
||||
|
||||
if (skb->len < sizeof(struct nci_core_conn_credit_ntf))
|
||||
if (skb->len < offsetofend(struct nci_core_conn_credit_ntf, num_entries))
|
||||
return -EINVAL;
|
||||
|
||||
ntf = (struct nci_core_conn_credit_ntf *)skb->data;
|
||||
|
|
@ -68,6 +68,10 @@ static int nci_core_conn_credits_ntf_packet(struct nci_dev *ndev,
|
|||
if (ntf->num_entries > NCI_MAX_NUM_CONN)
|
||||
ntf->num_entries = NCI_MAX_NUM_CONN;
|
||||
|
||||
if (skb->len < offsetofend(struct nci_core_conn_credit_ntf, num_entries) +
|
||||
ntf->num_entries * sizeof(struct conn_credit_entry))
|
||||
return -EINVAL;
|
||||
|
||||
/* update the credits */
|
||||
for (i = 0; i < ntf->num_entries; i++) {
|
||||
ntf->conn_entries[i].conn_id =
|
||||
|
|
@ -138,23 +142,48 @@ static int nci_core_conn_intf_error_ntf_packet(struct nci_dev *ndev,
|
|||
static const __u8 *
|
||||
nci_extract_rf_params_nfca_passive_poll(struct nci_dev *ndev,
|
||||
struct rf_tech_specific_params_nfca_poll *nfca_poll,
|
||||
const __u8 *data)
|
||||
const __u8 *data, ssize_t data_len)
|
||||
{
|
||||
/* Check if we have enough data for sens_res (2 bytes) */
|
||||
if (data_len < 2)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfca_poll->sens_res = __le16_to_cpu(*((__le16 *)data));
|
||||
data += 2;
|
||||
data_len -= 2;
|
||||
|
||||
/* Check if we have enough data for nfcid1_len (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfca_poll->nfcid1_len = min_t(__u8, *data++, NFC_NFCID1_MAXSIZE);
|
||||
data_len--;
|
||||
|
||||
pr_debug("sens_res 0x%x, nfcid1_len %d\n",
|
||||
nfca_poll->sens_res, nfca_poll->nfcid1_len);
|
||||
|
||||
/* Check if we have enough data for nfcid1 */
|
||||
if (data_len < nfca_poll->nfcid1_len)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
memcpy(nfca_poll->nfcid1, data, nfca_poll->nfcid1_len);
|
||||
data += nfca_poll->nfcid1_len;
|
||||
data_len -= nfca_poll->nfcid1_len;
|
||||
|
||||
/* Check if we have enough data for sel_res_len (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfca_poll->sel_res_len = *data++;
|
||||
data_len--;
|
||||
|
||||
if (nfca_poll->sel_res_len != 0) {
|
||||
/* Check if we have enough data for sel_res (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
if (nfca_poll->sel_res_len != 0)
|
||||
nfca_poll->sel_res = *data++;
|
||||
}
|
||||
|
||||
pr_debug("sel_res_len %d, sel_res 0x%x\n",
|
||||
nfca_poll->sel_res_len,
|
||||
|
|
@ -166,12 +195,21 @@ nci_extract_rf_params_nfca_passive_poll(struct nci_dev *ndev,
|
|||
static const __u8 *
|
||||
nci_extract_rf_params_nfcb_passive_poll(struct nci_dev *ndev,
|
||||
struct rf_tech_specific_params_nfcb_poll *nfcb_poll,
|
||||
const __u8 *data)
|
||||
const __u8 *data, ssize_t data_len)
|
||||
{
|
||||
/* Check if we have enough data for sensb_res_len (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfcb_poll->sensb_res_len = min_t(__u8, *data++, NFC_SENSB_RES_MAXSIZE);
|
||||
data_len--;
|
||||
|
||||
pr_debug("sensb_res_len %d\n", nfcb_poll->sensb_res_len);
|
||||
|
||||
/* Check if we have enough data for sensb_res */
|
||||
if (data_len < nfcb_poll->sensb_res_len)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
memcpy(nfcb_poll->sensb_res, data, nfcb_poll->sensb_res_len);
|
||||
data += nfcb_poll->sensb_res_len;
|
||||
|
||||
|
|
@ -181,14 +219,29 @@ nci_extract_rf_params_nfcb_passive_poll(struct nci_dev *ndev,
|
|||
static const __u8 *
|
||||
nci_extract_rf_params_nfcf_passive_poll(struct nci_dev *ndev,
|
||||
struct rf_tech_specific_params_nfcf_poll *nfcf_poll,
|
||||
const __u8 *data)
|
||||
const __u8 *data, ssize_t data_len)
|
||||
{
|
||||
/* Check if we have enough data for bit_rate (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfcf_poll->bit_rate = *data++;
|
||||
data_len--;
|
||||
|
||||
/* Check if we have enough data for sensf_res_len (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfcf_poll->sensf_res_len = min_t(__u8, *data++, NFC_SENSF_RES_MAXSIZE);
|
||||
data_len--;
|
||||
|
||||
pr_debug("bit_rate %d, sensf_res_len %d\n",
|
||||
nfcf_poll->bit_rate, nfcf_poll->sensf_res_len);
|
||||
|
||||
/* Check if we have enough data for sensf_res */
|
||||
if (data_len < nfcf_poll->sensf_res_len)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
memcpy(nfcf_poll->sensf_res, data, nfcf_poll->sensf_res_len);
|
||||
data += nfcf_poll->sensf_res_len;
|
||||
|
||||
|
|
@ -198,22 +251,49 @@ nci_extract_rf_params_nfcf_passive_poll(struct nci_dev *ndev,
|
|||
static const __u8 *
|
||||
nci_extract_rf_params_nfcv_passive_poll(struct nci_dev *ndev,
|
||||
struct rf_tech_specific_params_nfcv_poll *nfcv_poll,
|
||||
const __u8 *data)
|
||||
const __u8 *data, ssize_t data_len)
|
||||
{
|
||||
/* Skip 1 byte (reserved) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
++data;
|
||||
data_len--;
|
||||
|
||||
/* Check if we have enough data for dsfid (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfcv_poll->dsfid = *data++;
|
||||
data_len--;
|
||||
|
||||
/* Check if we have enough data for uid (8 bytes) */
|
||||
if (data_len < NFC_ISO15693_UID_MAXSIZE)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
memcpy(nfcv_poll->uid, data, NFC_ISO15693_UID_MAXSIZE);
|
||||
data += NFC_ISO15693_UID_MAXSIZE;
|
||||
|
||||
return data;
|
||||
}
|
||||
|
||||
static const __u8 *
|
||||
nci_extract_rf_params_nfcf_passive_listen(struct nci_dev *ndev,
|
||||
struct rf_tech_specific_params_nfcf_listen *nfcf_listen,
|
||||
const __u8 *data)
|
||||
const __u8 *data, ssize_t data_len)
|
||||
{
|
||||
/* Check if we have enough data for local_nfcid2_len (1 byte) */
|
||||
if (data_len < 1)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
nfcf_listen->local_nfcid2_len = min_t(__u8, *data++,
|
||||
NFC_NFCID2_MAXSIZE);
|
||||
data_len--;
|
||||
|
||||
/* Check if we have enough data for local_nfcid2 */
|
||||
if (data_len < nfcf_listen->local_nfcid2_len)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
||||
memcpy(nfcf_listen->local_nfcid2, data, nfcf_listen->local_nfcid2_len);
|
||||
data += nfcf_listen->local_nfcid2_len;
|
||||
|
||||
|
|
@ -364,7 +444,7 @@ static int nci_rf_discover_ntf_packet(struct nci_dev *ndev,
|
|||
const __u8 *data;
|
||||
bool add_target = true;
|
||||
|
||||
if (skb->len < sizeof(struct nci_rf_discover_ntf))
|
||||
if (skb->len < offsetofend(struct nci_rf_discover_ntf, rf_tech_specific_params_len))
|
||||
return -EINVAL;
|
||||
|
||||
data = skb->data;
|
||||
|
|
@ -380,26 +460,42 @@ static int nci_rf_discover_ntf_packet(struct nci_dev *ndev,
|
|||
pr_debug("rf_tech_specific_params_len %d\n",
|
||||
ntf.rf_tech_specific_params_len);
|
||||
|
||||
if (skb->len < (data - skb->data) +
|
||||
ntf.rf_tech_specific_params_len + sizeof(ntf.ntf_type))
|
||||
return -EINVAL;
|
||||
|
||||
if (ntf.rf_tech_specific_params_len > 0) {
|
||||
switch (ntf.rf_tech_and_mode) {
|
||||
case NCI_NFC_A_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfca_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfca_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfca_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return PTR_ERR(data);
|
||||
break;
|
||||
|
||||
case NCI_NFC_B_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcb_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcb_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcb_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return PTR_ERR(data);
|
||||
break;
|
||||
|
||||
case NCI_NFC_F_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcf_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcf_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcf_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return PTR_ERR(data);
|
||||
break;
|
||||
|
||||
case NCI_NFC_V_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcv_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcv_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcv_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return PTR_ERR(data);
|
||||
break;
|
||||
|
||||
default:
|
||||
|
|
@ -596,7 +692,7 @@ static int nci_rf_intf_activated_ntf_packet(struct nci_dev *ndev,
|
|||
const __u8 *data;
|
||||
int err = NCI_STATUS_OK;
|
||||
|
||||
if (skb->len < sizeof(struct nci_rf_intf_activated_ntf))
|
||||
if (skb->len < offsetofend(struct nci_rf_intf_activated_ntf, rf_tech_specific_params_len))
|
||||
return -EINVAL;
|
||||
|
||||
data = skb->data;
|
||||
|
|
@ -628,26 +724,41 @@ static int nci_rf_intf_activated_ntf_packet(struct nci_dev *ndev,
|
|||
if (ntf.rf_interface == NCI_RF_INTERFACE_NFCEE_DIRECT)
|
||||
goto listen;
|
||||
|
||||
if (skb->len < (data - skb->data) + ntf.rf_tech_specific_params_len)
|
||||
return -EINVAL;
|
||||
|
||||
if (ntf.rf_tech_specific_params_len > 0) {
|
||||
switch (ntf.activation_rf_tech_and_mode) {
|
||||
case NCI_NFC_A_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfca_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfca_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfca_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case NCI_NFC_B_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcb_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcb_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcb_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case NCI_NFC_F_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcf_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcf_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcf_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case NCI_NFC_V_PASSIVE_POLL_MODE:
|
||||
data = nci_extract_rf_params_nfcv_passive_poll(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcv_poll), data);
|
||||
&(ntf.rf_tech_specific_params.nfcv_poll), data,
|
||||
ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
case NCI_NFC_A_PASSIVE_LISTEN_MODE:
|
||||
|
|
@ -657,7 +768,9 @@ static int nci_rf_intf_activated_ntf_packet(struct nci_dev *ndev,
|
|||
case NCI_NFC_F_PASSIVE_LISTEN_MODE:
|
||||
data = nci_extract_rf_params_nfcf_passive_listen(ndev,
|
||||
&(ntf.rf_tech_specific_params.nfcf_listen),
|
||||
data);
|
||||
data, ntf.rf_tech_specific_params_len);
|
||||
if (IS_ERR(data))
|
||||
return -EINVAL;
|
||||
break;
|
||||
|
||||
default:
|
||||
|
|
@ -668,6 +781,13 @@ static int nci_rf_intf_activated_ntf_packet(struct nci_dev *ndev,
|
|||
}
|
||||
}
|
||||
|
||||
if (skb->len < (data - skb->data) +
|
||||
sizeof(ntf.data_exch_rf_tech_and_mode) +
|
||||
sizeof(ntf.data_exch_tx_bit_rate) +
|
||||
sizeof(ntf.data_exch_rx_bit_rate) +
|
||||
sizeof(ntf.activation_params_len))
|
||||
return -EINVAL;
|
||||
|
||||
ntf.data_exch_rf_tech_and_mode = *data++;
|
||||
ntf.data_exch_tx_bit_rate = *data++;
|
||||
ntf.data_exch_rx_bit_rate = *data++;
|
||||
|
|
@ -679,6 +799,9 @@ static int nci_rf_intf_activated_ntf_packet(struct nci_dev *ndev,
|
|||
pr_debug("data_exch_rx_bit_rate 0x%x\n", ntf.data_exch_rx_bit_rate);
|
||||
pr_debug("activation_params_len %d\n", ntf.activation_params_len);
|
||||
|
||||
if (skb->len < (data - skb->data) + ntf.activation_params_len)
|
||||
return -EINVAL;
|
||||
|
||||
if (ntf.activation_params_len > 0) {
|
||||
switch (ntf.rf_interface) {
|
||||
case NCI_RF_INTERFACE_ISO_DEP:
|
||||
|
|
|
|||
|
|
@ -6,6 +6,7 @@ config INET_PSP
|
|||
bool "PSP Security Protocol support"
|
||||
depends on INET
|
||||
select SKB_DECRYPTED
|
||||
select SKB_EXTENSIONS
|
||||
select SOCK_VALIDATE_XMIT
|
||||
help
|
||||
Enable kernel support for the PSP Security Protocol (PSP).
|
||||
|
|
|
|||
|
|
@ -1431,9 +1431,11 @@ int rds_sendmsg(struct socket *sock, struct msghdr *msg, size_t payload_len)
|
|||
else
|
||||
queue_delayed_work(cpath->cp_wq, &cpath->cp_send_w, 1);
|
||||
rcu_read_unlock();
|
||||
|
||||
if (ret)
|
||||
goto out;
|
||||
}
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
rds_message_put(rm);
|
||||
|
||||
for (ind = 0; ind < vct.indx; ind++)
|
||||
|
|
|
|||
|
|
@ -373,7 +373,7 @@ static int rds_tcp_conn_alloc(struct rds_connection *conn, gfp_t gfp)
|
|||
int ret = 0;
|
||||
|
||||
for (i = 0; i < RDS_MPATH_WORKERS; i++) {
|
||||
tc = kmem_cache_alloc(rds_tcp_conn_slab, gfp);
|
||||
tc = kmem_cache_zalloc(rds_tcp_conn_slab, gfp);
|
||||
if (!tc) {
|
||||
ret = -ENOMEM;
|
||||
goto fail;
|
||||
|
|
|
|||
|
|
@ -177,6 +177,7 @@ int rds_tcp_accept_one(struct rds_tcp_net *rtn)
|
|||
struct rds_tcp_connection *rs_tcp = NULL;
|
||||
int conn_state;
|
||||
struct rds_conn_path *cp;
|
||||
struct sock *sk;
|
||||
struct in6_addr *my_addr, *peer_addr;
|
||||
#if !IS_ENABLED(CONFIG_IPV6)
|
||||
struct in6_addr saddr, daddr;
|
||||
|
|
@ -298,6 +299,17 @@ int rds_tcp_accept_one(struct rds_tcp_net *rtn)
|
|||
rds_conn_path_drop(cp, 0);
|
||||
goto rst_nsk;
|
||||
}
|
||||
/* Save a local pointer to sk and hold a reference before setting
|
||||
* callbacks. Once callbacks are set, a concurrent
|
||||
* rds_tcp_conn_path_shutdown() may call sock_release(), which
|
||||
* sets new_sock->sk to NULL and drops a reference on sk.
|
||||
* The local pointer lets us safely access sk_state below even
|
||||
* if new_sock->sk has been nulled, and sock_hold() keeps sk
|
||||
* itself valid until we are done.
|
||||
*/
|
||||
sk = new_sock->sk;
|
||||
sock_hold(sk);
|
||||
|
||||
if (rs_tcp->t_sock) {
|
||||
/* Duelling SYN has been handled in rds_tcp_accept_one() */
|
||||
rds_tcp_reset_callbacks(new_sock, cp);
|
||||
|
|
@ -316,13 +328,15 @@ int rds_tcp_accept_one(struct rds_tcp_net *rtn)
|
|||
* knowing that "rds_tcp_conn_path_shutdown" will
|
||||
* dequeue pending messages.
|
||||
*/
|
||||
if (new_sock->sk->sk_state == TCP_CLOSE_WAIT ||
|
||||
new_sock->sk->sk_state == TCP_LAST_ACK ||
|
||||
new_sock->sk->sk_state == TCP_CLOSE)
|
||||
if (READ_ONCE(sk->sk_state) == TCP_CLOSE_WAIT ||
|
||||
READ_ONCE(sk->sk_state) == TCP_LAST_ACK ||
|
||||
READ_ONCE(sk->sk_state) == TCP_CLOSE)
|
||||
rds_conn_path_drop(cp, 0);
|
||||
else
|
||||
queue_delayed_work(cp->cp_wq, &cp->cp_recv_w, 0);
|
||||
|
||||
sock_put(sk);
|
||||
|
||||
new_sock = NULL;
|
||||
ret = 0;
|
||||
if (conn->c_npaths == 0)
|
||||
|
|
|
|||
|
|
@ -126,7 +126,7 @@ static int tcf_skbedit_init(struct net *net, struct nlattr *nla,
|
|||
struct tcf_skbedit *d;
|
||||
u32 flags = 0, *priority = NULL, *mark = NULL, *mask = NULL;
|
||||
u16 *queue_mapping = NULL, *ptype = NULL;
|
||||
u16 mapping_mod = 1;
|
||||
u32 mapping_mod = 1;
|
||||
bool exists = false;
|
||||
int ret = 0, err;
|
||||
u32 index;
|
||||
|
|
@ -194,6 +194,10 @@ static int tcf_skbedit_init(struct net *net, struct nlattr *nla,
|
|||
}
|
||||
|
||||
mapping_mod = *queue_mapping_max - *queue_mapping + 1;
|
||||
if (mapping_mod > U16_MAX) {
|
||||
NL_SET_ERR_MSG_MOD(extack, "The range of queue_mapping is invalid.");
|
||||
return -EINVAL;
|
||||
}
|
||||
flags |= SKBEDIT_F_TXQ_SKBHASH;
|
||||
}
|
||||
if (*pure_flags & SKBEDIT_F_INHERITDSFIELD)
|
||||
|
|
|
|||
|
|
@ -91,11 +91,13 @@
|
|||
* - /proc/sys/net/vsock/ns_mode (read-only) reports the current namespace's
|
||||
* mode, which is set at namespace creation and immutable thereafter.
|
||||
* - /proc/sys/net/vsock/child_ns_mode (writable) controls what mode future
|
||||
* child namespaces will inherit when created. The default is "global".
|
||||
* child namespaces will inherit when created. The initial value matches
|
||||
* the namespace's own ns_mode.
|
||||
*
|
||||
* Changing child_ns_mode only affects newly created namespaces, not the
|
||||
* current namespace or existing children. At namespace creation, ns_mode
|
||||
* is inherited from the parent's child_ns_mode.
|
||||
* current namespace or existing children. A "local" namespace cannot set
|
||||
* child_ns_mode to "global". At namespace creation, ns_mode is inherited
|
||||
* from the parent's child_ns_mode.
|
||||
*
|
||||
* The init_net mode is "global" and cannot be modified.
|
||||
*
|
||||
|
|
@ -2843,8 +2845,16 @@ static int vsock_net_child_mode_string(const struct ctl_table *table, int write,
|
|||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (write)
|
||||
if (write) {
|
||||
/* Prevent a "local" namespace from escalating to "global",
|
||||
* which would give nested namespaces access to global CIDs.
|
||||
*/
|
||||
if (vsock_net_mode(net) == VSOCK_NET_MODE_LOCAL &&
|
||||
new_mode == VSOCK_NET_MODE_GLOBAL)
|
||||
return -EPERM;
|
||||
|
||||
vsock_net_set_child_mode(net, new_mode);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
@ -2912,7 +2922,7 @@ static void vsock_net_init(struct net *net)
|
|||
else
|
||||
net->vsock.mode = vsock_net_child_mode(current->nsproxy->net_ns);
|
||||
|
||||
net->vsock.child_ns_mode = VSOCK_NET_MODE_GLOBAL;
|
||||
net->vsock.child_ns_mode = net->vsock.mode;
|
||||
}
|
||||
|
||||
static __net_init int vsock_sysctl_init_net(struct net *net)
|
||||
|
|
|
|||
|
|
@ -63,12 +63,29 @@ def check_tx_chunks(cfg) -> None:
|
|||
ksft_eq(socat.stdout.strip(), "hello\nworld")
|
||||
|
||||
|
||||
def check_rx_hds(cfg) -> None:
|
||||
"""Test HDS splitting across payload sizes."""
|
||||
require_devmem(cfg)
|
||||
|
||||
for size in [1, 8, 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192]:
|
||||
port = rand_port()
|
||||
listen_cmd = f"{cfg.bin_local} -L -l -f {cfg.ifname} -s {cfg.addr} -p {port}"
|
||||
|
||||
with bkg(listen_cmd, exit_wait=True) as ncdevmem:
|
||||
wait_port_listen(port)
|
||||
cmd(f"dd if=/dev/zero bs={size} count=1 2>/dev/null | " +
|
||||
f"socat -b {size} -u - TCP{cfg.addr_ipver}:{cfg.baddr}:{port},nodelay",
|
||||
host=cfg.remote, shell=True)
|
||||
|
||||
ksft_eq(ncdevmem.ret, 0, f"HDS failed for payload size {size}")
|
||||
|
||||
|
||||
def main() -> None:
|
||||
with NetDrvEpEnv(__file__) as cfg:
|
||||
cfg.bin_local = path.abspath(path.dirname(__file__) + "/ncdevmem")
|
||||
cfg.bin_remote = cfg.remote.deploy(cfg.bin_local)
|
||||
|
||||
ksft_run([check_rx, check_tx, check_tx_chunks],
|
||||
ksft_run([check_rx, check_tx, check_tx_chunks, check_rx_hds],
|
||||
args=(cfg, ))
|
||||
ksft_exit()
|
||||
|
||||
|
|
|
|||
|
|
@ -98,6 +98,7 @@ static unsigned int ifindex;
|
|||
static unsigned int dmabuf_id;
|
||||
static uint32_t tx_dmabuf_id;
|
||||
static int waittime_ms = 500;
|
||||
static bool fail_on_linear;
|
||||
|
||||
/* System state loaded by current_config_load() */
|
||||
#define MAX_FLOWS 8
|
||||
|
|
@ -975,6 +976,11 @@ static int do_server(struct memory_buffer *mem)
|
|||
"SCM_DEVMEM_LINEAR. dmabuf_cmsg->frag_size=%u\n",
|
||||
dmabuf_cmsg->frag_size);
|
||||
|
||||
if (fail_on_linear) {
|
||||
pr_err("received SCM_DEVMEM_LINEAR but --fail-on-linear (-L) set");
|
||||
goto err_close_client;
|
||||
}
|
||||
|
||||
continue;
|
||||
}
|
||||
|
||||
|
|
@ -1398,8 +1404,11 @@ int main(int argc, char *argv[])
|
|||
int is_server = 0, opt;
|
||||
int ret, err = 1;
|
||||
|
||||
while ((opt = getopt(argc, argv, "ls:c:p:v:q:t:f:z:")) != -1) {
|
||||
while ((opt = getopt(argc, argv, "Lls:c:p:v:q:t:f:z:")) != -1) {
|
||||
switch (opt) {
|
||||
case 'L':
|
||||
fail_on_linear = true;
|
||||
break;
|
||||
case 'l':
|
||||
is_server = 1;
|
||||
break;
|
||||
|
|
|
|||
|
|
@ -19,6 +19,8 @@ from lib.py import ksft_variants, KsftNamedVariant, KsftSkipEx, KsftFailEx
|
|||
|
||||
# "define" for the ID of the Toeplitz hash function
|
||||
ETH_RSS_HASH_TOP = 1
|
||||
# Must match RPS_MAX_CPUS in toeplitz.c
|
||||
RPS_MAX_CPUS = 16
|
||||
|
||||
|
||||
def _check_rps_and_rfs_not_configured(cfg):
|
||||
|
|
@ -67,23 +69,24 @@ def _get_irq_cpus(cfg):
|
|||
return cpus
|
||||
|
||||
|
||||
def _get_unused_cpus(cfg, count=2):
|
||||
def _get_unused_rps_cpus(cfg, count=2):
|
||||
"""
|
||||
Get CPUs that are not used by Rx queues.
|
||||
Returns a list of at least 'count' CPU numbers.
|
||||
Get CPUs that are not used by Rx queues for RPS.
|
||||
Returns a list of at least 'count' CPU numbers within
|
||||
the RPS_MAX_CPUS supported range.
|
||||
"""
|
||||
|
||||
# Get CPUs used by Rx queues
|
||||
rx_cpus = set(_get_irq_cpus(cfg))
|
||||
|
||||
# Get total number of CPUs
|
||||
num_cpus = os.cpu_count()
|
||||
# Get total number of CPUs, capped by RPS_MAX_CPUS
|
||||
num_cpus = min(os.cpu_count(), RPS_MAX_CPUS)
|
||||
|
||||
# Find unused CPUs
|
||||
unused_cpus = [cpu for cpu in range(num_cpus) if cpu not in rx_cpus]
|
||||
|
||||
if len(unused_cpus) < count:
|
||||
raise KsftSkipEx(f"Need at {count} CPUs not used by Rx queues, found {len(unused_cpus)}")
|
||||
raise KsftSkipEx(f"Need at least {count} CPUs in range 0..{num_cpus - 1} not used by Rx queues, found {len(unused_cpus)}")
|
||||
|
||||
return unused_cpus[:count]
|
||||
|
||||
|
|
@ -181,7 +184,7 @@ def test(cfg, proto_flag, ipver, grp):
|
|||
ksft_pr(f"RSS using CPUs: {irq_cpus}")
|
||||
elif grp == "rps":
|
||||
# Get CPUs not used by Rx queues and configure them for RPS
|
||||
rps_cpus = _get_unused_cpus(cfg, count=2)
|
||||
rps_cpus = _get_unused_rps_cpus(cfg, count=2)
|
||||
rps_mask = _configure_rps(cfg, rps_cpus)
|
||||
defer(_configure_rps, cfg, [])
|
||||
rx_cmd += ["-r", rps_mask]
|
||||
|
|
|
|||
|
|
@ -249,8 +249,8 @@ function listen_port_and_save_to() {
|
|||
SOCAT_MODE="UDP6-LISTEN"
|
||||
fi
|
||||
|
||||
# Just wait for 2 seconds
|
||||
timeout 2 ip netns exec "${NAMESPACE}" \
|
||||
# Just wait for 3 seconds
|
||||
timeout 3 ip netns exec "${NAMESPACE}" \
|
||||
socat "${SOCAT_MODE}":"${PORT}",fork "${OUTPUT}" 2> /dev/null
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -317,7 +317,7 @@ police_limits_test()
|
|||
|
||||
tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \
|
||||
flower skip_sw \
|
||||
action police rate 0.5kbit burst 1m conform-exceed drop/ok
|
||||
action police rate 0.5kbit burst 2k conform-exceed drop/ok
|
||||
check_fail $? "Incorrect success to add police action with too low rate"
|
||||
|
||||
tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \
|
||||
|
|
@ -327,7 +327,7 @@ police_limits_test()
|
|||
|
||||
tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \
|
||||
flower skip_sw \
|
||||
action police rate 1.5kbit burst 1m conform-exceed drop/ok
|
||||
action police rate 1.5kbit burst 2k conform-exceed drop/ok
|
||||
check_err $? "Failed to add police action with low rate"
|
||||
|
||||
tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower
|
||||
|
|
|
|||
|
|
@ -28,6 +28,7 @@ ALL_TESTS="
|
|||
test_8021d
|
||||
test_8021q
|
||||
test_8021qvs
|
||||
test_mdb_count_warning
|
||||
"
|
||||
|
||||
NUM_NETIFS=4
|
||||
|
|
@ -83,8 +84,6 @@ switch_create_8021q()
|
|||
{
|
||||
local br_flags=$1; shift
|
||||
|
||||
log_info "802.1q $br_flags${br_flags:+ }tests"
|
||||
|
||||
ip link add name br0 type bridge vlan_filtering 1 vlan_default_pvid 0 \
|
||||
mcast_snooping 1 $br_flags \
|
||||
mcast_igmp_version 3 mcast_mld_version 2
|
||||
|
|
@ -106,6 +105,7 @@ switch_create_8021q()
|
|||
|
||||
switch_create_8021qvs()
|
||||
{
|
||||
log_info "802.1q mcast_vlan_snooping 1 tests"
|
||||
switch_create_8021q "mcast_vlan_snooping 1"
|
||||
bridge vlan global set dev br0 vid 10 mcast_igmp_version 3
|
||||
bridge vlan global set dev br0 vid 10 mcast_mld_version 2
|
||||
|
|
@ -1272,6 +1272,76 @@ test_8021qvs_toggle_vlan_snooping()
|
|||
test_toggle_vlan_snooping_permanent
|
||||
}
|
||||
|
||||
mdb_count_check_warn()
|
||||
{
|
||||
local msg=$1; shift
|
||||
|
||||
dmesg | grep -q "WARNING:.*br_multicast_port_ngroups_dec.*"
|
||||
check_fail $? "$msg"
|
||||
}
|
||||
|
||||
test_mdb_count_mcast_vlan_snooping_flush()
|
||||
{
|
||||
RET=0
|
||||
|
||||
# check if we already have a warning
|
||||
mdb_count_check_warn "Check MDB entries count warning before test"
|
||||
|
||||
bridge mdb add dev br0 port "$swp1" grp 239.0.0.1 permanent vid 10
|
||||
ip link set dev br0 down
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 1
|
||||
bridge mdb flush dev br0
|
||||
|
||||
mdb_count_check_warn "Check MDB entries count warning after test"
|
||||
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 0
|
||||
ip link set dev br0 up
|
||||
|
||||
log_test "MDB count warning: mcast_vlan_snooping and MDB flush"
|
||||
}
|
||||
|
||||
test_mdb_count_mcast_snooping_flush()
|
||||
{
|
||||
RET=0
|
||||
|
||||
# check if we already have a warning
|
||||
mdb_count_check_warn "Check MDB entries count warning before test"
|
||||
|
||||
bridge mdb add dev br0 port "$swp1" grp 239.0.0.1 permanent vid 10
|
||||
ip link set dev br0 type bridge mcast_snooping 0
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 1
|
||||
bridge mdb flush dev br0
|
||||
|
||||
mdb_count_check_warn "Check MDB entries count warning after test"
|
||||
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 0
|
||||
ip link set dev br0 type bridge mcast_snooping 1
|
||||
|
||||
log_test "MDB count warning: mcast_snooping and MDB flush"
|
||||
}
|
||||
|
||||
test_mdb_count_vlan_state_flush()
|
||||
{
|
||||
RET=0
|
||||
|
||||
# check if we already have a warning
|
||||
mdb_count_check_warn "Check MDB entries count warning before test"
|
||||
|
||||
bridge mdb add dev br0 port "$swp1" grp 239.0.0.1 permanent vid 10
|
||||
ip link set dev br0 down
|
||||
bridge vlan set vid 10 dev "$swp1" state blocking
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 1
|
||||
ip link set dev br0 up
|
||||
bridge mdb flush dev br0
|
||||
|
||||
mdb_count_check_warn "Check MDB entries count warning after test"
|
||||
|
||||
bridge vlan set vid 10 dev "$swp1" state forwarding
|
||||
ip link set dev br0 type bridge mcast_vlan_snooping 0
|
||||
|
||||
log_test "MDB count warning: disabled vlan state and MDB flush"
|
||||
}
|
||||
|
||||
# test groups
|
||||
|
||||
test_8021d()
|
||||
|
|
@ -1297,6 +1367,7 @@ test_8021q()
|
|||
{
|
||||
# Tests for vlan_filtering 1 mcast_vlan_snooping 0.
|
||||
|
||||
log_info "802.1q tests"
|
||||
switch_create_8021q
|
||||
setup_wait
|
||||
|
||||
|
|
@ -1334,6 +1405,21 @@ test_8021qvs()
|
|||
switch_destroy
|
||||
}
|
||||
|
||||
test_mdb_count_warning()
|
||||
{
|
||||
# Tests for mdb_n_entries warning
|
||||
|
||||
log_info "MDB count warning tests"
|
||||
switch_create_8021q
|
||||
setup_wait
|
||||
|
||||
test_mdb_count_mcast_vlan_snooping_flush
|
||||
test_mdb_count_mcast_snooping_flush
|
||||
test_mdb_count_vlan_state_flush
|
||||
|
||||
switch_destroy
|
||||
}
|
||||
|
||||
if ! bridge link help 2>&1 | grep -q "mcast_max_groups"; then
|
||||
echo "SKIP: iproute2 too old, missing bridge \"mcast_max_groups\" support"
|
||||
exit $ksft_skip
|
||||
|
|
|
|||
|
|
@ -98,12 +98,20 @@ setup_prepare()
|
|||
h1_create
|
||||
h2_create
|
||||
switch_create
|
||||
|
||||
if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then
|
||||
sysctl_set net.bridge.bridge-nf-call-iptables 0
|
||||
fi
|
||||
}
|
||||
|
||||
cleanup()
|
||||
{
|
||||
pre_cleanup
|
||||
|
||||
if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then
|
||||
sysctl_restore net.bridge.bridge-nf-call-iptables
|
||||
fi
|
||||
|
||||
switch_destroy
|
||||
h2_destroy
|
||||
h1_destroy
|
||||
|
|
|
|||
|
|
@ -91,12 +91,20 @@ setup_prepare()
|
|||
h1_create
|
||||
h2_create
|
||||
switch_create
|
||||
|
||||
if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then
|
||||
sysctl_set net.bridge.bridge-nf-call-iptables 0
|
||||
fi
|
||||
}
|
||||
|
||||
cleanup()
|
||||
{
|
||||
pre_cleanup
|
||||
|
||||
if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then
|
||||
sysctl_restore net.bridge.bridge-nf-call-iptables
|
||||
fi
|
||||
|
||||
switch_destroy
|
||||
h2_destroy
|
||||
h1_destroy
|
||||
|
|
|
|||
|
|
@ -223,7 +223,7 @@ mirred_egress_to_ingress_tcp_test()
|
|||
ip_proto icmp \
|
||||
action drop
|
||||
|
||||
ip vrf exec v$h1 ncat --recv-only -w10 -l -p 12345 -o $mirred_e2i_tf2 &
|
||||
ip vrf exec v$h1 ncat --recv-only -w10 -l -p 12345 > $mirred_e2i_tf2 &
|
||||
local rpid=$!
|
||||
ip vrf exec v$h1 ncat -w1 --send-only 192.0.2.2 12345 <$mirred_e2i_tf1
|
||||
wait -n $rpid
|
||||
|
|
|
|||
|
|
@ -567,6 +567,21 @@ vxlan_encapped_ping_do()
|
|||
local inner_tos=$1; shift
|
||||
local outer_tos=$1; shift
|
||||
|
||||
local ipv4hdr=$(:
|
||||
)"45:"$( : IP version + IHL
|
||||
)"$inner_tos:"$( : IP TOS
|
||||
)"00:54:"$( : IP total length
|
||||
)"99:83:"$( : IP identification
|
||||
)"40:00:"$( : IP flags + frag off
|
||||
)"40:"$( : IP TTL
|
||||
)"01:"$( : IP proto
|
||||
)"CHECKSUM:"$( : IP header csum
|
||||
)"c0:00:02:03:"$( : IP saddr: 192.0.2.3
|
||||
)"c0:00:02:01"$( : IP daddr: 192.0.2.1
|
||||
)
|
||||
local checksum=$(payload_template_calc_checksum "$ipv4hdr")
|
||||
ipv4hdr=$(payload_template_expand_checksum "$ipv4hdr" $checksum)
|
||||
|
||||
$MZ $dev -c $count -d 100msec -q \
|
||||
-b $next_hop_mac -B $dest_ip \
|
||||
-t udp tos=$outer_tos,sp=23456,dp=$VXPORT,p=$(:
|
||||
|
|
@ -577,16 +592,7 @@ vxlan_encapped_ping_do()
|
|||
)"$dest_mac:"$( : ETH daddr
|
||||
)"$(mac_get w2):"$( : ETH saddr
|
||||
)"08:00:"$( : ETH type
|
||||
)"45:"$( : IP version + IHL
|
||||
)"$inner_tos:"$( : IP TOS
|
||||
)"00:54:"$( : IP total length
|
||||
)"99:83:"$( : IP identification
|
||||
)"40:00:"$( : IP flags + frag off
|
||||
)"40:"$( : IP TTL
|
||||
)"01:"$( : IP proto
|
||||
)"00:00:"$( : IP header csum
|
||||
)"c0:00:02:03:"$( : IP saddr: 192.0.2.3
|
||||
)"c0:00:02:01:"$( : IP daddr: 192.0.2.1
|
||||
)"$ipv4hdr:"$( : IPv4 header
|
||||
)"08:"$( : ICMP type
|
||||
)"00:"$( : ICMP code
|
||||
)"8b:f2:"$( : ICMP csum
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue