1. 16 Feb, 2021 8 commits
    • David S. Miller's avatar
      Merge branch 'Fix-buggy-brport-flags-offload-for-SJA1105-DSA' · 455843d2
      David S. Miller authored
      Vladimir Oltean says:
      
      ====================
      Fix buggy brport flags offload for SJA1105 DSA
      
      I am resending this series because the title and the patches were mixed
      up and these patches were lost. This series' cover letter was used as
      the merge commit for the unrelated "Fixing build breakage after "Merge
      branch 'Propagate-extack-for-switchdev-LANs-from-DSA'"" series, as can
      be seen below:
      https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=ca04422afd6998611a81d0ea1b61d5a5f4923f84
      
      while the actual patches from the "Fix buggy brport flags offload for
      SJA1105 DSA" series were marked as superseded and not applied:
      https://patchwork.kernel.org/project/netdevbpf/cover/20210214155704.1784220-1-olteanv@gmail.com/
      which they should have.
      
      I know with so many bugs I introduced it's hard to keep track, I'm sorry.
      
      Original series description:
      
      While testing software bridging on sja1105, I discovered that I managed
      to introduce two bugs in a single patch submitted recently to net-next.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      455843d2
    • Vladimir Oltean's avatar
      net: dsa: sja1105: fix leakage of flooded frames outside bridging domain · 7f7ccdea
      Vladimir Oltean authored
      Quite embarrasingly, I managed to fool myself into thinking that the
      flooding domain of sja1105 source ports is restricted by the forwarding
      domain, which it isn't. Frames which match an FDB entry are forwarded
      towards that entry's DESTPORTS restricted by REACH_PORT[SRC_PORT], while
      frames that don't match any FDB entry are forwarded towards
      FL_DOMAIN[SRC_PORT] or BC_DOMAIN[SRC_PORT].
      
      This means we can't get away with doing the simple thing, and we must
      manage the flooding domain ourselves such that it is restricted by the
      forwarding domain. This new function must be called from the
      .port_bridge_join and .port_bridge_leave methods too, not just from
      .port_bridge_flags as we did before.
      
      Fixes: 4d942354 ("net: dsa: sja1105: offload bridge port flags to device")
      Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      7f7ccdea
    • Vladimir Oltean's avatar
      net: dsa: sja1105: fix configuration of source address learning · 4c44fc5e
      Vladimir Oltean authored
      Due to a mistake, the driver always sets the address learning flag to
      the previously stored value, and not to the currently configured one.
      The bug is visible only in standalone ports mode, because when the port
      is bridged, the issue is masked by .port_stp_state_set which overwrites
      the address learning state to the proper value.
      
      Fixes: 4d942354 ("net: dsa: sja1105: offload bridge port flags to device")
      Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
      Reviewed-by: default avatarFlorian Fainelli <f.fainelli@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      4c44fc5e
    • Geetha sowjanya's avatar
      octeontx2-af: cn10k: Fixes CN10K RPM reference issue · 786621d2
      Geetha sowjanya authored
      This patch fixes references to uninitialized variables and
      debugfs entry name for CN10K platform and HW_TSO flag check.
      
      Fixes: 3ad3f8f9 ("octeontx2-af: cn10k: MAC internal loopback support").
      Signed-off-by: default avatarGeetha sowjanya <gakula@marvell.com>
      Signed-off-by: default avatarSunil Goutham <sgoutham@marvell.com>
      
      v1-v2
      - Clear HW_TSO flag for 96xx B0 version.
      
      This patch fixes the bug introduced by the commit
      3ad3f8f9 ("octeontx2-af: cn10k: MAC internal loopback support").
      These changes are not yet merged into net branch, hence submitting
      to net-next.
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      786621d2
    • Vladimir Oltean's avatar
      net: dsa: felix: perform teardown on error in felix_setup · 6b73b7c9
      Vladimir Oltean authored
      If the driver fails to probe, it would be nice to not leak memory.
      Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      6b73b7c9
    • Vladimir Oltean's avatar
      net: dsa: felix: don't deinitialize unused ports · 42b5adbb
      Vladimir Oltean authored
      ocelot_init_port is called only if dsa_is_unused_port == false, however
      ocelot_deinit_port is called unconditionally. This causes a warning in
      the skb_queue_purge inside ocelot_deinit_port saying that the spin lock
      protecting ocelot_port->tx_skbs was not initialized.
      
      Fixes: e5fb512d ("net: mscc: ocelot: deinitialize only initialized ports")
      Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      42b5adbb
    • Chen Lin's avatar
      ionic: Remove unused function pointer typedef ionic_reset_cb · 6825a456
      Chen Lin authored
      Remove the 'ionic_reset_cb' typedef as it is not used.
      Signed-off-by: default avatarChen Lin <chen.lin5@zte.com.cn>
      Acked-by: default avatarShannon Nelson <snelson@pensando.io>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      6825a456
    • David S. Miller's avatar
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next · b8af417e
      David S. Miller authored
      Daniel Borkmann says:
      
      ====================
      pull-request: bpf-next 2021-02-16
      
      The following pull-request contains BPF updates for your *net-next* tree.
      
      There's a small merge conflict between 7eeba170 ("tcp: Add receive timestamp
      support for receive zerocopy.") from net-next tree and 9cacf81f ("bpf: Remove
      extra lock_sock for TCP_ZEROCOPY_RECEIVE") from bpf-next tree. Resolve as follows:
      
        [...]
                      lock_sock(sk);
                      err = tcp_zerocopy_receive(sk, &zc, &tss);
                      err = BPF_CGROUP_RUN_PROG_GETSOCKOPT_KERN(sk, level, optname,
                                                                &zc, &len, err);
                      release_sock(sk);
        [...]
      
      We've added 116 non-merge commits during the last 27 day(s) which contain
      a total of 156 files changed, 5662 insertions(+), 1489 deletions(-).
      
      The main changes are:
      
      1) Adds support of pointers to types with known size among global function
         args to overcome the limit on max # of allowed args, from Dmitrii Banshchikov.
      
      2) Add bpf_iter for task_vma which can be used to generate information similar
         to /proc/pid/maps, from Song Liu.
      
      3) Enable bpf_{g,s}etsockopt() from all sock_addr related program hooks. Allow
         rewriting bind user ports from BPF side below the ip_unprivileged_port_start
         range, both from Stanislav Fomichev.
      
      4) Prevent recursion on fentry/fexit & sleepable programs and allow map-in-map
         as well as per-cpu maps for the latter, from Alexei Starovoitov.
      
      5) Add selftest script to run BPF CI locally. Also enable BPF ringbuffer
         for sleepable programs, both from KP Singh.
      
      6) Extend verifier to enable variable offset read/write access to the BPF
         program stack, from Andrei Matei.
      
      7) Improve tc & XDP MTU handling and add a new bpf_check_mtu() helper to
         query device MTU from programs, from Jesper Dangaard Brouer.
      
      8) Allow bpf_get_socket_cookie() helper also be called from [sleepable] BPF
         tracing programs, from Florent Revest.
      
      9) Extend x86 JIT to pad JMPs with NOPs for helping image to converge when
         otherwise too many passes are required, from Gary Lin.
      
      10) Verifier fixes on atomics with BPF_FETCH as well as function-by-function
          verification both related to zero-extension handling, from Ilya Leoshkevich.
      
      11) Better kernel build integration of resolve_btfids tool, from Jiri Olsa.
      
      12) Batch of AF_XDP selftest cleanups and small performance improvement
          for libbpf's xsk map redirect for newer kernels, from Björn Töpel.
      
      13) Follow-up BPF doc and verifier improvements around atomics with
          BPF_FETCH, from Brendan Jackman.
      
      14) Permit zero-sized data sections e.g. if ELF .rodata section contains
          read-only data from local variables, from Yonghong Song.
      
      15) veth driver skb bulk-allocation for ndo_xdp_xmit, from Lorenzo Bianconi.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b8af417e
  2. 15 Feb, 2021 32 commits