1. 01 Mar, 2024 2 commits
  2. 29 Feb, 2024 15 commits
    • Linus Torvalds's avatar
      Merge tag 'net-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net · 87adedeb
      Linus Torvalds authored
      Pull networking fixes from Jakub Kicinski:
       "Including fixes from bluetooth, WiFi and netfilter.
      
        We have one outstanding issue with the stmmac driver, which may be a
        LOCKDEP false positive, not a blocker.
      
        Current release - regressions:
      
         - netfilter: nf_tables: re-allow NFPROTO_INET in
           nft_(match/target)_validate()
      
         - eth: ionic: fix error handling in PCI reset code
      
        Current release - new code bugs:
      
         - eth: stmmac: complete meta data only when enabled, fix null-deref
      
         - kunit: fix again checksum tests on big endian CPUs
      
        Previous releases - regressions:
      
         - veth: try harder when allocating queue memory
      
         - Bluetooth:
            - hci_bcm4377: do not mark valid bd_addr as invalid
            - hci_event: fix handling of HCI_EV_IO_CAPA_REQUEST
      
        Previous releases - always broken:
      
         - info leak in __skb_datagram_iter() on netlink socket
      
         - mptcp:
            - map v4 address to v6 when destroying subflow
            - fix potential wake-up event loss due to sndbuf auto-tuning
            - fix double-free on socket dismantle
      
         - wifi: nl80211: reject iftype change with mesh ID change
      
         - fix small out-of-bound read when validating netlink be16/32 types
      
         - rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
      
         - ipv6: fix potential "struct net" ref-leak in inet6_rtm_getaddr()
      
         - ip_tunnel: prevent perpetual headroom growth with huge number of
           tunnels on top of each other
      
         - mctp: fix skb leaks on error paths of mctp_local_output()
      
         - eth: ice: fixes for DPLL state reporting
      
         - dpll: rely on rcu for netdev_dpll_pin() to prevent UaF
      
         - eth: dpaa: accept phy-interface-type = '10gbase-r' in the device
           tree"
      
      * tag 'net-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (73 commits)
        dpll: fix build failure due to rcu_dereference_check() on unknown type
        kunit: Fix again checksum tests on big endian CPUs
        tls: fix use-after-free on failed backlog decryption
        tls: separate no-async decryption request handling from async
        tls: fix peeking with sync+async decryption
        tls: decrement decrypt_pending if no async completion will be called
        gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
        net: hsr: Use correct offset for HSR TLV values in supervisory HSR frames
        igb: extend PTP timestamp adjustments to i211
        rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
        tools: ynl: fix handling of multiple mcast groups
        selftests: netfilter: add bridge conntrack + multicast test case
        netfilter: bridge: confirm multicast packets before passing them up the stack
        netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
        Bluetooth: qca: Fix triggering coredump implementation
        Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT
        Bluetooth: qca: Fix wrong event type for patch config command
        Bluetooth: Enforce validation on max value of connection interval
        Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST
        Bluetooth: mgmt: Fix limited discoverable off timeout
        ...
      87adedeb
    • Linus Torvalds's avatar
      Merge tag 'landlock-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux · d4f76f80
      Linus Torvalds authored
      Pull Landlock fix from Mickaël Salaün:
       "Fix a potential issue when handling inodes with inconsistent
        properties"
      
      * tag 'landlock-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux:
        landlock: Fix asymmetric private inodes referring
      d4f76f80
    • Eric Dumazet's avatar
      dpll: fix build failure due to rcu_dereference_check() on unknown type · 640f41ed
      Eric Dumazet authored
      Tasmiya reports that their compiler complains that we deref
      a pointer to unknown type with rcu_dereference_rtnl():
      
      include/linux/rcupdate.h:439:9: error: dereferencing pointer to incomplete type ‘struct dpll_pin’
      
      Unclear what compiler it is, at the moment, and we can't report
      but since DPLL can't be a module - move the code from the header
      into the source file.
      
      Fixes: 0d60d8df ("dpll: rely on rcu for netdev_dpll_pin()")
      Reported-by: default avatarTasmiya Nalatwad <tasmiya@linux.vnet.ibm.com>
      Link: https://lore.kernel.org/all/3fcf3a2c-1c1b-42c1-bacb-78fdcd700389@linux.vnet.ibm.com/Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Link: https://lore.kernel.org/r/20240229190515.2740221-1-kuba@kernel.orgSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      640f41ed
    • Christophe Leroy's avatar
      kunit: Fix again checksum tests on big endian CPUs · 3d6423ef
      Christophe Leroy authored
      Commit b38460bc ("kunit: Fix checksum tests on big endian CPUs")
      fixed endianness issues with kunit checksum tests, but then
      commit 6f4c45cb ("kunit: Add tests for csum_ipv6_magic and
      ip_fast_csum") introduced new issues on big endian CPUs. Those issues
      are once again reflected by the warnings reported by sparse.
      
      So, fix them with the same approach, perform proper conversion in
      order to support both little and big endian CPUs. Once the conversions
      are properly done and the right types used, the sparse warnings are
      cleared as well.
      Reported-by: default avatarErhard Furtner <erhard_f@mailbox.org>
      Fixes: 6f4c45cb ("kunit: Add tests for csum_ipv6_magic and ip_fast_csum")
      Signed-off-by: default avatarChristophe Leroy <christophe.leroy@csgroup.eu>
      Tested-by: default avatarCharlie Jenkins <charlie@rivosinc.com>
      Tested-by: default avatarGuenter Roeck <linux@roeck-us.net>
      Acked-by: default avatarPaolo Abeni <pabeni@redhat.com>
      Acked-by: default avatarPalmer Dabbelt <palmer@rivosinc.com>
      Link: https://lore.kernel.org/r/73df3a9e95c2179119398ad1b4c84cdacbd8dfb6.1708684443.git.christophe.leroy@csgroup.euSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      3d6423ef
    • Jakub Kicinski's avatar
      Merge tag 'for-net-2024-02-28' of git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth · 244b96c2
      Jakub Kicinski authored
      Luiz Augusto von Dentz says:
      
      ====================
      bluetooth pull request for net:
      
       - mgmt: Fix limited discoverable off timeout
       - hci_qca: Set BDA quirk bit if fwnode exists in DT
       - hci_bcm4377: do not mark valid bd_addr as invalid
       - hci_sync: Check the correct flag before starting a scan
       - Enforce validation on max value of connection interval
       - hci_sync: Fix accept_list when attempting to suspend
       - hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST
       - Avoid potential use-after-free in hci_error_reset
       - rfcomm: Fix null-ptr-deref in rfcomm_check_security
       - hci_event: Fix wrongly recorded wakeup BD_ADDR
       - qca: Fix wrong event type for patch config command
       - qca: Fix triggering coredump implementation
      
      * tag 'for-net-2024-02-28' of git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth:
        Bluetooth: qca: Fix triggering coredump implementation
        Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT
        Bluetooth: qca: Fix wrong event type for patch config command
        Bluetooth: Enforce validation on max value of connection interval
        Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST
        Bluetooth: mgmt: Fix limited discoverable off timeout
        Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR
        Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
        Bluetooth: hci_sync: Fix accept_list when attempting to suspend
        Bluetooth: Avoid potential use-after-free in hci_error_reset
        Bluetooth: hci_sync: Check the correct flag before starting a scan
        Bluetooth: hci_bcm4377: do not mark valid bd_addr as invalid
      ====================
      
      Link: https://lore.kernel.org/r/20240228145644.2269088-1-luiz.dentz@gmail.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      244b96c2
    • Jakub Kicinski's avatar
      Merge branch 'tls-a-few-more-fixes-for-async-decrypt' · 8f5afe41
      Jakub Kicinski authored
      Sabrina Dubroca says:
      
      ====================
      tls: a few more fixes for async decrypt
      
      The previous patchset [1] took care of "full async". This adds a few
      fixes for cases where only part of the crypto operations go the async
      route, found by extending my previous debug patch [2] to do N
      synchronous operations followed by M asynchronous ops (with N and M
      configurable).
      
      [1] https://patchwork.kernel.org/project/netdevbpf/list/?series=823784&state=*
      [2] https://lore.kernel.org/all/9d664093b1bf7f47497b2c40b3a085b45f3274a2.1694021240.git.sd@queasysnail.net/
      ====================
      
      Link: https://lore.kernel.org/r/cover.1709132643.git.sd@queasysnail.netSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      8f5afe41
    • Sabrina Dubroca's avatar
      tls: fix use-after-free on failed backlog decryption · 13114dc5
      Sabrina Dubroca authored
      When the decrypt request goes to the backlog and crypto_aead_decrypt
      returns -EBUSY, tls_do_decryption will wait until all async
      decryptions have completed. If one of them fails, tls_do_decryption
      will return -EBADMSG and tls_decrypt_sg jumps to the error path,
      releasing all the pages. But the pages have been passed to the async
      callback, and have already been released by tls_decrypt_done.
      
      The only true async case is when crypto_aead_decrypt returns
       -EINPROGRESS. With -EBUSY, we already waited so we can tell
      tls_sw_recvmsg that the data is available for immediate copy, but we
      need to notify tls_decrypt_sg (via the new ->async_done flag) that the
      memory has already been released.
      
      Fixes: 85905414 ("net: tls: handle backlogging of crypto requests")
      Signed-off-by: default avatarSabrina Dubroca <sd@queasysnail.net>
      Link: https://lore.kernel.org/r/4755dd8d9bebdefaa19ce1439b833d6199d4364c.1709132643.git.sd@queasysnail.netSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      13114dc5
    • Sabrina Dubroca's avatar
      tls: separate no-async decryption request handling from async · 41532b78
      Sabrina Dubroca authored
      If we're not doing async, the handling is much simpler. There's no
      reference counting, we just need to wait for the completion to wake us
      up and return its result.
      
      We should preferably also use a separate crypto_wait. I'm not seeing a
      UAF as I did in the past, I think aec79619 ("tls: fix race between
      async notify and socket close") took care of it.
      
      This will make the next fix easier.
      Signed-off-by: default avatarSabrina Dubroca <sd@queasysnail.net>
      Link: https://lore.kernel.org/r/47bde5f649707610eaef9f0d679519966fc31061.1709132643.git.sd@queasysnail.netSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      41532b78
    • Sabrina Dubroca's avatar
      tls: fix peeking with sync+async decryption · 6caaf104
      Sabrina Dubroca authored
      If we peek from 2 records with a currently empty rx_list, and the
      first record is decrypted synchronously but the second record is
      decrypted async, the following happens:
        1. decrypt record 1 (sync)
        2. copy from record 1 to the userspace's msg
        3. queue the decrypted record to rx_list for future read(!PEEK)
        4. decrypt record 2 (async)
        5. queue record 2 to rx_list
        6. call process_rx_list to copy data from the 2nd record
      
      We currently pass copied=0 as skip offset to process_rx_list, so we
      end up copying once again from the first record. We should skip over
      the data we've already copied.
      
      Seen with selftest tls.12_aes_gcm.recv_peek_large_buf_mult_recs
      
      Fixes: 692d7b5d ("tls: Fix recvmsg() to be able to peek across multiple records")
      Signed-off-by: default avatarSabrina Dubroca <sd@queasysnail.net>
      Link: https://lore.kernel.org/r/1b132d2b2b99296bfde54e8a67672d90d6d16e71.1709132643.git.sd@queasysnail.netSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      6caaf104
    • Sabrina Dubroca's avatar
      tls: decrement decrypt_pending if no async completion will be called · f7fa16d4
      Sabrina Dubroca authored
      With mixed sync/async decryption, or failures of crypto_aead_decrypt,
      we increment decrypt_pending but we never do the corresponding
      decrement since tls_decrypt_done will not be called. In this case, we
      should decrement decrypt_pending immediately to avoid getting stuck.
      
      For example, the prequeue prequeue test gets stuck with mixed
      modes (one async decrypt + one sync decrypt).
      
      Fixes: 94524d8f ("net/tls: Add support for async decryption of tls records")
      Signed-off-by: default avatarSabrina Dubroca <sd@queasysnail.net>
      Link: https://lore.kernel.org/r/c56d5fc35543891d5319f834f25622360e1bfbec.1709132643.git.sd@queasysnail.netSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      f7fa16d4
    • Alexander Ofitserov's avatar
      gtp: fix use-after-free and null-ptr-deref in gtp_newlink() · 616d82c3
      Alexander Ofitserov authored
      The gtp_link_ops operations structure for the subsystem must be
      registered after registering the gtp_net_ops pernet operations structure.
      
      Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:
      
      [ 1010.702740] gtp: GTP module unloaded
      [ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
      [ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
      [ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
      [ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
      [ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
      [ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
      [ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
      [ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
      [ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
      [ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
      [ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
      [ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
      [ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
      [ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
      [ 1010.715968] PKRU: 55555554
      [ 1010.715972] Call Trace:
      [ 1010.715985]  ? __die_body.cold+0x1a/0x1f
      [ 1010.715995]  ? die_addr+0x43/0x70
      [ 1010.716002]  ? exc_general_protection+0x199/0x2f0
      [ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30
      [ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]
      [ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]
      [ 1010.716042]  __rtnl_newlink+0x1063/0x1700
      [ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0
      [ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0
      [ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0
      [ 1010.716076]  ? __kernel_text_address+0x56/0xa0
      [ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0
      [ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30
      [ 1010.716098]  ? arch_stack_walk+0x9e/0xf0
      [ 1010.716106]  ? stack_trace_save+0x91/0xd0
      [ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170
      [ 1010.716121]  ? __lock_acquire+0x15c5/0x5380
      [ 1010.716139]  ? mark_held_locks+0x9e/0xe0
      [ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0
      [ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700
      [ 1010.716160]  rtnl_newlink+0x69/0xa0
      [ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50
      [ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0
      [ 1010.716179]  ? lock_acquire+0x1fe/0x560
      [ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50
      [ 1010.716196]  netlink_rcv_skb+0x14d/0x440
      [ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0
      [ 1010.716208]  ? netlink_ack+0xab0/0xab0
      [ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50
      [ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50
      [ 1010.716226]  ? __virt_addr_valid+0x30b/0x590
      [ 1010.716233]  netlink_unicast+0x54b/0x800
      [ 1010.716240]  ? netlink_attachskb+0x870/0x870
      [ 1010.716248]  ? __check_object_size+0x2de/0x3b0
      [ 1010.716254]  netlink_sendmsg+0x938/0xe40
      [ 1010.716261]  ? netlink_unicast+0x800/0x800
      [ 1010.716269]  ? __import_iovec+0x292/0x510
      [ 1010.716276]  ? netlink_unicast+0x800/0x800
      [ 1010.716284]  __sock_sendmsg+0x159/0x190
      [ 1010.716290]  ____sys_sendmsg+0x712/0x880
      [ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0
      [ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270
      [ 1010.716309]  ? lock_acquire+0x1fe/0x560
      [ 1010.716315]  ? drain_array_locked+0x90/0x90
      [ 1010.716324]  ___sys_sendmsg+0xf8/0x170
      [ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170
      [ 1010.716337]  ? lockdep_init_map_type+0x2c7/0x860
      [ 1010.716343]  ? lockdep_hardirqs_on_prepare+0x430/0x430
      [ 1010.716350]  ? debug_mutex_init+0x33/0x70
      [ 1010.716360]  ? percpu_counter_add_batch+0x8b/0x140
      [ 1010.716367]  ? lock_acquire+0x1fe/0x560
      [ 1010.716373]  ? find_held_lock+0x2c/0x110
      [ 1010.716384]  ? __fd_install+0x1b6/0x6f0
      [ 1010.716389]  ? lock_downgrade+0x810/0x810
      [ 1010.716396]  ? __fget_light+0x222/0x290
      [ 1010.716403]  __sys_sendmsg+0xea/0x1b0
      [ 1010.716409]  ? __sys_sendmsg_sock+0x40/0x40
      [ 1010.716419]  ? lockdep_hardirqs_on_prepare+0x2b3/0x430
      [ 1010.716425]  ? syscall_enter_from_user_mode+0x1d/0x60
      [ 1010.716432]  do_syscall_64+0x30/0x40
      [ 1010.716438]  entry_SYSCALL_64_after_hwframe+0x62/0xc7
      [ 1010.716444] RIP: 0033:0x7fd1508cbd49
      [ 1010.716452] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ef 70 0d 00 f7 d8 64 89 01 48
      [ 1010.716456] RSP: 002b:00007fff18872348 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
      [ 1010.716463] RAX: ffffffffffffffda RBX: 000055f72bf0eac0 RCX: 00007fd1508cbd49
      [ 1010.716468] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000006
      [ 1010.716473] RBP: 00007fff18872360 R08: 00007fff18872360 R09: 00007fff18872360
      [ 1010.716478] R10: 00007fff18872360 R11: 0000000000000202 R12: 000055f72bf0e1b0
      [ 1010.716482] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
      [ 1010.716491] Modules linked in: gtp(+) udp_tunnel ib_core uinput af_packet rfkill qrtr joydev hid_generic usbhid hid kvm_intel iTCO_wdt intel_pmc_bxt iTCO_vendor_support kvm snd_hda_codec_generic ledtrig_audio irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel snd_hda_intel nls_utf8 snd_intel_dspcfg nls_cp866 psmouse aesni_intel vfat crypto_simd fat cryptd glue_helper snd_hda_codec pcspkr snd_hda_core i2c_i801 snd_hwdep i2c_smbus xhci_pci snd_pcm lpc_ich xhci_pci_renesas xhci_hcd qemu_fw_cfg tiny_power_button button sch_fq_codel vboxvideo drm_vram_helper drm_ttm_helper ttm vboxsf vboxguest snd_seq_midi snd_seq_midi_event snd_seq snd_rawmidi snd_seq_device snd_timer snd soundcore msr fuse efi_pstore dm_mod ip_tables x_tables autofs4 virtio_gpu virtio_dma_buf drm_kms_helper cec rc_core drm virtio_rng virtio_scsi rng_core virtio_balloon virtio_blk virtio_net virtio_console net_failover failover ahci libahci libata evdev scsi_mod input_leds serio_raw virtio_pci intel_agp
      [ 1010.716674]  virtio_ring intel_gtt virtio [last unloaded: gtp]
      [ 1010.716693] ---[ end trace 04990a4ce61e174b ]---
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarAlexander Ofitserov <oficerovas@altlinux.org>
      Fixes: 459aa660 ("gtp: add initial driver for datapath of GPRS Tunneling Protocol (GTP-U)")
      Reviewed-by: default avatarJiri Pirko <jiri@nvidia.com>
      Link: https://lore.kernel.org/r/20240228114703.465107-1-oficerovas@altlinux.orgSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      616d82c3
    • Paolo Abeni's avatar
      Merge tag 'nf-24-02-29' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf · b611b776
      Paolo Abeni authored
      Pablo Neira Ayuso says:
      
      ====================
      Netfilter fixes for net
      
      Patch #1 restores NFPROTO_INET with nft_compat, from Ignat Korchagin.
      
      Patch #2 fixes an issue with bridge netfilter and broadcast/multicast
      packets.
      
      There is a day 0 bug in br_netfilter when used with connection tracking.
      
      Conntrack assumes that an nf_conn structure that is not yet added to
      hash table ("unconfirmed"), is only visible by the current cpu that is
      processing the sk_buff.
      
      For bridge this isn't true, sk_buff can get cloned in between, and
      clones can be processed in parallel on different cpu.
      
      This patch disables NAT and conntrack helpers for multicast packets.
      
      Patch #3 adds a selftest to cover for the br_netfilter bug.
      
      netfilter pull request 24-02-29
      
      * tag 'nf-24-02-29' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf:
        selftests: netfilter: add bridge conntrack + multicast test case
        netfilter: bridge: confirm multicast packets before passing them up the stack
        netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
      ====================
      
      Link: https://lore.kernel.org/r/20240229000135.8780-1-pablo@netfilter.orgSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      b611b776
    • Lukasz Majewski's avatar
      net: hsr: Use correct offset for HSR TLV values in supervisory HSR frames · 51dd4ee0
      Lukasz Majewski authored
      Current HSR implementation uses following supervisory frame (even for
      HSRv1 the HSR tag is not is not present):
      
      00000000: 01 15 4e 00 01 2d XX YY ZZ 94 77 10 88 fb 00 01
      00000010: 7e 1c 17 06 XX YY ZZ 94 77 10 1e 06 XX YY ZZ 94
      00000020: 77 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      00000030: 00 00 00 00 00 00 00 00 00 00 00 00
      
      The current code adds extra two bytes (i.e. sizeof(struct hsr_sup_tlv))
      when offset for skb_pull() is calculated.
      This is wrong, as both 'struct hsrv1_ethhdr_sp' and 'hsrv0_ethhdr_sp'
      already have 'struct hsr_sup_tag' defined in them, so there is no need
      for adding extra two bytes.
      
      This code was working correctly as with no RedBox support, the check for
      HSR_TLV_EOT (0x00) was off by two bytes, which were corresponding to
      zeroed padded bytes for minimal packet size.
      
      Fixes: eafaa88b ("net: hsr: Add support for redbox supervision frames")
      Signed-off-by: default avatarLukasz Majewski <lukma@denx.de>
      Reviewed-by: default avatarJiri Pirko <jiri@nvidia.com>
      Link: https://lore.kernel.org/r/20240228085644.3618044-1-lukma@denx.deSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      51dd4ee0
    • Oleksij Rempel's avatar
      igb: extend PTP timestamp adjustments to i211 · 0bb7b093
      Oleksij Rempel authored
      The i211 requires the same PTP timestamp adjustments as the i210,
      according to its datasheet. To ensure consistent timestamping across
      different platforms, this change extends the existing adjustments to
      include the i211.
      
      The adjustment result are tested and comparable for i210 and i211 based
      systems.
      
      Fixes: 3f544d2a ("igb: adjust PTP timestamps for Tx/Rx latency")
      Signed-off-by: default avatarOleksij Rempel <o.rempel@pengutronix.de>
      Reviewed-by: default avatarJacob Keller <jacob.e.keller@intel.com>
      Tested-by: Pucha Himasekhar Reddy <himasekharx.reddy.pucha@intel.com> (A Contingent worker at Intel)
      Signed-off-by: default avatarTony Nguyen <anthony.l.nguyen@intel.com>
      Link: https://lore.kernel.org/r/20240227184942.362710-1-anthony.l.nguyen@intel.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      0bb7b093
    • Lin Ma's avatar
      rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back · 743ad091
      Lin Ma authored
      In the commit d73ef2d6 ("rtnetlink: let rtnl_bridge_setlink checks
      IFLA_BRIDGE_MODE length"), an adjustment was made to the old loop logic
      in the function `rtnl_bridge_setlink` to enable the loop to also check
      the length of the IFLA_BRIDGE_MODE attribute. However, this adjustment
      removed the `break` statement and led to an error logic of the flags
      writing back at the end of this function.
      
      if (have_flags)
          memcpy(nla_data(attr), &flags, sizeof(flags));
          // attr should point to IFLA_BRIDGE_FLAGS NLA !!!
      
      Before the mentioned commit, the `attr` is granted to be IFLA_BRIDGE_FLAGS.
      However, this is not necessarily true fow now as the updated loop will let
      the attr point to the last NLA, even an invalid NLA which could cause
      overflow writes.
      
      This patch introduces a new variable `br_flag` to save the NLA pointer
      that points to IFLA_BRIDGE_FLAGS and uses it to resolve the mentioned
      error logic.
      
      Fixes: d73ef2d6 ("rtnetlink: let rtnl_bridge_setlink checks IFLA_BRIDGE_MODE length")
      Signed-off-by: default avatarLin Ma <linma@zju.edu.cn>
      Acked-by: default avatarNikolay Aleksandrov <razor@blackwall.org>
      Link: https://lore.kernel.org/r/20240227121128.608110-1-linma@zju.edu.cnSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      743ad091
  3. 28 Feb, 2024 23 commits
    • Jakub Kicinski's avatar
      tools: ynl: fix handling of multiple mcast groups · b6c65eb2
      Jakub Kicinski authored
      We never increment the group number iterator, so all groups
      get recorded into index 0 of the mcast_groups[] array.
      
      As a result YNL can only handle using the last group.
      For example using the "netdev" sample on kernel with
      page pool commands results in:
      
        $ ./samples/netdev
        YNL: Multicast group 'mgmt' not found
      
      Most families have only one multicast group, so this hasn't
      been noticed. Plus perhaps developers usually test the last
      group which would have worked.
      
      Fixes: 86878f14 ("tools: ynl: user space helpers")
      Reviewed-by: default avatarDonald Hunter <donald.hunter@gmail.com>
      Acked-by: default avatarNicolas Dichtel <nicolas.dichtel@6wind.com>
      Link: https://lore.kernel.org/r/20240226214019.1255242-1-kuba@kernel.orgSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      b6c65eb2
    • Florian Westphal's avatar
      selftests: netfilter: add bridge conntrack + multicast test case · 6523cf51
      Florian Westphal authored
      Add test case for multicast packet confirm race.
      Without preceding patch, this should result in:
      
       WARNING: CPU: 0 PID: 38 at net/netfilter/nf_conntrack_core.c:1198 __nf_conntrack_confirm+0x3ed/0x5f0
       Workqueue: events_unbound macvlan_process_broadcast
       RIP: 0010:__nf_conntrack_confirm+0x3ed/0x5f0
        ? __nf_conntrack_confirm+0x3ed/0x5f0
        nf_confirm+0x2ad/0x2d0
        nf_hook_slow+0x36/0xd0
        ip_local_deliver+0xce/0x110
        __netif_receive_skb_one_core+0x4f/0x70
        process_backlog+0x8c/0x130
        [..]
      Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      6523cf51
    • Florian Westphal's avatar
      netfilter: bridge: confirm multicast packets before passing them up the stack · 62e7151a
      Florian Westphal authored
      conntrack nf_confirm logic cannot handle cloned skbs referencing
      the same nf_conn entry, which will happen for multicast (broadcast)
      frames on bridges.
      
       Example:
          macvlan0
             |
            br0
           /  \
        ethX    ethY
      
       ethX (or Y) receives a L2 multicast or broadcast packet containing
       an IP packet, flow is not yet in conntrack table.
      
       1. skb passes through bridge and fake-ip (br_netfilter)Prerouting.
          -> skb->_nfct now references a unconfirmed entry
       2. skb is broad/mcast packet. bridge now passes clones out on each bridge
          interface.
       3. skb gets passed up the stack.
       4. In macvlan case, macvlan driver retains clone(s) of the mcast skb
          and schedules a work queue to send them out on the lower devices.
      
          The clone skb->_nfct is not a copy, it is the same entry as the
          original skb.  The macvlan rx handler then returns RX_HANDLER_PASS.
       5. Normal conntrack hooks (in NF_INET_LOCAL_IN) confirm the orig skb.
      
      The Macvlan broadcast worker and normal confirm path will race.
      
      This race will not happen if step 2 already confirmed a clone. In that
      case later steps perform skb_clone() with skb->_nfct already confirmed (in
      hash table).  This works fine.
      
      But such confirmation won't happen when eb/ip/nftables rules dropped the
      packets before they reached the nf_confirm step in postrouting.
      
      Pablo points out that nf_conntrack_bridge doesn't allow use of stateful
      nat, so we can safely discard the nf_conn entry and let inet call
      conntrack again.
      
      This doesn't work for bridge netfilter: skb could have a nat
      transformation. Also bridge nf prevents re-invocation of inet prerouting
      via 'sabotage_in' hook.
      
      Work around this problem by explicit confirmation of the entry at LOCAL_IN
      time, before upper layer has a chance to clone the unconfirmed entry.
      
      The downside is that this disables NAT and conntrack helpers.
      
      Alternative fix would be to add locking to all code parts that deal with
      unconfirmed packets, but even if that could be done in a sane way this
      opens up other problems, for example:
      
      -m physdev --physdev-out eth0 -j SNAT --snat-to 1.2.3.4
      -m physdev --physdev-out eth1 -j SNAT --snat-to 1.2.3.5
      
      For multicast case, only one of such conflicting mappings will be
      created, conntrack only handles 1:1 NAT mappings.
      
      Users should set create a setup that explicitly marks such traffic
      NOTRACK (conntrack bypass) to avoid this, but we cannot auto-bypass
      them, ruleset might have accept rules for untracked traffic already,
      so user-visible behaviour would change.
      Suggested-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      Fixes: 1da177e4 ("Linux-2.6.12-rc2")
      Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217777Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      62e7151a
    • Ignat Korchagin's avatar
      netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate() · 7e0f122c
      Ignat Korchagin authored
      Commit d0009eff ("netfilter: nf_tables: validate NFPROTO_* family") added
      some validation of NFPROTO_* families in the nft_compat module, but it broke
      the ability to use legacy iptables modules in dual-stack nftables.
      
      While with legacy iptables one had to independently manage IPv4 and IPv6
      tables, with nftables it is possible to have dual-stack tables sharing the
      rules. Moreover, it was possible to use rules based on legacy iptables
      match/target modules in dual-stack nftables.
      
      As an example, the program from [2] creates an INET dual-stack family table
      using an xt_bpf based rule, which looks like the following (the actual output
      was generated with a patched nft tool as the current nft tool does not parse
      dual stack tables with legacy match rules, so consider it for illustrative
      purposes only):
      
      table inet testfw {
        chain input {
          type filter hook prerouting priority filter; policy accept;
          bytecode counter packets 0 bytes 0 accept
        }
      }
      
      After d0009eff ("netfilter: nf_tables: validate NFPROTO_* family") we get
      EOPNOTSUPP for the above program.
      
      Fix this by allowing NFPROTO_INET for nft_(match/target)_validate(), but also
      restrict the functions to classic iptables hooks.
      
      Changes in v3:
        * clarify that upstream nft will not display such configuration properly and
          that the output was generated with a patched nft tool
        * remove example program from commit description and link to it instead
        * no code changes otherwise
      
      Changes in v2:
        * restrict nft_(match/target)_validate() to classic iptables hooks
        * rewrite example program to use unmodified libnftnl
      
      Fixes: d0009eff ("netfilter: nf_tables: validate NFPROTO_* family")
      Link: https://lore.kernel.org/all/Zc1PfoWN38UuFJRI@calendula/T/#mc947262582c90fec044c7a3398cc92fac7afea72 [1]
      Link: https://lore.kernel.org/all/20240220145509.53357-1-ignat@cloudflare.com/ [2]
      Reported-by: default avatarJordan Griege <jgriege@cloudflare.com>
      Signed-off-by: default avatarIgnat Korchagin <ignat@cloudflare.com>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      7e0f122c
    • Linus Torvalds's avatar
      Merge tag 'acpi-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm · 805d849d
      Linus Torvalds authored
      Pull ACPI fix from Rafael Wysocki:
       "Revert a recent EC driver change that introduced an unexpected and
        undesirable user-visible difference in behavior (Rafael Wysocki)"
      
      * tag 'acpi-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm:
        Revert "ACPI: EC: Use a spin lock without disabing interrupts"
      805d849d
    • Linus Torvalds's avatar
      Merge tag 'pm-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm · 022d0c6e
      Linus Torvalds authored
      Pull power management fix from Rafael Wysocki:
       "Fix a latent bug in the intel-pstate cpufreq driver that has been
        exposed by the recent schedutil governor changes (Doug Smythies)"
      
      * tag 'pm-6.8-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm:
        cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back
      022d0c6e
    • Linus Torvalds's avatar
      Merge tag 'spi-fix-v6.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi · 5cf7ebef
      Linus Torvalds authored
      Pull spi fixes from Mark Brown:
       "There's two things here - the big one is a batch of fixes for the
        power management in the Cadence QuadSPI driver which had some serious
        issues with runtime PM and there's also a revert of one of the last
        batch of fixes for ppc4xx which has a dependency on -next but was in
        between two mainline fixes so the -next dependency got missed.
      
        The ppc4xx driver is not currently included in any defconfig and has
        dependencies that exclude it from allmodconfigs so none of the CI
        systems catch issues with it, hence the need for the earlier fixes
        series. There's some updates to the PowerPC configs to address this"
      
      * tag 'spi-fix-v6.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi:
        spi: Drop mismerged fix
        spi: cadence-qspi: add system-wide suspend and resume callbacks
        spi: cadence-qspi: put runtime in runtime PM hooks names
        spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks
        spi: cadence-qspi: fix pointer reference in runtime PM hooks
      5cf7ebef
    • Linus Torvalds's avatar
      Merge tag 'regulator-fix-v6.8-rc5' of... · 628e0594
      Linus Torvalds authored
      Merge tag 'regulator-fix-v6.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/regulator
      
      Pull regulator fixes from Mark Brown:
       "Two small fixes, one small update for the max5970 driver bringing the
        driver and DT binding documentation into sync plus a missed update to
        the patterns in MAINTAINERS after a DT binding YAML conversion"
      
      * tag 'regulator-fix-v6.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/regulator:
        regulator: max5970: Fix regulator child node name
        MAINTAINERS: repair entry for MICROCHIP MCP16502 PMIC DRIVER
      628e0594
    • Linus Torvalds's avatar
      Merge tag 'v6.8-p5' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 · e326df53
      Linus Torvalds authored
      Pull crypto fixes from Herbert Xu:
       "This fixes a regression in lskcipher and an out-of-bound access
        in arm64/neonbs"
      
      * tag 'v6.8-p5' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
        crypto: arm64/neonbs - fix out-of-bounds access on short input
        crypto: lskcipher - Copy IV in lskcipher glue code always
      e326df53
    • Zijun Hu's avatar
      Bluetooth: qca: Fix triggering coredump implementation · 6abf9dd2
      Zijun Hu authored
      hci_coredump_qca() uses __hci_cmd_sync() to send a vendor-specific command
      to trigger firmware coredump, but the command does not have any event as
      its sync response, so it is not suitable to use __hci_cmd_sync(), fixed by
      using __hci_cmd_send().
      
      Fixes: 06d3fdfc ("Bluetooth: hci_qca: Add qcom devcoredump support")
      Signed-off-by: default avatarZijun Hu <quic_zijuhu@quicinc.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      6abf9dd2
    • Janaki Ramaiah Thota's avatar
      Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT · 7dcd3e01
      Janaki Ramaiah Thota authored
      BT adapter going into UNCONFIGURED state during BT turn ON when
      devicetree has no local-bd-address node.
      
      Bluetooth will not work out of the box on such devices, to avoid this
      problem, added check to set HCI_QUIRK_USE_BDADDR_PROPERTY based on
      local-bd-address node entry.
      
      When this quirk is not set, the public Bluetooth address read by host
      from controller though HCI Read BD Address command is
      considered as valid.
      
      Fixes: e668eb1e ("Bluetooth: hci_core: Don't stop BT if the BD address missing in dts")
      Signed-off-by: default avatarJanaki Ramaiah Thota <quic_janathot@quicinc.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      7dcd3e01
    • Zijun Hu's avatar
      Bluetooth: qca: Fix wrong event type for patch config command · c0dbc560
      Zijun Hu authored
      Vendor-specific command patch config has HCI_Command_Complete event as
      response, but qca_send_patch_config_cmd() wrongly expects vendor-specific
      event for the command, fixed by using right event type.
      
      Btmon log for the vendor-specific command are shown below:
      < HCI Command: Vendor (0x3f|0x0000) plen 5
              28 01 00 00 00
      > HCI Event: Command Complete (0x0e) plen 5
            Vendor (0x3f|0x0000) ncmd 1
              Status: Success (0x00)
              28
      
      Fixes: 4fac8a7a ("Bluetooth: btqca: sequential validation")
      Signed-off-by: default avatarZijun Hu <quic_zijuhu@quicinc.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      c0dbc560
    • Kai-Heng Feng's avatar
      Bluetooth: Enforce validation on max value of connection interval · e4b01951
      Kai-Heng Feng authored
      Right now Linux BT stack cannot pass test case "GAP/CONN/CPUP/BV-05-C
      'Connection Parameter Update Procedure Invalid Parameters Central
      Responder'" in Bluetooth Test Suite revision GAP.TS.p44. [0]
      
      That was revoled by commit c49a8682 ("Bluetooth: validate BLE
      connection interval updates"), but later got reverted due to devices
      like keyboards and mice may require low connection interval.
      
      So only validate the max value connection interval to pass the Test
      Suite, and let devices to request low connection interval if needed.
      
      [0] https://www.bluetooth.org/docman/handlers/DownloadDoc.ashx?doc_id=229869
      
      Fixes: 68d19d7d ("Revert "Bluetooth: validate BLE connection interval updates"")
      Signed-off-by: default avatarKai-Heng Feng <kai.heng.feng@canonical.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      e4b01951
    • Luiz Augusto von Dentz's avatar
      Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST · 7e74aa53
      Luiz Augusto von Dentz authored
      If we received HCI_EV_IO_CAPA_REQUEST while
      HCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote
      does support SSP since otherwise this event shouldn't be generated.
      
      Link: https://lore.kernel.org/linux-bluetooth/CABBYNZ+9UdG1cMZVmdtN3U2aS16AKMCyTARZZyFX7xTEDWcMOw@mail.gmail.com/T/#t
      Fixes: c7f59461 ("Bluetooth: Fix a refcnt underflow problem for hci_conn")
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      7e74aa53
    • Frédéric Danis's avatar
      Bluetooth: mgmt: Fix limited discoverable off timeout · 0bd1fb58
      Frédéric Danis authored
      LIMITED_DISCOVERABLE flag is not reset from Class of Device and
      advertisement on limited discoverable timeout. This prevents to pass PTS
      test GAP/DISC/LIMM/BV-02-C
      
      Calling set_discoverable_sync as when the limited discovery is set
      correctly update the Class of Device and advertisement.
      Signed-off-by: default avatarFrédéric Danis <frederic.danis@collabora.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      0bd1fb58
    • Zijun Hu's avatar
      Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR · 61a5ab72
      Zijun Hu authored
      hci_store_wake_reason() wrongly parses event HCI_Connection_Request
      as HCI_Connection_Complete and HCI_Connection_Complete as
      HCI_Connection_Request, so causes recording wakeup BD_ADDR error and
      potential stability issue, fix it by using the correct field.
      
      Fixes: 2f20216c ("Bluetooth: Emit controller suspend and resume events")
      Signed-off-by: default avatarZijun Hu <quic_zijuhu@quicinc.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      61a5ab72
    • Yuxuan Hu's avatar
      Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security · 2535b848
      Yuxuan Hu authored
      During our fuzz testing of the connection and disconnection process at the
      RFCOMM layer, we discovered this bug. By comparing the packets from a
      normal connection and disconnection process with the testcase that
      triggered a KASAN report. We analyzed the cause of this bug as follows:
      
      1. In the packets captured during a normal connection, the host sends a
      `Read Encryption Key Size` type of `HCI_CMD` packet
      (Command Opcode: 0x1408) to the controller to inquire the length of
      encryption key.After receiving this packet, the controller immediately
      replies with a Command Completepacket (Event Code: 0x0e) to return the
      Encryption Key Size.
      
      2. In our fuzz test case, the timing of the controller's response to this
      packet was delayed to an unexpected point: after the RFCOMM and L2CAP
      layers had disconnected but before the HCI layer had disconnected.
      
      3. After receiving the Encryption Key Size Response at the time described
      in point 2, the host still called the rfcomm_check_security function.
      However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)->chan->conn;`
      had already been released, and when the function executed
      `return hci_conn_security(conn->hcon, d->sec_level, auth_type, d->out);`,
      specifically when accessing `conn->hcon`, a null-ptr-deref error occurred.
      
      To fix this bug, check if `sk->sk_state` is BT_CLOSED before calling
      rfcomm_recv_frame in rfcomm_process_rx.
      Signed-off-by: default avatarYuxuan Hu <20373622@buaa.edu.cn>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      2535b848
    • Luiz Augusto von Dentz's avatar
      Bluetooth: hci_sync: Fix accept_list when attempting to suspend · e5469adb
      Luiz Augusto von Dentz authored
      During suspend, only wakeable devices can be in acceptlist, so if the
      device was previously added it needs to be removed otherwise the device
      can end up waking up the system prematurely.
      
      Fixes: 3b420553 ("Bluetooth: hci_sync: Fix attempting to suspend with unfiltered passive scan")
      Signed-off-by: default avatarClancy Shang <clancy.shang@quectel.com>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      Reviewed-by: default avatarPaul Menzel <pmenzel@molgen.mpg.de>
      e5469adb
    • Ying Hsu's avatar
      Bluetooth: Avoid potential use-after-free in hci_error_reset · 2449007d
      Ying Hsu authored
      While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
      BT controller is not responding, the GPIO reset mechanism would
      free the hci_dev and lead to a use-after-free in hci_error_reset.
      
      Here's the call trace observed on a ChromeOS device with Intel AX201:
         queue_work_on+0x3e/0x6c
         __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth <HASH:3b4a6>]
         ? init_wait_entry+0x31/0x31
         __hci_cmd_sync+0x16/0x20 [bluetooth <HASH:3b4a 6>]
         hci_error_reset+0x4f/0xa4 [bluetooth <HASH:3b4a 6>]
         process_one_work+0x1d8/0x33f
         worker_thread+0x21b/0x373
         kthread+0x13a/0x152
         ? pr_cont_work+0x54/0x54
         ? kthread_blkcg+0x31/0x31
          ret_from_fork+0x1f/0x30
      
      This patch holds the reference count on the hci_dev while processing
      a HCI_EV_HARDWARE_ERROR event to avoid potential crash.
      
      Fixes: c7741d16 ("Bluetooth: Perform a power cycle when receiving hardware error event")
      Signed-off-by: default avatarYing Hsu <yinghsu@chromium.org>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      2449007d
    • Jonas Dreßler's avatar
      Bluetooth: hci_sync: Check the correct flag before starting a scan · 6b3899be
      Jonas Dreßler authored
      There's a very confusing mistake in the code starting a HCI inquiry: We're
      calling hci_dev_test_flag() to test for HCI_INQUIRY, but hci_dev_test_flag()
      checks hdev->dev_flags instead of hdev->flags. HCI_INQUIRY is a bit that's
      set on hdev->flags, not on hdev->dev_flags though.
      
      HCI_INQUIRY equals the integer 7, and in hdev->dev_flags, 7 means
      HCI_BONDABLE, so we were actually checking for HCI_BONDABLE here.
      
      The mistake is only present in the synchronous code for starting an inquiry,
      not in the async one. Also devices are typically bondable while doing an
      inquiry, so that might be the reason why nobody noticed it so far.
      
      Fixes: abfeea47 ("Bluetooth: hci_sync: Convert MGMT_OP_START_DISCOVERY")
      Signed-off-by: default avatarJonas Dreßler <verdre@v0yd.nl>
      Reviewed-by: default avatarSimon Horman <horms@kernel.org>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      6b3899be
    • Johan Hovold's avatar
      Bluetooth: hci_bcm4377: do not mark valid bd_addr as invalid · c17d2a7b
      Johan Hovold authored
      A recent commit restored the original (and still documented) semantics
      for the HCI_QUIRK_USE_BDADDR_PROPERTY quirk so that the device address
      is considered invalid unless an address is provided by firmware.
      
      This specifically means that this flag must only be set for devices with
      invalid addresses, but the Broadcom BCM4377 driver has so far been
      setting this flag unconditionally.
      
      Fortunately the driver already checks for invalid addresses during setup
      and sets the HCI_QUIRK_INVALID_BDADDR flag, which can simply be replaced
      with HCI_QUIRK_USE_BDADDR_PROPERTY to indicate that the default address
      is invalid but can be overridden by firmware (long term, this should
      probably just always be allowed).
      
      Fixes: 6945795b ("Bluetooth: fix use-bdaddr-property quirk")
      Cc: stable@vger.kernel.org      # 6.5
      Reported-by: default avatarFelix Zhang <mrman@mrman314.tech>
      Link: https://lore.kernel.org/r/77419ffacc5b4875e920e038332575a2a5bff29f.camel@mrman314.tech/Signed-off-by: default avatarJohan Hovold <johan+linaro@kernel.org>
      Reported-by: default avatarFelix Zhang <mrman@mrman314.tech>
      Reviewed-by: default avatarNeal Gompa <neal@gompa.dev>
      Signed-off-by: default avatarLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
      c17d2a7b
    • Haiyue Wang's avatar
      Documentations: correct net_cachelines title for struct inet_sock · 4adfc94d
      Haiyue Wang authored
      The fast path usage breakdown describes the detail for 'inet_sock', fix
      the markup title.
      Signed-off-by: default avatarHaiyue Wang <haiyue.wang@intel.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      4adfc94d
    • Jakub Raczynski's avatar
      stmmac: Clear variable when destroying workqueue · 8af411bb
      Jakub Raczynski authored
      Currently when suspending driver and stopping workqueue it is checked whether
      workqueue is not NULL and if so, it is destroyed.
      Function destroy_workqueue() does drain queue and does clear variable, but
      it does not set workqueue variable to NULL. This can cause kernel/module
      panic if code attempts to clear workqueue that was not initialized.
      
      This scenario is possible when resuming suspended driver in stmmac_resume(),
      because there is no handling for failed stmmac_hw_setup(),
      which can fail and return if DMA engine has failed to initialize,
      and workqueue is initialized after DMA engine.
      Should DMA engine fail to initialize, resume will proceed normally,
      but interface won't work and TX queue will eventually timeout,
      causing 'Reset adapter' error.
      This then does destroy workqueue during reset process.
      And since workqueue is initialized after DMA engine and can be skipped,
      it will cause kernel/module panic.
      
      To secure against this possible crash, set workqueue variable to NULL when
      destroying workqueue.
      
      Log/backtrace from crash goes as follows:
      [88.031977]------------[ cut here ]------------
      [88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out
      [88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398
                 <Skipping backtrace for watchdog timeout>
      [88.032251]---[ end trace e70de432e4d5c2c0 ]---
      [88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.
      [88.036359]------------[ cut here ]------------
      [88.036519]Call trace:
      [88.036523] flush_workqueue+0x3e4/0x430
      [88.036528] drain_workqueue+0xc4/0x160
      [88.036533] destroy_workqueue+0x40/0x270
      [88.036537] stmmac_fpe_stop_wq+0x4c/0x70
      [88.036541] stmmac_release+0x278/0x280
      [88.036546] __dev_close_many+0xcc/0x158
      [88.036551] dev_close_many+0xbc/0x190
      [88.036555] dev_close.part.0+0x70/0xc0
      [88.036560] dev_close+0x24/0x30
      [88.036564] stmmac_service_task+0x110/0x140
      [88.036569] process_one_work+0x1d8/0x4a0
      [88.036573] worker_thread+0x54/0x408
      [88.036578] kthread+0x164/0x170
      [88.036583] ret_from_fork+0x10/0x20
      [88.036588]---[ end trace e70de432e4d5c2c1 ]---
      [88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
      
      Fixes: 5a558611 ("net: stmmac: support FPE link partner hand-shaking procedure")
      Signed-off-by: default avatarJakub Raczynski <j.raczynski@samsung.com>
      Reviewed-by: default avatarJiri Pirko <jiri@nvidia.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      8af411bb