1. 05 Dec, 2023 13 commits
    • Moshe Shemesh's avatar
      net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work · eab0da38
      Moshe Shemesh authored
      Due to the cited patch, devlink health commands take devlink lock and
      this may result in deadlock for mlx5e_tx_reporter as it takes local
      state_lock before calling devlink health report and on the other hand
      devlink health commands such as diagnose for same reporter take local
      state_lock after taking devlink lock (see kernel log below).
      
      To fix it, remove local state_lock from mlx5e_tx_timeout_work() before
      calling devlink_health_report() and take care to cancel the work before
      any call to close channels, which may free the SQs that should be
      handled by the work. Before cancel_work_sync(), use current_work() to
      check we are not calling it from within the work, as
      mlx5e_tx_timeout_work() itself may close the channels and reopen as part
      of recovery flow.
      
      While removing state_lock from mlx5e_tx_timeout_work() keep rtnl_lock to
      ensure no change in netdev->real_num_tx_queues, but use rtnl_trylock()
      and a flag to avoid deadlock by calling cancel_work_sync() before
      closing the channels while holding rtnl_lock too.
      
      Kernel log:
      ======================================================
      WARNING: possible circular locking dependency detected
      6.0.0-rc3_for_upstream_debug_2022_08_30_13_10 #1 Not tainted
      ------------------------------------------------------
      kworker/u16:2/65 is trying to acquire lock:
      ffff888122f6c2f8 (&devlink->lock_key#2){+.+.}-{3:3}, at: devlink_health_report+0x2f1/0x7e0
      
      but task is already holding lock:
      ffff888121d20be0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_tx_timeout_work+0x70/0x280 [mlx5_core]
      
      which lock already depends on the new lock.
      
      the existing dependency chain (in reverse order) is:
      
      -> #1 (&priv->state_lock){+.+.}-{3:3}:
             __mutex_lock+0x12c/0x14b0
             mlx5e_rx_reporter_diagnose+0x71/0x700 [mlx5_core]
             devlink_nl_cmd_health_reporter_diagnose_doit+0x212/0xa50
             genl_family_rcv_msg_doit+0x1e9/0x2f0
             genl_rcv_msg+0x2e9/0x530
             netlink_rcv_skb+0x11d/0x340
             genl_rcv+0x24/0x40
             netlink_unicast+0x438/0x710
             netlink_sendmsg+0x788/0xc40
             sock_sendmsg+0xb0/0xe0
             __sys_sendto+0x1c1/0x290
             __x64_sys_sendto+0xdd/0x1b0
             do_syscall_64+0x3d/0x90
             entry_SYSCALL_64_after_hwframe+0x46/0xb0
      
      -> #0 (&devlink->lock_key#2){+.+.}-{3:3}:
             __lock_acquire+0x2c8a/0x6200
             lock_acquire+0x1c1/0x550
             __mutex_lock+0x12c/0x14b0
             devlink_health_report+0x2f1/0x7e0
             mlx5e_health_report+0xc9/0xd7 [mlx5_core]
             mlx5e_reporter_tx_timeout+0x2ab/0x3d0 [mlx5_core]
             mlx5e_tx_timeout_work+0x1c1/0x280 [mlx5_core]
             process_one_work+0x7c2/0x1340
             worker_thread+0x59d/0xec0
             kthread+0x28f/0x330
             ret_from_fork+0x1f/0x30
      
      other info that might help us debug this:
      
       Possible unsafe locking scenario:
      
             CPU0                    CPU1
             ----                    ----
        lock(&priv->state_lock);
                                     lock(&devlink->lock_key#2);
                                     lock(&priv->state_lock);
        lock(&devlink->lock_key#2);
      
       *** DEADLOCK ***
      
      4 locks held by kworker/u16:2/65:
       #0: ffff88811a55b138 ((wq_completion)mlx5e#2){+.+.}-{0:0}, at: process_one_work+0x6e2/0x1340
       #1: ffff888101de7db8 ((work_completion)(&priv->tx_timeout_work)){+.+.}-{0:0}, at: process_one_work+0x70f/0x1340
       #2: ffffffff84ce8328 (rtnl_mutex){+.+.}-{3:3}, at: mlx5e_tx_timeout_work+0x53/0x280 [mlx5_core]
       #3: ffff888121d20be0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_tx_timeout_work+0x70/0x280 [mlx5_core]
      
      stack backtrace:
      CPU: 1 PID: 65 Comm: kworker/u16:2 Not tainted 6.0.0-rc3_for_upstream_debug_2022_08_30_13_10 #1
      Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
      Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core]
      Call Trace:
       <TASK>
       dump_stack_lvl+0x57/0x7d
       check_noncircular+0x278/0x300
       ? print_circular_bug+0x460/0x460
       ? find_held_lock+0x2d/0x110
       ? __stack_depot_save+0x24c/0x520
       ? alloc_chain_hlocks+0x228/0x700
       __lock_acquire+0x2c8a/0x6200
       ? register_lock_class+0x1860/0x1860
       ? kasan_save_stack+0x1e/0x40
       ? kasan_set_free_info+0x20/0x30
       ? ____kasan_slab_free+0x11d/0x1b0
       ? kfree+0x1ba/0x520
       ? devlink_health_do_dump.part.0+0x171/0x3a0
       ? devlink_health_report+0x3d5/0x7e0
       lock_acquire+0x1c1/0x550
       ? devlink_health_report+0x2f1/0x7e0
       ? lockdep_hardirqs_on_prepare+0x400/0x400
       ? find_held_lock+0x2d/0x110
       __mutex_lock+0x12c/0x14b0
       ? devlink_health_report+0x2f1/0x7e0
       ? devlink_health_report+0x2f1/0x7e0
       ? mutex_lock_io_nested+0x1320/0x1320
       ? trace_hardirqs_on+0x2d/0x100
       ? bit_wait_io_timeout+0x170/0x170
       ? devlink_health_do_dump.part.0+0x171/0x3a0
       ? kfree+0x1ba/0x520
       ? devlink_health_do_dump.part.0+0x171/0x3a0
       devlink_health_report+0x2f1/0x7e0
       mlx5e_health_report+0xc9/0xd7 [mlx5_core]
       mlx5e_reporter_tx_timeout+0x2ab/0x3d0 [mlx5_core]
       ? lockdep_hardirqs_on_prepare+0x400/0x400
       ? mlx5e_reporter_tx_err_cqe+0x1b0/0x1b0 [mlx5_core]
       ? mlx5e_tx_reporter_timeout_dump+0x70/0x70 [mlx5_core]
       ? mlx5e_tx_reporter_dump_sq+0x320/0x320 [mlx5_core]
       ? mlx5e_tx_timeout_work+0x70/0x280 [mlx5_core]
       ? mutex_lock_io_nested+0x1320/0x1320
       ? process_one_work+0x70f/0x1340
       ? lockdep_hardirqs_on_prepare+0x400/0x400
       ? lock_downgrade+0x6e0/0x6e0
       mlx5e_tx_timeout_work+0x1c1/0x280 [mlx5_core]
       process_one_work+0x7c2/0x1340
       ? lockdep_hardirqs_on_prepare+0x400/0x400
       ? pwq_dec_nr_in_flight+0x230/0x230
       ? rwlock_bug.part.0+0x90/0x90
       worker_thread+0x59d/0xec0
       ? process_one_work+0x1340/0x1340
       kthread+0x28f/0x330
       ? kthread_complete_and_exit+0x20/0x20
       ret_from_fork+0x1f/0x30
       </TASK>
      
      Fixes: c90005b5 ("devlink: Hold the instance lock in health callbacks")
      Signed-off-by: default avatarMoshe Shemesh <moshe@nvidia.com>
      Reviewed-by: default avatarTariq Toukan <tariqt@nvidia.com>
      Signed-off-by: default avatarSaeed Mahameed <saeedm@nvidia.com>
      eab0da38
    • Chris Mi's avatar
      net/mlx5e: Disable IPsec offload support if not FW steering · 762a55a5
      Chris Mi authored
      IPsec FDB offload can only work with FW steering as of now,
      disable the cap upon non FW steering.
      
      And since the IPSec cap is dynamic now based on steering mode.
      Cleanup the resources if they exist instead of checking the
      IPsec cap again.
      
      Fixes: edd8b295 ("Merge branch 'mlx5-ipsec-packet-offload-support-in-eswitch-mode'")
      Signed-off-by: default avatarChris Mi <cmi@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      762a55a5
    • Jianbo Liu's avatar
      net/mlx5e: Check the number of elements before walk TC rhashtable · 4e25b661
      Jianbo Liu authored
      After IPSec TX tables are destroyed, the flow rules in TC rhashtable,
      which have the destination to IPSec, are restored to the original
      one, the uplink.
      
      However, when the device is in switchdev mode and unload driver with
      IPSec rules configured, TC rhashtable cleanup is done before IPSec
      cleanup, which means tc_ht->tbl is already freed when walking TC
      rhashtable, in order to restore the destination. So add the checking
      before walking to avoid unexpected behavior.
      
      Fixes: d1569537 ("net/mlx5e: Modify and restore TC rules for IPSec TX rules")
      Signed-off-by: default avatarJianbo Liu <jianbol@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      4e25b661
    • Jianbo Liu's avatar
      net/mlx5e: Reduce eswitch mode_lock protection context · baac8351
      Jianbo Liu authored
      Currently eswitch mode_lock is so heavy, for example, it's locked
      during the whole process of the mode change, which may need to hold
      other locks. As the mode_lock is also used by IPSec to block mode and
      encap change now, it is easy to cause lock dependency.
      
      Since some of protections are also done by devlink lock, the eswitch
      mode_lock is not needed at those places, and thus the possibility of
      lockdep issue is reduced.
      
      Fixes: c8e350e6 ("net/mlx5e: Make TC and IPsec offloads mutually exclusive on a netdev")
      Signed-off-by: default avatarJianbo Liu <jianbol@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      baac8351
    • Leon Romanovsky's avatar
      net/mlx5e: Tidy up IPsec NAT-T SA discovery · c2bf84f1
      Leon Romanovsky authored
      IPsec NAT-T packets are UDP encapsulated packets over ESP normal ones.
      In case they arrive to RX, the SPI and ESP are located in inner header,
      while the check was performed on outer header instead.
      
      That wrong check caused to the situation where received rekeying request
      was missed and caused to rekey timeout, which "compensated" this failure
      by completing rekeying.
      
      Fixes: d6595493 ("net/mlx5e: Support IPsec NAT-T functionality")
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      c2bf84f1
    • Patrisious Haddad's avatar
      net/mlx5e: Add IPsec and ASO syndromes check in HW · dddb49b6
      Patrisious Haddad authored
      After IPsec decryption it isn't enough to only check the IPsec syndrome
      but need to also check the ASO syndrome in order to verify that the
      operation was actually successful.
      
      Verify that both syndromes are actually zero and in case not drop the
      packet and increment the appropriate flow counter for the drop reason.
      
      Fixes: 6b5c45e1 ("net/mlx5e: Configure IPsec packet offload flow steering")
      Signed-off-by: default avatarPatrisious Haddad <phaddad@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      dddb49b6
    • Leon Romanovsky's avatar
      net/mlx5e: Remove exposure of IPsec RX flow steering struct · 5ad00dee
      Leon Romanovsky authored
      After previous commit, which unified various IPsec creation modes,
      there is no need to have struct mlx5e_ipsec_rx exposed in global
      IPsec header. Move it to ipsec_fs.c to be placed together with
      already existing struct mlx5e_ipsec_tx.
      
      Fixes: 1762f132 ("net/mlx5e: Support IPsec packet offload for RX in switchdev mode")
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      5ad00dee
    • Patrisious Haddad's avatar
      net/mlx5e: Unify esw and normal IPsec status table creation/destruction · 94af50c0
      Patrisious Haddad authored
      Change normal IPsec flow to use the same creation/destruction functions
      for status flow table as that of ESW, which first of all refines the
      code to have less code duplication.
      
      And more importantly, the ESW status table handles IPsec syndrome
      checks at steering by HW, which is more efficient than the previous
      behaviour we had where it was copied to WQE meta data and checked
      by the driver.
      
      Fixes: 1762f132 ("net/mlx5e: Support IPsec packet offload for RX in switchdev mode")
      Signed-off-by: default avatarPatrisious Haddad <phaddad@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      94af50c0
    • Leon Romanovsky's avatar
      net/mlx5e: Ensure that IPsec sequence packet number starts from 1 · 3d42c8cc
      Leon Romanovsky authored
      According to RFC4303, section "3.3.3. Sequence Number Generation",
      the first packet sent using a given SA will contain a sequence
      number of 1.
      
      However if user didn't set seq/oseq, the HW used zero as first sequence
      packet number. Such misconfiguration causes to drop of first packet
      if replay window protection was enabled in SA.
      
      To fix it, set sequence number to be at least 1.
      
      Fixes: 7db21ef4 ("net/mlx5e: Set IPsec replay sequence numbers")
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      3d42c8cc
    • Leon Romanovsky's avatar
      net/mlx5e: Honor user choice of IPsec replay window size · a5e400a9
      Leon Romanovsky authored
      Users can configure IPsec replay window size, but mlx5 driver didn't
      honor their choice and set always 32bits. Fix assignment logic to
      configure right size from the beginning.
      
      Fixes: 7db21ef4 ("net/mlx5e: Set IPsec replay sequence numbers")
      Reviewed-by: default avatarPatrisious Haddad <phaddad@nvidia.com>
      Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
      a5e400a9
    • Jianheng Zhang's avatar
      net: stmmac: fix FPE events losing · 37e4b8df
      Jianheng Zhang authored
      The status bits of register MAC_FPE_CTRL_STS are clear on read. Using
      32-bit read for MAC_FPE_CTRL_STS in dwmac5_fpe_configure() and
      dwmac5_fpe_send_mpacket() clear the status bits. Then the stmmac interrupt
      handler missing FPE event status and leads to FPE handshaking failure and
      retries.
      To avoid clear status bits of MAC_FPE_CTRL_STS in dwmac5_fpe_configure()
      and dwmac5_fpe_send_mpacket(), add fpe_csr to stmmac_fpe_cfg structure to
      cache the control bits of MAC_FPE_CTRL_STS and to avoid reading
      MAC_FPE_CTRL_STS in those methods.
      
      Fixes: 5a558611 ("net: stmmac: support FPE link partner hand-shaking procedure")
      Reviewed-by: default avatarSerge Semin <fancer.lancer@gmail.com>
      Signed-off-by: default avatarJianheng Zhang <Jianheng.Zhang@synopsys.com>
      Link: https://lore.kernel.org/r/CY5PR12MB637225A7CF529D5BE0FBE59CBF81A@CY5PR12MB6372.namprd12.prod.outlook.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      37e4b8df
    • Naveen Mamindlapalli's avatar
      octeontx2-pf: consider both Rx and Tx packet stats for adaptive interrupt coalescing · adbf100f
      Naveen Mamindlapalli authored
      The current adaptive interrupt coalescing code updates only rx
      packet stats for dim algorithm. This patch also updates tx packet
      stats which will be useful when there is only tx traffic.
      Also moved configuring hardware adaptive interrupt setting to
      driver dim callback.
      
      Fixes: 6e144b47 ("octeontx2-pf: Add support for adaptive interrupt coalescing")
      Signed-off-by: default avatarNaveen Mamindlapalli <naveenm@marvell.com>
      Signed-off-by: default avatarSuman Ghosh <sumang@marvell.com>
      Reviewed-by: default avatarWojciech Drewek <wojciech.drewek@intel.com>
      Link: https://lore.kernel.org/r/20231201053330.3903694-1-sumang@marvell.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      adbf100f
    • Thomas Reichinger's avatar
      arcnet: restoring support for multiple Sohard Arcnet cards · 6b17a597
      Thomas Reichinger authored
      Probe of Sohard Arcnet cards fails,
      if 2 or more cards are installed in a system.
      See kernel log:
      [    2.759203] arcnet: arcnet loaded
      [    2.763648] arcnet:com20020: COM20020 chipset support (by David Woodhouse et al.)
      [    2.770585] arcnet:com20020_pci: COM20020 PCI support
      [    2.772295] com20020 0000:02:00.0: enabling device (0000 -> 0003)
      [    2.772354] (unnamed net_device) (uninitialized): PLX-PCI Controls
      ...
      [    3.071301] com20020 0000:02:00.0 arc0-0 (uninitialized): PCI COM20020: station FFh found at F080h, IRQ 101.
      [    3.071305] com20020 0000:02:00.0 arc0-0 (uninitialized): Using CKP 64 - data rate 2.5 Mb/s
      [    3.071534] com20020 0000:07:00.0: enabling device (0000 -> 0003)
      [    3.071581] (unnamed net_device) (uninitialized): PLX-PCI Controls
      ...
      [    3.369501] com20020 0000:07:00.0: Led pci:green:tx:0-0 renamed to pci:green:tx:0-0_1 due to name collision
      [    3.369535] com20020 0000:07:00.0: Led pci:red:recon:0-0 renamed to pci:red:recon:0-0_1 due to name collision
      [    3.370586] com20020 0000:07:00.0 arc0-0 (uninitialized): PCI COM20020: station E1h found at C000h, IRQ 35.
      [    3.370589] com20020 0000:07:00.0 arc0-0 (uninitialized): Using CKP 64 - data rate 2.5 Mb/s
      [    3.370608] com20020: probe of 0000:07:00.0 failed with error -5
      
      commit 5ef216c1 ("arcnet: com20020-pci: add rotary index support")
      changes the device name of all COM20020 based PCI cards,
      even if only some cards support this:
      	snprintf(dev->name, sizeof(dev->name), "arc%d-%d", dev->dev_id, i);
      
      The error happens because all Sohard Arcnet cards would be called arc0-0,
      since the Sohard Arcnet cards don't have a PLX rotary coder.
      I.e. EAE Arcnet cards have a PLX rotary coder,
      which sets the first decimal, ensuring unique devices names.
      
      This patch adds two new card feature flags to indicate
      which cards support LEDs and the PLX rotary coder.
      For EAE based cards the names still depend on the PLX rotary coder
      (untested, since missing EAE hardware).
      For Sohard based cards, this patch will result in devices
      being called arc0, arc1, ... (tested).
      Signed-off-by: default avatarThomas Reichinger <thomas.reichinger@sohard.de>
      Fixes: 5ef216c1 ("arcnet: com20020-pci: add rotary index support")
      Link: https://lore.kernel.org/r/20231130113503.6812-1-thomas.reichinger@sohard.deSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      6b17a597
  2. 04 Dec, 2023 6 commits
  3. 02 Dec, 2023 3 commits
  4. 01 Dec, 2023 4 commits
    • Subbaraya Sundeep's avatar
      octeontx2-af: Check return value of nix_get_nixlf before using nixlf · 830139e7
      Subbaraya Sundeep authored
      If a NIXLF is not attached to a PF/VF device then
      nix_get_nixlf function fails and returns proper error
      code. But npc_get_default_entry_action does not check it
      and uses garbage value in subsequent calls. Fix this
      by cheking the return value of nix_get_nixlf.
      
      Fixes: 967db352 ("octeontx2-af: add support for multicast/promisc packet replication feature")
      Signed-off-by: default avatarSubbaraya Sundeep <sbhatta@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      830139e7
    • Subbaraya Sundeep's avatar
      octeontx2-pf: Add missing mutex lock in otx2_get_pauseparam · 9572c949
      Subbaraya Sundeep authored
      All the mailbox messages sent to AF needs to be guarded
      by mutex lock. Add the missing lock in otx2_get_pauseparam
      function.
      
      Fixes: 75f36270 ("octeontx2-pf: Support to enable/disable pause frames via ethtool")
      Signed-off-by: default avatarSubbaraya Sundeep <sbhatta@marvell.com>
      Reviewed-by: default avatarSimon Horman <horms@kernel.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      9572c949
    • Jakub Kicinski's avatar
      MAINTAINERS: exclude 9p from networking · cf50b5ca
      Jakub Kicinski authored
      We don't have much to say about 9p, even tho it lives under net/.
      Avoid CCing netdev.
      Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      Reviewed-by: default avatarSimon Horman <horms@kernel.org>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      cf50b5ca
    • Eric Dumazet's avatar
      ipv6: fix potential NULL deref in fib6_add() · 75475bb5
      Eric Dumazet authored
      If fib6_find_prefix() returns NULL, we should silently fallback
      using fib6_null_entry regardless of RT6_DEBUG value.
      
      syzbot reported:
      
      WARNING: CPU: 0 PID: 5477 at net/ipv6/ip6_fib.c:1516 fib6_add+0x310d/0x3fa0 net/ipv6/ip6_fib.c:1516
      Modules linked in:
      CPU: 0 PID: 5477 Comm: syz-executor.0 Not tainted 6.7.0-rc2-syzkaller-00029-g9b6de136 #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
      RIP: 0010:fib6_add+0x310d/0x3fa0 net/ipv6/ip6_fib.c:1516
      Code: 00 48 8b 54 24 68 e8 42 22 00 00 48 85 c0 74 14 49 89 c6 e8 d5 d3 c2 f7 eb 5d e8 ce d3 c2 f7 e9 ca 00 00 00 e8 c4 d3 c2 f7 90 <0f> 0b 90 48 b8 00 00 00 00 00 fc ff df 48 8b 4c 24 38 80 3c 01 00
      RSP: 0018:ffffc90005067740 EFLAGS: 00010293
      RAX: ffffffff89cba5bc RBX: ffffc90005067ab0 RCX: ffff88801a2e9dc0
      RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
      RBP: ffffc90005067980 R08: ffffffff89cbca85 R09: 1ffff110040d4b85
      R10: dffffc0000000000 R11: ffffed10040d4b86 R12: 00000000ffffffff
      R13: 1ffff110051c3904 R14: ffff8880206a5c00 R15: ffff888028e1c820
      FS: 00007f763783c6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
      CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      CR2: 00007f763783bff8 CR3: 000000007f74d000 CR4: 00000000003506f0
      DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
      Call Trace:
      <TASK>
      __ip6_ins_rt net/ipv6/route.c:1303 [inline]
      ip6_route_add+0x88/0x120 net/ipv6/route.c:3847
      ipv6_route_ioctl+0x525/0x7b0 net/ipv6/route.c:4467
      inet6_ioctl+0x21a/0x270 net/ipv6/af_inet6.c:575
      sock_do_ioctl+0x152/0x460 net/socket.c:1220
      sock_ioctl+0x615/0x8c0 net/socket.c:1339
      vfs_ioctl fs/ioctl.c:51 [inline]
      __do_sys_ioctl fs/ioctl.c:871 [inline]
      __se_sys_ioctl+0xf8/0x170 fs/ioctl.c:857
      do_syscall_x64 arch/x86/entry/common.c:51 [inline]
      do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82
      
      Fixes: 7bbfe00e ("ipv6: fix general protection fault in fib6_add()")
      Reported-by: default avatarsyzbot <syzkaller@googlegroups.com>
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Cc: Wei Wang <weiwan@google.com>
      Reviewed-by: default avatarDavid Ahern <dsahern@kernel.org>
      Link: https://lore.kernel.org/r/20231129160630.3509216-1-edumazet@google.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      75475bb5
  5. 30 Nov, 2023 14 commits