Re: [PATCH net-next v2 10/10] genetlink: allow dumping command-specific policy

2020-10-01 Thread Johannes Berg
hould >make it cleaner to extend the output format for dumping >policies for all the commands at once in the future. Great, thanks :) Reviewed-by: Johannes Berg johannes

[PATCH] netlink: fix policy dump leak

2020-10-02 Thread Johannes Berg
From: Johannes Berg If userspace doesn't complete the policy dump, we leak the allocated state. Fix this. Fixes: d07dcf9aadd6 ("netlink: add infrastructure to expose policies to userspace") Signed-off-by: Johannes Berg --- Found this while looking at Jakub's series and

[PATCH 1/5] netlink: simplify netlink_policy_dump_start() prototype

2020-10-02 Thread Johannes Berg
From: Johannes Berg Since moving the call to this to a dump start() handler we no longer need this to deal with being called after having been called already. Since that is the preferred way of doing things anyway, remove the code necessary for that and simply return the pointer (or an ERR_PTR

[PATCH 4/5] genetlink: factor skb preparation out of ctrl_dumppolicy()

2020-10-02 Thread Johannes Berg
From: Johannes Berg We'll need this later for the per-op policy index dump. Signed-off-by: Johannes Berg --- net/netlink/genetlink.c | 26 +++--- 1 file changed, 19 insertions(+), 7 deletions(-) diff --git a/net/netlink/genetlink.c b/net/netlink/genetlink.c

[PATCH 2/5] netlink: compare policy more accurately

2020-10-02 Thread Johannes Berg
From: Johannes Berg The maxtype is really an integral part of the policy, and while we haven't gotten into a situation yet where this happens, it seems that some developer might eventually have two places pointing to identical policies, with different maxattr to exclude some attrs in one o

[PATCH 3/5] netlink: rework policy dump to support multiple policies

2020-10-02 Thread Johannes Berg
From: Johannes Berg Rework the policy dump code a bit to support adding multiple policies to a single dump, in order to e.g. support per-op policies in generic netlink. Signed-off-by: Johannes Berg --- include/net/netlink.h | 62 +++-- net/netlink

[PATCH 0/5] genetlink: complete policy dumping

2020-10-02 Thread Johannes Berg
Hi, So ... Jakub added per-op policy retrieval, so you could retrieve the policy for a single op. This then adds - as discussed - support for dumping *everything*, which has basically first an [op] -> [policy-idx] mapping, followed by all the policies. When a single op is requested, you get a con

[PATCH 5/5] genetlink: properly support per-op policy dumping

2020-10-02 Thread Johannes Berg
From: Johannes Berg Add support for per-op policy dumping. The data is pretty much as before, except that now the assumption that the policy with index 0 is "the" policy no longer holds - you now need to look at the new CTRL_ATTR_OP_POLICY attribute which is a nested attr containi

pull-request: mac80211-next 2020-10-02

2020-10-02 Thread Johannes Berg
cfg80211: regulatory: remove a bogus initialization Felix Fietkau (1): mac80211: fix regression in sta connection monitor Johannes Berg (6): mac80211_hwsim: fix typo in kernel-doc mac80211: fix some missing kernel-doc wireless: radiotap: fix some kernel-doc mac80211: fix

[PATCH] genl: ctrl: print op -> policy idx mapping

2020-10-02 Thread Johannes Berg
Newer kernels can dump per-op policies, so print out the new mapping attribute to indicate which op has which policy. Signed-off-by: Johannes Berg --- genl/ctrl.c| 10 ++ include/uapi/linux/genetlink.h | 2 ++ 2 files changed, 12 insertions(+) diff --git a/genl

Re: [PATCH] genl: ctrl: print op -> policy idx mapping

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 07:29 -0700, David Ahern wrote: > On 10/2/20 3:26 AM, Johannes Berg wrote: > > diff --git a/genl/ctrl.c b/genl/ctrl.c > > index 68099fe97f1a..c62212b40fa3 100644 > > --- a/genl/ctrl.c > > +++ b/genl/ctrl.c > > @@ -162,6 +162,16 @@ static int

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 07:40 -0700, Jakub Kicinski wrote: > > I suppose you could make an argument that only some attrs might be > > accepted in doit and somewhat others in dumpit, or perhaps none in > > dumpit because filtering wasn't implemented? > > Right? Feels like it goes against our strict

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
> > Or just give them both? I mean, in many (most?) cases they're anyway > > going to be the same, so with the patches I posted you could just give > > them the two different policy indexes, and they can be the same? > > Ah, I missed your posting! Huh, I even CC'ed you I think? https://lore.ke

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:03 -0700, Jakub Kicinski wrote: > > Huh, I even CC'ed you I think? > > I filter stuff which is to:netdev cc:me and get to it when I read the > ML. There's too much of it. Ah, ok :) > > Yeah, that'd work. I'd probably wonder if we shouldn't do > > > > [OP_POLICY] > >

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:09 -0700, Jakub Kicinski wrote: > On Fri, 02 Oct 2020 17:04:11 +0200 Johannes Berg wrote: > > > > Yeah, that'd work. I'd probably wonder if we shouldn't do > > > > > > > > [OP_POLICY] > > > > [OP] ->

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:25 -0700, Jakub Kicinski wrote: > > > I suppose, I thought you wanted to change it to have separate dump/do > > policies? Whatever you like there, I don't really care much :) > > I just want to make the uAPI future-proof for now. Yeah, makes sense. > At a quick look eth

Re: [PATCH] netlink: fix policy dump leak

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:29 -0700, Jakub Kicinski wrote: > On Fri, 2 Oct 2020 09:46:04 +0200 Johannes Berg wrote: > > From: Johannes Berg > > > > If userspace doesn't complete the policy dump, we leak the > > allocated state. Fix this. > > > > Fixes

Re: [PATCH] genl: ctrl: print op -> policy idx mapping

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 11:01 -0700, David Ahern wrote: > > does not have to be in the kernel. Usability is important. Yeah I completely agree with you. I'm just not sure we _can_ here, since we don't have the domain-specific details. In a way, I'm really just more or less considering the 'genl' s

Re: [PATCH 1/5] netlink: simplify netlink_policy_dump_start() prototype

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:31 -0700, Jakub Kicinski wrote: > On Fri, 2 Oct 2020 11:09:40 +0200 Johannes Berg wrote: > > From: Johannes Berg > > > > Since moving the call to this to a dump start() handler we no > > longer need this to deal with being called after hav

Re: [PATCH 3/5] netlink: rework policy dump to support multiple policies

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:39 -0700, Jakub Kicinski wrote: > > > - ctx->state = netlink_policy_dump_start(op.policy, op.maxattr); > > - if (IS_ERR(ctx->state)) > > - return PTR_ERR(ctx->state); > > - return 0; > > + return netlink_policy_dump_add_policy(&ctx->state, op.policy, > >

Re: [PATCH 3/5] netlink: rework policy dump to support multiple policies

2020-10-02 Thread Johannes Berg
Oh, and ... > > +/** > > + * netlink_policy_dump_add_policy - add a policy to the dump > > + * @pstate: state to add to, may be reallocated, must be %NULL the first > > time > > + * @policy: the new policy to add to the dump > > + * @maxtype: the new policy's max attr type > > + * > > + * Returns

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 08:09 -0700, Jakub Kicinski wrote: > On Fri, 02 Oct 2020 17:04:11 +0200 Johannes Berg wrote: > > > > Yeah, that'd work. I'd probably wonder if we shouldn't do > > > > > > > > [OP_POLICY] > > > > [OP] ->

Re: [PATCH 3/5] netlink: rework policy dump to support multiple policies

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 13:37 -0700, Jakub Kicinski wrote: > > I guess it's because of the volume of messages this would cause. There's actually been a large cleanup, so it wouldn't be too bad. I had really just suspected tooling/build system issues, you know which C files you're compiling, but no

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 13:50 -0700, Jakub Kicinski wrote: > > My thinking was that until kernel actually start using separate dump > policies user space can assume policy 0 is relevant. But yeah, merging > your changes first would probably be best. Works for me. I have it based on yours. Just upda

Re: [PATCH net-next v2 00/10] genetlink: support per-command policy dump

2020-10-02 Thread Johannes Berg
On Fri, 2020-10-02 at 22:59 +0200, Johannes Berg wrote: > On Fri, 2020-10-02 at 13:50 -0700, Jakub Kicinski wrote: > > My thinking was that until kernel actually start using separate dump > > policies user space can assume policy 0 is relevant. But yeah, merging > > you

[PATCH v3 4/5] genetlink: properly support per-op policy dumping

2020-10-03 Thread Johannes Berg
From: Johannes Berg Add support for per-op policy dumping. The data is pretty much as before, except that now the assumption that the policy with index 0 is "the" policy no longer holds - you now need to look at the new CTRL_ATTR_OP_POLICY attribute which is a nested attr (ind

[PATCH v3 5/5] genetlink: allow dumping command-specific policy

2020-10-03 Thread Johannes Berg
ke it cleaner to extend the output format for dumping policies for all the commands at once in the future. Signed-off-by: Jakub Kicinski Link: https://lore.kernel.org/r/20201001225933.1373426-11-k...@kernel.org Signed-off-by: Johannes Berg --- include/uapi/linux/genetlink.h | 1 + net/ne

[PATCH v3 3/5] genetlink: factor skb preparation out of ctrl_dumppolicy()

2020-10-03 Thread Johannes Berg
From: Johannes Berg We'll need this later for the per-op policy index dump. Reviewed-by: Jakub Kicinski Signed-off-by: Johannes Berg --- net/netlink/genetlink.c | 25 +++-- 1 file changed, 19 insertions(+), 6 deletions(-) diff --git a/net/netlink/genetlink.c

[PATCH v3] genl: ctrl: print op -> policy idx mapping

2020-10-03 Thread Johannes Berg
Newer kernels can dump per-op policies, so print out the new mapping attribute to indicate which op has which policy. v2: * print out both do/dump policy idx v3: * fix userspace API which renumbered after patch rebasing Signed-off-by: Johannes Berg --- genl/ctrl.c| 27

[PATCH v3 2/5] netlink: rework policy dump to support multiple policies

2020-10-03 Thread Johannes Berg
From: Johannes Berg Rework the policy dump code a bit to support adding multiple policies to a single dump, in order to e.g. support per-op policies in generic netlink. v2: - move kernel-doc to implementation [Jakub] - squash the first patch to not flip-flop on the prototype [Jakub

[PATCH v3 1/5] netlink: compare policy more accurately

2020-10-03 Thread Johannes Berg
From: Johannes Berg The maxtype is really an integral part of the policy, and while we haven't gotten into a situation yet where this happens, it seems that some developer might eventually have two places pointing to identical policies, with different maxattr to exclude some attrs in one o

[PATCH v3 0/5] genetlink per-op policy export

2020-10-03 Thread Johannes Berg
Hi, Here's a respin, now including Jakub's patch last so that it will do the right thing from the start. The first patch remains the same, of course; the others have mostly some rebasing going on, except for the actual export patch (patch 4) which is adjusted per Jakub's review comments about exp

Re: [PATCH net-next 1/6] ethtool: wire up get policies to ops

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 08:57 -0700, Jakub Kicinski wrote: > > @@ -783,6 +799,9 @@ static const struct genl_ops ethtool_genl_ops[] = { > .start = ethnl_default_start, > .dumpit = ethnl_default_dumpit, > .done = ethnl_default_done, > + .policy

Re: [PATCH net-next 6/6] ethtool: specify which header flags are supported per command

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 08:57 -0700, Jakub Kicinski wrote: > > @@ -47,19 +61,16 @@ int ethnl_parse_header_dev_get(struct ethnl_req_info > *req_info, > NL_SET_ERR_MSG(extack, "request header missing"); > return -EINVAL; > } > + /* Use most permissive header poli

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
bits there in ethtool, using the cookie. Just pointing out you lost it now. I'm not sure I like using the cookie, that seems a bit strange, but we could easily define a different attr? OTOH, one can always query the policy export too (which hopefully got wired up) so it wouldn't really matter much. Either way is fine with me on both of these points. Reviewed-by: Johannes Berg Thanks! johannes

Re: [PATCH net-next 1/6] ethtool: wire up get policies to ops

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:16 -0700, Jakub Kicinski wrote: > On Mon, 05 Oct 2020 20:56:29 +0200 Johannes Berg wrote: > > On Mon, 2020-10-05 at 08:57 -0700, Jakub Kicinski wrote: > > > @@ -783,6 +799,9 @@ static const struct genl_ops ethtool_genl_ops[] = { >

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:22 -0700, Jakub Kicinski wrote: > > > + if (value & ~(u64)pt->mask) { > > > + NL_SET_ERR_MSG_ATTR(extack, nla, "reserved bit set"); > > > + return -EINVAL; > > > > You had an export of the valid bits there in ethtool, using the cookie. > > Just pointing

Re: [PATCH net-next 6/6] ethtool: specify which header flags are supported per command

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:25 -0700, Jakub Kicinski wrote: > On Mon, 05 Oct 2020 20:58:57 +0200 Johannes Berg wrote: > > On Mon, 2020-10-05 at 08:57 -0700, Jakub Kicinski wrote: > > > @@ -47,19 +61,16 @@ int ethnl_parse_header_dev_get(struct ethnl_req_inf

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 21:28 +0200, Michal Kubecek wrote: > > > + if (value & ~(u64)pt->mask) { > > > + NL_SET_ERR_MSG_ATTR(extack, nla, "reserved bit set"); > > > + return -EINVAL; > > > > You had an export of the valid bits there in ethtool, using the cookie. > > Just pointing ou

Re: [PATCH net-next 1/6] ethtool: wire up get policies to ops

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:31 -0700, Jakub Kicinski wrote: > Yea, I think we're both confused. Agreed with the above. > > Are you suggesting: > > const struct nla_policy policy[/* no size */] = { > [HEADER]= NLA_POLICY(...) > [OTHER_ATTR]= NLA_POLICY(...) > }; > > extern c

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:34 -0700, Jakub Kicinski wrote: > > > My thinking is that there are no known uses of the cookie, it'd only Ahh. I completely misinterpreted the word "uses" here - you meant, I think (now), "uses of the cookie in the way that it was done in ethtool before". I read over thi

Re: [PATCH net-next 1/6] ethtool: wire up get policies to ops

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:41 -0700, Jakub Kicinski wrote: > > Now you can freely add any attributes, and, due to strict validation, > > anything not specified in the policy will be rejected, whether by being > > out of range (> maxattr) or not specified (NLA_UNSPEC). > > 100%, but in ethtool polic

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 12:40 -0700, Jakub Kicinski wrote: > > I would totally support doing that here in the general validation code, > > but (again) don't really think NLMSGERR_ATTR_COOKIE is an appropriate > > attribute for it. > > Hm. Perhaps we can do a partial policy dump into the extack? Hm

Re: [PATCH net-next 5/6] netlink: add mask validation

2020-10-05 Thread Johannes Berg
On Mon, 2020-10-05 at 21:53 +0200, Johannes Berg wrote: > On Mon, 2020-10-05 at 12:40 -0700, Jakub Kicinski wrote: > > > > I would totally support doing that here in the general validation code, > > > but (again) don't really think NLMSGERR_ATTR_COOKIE is an appro

Re: [PATCH mac80211-next v4] mac80211-next: rtnetlink wifi simulation device

2018-11-24 Thread Johannes Berg
On Tue, 2018-11-20 at 19:14 -0800, Cody Schuffelen wrote: > > +config VIRT_WIFI > + bool "Wifi wrapper for ethernet drivers" The built bot complaint is most likely because of this being bool rather than tristate (CFG80211=m, VIRT_WIFI=y, I guess, didn't check), I thought this was because of t

Re: [PATCH v2] wireless: mark expected switch fall-throughs

2018-10-23 Thread Johannes Berg
On Tue, 2018-10-23 at 12:58 +0200, Gustavo A. R. Silva wrote: > On 10/23/18 10:59 AM, Gustavo A. R. Silva wrote: > > > > On 10/23/18 9:01 AM, Johannes Berg wrote: > > > On Tue, 2018-10-23 at 02:13 +0200, Gustavo A. R. Silva wrote: > > > > In preparation to e

Re: [PATCH] mac80211: Remove attribute packed from struct 'action'

2019-01-24 Thread Johannes Berg
On Thu, 2019-01-24 at 19:05 +0100, Mathieu Malaterre wrote: > During refactor in commit 9e478066eae4 ("mac80211: fix MU-MIMO > follow-MAC mode") a new struct 'action' was declared with packed > attribute as: > > struct { > struct ieee80211_hdr_3addr hdr; > u8 category; >

Re: [PATCH] mac80211: Remove attribute packed from struct 'action'

2019-01-24 Thread Johannes Berg
On Thu, 2019-01-24 at 19:14 +0100, Mathieu Malaterre wrote: > > I'm not sure this will work on all platforms, didn't something like > > alpha pad out u8's to u32 when not requiring packing? > > I was not aware of that. TBH, I'm not actually sure about that. Pure hearsay. If anyone knows, I'd lik

[PATCH net-next] netlink: reduce NLA_POLICY_NESTED{,_ARRAY} arguments

2019-01-25 Thread Johannes Berg
From: Johannes Berg In typical cases, there's no need to pass both the maxattr and the policy array pointer, as the maxattr should just be ARRAY_SIZE(policy) - 1. Therefore, to be less error prone, just remove the maxattr argument from the default macros and deduce the size accordingly.

pull-request: mac80211 2019-01-25

2019-01-25 Thread Johannes Berg
cfg80211: reg: remove warn_on for a normal case cfg80211: extend range deviation for DMG Johannes Berg (2): mac80211_hwsim: check that n_limits makes sense nl80211: fix NLA_POLICY_NESTED() arguments Mathieu Malaterre (1): mac80211: Add attribute aligned(2) to

Re: [PATCH net-next] netlink: reduce NLA_POLICY_NESTED{,_ARRAY} arguments

2019-01-25 Thread Johannes Berg
On Fri, 2019-01-25 at 11:04 -0800, David Miller wrote: > > > Dave, it looks like we're the only users of this right now, > > so let me know if you'd prefer I take it through my tree. > > Also, this conflicts with the fix I just made to the place > > where I got it wrong, but obviously the resoluti

[PATCH net 0/4] various compat ioctl fixes

2019-01-25 Thread Johannes Berg
Back a long time ago, I already fixed a few of these by passing the size of the struct ifreq to do_sock_ioctl(). However, Robert found more cases, and now it won't be as simple because we'd have to pass that down all the way to e.g. bond_do_ioctl() which isn't really feasible. Therefore, restore t

[PATCH net 3/4] net: socket: fix SIOCGIFNAME in compat

2019-01-25 Thread Johannes Berg
From: Johannes Berg As reported by Robert O'Callahan in https://bugzilla.kernel.org/show_bug.cgi?id=202273 reverting the previous changes in this area broke the SIOCGIFNAME ioctl in compat again (I'd previously fixed it after his previous report of breakage in https://bugzilla.

[PATCH net 2/4] Revert "kill dev_ifsioc()"

2019-01-25 Thread Johannes Berg
From: Johannes Berg This reverts commit bf4405737f9f ("kill dev_ifsioc()"). This wasn't really unused as implied by the original commit, it still handles the copy to/from user differently, and the commit thus caused issues such as https://bugzilla.kernel.org/show_bug.cgi?id=199

[PATCH net 1/4] Revert "socket: fix struct ifreq size in compat ioctl"

2019-01-25 Thread Johannes Berg
From: Johannes Berg This reverts commit 1cebf8f143c2 ("socket: fix struct ifreq size in compat ioctl"), it's a bugfix for another commit that I'll revert next. This is not a 'perfect' revert, I'm keeping some coding style intact rather than revert to the stat

[PATCH net 4/4] net: socket: make bond ioctls go through compat_ifreq_ioctl()

2019-01-25 Thread Johannes Berg
From: Johannes Berg Same story as before, these use struct ifreq and thus need to be read with the shorter version to not cause faults. Cc: sta...@vger.kernel.org Fixes: f92d4fc95341 ("kill bond_ioctl()") Signed-off-by: Johannes Berg --- net/socket.c | 8 1 file changed, 4

Re: [PATCH net 2/4] Revert "kill dev_ifsioc()"

2019-01-26 Thread Johannes Berg
On Sat, 2019-01-26 at 17:29 +, Al Viro wrote: > > I disagree with solution. Look at what's happening here: > > > + uifr = compat_alloc_user_space(sizeof(*uifr)); > > + if (copy_in_user(uifr, uifr32, sizeof(*uifr32))) > > + return -EFAULT; > > an enlarged copy is made. Yes, th

Re: [PATCH net 2/4] Revert "kill dev_ifsioc()"

2019-01-26 Thread Johannes Berg
On Sat, 2019-01-26 at 18:45 +0100, Johannes Berg wrote: > > Yes and no. It *sometimes* (actually rarely, since we don't really have > dev_ioctls that much, afaict) hits this, but it could also just hit Actually, no, I'm wrong. We do mostly hit dev_ioctl(), since that's th

Re: [PATCH net 2/4] Revert "kill dev_ifsioc()"

2019-01-26 Thread Johannes Berg
On Sat, 2019-01-26 at 18:49 +0100, Johannes Berg wrote: > On Sat, 2019-01-26 at 18:45 +0100, Johannes Berg wrote: > > > > Yes and no. It *sometimes* (actually rarely, since we don't really have > > dev_ioctls that much, afaict) hits this, but it could also just hit &g

[PATCH] decnet: fix DN_IFREQ_SIZE

2019-01-26 Thread Johannes Berg
From: Johannes Berg Digging through the ioctls with Al because of the previous patches, we found that on 64-bit decnet's dn_dev_ioctl() is wrong, because struct ifreq::ifr_ifru is actually 24 bytes (not 16 as expected from struct sockaddr) due to the ifru_map and ifru_settings members. Cl

Re: [PATCH net 0/4] various compat ioctl fixes

2019-01-28 Thread Johannes Berg
On Mon, 2019-01-28 at 11:22 -0800, David Miller wrote: > I see some back and forth between you and Al, where do we stand at > this point? I don't really know. I think neither of us _likes_ this code, in particular the whole copy_in_user() thing is quite a mess. The copy_in_user() also means that

pull-request: mac80211 2019-02-01

2019-02-01 Thread Johannes Berg
ional condition, needs to rerun the checks after that condition changes Felix Fietkau (1): mac80211: ensure that mgmt tx skbs have tailroom for encryption Johannes Berg (1): cfg80211: call disconnect_wk when AP stops

pull-request: mac80211-next 2019-02-01

2019-02-01 Thread Johannes Berg
to indicate missing/inaccurate tx A-MPDU length Gustavo A. R. Silva (1): cfg80211: mark expected switch fall-throughs Johannes Berg (5): mac80211: remove unused variable Merge remote-tracking branch 'net-next/master' into mac80211-next netlink: reduce NLA_PO

[PATCH] rhashtable: use irq-safe spinlock in rhashtable_rehash_table()

2019-02-05 Thread Johannes Berg
From: Johannes Berg When an rhashtabl walk is done from irq/bh context, we rightfully get a lockdep complaint saying that we could get a (soft-)IRQ in the middle of a rehash. This happened e.g. in mac80211 as it does a walk in soft-irq context. Fix this by using irq-safe locking here. We don&#

Re: [PATCH] rhashtable: use irq-safe spinlock in rhashtable_rehash_table()

2019-02-06 Thread Johannes Berg
On Tue, 2019-02-05 at 15:37 +0100, Johannes Berg wrote: > From: Johannes Berg > > When an rhashtabl walk is done from irq/bh context, we rightfully > get a lockdep complaint saying that we could get a (soft-)IRQ in > the middle of a rehash. This happened e.g. in mac80211 as it d

[PATCH v2] rhashtable: make walk safe from softirq context

2019-02-06 Thread Johannes Berg
From: Johannes Berg When an rhashtable walk is done from softirq context, we rightfully get a lockdep complaint saying that we could get a softirq in the middle of a rehash, and thus deadlock on &ht->lock. This happened e.g. in mac80211 as it does a walk in softirq context. Fix this b

pull-request: mac80211 2018-12-19

2018-12-19 Thread Johannes Berg
e used it internally before returning SKB ---- Johannes Berg (1): nl80211: fix memory leak if validate_pae_over_nl80211() fails Sara Sharon (2): mac80211: fix a kernel panic when TXing after TXQ teardown mac8021

pull-request: mac80211-next 2018-12-19

2018-12-19 Thread Johannes Berg
0211_hwsim: allow configurable cipher types mac80211_hwsim: fixes kernel crash during mac80211_hwsim init mac80211_hwsim: fix overwriting of if_combination Johannes Berg (17): cfg80211: tracing: avoid 'idx' variable mac80211: tracing: avoid 'idx' variable

pull-request: mac80211 2018-12-05

2018-12-05 Thread Johannes Berg
duplicate detection Felix Fietkau (2): mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext mac80211: fix reordering of buffered broadcast packets Johannes Berg (2): cfg80211/mac80211: fix FTM settings across CSA mac80211: fix CSA beacon allocation size Jouni

[PATCH v3 0/5] netlink: nested policy validation

2018-09-26 Thread Johannes Berg
This adds nested policy validation, which lets you specify the nested attribute type, e.g. NLA_NESTED with sub-policy, or the new NLA_NESTED_ARRAY with sub-sub-policy. Changes in v2: * move setting the bad attr pointer/message into validate_nla() * remove the recursion patch since that's no lon

[PATCH v3 4/5] netlink: allow NLA_NESTED to specify nested policy to validate

2018-09-26 Thread Johannes Berg
From: Johannes Berg Now that we have a validation_data pointer, and the len field in the policy is unused for NLA_NESTED, we can allow using them both to have nested validation. This can be nice in code, although we still have to use nla_parse_nested() or similar which would also take a policy

[PATCH v3 3/5] netlink: move extack setting into validate_nla()

2018-09-26 Thread Johannes Berg
From: Johannes Berg This unifies the code between nla_parse() which sets the bad attribute pointer and an error message, and nla_validate() which only sets the bad attribute pointer. It also cleans up the code for NLA_REJECT and paves the way for nested policy validation, as it will allow us to

[PATCH v3 5/5] netlink: add nested array policy validation

2018-09-26 Thread Johannes Berg
From: Johannes Berg Sometimes nested netlink attributes are just used as arrays, with the nla_type() of each not being used; we have this in nl80211 and e.g. NFTA_SET_ELEM_LIST_ELEMENTS. Add the ability to validate this type of message directly in the policy, by adding the type NLA_NESTED_ARRAY

[PATCH v3 1/5] netlink: remove NLA_NESTED_COMPAT

2018-09-26 Thread Johannes Berg
From: Johannes Berg This isn't used anywhere, so we might as well get rid of it. Reviewed-by: David Ahern Signed-off-by: Johannes Berg --- include/net/netlink.h | 2 -- lib/nlattr.c | 11 --- 2 files changed, 13 deletions(-) diff --git a/include/net/netlink.h b/includ

[PATCH v3 2/5] netlink: make validation_data const

2018-09-26 Thread Johannes Berg
From: Johannes Berg The validation data is only used within the policy that should usually already be const, and isn't changed in any code that uses it. Therefore, make the validation_data pointer const. While at it, remove the duplicate variable in the bitfield validation that I'd

[PATCH] netlink: fix typo in nla_parse_nested() comment

2018-09-26 Thread Johannes Berg
From: Johannes Berg Fix a simple typo: attribuets -> attributes Signed-off-by: Johannes Berg --- include/net/netlink.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/netlink.h b/include/net/netlink.h index ddabc832febc..69866f5a97f2 100644 --- a/include/

Re: [PATCH v3 0/5] netlink: nested policy validation

2018-09-27 Thread Johannes Berg
On Wed, 2018-09-26 at 10:21 -0700, David Miller wrote: > From: Johannes Berg > Date: Wed, 26 Sep 2018 11:15:29 +0200 > > > This adds nested policy validation, which lets you specify the > > nested attribute type, e.g. NLA_NESTED with sub-policy, or the > > new NL

pull-request: mac80211 2018-09-27

2018-09-27 Thread Johannes Berg
t_core() Bob Copeland (1): mac80211: fix pending queue hang due to TX_DROP Felix Fietkau (1): mac80211: allocate TXQs for active monitor interfaces Johannes Berg (1): mac80211: TDLS: fix skb queue/priority assignment Jouni Malinen (1): cfg80211: Address some corner cas

Re: [PATCH v2] rhashtable: make walk safe from softirq context

2019-02-07 Thread Johannes Berg
> This interface wasn't designed for use in softirq contexts. Well, it clearly was used there. You even gave it a gfp_t argument in rhashtable_walk_init(), so you can't really claim it wasn't designed for this. I see now that it's ignored, but still? > Could you please show me who is doing this

Re: [PATCH v2] rhashtable: make walk safe from softirq context

2019-02-07 Thread Johannes Berg
On Fri, 2019-02-08 at 05:48 +0800, Herbert Xu wrote: > On Thu, Feb 07, 2019 at 02:50:54PM +0100, Johannes Berg wrote: > > > > > This interface wasn't designed for use in softirq contexts. > > > > Well, it clearly was used there. You even gave it a gfp_t argumen

pull-request: mac80211 2019-02-12

2019-02-12 Thread Johannes Berg
80211: Fix FTM per burst maximum value Ilan Peer (1): mac80211: Fix Tx aggregation session tear down with ITXQs Johannes Berg (5): cfg80211: pmsr: fix MAC address setting cfg80211: pmsr: fix abort locking mac80211: call drv_ibss_join() on restart cfg80211: pmsr: r

Re: [PATCH v2] rhashtable: make walk safe from softirq context

2019-02-12 Thread Johannes Berg
On Tue, 2019-02-12 at 10:43 -0800, David Miller wrote: > Herbert and Johannes, I need some guidance. > > It seems Herbert wants the softirq usage of rhashtables removed, Well, specifically of rhashtable walkers. I can only concede that he's right in that a hashtable walk during softirq (or even

Re: linux-next: Tree for Feb 11 (wireless/80211)

2019-02-13 Thread Johannes Berg
Thanks for the heads-up, Randy. We'd seen separate build bot reports on this as well. > ERROR: "__umoddi3" [net/wireless/cfg80211.ko] undefined! > ERROR: "__umoddi3" [net/mac80211/mac80211.ko] undefined! Should be fixed as of yesterday, let me know if it reappears. johannes

Re: [v2 PATCH 0/4] mac80211: Fix incorrect usage of rhashtable walk API

2019-02-13 Thread Johannes Berg
On Wed, 2019-02-13 at 22:38 +0800, Herbert Xu wrote: > Hi: > > The first two patches in this series are bug fixes and should be > backported to stable. > > They fixes a number of issues with the use of the rhashtable API > in mac80211. First of all it converts the use of rashtable walks over > t

Re: [PATCH 2/4] mac80211: Free mpath object when rhashtable insertion fails

2019-02-13 Thread Johannes Berg
On Wed, 2019-02-13 at 22:39 +0800, Herbert Xu wrote: > + if (ret != -EEXIST) > return ERR_PTR(ret); Surely that should still be "if (ret && ret != -EEXIST)" otherwise you return for the success case too? or "else if"? I'd probably say we should combine all those ifs into somethi

Re: [v3 PATCH 0/4] mac80211: Fix incorrect usage of rhashtable walk API

2019-02-15 Thread Johannes Berg
> The first two patches in this series are bug fixes and should be > backported to stable. > > They fixes a number of issues with the use of the rhashtable API > in mac80211. First of all it converts the use of rashtable walks over > to a simple linked list. This is because an rhashtable walk is

Re: [PATCH AUTOSEL 3.18 15/16] cfg80211: extend range deviation for DMG

2019-02-15 Thread Johannes Berg
On Thu, 2019-02-14 at 21:15 -0500, Sasha Levin wrote: > From: Chaitanya Tata > > [ Upstream commit 93183bdbe73bbdd03e9566c8dc37c9d06b0d0db6 ] > > Recently, DMG frequency bands have been extended till 71GHz, so extend > the range check till 20GHz (45-71GHZ), else some channels will be marked > as

pull-request: mac80211 2019-02-15

2019-02-15 Thread Johannes Berg
Hi Dave, It's clear things are winding down, this is basically just the stuff from Herbert that we've been discussing. I threw in a simple error path fix, mostly because it's simple :-) Please pull and let me know if there's any problem. Thanks, johannes The following changes since commit f9b

[PATCH net] mac80211: mesh: fix missing unlock on error in table_path_del()

2019-02-18 Thread Johannes Berg
ot;) Acked-by: Herbert Xu Signed-off-by: Wei Yongjun Signed-off-by: Johannes Berg --- Dave, can you take this directly? I see little value in sending a pull request for this one patch (but if you prefer can do so.) --- net/mac80211/mesh_pathtbl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletio

Re: About the alx WoL feature

2018-05-22 Thread Johannes Berg
+netdev Hi, > Sorry to write to you directly, I'm not sure if I should CC some > public lists, please feel free to add them if that's the right way to > do. I think it is, adding netdev. > I would like to add back the alx WoL feature which is reverted by you > 5 years ago, and we have some disc

pull-request: mac80211 2018-05-23

2018-05-23 Thread Johannes Berg
Hi Dave, Just another handful of fixes as we wind down towards the merge window. Please pull and let me know if there's any problem. Thanks, johannes The following changes since commit 6caf9fb3bda17df59de4ed6ed4950c43ca1361e3: Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf (20

Re: [v8, bpf-next, 4/9] net/wireless/iwlwifi: fix iwlwifi_dev_ucode_error tracepoint

2018-05-23 Thread Johannes Berg
On Wed, 2018-03-28 at 12:05 -0700, Alexei Starovoitov wrote: > fix iwlwifi_dev_ucode_error tracepoint to pass pointer to a table > instead of all 17 arguments by value. > dvm/main.c and mvm/utils.c have 'struct iwl_error_event_table' > defined with very similar yet subtly different fields and offse

pull-request: mac80211-next 2018-05-23

2018-05-23 Thread Johannes Berg
an (1): mac80211: add api to set CSA counter in mac80211 Haim Dreyfuss (1): nl80211: Add wmm rule attribute to NL80211_CMD_GET_WIPHY dump command Ilan Peer (1): mac80211: Support adding duration for prepare_tx() callback Johannes Berg (9): mac80211: rename rtap_vendor_spac

pull-request: mac80211 2017-11-20

2017-11-20 Thread Johannes Berg
mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() Johannes Berg (3): nl80211: don't expose wdev->ssid for most interfaces cfg80211: initialize regulatory keys/database later mac80211: properly free requested-but-not-started TX agg sessions Kees Cook (2):

Re: pull-request: mac80211 2017-11-20

2017-11-21 Thread Johannes Berg
On Tue, 2017-11-21 at 20:17 +0900, David Miller wrote: > From: Johannes Berg > Date: Mon, 20 Nov 2017 17:06:44 +0100 > > > ssh://korg/pub/scm/linux/kernel/git/jberg/mac80211.git > > tags/mac80211-for-davem-2017-11-20 > > That's an awesome URL, but I don't

Re: kernel BUG at crypto/asymmetric_keys/public_key.c:80

2017-11-22 Thread Johannes Berg
On Wed, 2017-11-22 at 19:29 +0100, Arend van Spriel wrote: > + Johannes > > >>> BUG_ON(!sig->digest); > BUG_ON(!sig->s); I *think* this is the same bug that was reported before, then this should fix it: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=d7be10

Re: kernel BUG at crypto/asymmetric_keys/public_key.c:80

2017-11-23 Thread Johannes Berg
On Wed, 2017-11-22 at 15:07 -0800, Florian Fainelli wrote: > On 11/22/2017 10:42 AM, Johannes Berg wrote: > > On Wed, 2017-11-22 at 19:29 +0100, Arend van Spriel wrote: > > > + Johannes > > > > > > >>> BUG_ON(!sig->digest); > > >

Re: kernel BUG at crypto/asymmetric_keys/public_key.c:80

2017-11-23 Thread Johannes Berg
On Thu, 2017-11-23 at 09:47 -0800, Florian Fainelli wrote: > Absolutely, please find it enclosed. Thanks. This is a bit odd. I didn't think the most likely reason is that you have CONFIG_CRYPTO_SHA256=m but everything else built-in. Thus, when loading the certificate, there's no way to calcula

pull-request: mac80211 2017-11-27

2017-11-27 Thread Johannes Berg
metric for RANN frame Johannes Berg (2): cfg80211: select CRYPTO_SHA256 if needed mac80211: use QoS NDP for AP probing Sara Sharon (1): mac80211: tear down RX aggregations first drivers/net/wireless/ath/ath9k/channel.c | 2 +- drivers/net/wireless/st/cw1200/sta.c | 4 ++

[PATCH net] Revert "net: core: maybe return -EEXIST in __dev_alloc_name"

2017-12-01 Thread Johannes Berg
From: Johannes Berg This reverts commit d6f295e9def0; some userspace (in the case we noticed it's wpa_supplicant), is relying on the current error code to determine that a fixed name interface already exists. Reported-by: Jouni Malinen Signed-off-by: Johannes Berg --- net/core/dev.

<    1   2   3   4   5   6   7   8   9   10   >