Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5620177imu; Mon, 26 Nov 2018 03:06:26 -0800 (PST) X-Google-Smtp-Source: AFSGD/UtrcYPvOFeEEcvHU9hDjMSL19MtvNe21zk2Z6ukNXc45ZZuA2anHob6qpjQdAGjAhHsfx9 X-Received: by 2002:a63:f615:: with SMTP id m21mr24981051pgh.428.1543230386368; Mon, 26 Nov 2018 03:06:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543230386; cv=none; d=google.com; s=arc-20160816; b=gsdQu097WaFAW2pdgJUp6LhwUH3k6ewHOuy0kQpOrrkQec2w6Zps+8jXn8FQgVbmK0 822xsi/DVqhr71wR+hDJQU3YGDaudzCR/uvwowT4LlIXNJ5FBcFNfxHUJlFUSjoEIC0a Dv55aPhD7aeCGl2G+xXQ4QImda/vseheZhZltcb4/9x9o0rW7NgPR/i4JFOIWORzXQ3U AhLhdjwcmSekaCqrrFi7ThO4695TfDgEjrcxiiSqeUnYjMF8gzY/ioOE+qsfvkNWj9Ek 7aTHv+hhPMUqjW+rKVSwnpcXuprDIw9rPxY5znBPiB28yqBDRtIJOuioRl321JT9KLi3 AclQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=b8wwMp8DaUpvjtTQqd7ZJhwuSVgxK3k5zUGSxoHyb0Y=; b=PJgV466DwdbDpjJphlbG4tOxLH5W+Hp4ZQkxQgoOBxb9PPbmYBq23KomBV9KWXFBWy d12IpLsmxNq/QxlVYouGWU+GwpN4dxE7PG5IQP9OAe0RyMvOhcn4t57/Ge6vn9IUvHBj B5Z/Rsw5DFEQ2lm206CcaYD9iSOReaCbyb8cYIrc1cl7Y7Mn2mgQ86oFTuS+r8tdaTb2 9nhgQXVWNkUaRXmJjlmtQZPHFLVrTFGwPwwQltArhGB/IcZdCaAKGxDftlYWUXUrq80W b1SSPdP3h5WGDPnbpKDdSjoGIBil6hHCy7Rmt+1gxo+7g/rARgu9eCkXQdNIX8LVu6Cr xjaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1E0ngXMk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9si17130536pgm.339.2018.11.26.03.06.04; Mon, 26 Nov 2018 03:06:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1E0ngXMk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730771AbeKZV5T (ORCPT + 99 others); Mon, 26 Nov 2018 16:57:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:41356 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726729AbeKZV5S (ORCPT ); Mon, 26 Nov 2018 16:57:18 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DFD420672; Mon, 26 Nov 2018 11:03:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543230213; bh=j76L4CSyMT1xhYvcUrsRqMu4MG2zoNEs7dmNJVtcbt0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1E0ngXMkpP0Vd7FZtW9lO2hzfEfnXMJniPepE1YrpZlGFyKqzWP1/AOq03cQ2gYSa 22G9A+pOU/bBKmZ7w1GA9kLX0gNd2kcOWRa3D6CwUUEo0HgZYOIZqCwonOTkEN85mK LdD6aA4/iTLOM0P0op5Q/+pfT2ylHBBk9YfY4ysk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Julian Wiedmann , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 051/118] s390/qeth: fix HiperSockets sniffer Date: Mon, 26 Nov 2018 11:50:45 +0100 Message-Id: <20181126105102.870083789@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181126105059.832485122@linuxfoundation.org> References: <20181126105059.832485122@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit bd74a7f9cc033cf4d405788f80292268987dc0c5 ] Sniffing mode for L3 HiperSockets requires that no IP addresses are registered with the HW. The preferred way to achieve this is for userspace to delete all the IPs on the interface. But qeth is expected to also tolerate a configuration where that is not the case, by skipping the IP registration when in sniffer mode. Since commit 5f78e29ceebf ("qeth: optimize IP handling in rx_mode callback") reworked the IP registration logic in the L3 subdriver, this no longer works. When the qeth device is set online, qeth_l3_recover_ip() now unconditionally registers all unicast addresses from our internal IP table. While we could fix this particular problem by skipping qeth_l3_recover_ip() on a sniffer device, the more future-proof change is to skip the IP address registration at the lowest level. This way we a) catch any future code path that attempts to register an IP address without considering the sniffer scenario, and b) continue to build up our internal IP table, so that if sniffer mode is switched off later we can operate just like normal. Fixes: 5f78e29ceebf ("qeth: optimize IP handling in rx_mode callback") Signed-off-by: Julian Wiedmann Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/s390/net/qeth_l3_main.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/s390/net/qeth_l3_main.c b/drivers/s390/net/qeth_l3_main.c index ada258c01a08..17e2fd584fbf 100644 --- a/drivers/s390/net/qeth_l3_main.c +++ b/drivers/s390/net/qeth_l3_main.c @@ -279,9 +279,6 @@ static void qeth_l3_clear_ip_htable(struct qeth_card *card, int recover) QETH_CARD_TEXT(card, 4, "clearip"); - if (recover && card->options.sniffer) - return; - spin_lock_bh(&card->ip_lock); hash_for_each_safe(card->ip_htable, i, tmp, addr, hnode) { @@ -664,6 +661,8 @@ static int qeth_l3_register_addr_entry(struct qeth_card *card, int rc = 0; int cnt = 3; + if (card->options.sniffer) + return 0; if (addr->proto == QETH_PROT_IPV4) { QETH_CARD_TEXT(card, 2, "setaddr4"); @@ -698,6 +697,9 @@ static int qeth_l3_deregister_addr_entry(struct qeth_card *card, { int rc = 0; + if (card->options.sniffer) + return 0; + if (addr->proto == QETH_PROT_IPV4) { QETH_CARD_TEXT(card, 2, "deladdr4"); QETH_CARD_HEX(card, 3, &addr->u.a4.addr, sizeof(int)); -- 2.17.1