Skip to content
Permalink
Tanner-Love/vi…
Switch branches/tags

Commits on Jun 17, 2021

  1. selftests/net: amend bpf flow dissector prog to do vnet hdr validation

    Change the BPF flow dissector program to perform various checks on the
    virtio_net_hdr fields after doing flow dissection.
    
    Amend test_flow_dissector.(c|sh) to add test cases that inject packets
    with reasonable or unreasonable virtio-net headers and assert that bad
    packets are dropped and good packets are not. Do this via packet
    socket; the kernel executes tpacket_snd, which enters
    virtio_net_hdr_to_skb, where flow dissection / vnet header validation
    occurs.
    
    Changes
    v4:
      - Read virtio_net_hdr pointer from struct bpf_flow_keys
      - Add vnet header endianness logic to BPF program
    
    Signed-off-by: Tanner Love <tannerlove@google.com>
    Reviewed-by: Willem de Bruijn <willemb@google.com>
    tannerlove authored and intel-lab-lkp committed Jun 17, 2021
  2. virtio_net: add optional flow dissection in virtio_net_hdr_to_skb

    Syzkaller bugs have resulted from loose specification of
    virtio_net_hdr[1]. Enable execution of a BPF flow dissector program
    in virtio_net_hdr_to_skb to validate the vnet header and drop bad
    input.
    
    Introduce a new sysctl net.core.flow_dissect_vnet_hdr controlling a
    static key to decide whether to perform flow dissection. When the key
    is false, virtio_net_hdr_to_skb computes as before.
    
    A permissive specification of vnet headers is part of the ABI. Some
    applications now depend on it. Still, many of these packets are bogus.
    Give admins the option to interpret behavior more strictly. For
    instance, verifying that a VIRTIO_NET_HDR_GSO_TCPV6 header matches a
    packet with unencapsulated IPv6/TCP without extension headers, with
    payload length exceeding gso_size and hdr_len exactly at TCP payload
    offset.
    
    BPF flow dissection implements protocol parsing in an safe way. And is
    configurable, so can be as pedantic as the workload allows (e.g.,
    dropping UFO altogether).
    
    Vnet_header flow dissection is *not* a substitute for fixing bugs when
    reported. But even if not enabled continuously, offers a quick path to
    mitigating vulnerabilities.
    
    [1] https://syzkaller.appspot.com/bug?id=b419a5ca95062664fe1a60b764621eb4526e2cd0
    
    Changes
    v4:
      - Expand commit message with rationale for bpf flow dissector based
        implementation
    v3:
      - Move sysctl_flow_dissect_vnet_hdr_key definition to
        flow_dissector.c to fix CONFIG_SYSCTL warning when building UML
    
    Suggested-by: Willem de Bruijn <willemb@google.com>
    Signed-off-by: Tanner Love <tannerlove@google.com>
    Reviewed-by: Willem de Bruijn <willemb@google.com>
    tannerlove authored and intel-lab-lkp committed Jun 17, 2021
  3. net: flow_dissector: extend bpf flow dissector support with vnet hdr

    Amend the bpf flow dissector program type to be able to process
    virtio-net headers. Do this to enable bpf flow dissector programs to
    perform virtio-net header validation. The next patch in this series
    will add a flow dissection hook in virtio_net_hdr_to_skb and make use
    of this extended functionality. That commit message has more
    background on the use case.
    
    Add a pointer to struct virtio_net_hdr as a new member in struct
    bpf_flow_keys. When machine is big and vnet hdr is little endian, the
    kernel converts the vnet hdr endianness before passing the vnet hdr
    pointer to the bpf program; otherwise, the kernel just passes along
    the pointer to the unaltered vnet header to the bpf program. This
    handles the case of a v1+ header on a big endian machine.
    
    Changes
    v7:
      - Remove vhdr_is_little_endian, instead copy vhdr fields only in
        case where machine is big and vhdr is little endian
      - Rename check_flow_keys_access bpf_flow_dissector_is_valid_access
      - Move bpf_flow_dissector_is_valid_access() under CONFIG_NET
      - Make bpf_flow_dissector_is_valid_access() populate info.btf and
        info.reg_type in addition to info.btf_id
    v6:
      - Move bpf_flow_dissector_btf_ids, check_flow_keys_access() to
        filter.c
      - Verify (off % size == 0) in check_flow_keys_access()
      - Check bpf_flow_dissector_btf_ids[0] is nonzero in
        check_flow_keys_access()
    v5:
      - Use PTR_TO_BTF_ID_OR_NULL instead of defining new
        PTR_TO_VNET_HDR_OR_NULL
      - Make check_flow_keys_access() disallow writes to keys->vhdr
      - Make check_flow_keys_access() check loading keys->vhdr is in
        sizeof(__u64)
      - Use BPF_REG_AX instead of BPF_REG_TMP as scratch reg
      - Describe parameter vhdr_is_little_endian in __skb_flow_dissect
        documentation
    v4:
      - Add virtio_net_hdr pointer to struct bpf_flow_keys
      - Add vhdr_is_little_endian to struct bpf_flow_keys
    v2:
      - Describe parameter vhdr in __skb_flow_dissect documentation
    
    Signed-off-by: Tanner Love <tannerlove@google.com>
    Reviewed-by: Willem de Bruijn <willemb@google.com>
    Reviewed-by: Petar Penkov <ppenkov@google.com>
    Reviewed-by: Stanislav Fomichev <sdf@google.com>
    tannerlove authored and intel-lab-lkp committed Jun 17, 2021

Commits on Jun 16, 2021

  1. Merge tag 'wireless-drivers-next-2021-06-16' of git://git.kernel.org/…

    …pub/scm/linux/kernel/git/kvalo/wireless-drivers-next
    
    Kalle Valo says:
    
    ====================
    wireless-drivers-next patches for v5.14
    
    First set of patches for v5.14. Major new features are here support
    WCN6855 PCI in ath11k and WoWLAN support for wcn36xx. Also smaller
    fixes and cleanups all over.
    
    ath9k
    
    * provide STBC info in the received frames
    
    brcmfmac
    
    * fix setting of station info chains bitmask
    
    * correctly report average RSSI in station info
    
    rsi
    
    * support for changing beacon interval in AP mode
    
    ath11k
    
    * support for WCN6855 PCI hardware
    
    wcn36xx
    
    * WoWLAN support with magic packets and GTK rekeying
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Jun 16, 2021
  2. Merge branch 'marvell-prestera-flower-match-all'

    Vadym Kochan says:
    
    ====================
    Marvell Prestera add flower and match all support
    
    Add ACL infrastructure for Prestera Switch ASICs family devices to
    offload cls_flower rules to be processed in the HW.
    
    ACL implementation is based on tc filter api. The flower classifier
    is supported to configure ACL rules/matches/action.
    
    Supported actions:
    
        - drop
        - trap
        - pass
    
    Supported dissector keys:
    
        - indev
        - src_mac
        - dst_mac
        - src_ip
        - dst_ip
        - ip_proto
        - src_port
        - dst_port
        - vlan_id
        - vlan_ethtype
        - icmp type/code
    
    - Introduce matchall filter support
    - Add SPAN API to configure port mirroring.
    - Add tc mirror action.
    
    At this moment, only mirror (egress) action is supported.
    
    Example:
        tc filter ... action mirred egress mirror dev DEV
    
    v2:
        Fixed "newline at EOF warnings" from "git am" by
            re-applying with --whitespace=fix
    
        patch #1:
            1) Set TC HW Offload always enabled without disable it     [suggested by Vladimir Oltean]
               by user. It reduced the logic by removing feature
               handling and acl block disable counting.
    
        patch #2:
            1) Removed extra not needed diff with prestera_port and    [suggested by Vladimir Oltean]
               prestera_switch  lines exchanging in prestera_acl.h
    
            2) Fix local variables ordering to reverse chrostmas tree  [suggested by Vladimir Oltean]
    
            3) Use tc_cls_can_offload_and_chain0() in                  [suggested by Vladimir Oltean]
               prestera_span_replace()
    
            4) Removed TODO about prio check                           [suggested by Vladimir Oltean]
    
            5) Rephrase error message if prestera_netdev_check()       [suggested by Vladimir Oltean]
               fails in prestera_span_replace()
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Jun 16, 2021
  3. net: marvell: prestera: Add matchall support

    - Introduce matchall filter support
    - Add SPAN API to configure port mirroring.
    - Add tc mirror action.
    
    At this moment, only mirror (egress) action is supported.
    
    Example:
        tc filter ... action mirred egress mirror dev DEV
    
    Co-developed-by: Volodymyr Mytnyk <vmytnyk@marvell.com>
    Signed-off-by: Volodymyr Mytnyk <vmytnyk@marvell.com>
    Signed-off-by: Serhiy Boiko <serhiy.boiko@plvision.eu>
    Signed-off-by: Vadym Kochan <vkochan@marvell.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Serhiy Boiko authored and davem330 committed Jun 16, 2021
  4. net: marvell: Implement TC flower offload

    Add ACL infrastructure for Prestera Switch ASICs family devices to
    offload cls_flower rules to be processed in the HW.
    
    ACL implementation is based on tc filter api. The flower classifier
    is supported to configure ACL rules/matches/action.
    
    Supported actions:
    
        - drop
        - trap
        - pass
    
    Supported dissector keys:
    
        - indev
        - src_mac
        - dst_mac
        - src_ip
        - dst_ip
        - ip_proto
        - src_port
        - dst_port
        - vlan_id
        - vlan_ethtype
        - icmp type/code
    
    Co-developed-by: Volodymyr Mytnyk <vmytnyk@marvell.com>
    Signed-off-by: Volodymyr Mytnyk <vmytnyk@marvell.com>
    Signed-off-by: Serhiy Boiko <serhiy.boiko@plvision.eu>
    Signed-off-by: Vadym Kochan <vkochan@marvell.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Serhiy Boiko authored and davem330 committed Jun 16, 2021
  5. Merge branch 'net-smc-stats'

    Karsten Graul says:
    
    ====================
    net/smc: Add SMC statistic support
    
    Please apply the following patch series for smc to netdev's net-next tree.
    
    This v2 is a resend of the code contained in v1 but with an updated
    cover letter to describe why we have chosen to use the generic netlink
    mechanism to access the smc protocol's statistic data.
    
    The patchset adds statistic support to the SMC protocol. Per-cpu
    variables are used to collect the statistic information for better
    performance and for reducing concurrency pitfalls. The code that is
    collecting statistic data is implemented in macros to increase code
    reuse and readability.
    The generic netlink mechanism in SMC is extended to provide the
    collected statistics to userspace.
    Network namespace awareness is also part of the statistics
    implementation.
    
    SMC is a protocol interacting with PCI devices (like RoCE Cards) and
    runs on top of the TCP protocol. As SMC is a network protocol and not
    an ethernet device driver, we decided to use the generic netlink
    interface. This should be comparable to what other protocols in the
    net subsystem like tipc, ncsi, ieee802154 or tcp, et al, do.
    There is already an established internal generic netlink interface
    mechanism in SMC which is used to collect SMC Protocol internal
    information. This patchset extends that existing mechanism.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Jun 16, 2021
  6. net/smc: Make SMC statistics network namespace aware

    Make the gathered SMC statistics network namespace aware, for each
    namespace collect an own set of statistic information.
    
    Signed-off-by: Guvenc Gulce <guvenc@linux.ibm.com>
    Signed-off-by: Karsten Graul <kgraul@linux.ibm.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    guvenc authored and davem330 committed Jun 16, 2021
  7. net/smc: Add netlink support for SMC fallback statistics

    Add support to collect more detailed SMC fallback reason statistics and
    provide these statistics to user space on the netlink interface.
    
    Signed-off-by: Guvenc Gulce <guvenc@linux.ibm.com>
    Signed-off-by: Karsten Graul <kgraul@linux.ibm.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    guvenc authored and davem330 committed Jun 16, 2021
  8. net/smc: Add netlink support for SMC statistics

    Add the netlink function which collects the statistics information and
    delivers it to the userspace.
    
    Signed-off-by: Guvenc Gulce <guvenc@linux.ibm.com>
    Signed-off-by: Karsten Graul <kgraul@linux.ibm.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    guvenc authored and davem330 committed Jun 16, 2021
  9. net/smc: Add SMC statistics support

    Add the ability to collect SMC statistics information. Per-cpu
    variables are used to collect the statistic information for better
    performance and for reducing concurrency pitfalls. The code that is
    collecting statistic data is implemented in macros to increase code
    reuse and readability.
    
    Signed-off-by: Guvenc Gulce <guvenc@linux.ibm.com>
    Signed-off-by: Karsten Graul <kgraul@linux.ibm.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    guvenc authored and davem330 committed Jun 16, 2021
  10. mlxsw: spectrum_router: remove redundant continue statement

    The continue statement at the end of a for-loop has no effect,
    remove it.
    
    Addresses-Coverity: ("Continue has no effect")
    Signed-off-by: Colin Ian King <colin.king@canonical.com>
    Reviewed-by: Ido Schimmel <idosch@nvidia.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Colin Ian King authored and davem330 committed Jun 16, 2021
  11. Merge branch 'nfp-ct-part-two'

    Simon Horman says:
    
    ====================
    Next set of conntrack patches for the nfp driver
    
    Louis Peens says:
    
    This follows on from the previous series of a similar nature.
    Looking at the diagram as explained in the previous series
    this implements changes up to the point where the merged
    nft entries are saved. There are still bits of stubbed
    out code where offloading of the flows will be implemented.
    
    	+-------------+                      +----------+
    	| pre_ct flow +--------+             | nft flow |
    	+-------------+        v             +------+---+
    	                  +----------+              |
    	                  | tc_merge +--------+     |
    	                  +----------+        v     v
    	+--------------+       ^           +-------------+
    	| post_ct flow +-------+       +---+nft_tc merge |
    	+--------------+               |   +-------------+
    	                               |
    	                               |
    	                               |
    	                               v
    	                        Offload to nfp
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Jun 16, 2021
  12. nfp: flower-ct: implement action_merge check

    Fill in code stub to check that the flow actions are valid for
    merge. The actions of the flow X should not conflict with the
    matches of flow X+1. For now this check is quite strict and
    set_actions are very limited, will need to update this when
    NAT support is added.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  13. nfp: flower-ct: fill ct metadata check function

    Fill in check_meta stub to check that ct_metadata action fields in
    the nft flow matches the ct_match data of the post_ct flow.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  14. nfp: flower-ct: fill in ct merge check function

    Replace merge check stub code with the actual implementation. This
    checks that the match parts of two tc flows does not conflict.
    Only overlapping keys needs to be checked, and only the narrowest
    masked parts needs to be checked, so each key is masked with the
    AND'd result of both masks before comparing.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  15. nfp: flower-ct: implement code to save merge of tc and nft flows

    Add in the code to merge the tc_merge objects with the flows
    received from nft. At the moment flows are just merged blindly
    as the validity check functions are stubbed out, this will
    be populated in follow-up patches.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  16. nfp: flower-ct: add nft_merge table

    Add table and struct to save the result of the three-way merge
    between pre_ct,post_ct, and nft flows. Merging code is to be
    added in follow-up patches.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  17. nfp: flower-ct: make a full copy of the rule when it is a NFT flow

    The nft flow will be destroyed after offload cb returns. This means
    we need save a full copy of it since it can be referenced through
    other paths other than just the offload cb, for example when a new
    pre_ct or post_ct entry is added, and it needs to be merged with
    an existing nft entry.
    
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    zhangyinjun authored and davem330 committed Jun 16, 2021
  18. nfp: flower-ct: add nft flows to nft list

    Implement code to add and remove nft flows to the relevant list.
    Registering and deregistering the callback function for the nft
    table is quite complicated. The safest is to delete the callback
    on the removal of the last pre_ct flow. This is because if this
    is also the latest pre_ct flow in software it means that this
    specific nft table will be freed, so there will not be a later
    opportunity to do this. Another place where it looks possible
    to delete the callback is when the last nft_flow is deleted,
    but this happens under the flow_table lock, which is also taken
    when deregistering the callback, leading to a deadlock situation.
    
    This means the final solution here is to delete the callback
    when removing the last pre_ct flow, and then clean up any
    remaining nft_flow entries which may still be present, since
    there will never be a callback now to do this, leaving them
    orphaned if not cleaned up here as well.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  19. nfp: flower-ct: add nft callback stubs

    Add register/unregister of the nft callback. For now just add
    stub code to accept the flows, but don't do anything with it.
    Decided to accept the flows since netfilter will keep on trying
    to offload a flow if it was rejected, which is quite noisy.
    Follow-up patches will start implementing the functions to add
    nft flows to the relevant tables.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  20. nfp: flower-ct: add delete flow handling for ct

    Add functions to handle delete flow callbacks for ct flows. Also
    accept the flows for offloading by returning 0 instead of -EOPNOTSUPP.
    Flows will still not actually be offloaded to hw, but at this point
    it's difficult to not accept the flows and also exercise the cleanup
    paths properly. Traffic will still be handled safely through the
    fallback path.
    
    Signed-off-by: Louis Peens <louis.peens@corigine.com>
    Signed-off-by: Yinjun Zhang <yinjun.zhang@corigine.com>
    Signed-off-by: Simon Horman <simon.horman@corigine.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    louis-peens authored and davem330 committed Jun 16, 2021
  21. Merge branch 'net-phy-cleanups'

    Weihang Li says:
    
    ====================
    net: phy: fix some coding-style issues
    
    Make some cleanups according to the coding style of kernel.
    
    Changes since v1:
    - Update commit description of #1 and #3.
    - Avoid changing the indentation in #2.
    - Change a group of if-else statement into switch from #4 and put it into
      a single patch.
    - Put '|' at the end of line in #5 and torvalds#7.
    - Avoid deleting spaces in definition of 'settings' in #5.
    - Drop torvalds#8 from the series which needs more discussion with David.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Jun 16, 2021
  22. net: phy: replace if-else statements with switch

    Switch statement is clearer than a group of 'if-else'.
    
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Weihang Li authored and davem330 committed Jun 16, 2021
  23. net: phy: remove unnecessary line continuation

    Avoid unnecessary line continuations, and put '|' at the end of line.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  24. net: phy: print the function name by __func__ instead of an fixed string

    It's better to use __func__ than a fixed string to print a function's
    name.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  25. net: phy: fix formatting issues with braces

    Fix following format issues:
    1. open brace '{' following function definitions should go to the next
       line.
    2. braces {} are not necessary for single line statements.
    3. else should follow close brace '}'.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  26. net: phy: fix space alignment issues

    There are some space related issues, including spaces at the start of the
    line, before tabs, after open parenthesis and before close parenthesis.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  27. net: phy: delete repeated words of comments

    There are some repeated words in some comments, they should be deleted.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  28. net: phy: correct format of block comments

    Block comments should not use a trailing */ on a separate line and every
    line of a block comment should start with an '*'.
    
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  29. net: phy: change format of some declarations

    Add a blank line after declarations, change the order of them and put the
    assignments and declarations together.
    
    Cc: Richard Cochran <richardcochran@gmail.com>
    Signed-off-by: Wenpeng Liang <liangwenpeng@huawei.com>
    Signed-off-by: Weihang Li <liweihang@huawei.com>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenpeng Liang authored and davem330 committed Jun 16, 2021
  30. net: qualcomm: rmnet: Remove some unneeded casts

    Remove the explicit casts in the checksum complement functions
    and pass the actual protocol specific headers instead.
    
    Signed-off-by: Subash Abhinov Kasiviswanathan <subashab@codeaurora.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Subash Abhinov Kasiviswanathan authored and davem330 committed Jun 16, 2021
  31. net: iosm: remove the repeated declaration and comment

    Function 'ipc_mmio_get_cp_version' is declared twice, so remove the
    repeated declaration and wrong comments.
    
    Cc: M Chetan Kumar <m.chetan.kumar@intel.com>
    Cc: Intel Corporation <linuxwwan@intel.com>
    Cc: David S. Miller <davem@davemloft.net>
    Cc: Jakub Kicinski <kuba@kernel.org>
    Signed-off-by: Shaokun Zhang <zhangshaokun@hisilicon.com>
    Reviewed-by: M Chetan Kumar <m.chetan.kumar@intel.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    zhangshk authored and davem330 committed Jun 16, 2021
  32. net: dsa: xrs700x: forward HSR supervision frames

    Forward supervision frames between redunant HSR ports. This was broken
    in the last commit.
    
    Fixes: 1a42624 ("net: dsa: xrs700x: allow HSR/PRP supervision dupes for node_table")
    Signed-off-by: George McCollister <george.mccollister@gmail.com>
    Reviewed-by: Vladimir Oltean <olteanv@gmail.com>
    Reviewed-by: Florian Fainelli <f.fainelli@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    gmccollister authored and davem330 committed Jun 16, 2021
Older