n list manager -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender SpamTally: Final spam score: 4 5.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet [ Upstream commit 8175dbf174d487afab81e936a862a8d9b8a1ccb6 ] dev->work can re read locklessly in mISDN_read() and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations. BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read write to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1: misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline] mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583 x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0: mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112 do_loop_readv_writev fs/read_write.c:847 [inline] vfs_readv+0x3fb/0x690 fs/read_write.c:1020 do_readv+0xe7/0x210 fs/read_write.c:1080 __do_sys_readv fs/read_write.c:1165 [inline] __se_sys_readv fs/read_write.c:1162 [inline] __x64_sys_readv+0x45/0x50 fs/read_write.c:1162 x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Fixes: 1b2b03f8e514 ("Add mISDN core files") Reported-by: syzbot Signed-off-by: Eric Dumazet Link: https://patch.msgid.link/20260118132528.2349573-1-edumazet@google.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/isdn/mISDN/timerdev.c | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/isdn/mISDN/timerdev.c b/drivers/isdn/mISDN/timerdev.c index abdf36ac3bee5..74d6ed49dc368 100644 --- a/drivers/isdn/mISDN/timerdev.c +++ b/drivers/isdn/mISDN/timerdev.c @@ -109,14 +109,14 @@ mISDN_read(struct file *filep, char __user *buf, size_t count, loff_t *off) spin_unlock_irq(&dev->lock); if (filep->f_flags & O_NONBLOCK) return -EAGAIN; - wait_event_interruptible(dev->wait, (dev->work || + wait_event_interruptible(dev->wait, (READ_ONCE(dev->work) || !list_empty(list))); if (signal_pending(current)) return -ERESTARTSYS; spin_lock_irq(&dev->lock); } if (dev->work) - dev->work = 0; + WRITE_ONCE(dev->work, 0); if (!list_empty(list)) { timer = list_first_entry(list, struct mISDNtimer, list); list_del(&timer->list); @@ -141,13 +141,16 @@ mISDN_poll(struct file *filep, poll_table *wait) if (*debug & DEBUG_TIMER) printk(KERN_DEBUG "%s(%p, %p)\n", __func__, filep, wait); if (dev) { + u32 work; + poll_wait(filep, &dev->wait, wait); mask = 0; - if (dev->work || !list_empty(&dev->expired)) + work = READ_ONCE(dev->work); + if (work || !list_empty(&dev->expired)) mask |= (EPOLLIN | EPOLLRDNORM); if (*debug & DEBUG_TIMER) printk(KERN_DEBUG "%s work(%d) empty(%d)\n", __func__, - dev->work, list_empty(&dev->expired)); + work, list_empty(&dev->expired)); } return mask; } @@ -172,7 +175,7 @@ misdn_add_timer(struct mISDNtimerdev *dev, int timeout) struct mISDNtimer *timer; if (!timeout) { - dev->work = 1; + WRITE_ONCE(dev->work, 1); wake_up_interruptible(&dev->wait); id = 0; } else { -- 2.51.0 From - Wed Feb 04 15:19:44 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id oBxfFoxjg2lKhhQAYBR5ng (envelope-from ) for ; Wed, 04 Feb 2026 15:19:40 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Wed, 04 Feb 2026 15:19:40 +0000 Received: from sea.lore.kernel.org ([172.234.253.10]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vnefM-00000007Cz0-0M7t for hi@josie.lol; Wed, 04 Feb 2026 15:19:40 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sea.lore.kernel.org (Postfix) with ESMTP id DD7EA307B7C1 for ; Wed, 4 Feb 2026 14:59:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D639541C2EF; Wed, 4 Feb 2026 14:58:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="T9xdZq3D" X-Original-To: stable@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B39D941323E; Wed, 4 Feb 2026 14:58:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217136; cv=none; b=Ffo4JRKEWHD3pc6r50UiX6af4BK/sVSiAPWBHrRoReCKCUu8Uz28Lzj3OAFr4Jb/Ox+xhIiUEf0v4rZAuP7lhk2PLGdApa/Ae7795YW8JM9T6fRav6vQOPSAwK6lyM6t94r+4byXe7dXPjEKYhpjbiTC+K9pVwED2HYUjq9GRn4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217136; c=relaxed/simple; bh=f6Gl/4T4RxLlCimGiMWEZpM2ckll4uPOQw2wHDj2Jh0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=dV06bxuqZMT87DpS8K0oOz2gGPtJ8s9gtDIVD+XU0qn1nCBgXWhkAaCFFA7nRi7Z4cY506nXdI/5qaUXQ1vmxuqcNAFtTiank7YRccRvOCAEpv6iQGtK4HMn+huEUTQ6OqYYPF6WyCKByWFx5DggEuxQFbtx57M5UmgzNUk7LCM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=T9xdZq3D; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2A28AC4CEF7; Wed, 4 Feb 2026 14:58:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1770217136; bh=f6Gl/4T4RxLlCimGiMWEZpM2ckll4uPOQw2wHDj2Jh0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T9xdZq3DhVFhQ2FJKsmsKkzx6HSoy41lGHD+itfLUHxSmSJG2gvqT2kctCUW4UMKY wlPtkY/V9Fge23goHNNJlKDjXMxTi9WXujYoJsb+Fzq5SO98puSO2Lwz42yPG/2rIR eZZzl52ZEUKkS+WEguO9ZvcURdgKCuZxQ/rnA7ww= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Andrey Vatoropin , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.15 101/206] be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list Date: Wed, 4 Feb 2026 15:38:52 +0100 Message-ID: <20260204143901.849705069@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260204143858.193781818@linuxfoundation.org> References: <20260204143858.193781818@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-DKIM: signer='linuxfoundation.org' status='pass' reason='' DKIMCheck: Server passes DKIM test, 0 Spam score X-Spam-Score: 0.4 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.4 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: msgid.link] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block for more information. [172.234.253.10 listed in list.dnswl.org] 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender SpamTally: Final spam score: 4 5.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andrey Vatoropin [ Upstream commit 8215794403d264739cc676668087512950b2ff31 ] When the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is set to false, the driver may request the PMAC_ID from the firmware of the network card, and this function will store that PMAC_ID at the provided address pmac_id. This is the contract of this function. However, there is a location within the driver where both pmac_id_valid == false and pmac_id == NULL are being passed. This could result in dereferencing a NULL pointer. To resolve this issue, it is necessary to pass the address of a stub variable to the function. Fixes: 95046b927a54 ("be2net: refactor MAC-addr setup code") Signed-off-by: Andrey Vatoropin Link: https://patch.msgid.link/20260120113734.20193-1-a.vatoropin@crpt.ru Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/ethernet/emulex/benet/be_cmds.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/emulex/benet/be_cmds.c b/drivers/net/ethernet/emulex/benet/be_cmds.c index 96a8749cf34fb..92ee82d4b18f1 100644 --- a/drivers/net/ethernet/emulex/benet/be_cmds.c +++ b/drivers/net/ethernet/emulex/benet/be_cmds.c @@ -3796,6 +3796,7 @@ int be_cmd_get_perm_mac(struct be_adapter *adapter, u8 *mac) { int status; bool pmac_valid = false; + u32 pmac_id; eth_zero_addr(mac); @@ -3808,7 +3809,7 @@ int be_cmd_get_perm_mac(struct be_adapter *adapter, u8 *mac) adapter->if_handle, 0); } else { status = be_cmd_get_mac_from_list(adapter, mac, &pmac_valid, - NULL, adapter->if_handle, 0); + &pmac_id, adapter->if_handle, 0); } return status; -- 2.51.0 From - Wed Feb 04 15:19:56 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id OGvkIphjg2nghhgAYBR5ng (envelope-from ) for ; Wed, 04 Feb 2026 15:19:52 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Wed, 04 Feb 2026 15:19:52 +0000 Received: from sto.lore.kernel.org ([172.232.135.74]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vnefY-00000007DKl-0I1f for hi@josie.lol; Wed, 04 Feb 2026 15:19:52 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sto.lore.kernel.org (Postfix) with ESMTP id E678A305721B for ; Wed, 4 Feb 2026 15:11:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5EA5F421EF3; Wed, 4 Feb 2026 15:04:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="jd/OE2OW" X-Original-To: stable@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BA0B421EF0; Wed, 4 Feb 2026 15:04:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217455; cv=none; b=sJpUGuzzfD1AbyQ6YzG7q3fuE49pEclbjnMn4UAAFkLEpcGaIIJwKFY5+YlDKUtpeq2DoOfczXTS7x7hDBhGnZyZPlqhZ13aCsCPgywKRnOueMB2GbicK3DoxAlLDlxlITe17Is9RYlV8tfmWzaYWXa7mriiJWZVvjwI15R0KdE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217455; c=relaxed/simple; bh=toPw79wJtNUqaIWqahcYgFxTMMVWRxZOSnDq4jGA7As=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=eBHTU3+2Y0ukUtKBS6RksQI++iShXtHo64Ll3KgRYKME2VQWjMD6EgclO/vii14wti11FDVtkUQCNG3IU5PDssesTTsA/lbRFP8mNAf2i65AIAQDLIOQqL6rFGgmCvZ0PqLcMVi84f8y2BH1ZRwvWzIf2XcYGwLq/ZHDHNnz0Jg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=jd/OE2OW; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id B49ADC4CEF7; Wed, 4 Feb 2026 15:04:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1770217455; bh=toPw79wJtNUqaIWqahcYgFxTMMVWRxZOSnDq4jGA7As=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jd/OE2OWtiRyF2KDwSySI5xncc1uEUrmsSf92h7dDLVeKIepVX4fOFwfcvoI7vG6/ EvTljgj1dYYoIHLceRE4G+GDIL0vqp0eC45dtWmkHQBw6gLGxGp7cq38X4pMz4xWar 5MW5ZO4OE3+FxmZvi2JFQ6aaE0X/hTrlYKpNZQa0= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, syzbot+7c134e1c3aa3283790b9@syzkaller.appspotmail.com, Eric Dumazet , Jakub Kicinski , Sasha Levin Subject: [PATCH 6.1 013/280] ipv4: ip_gre: make ipgre_header() robust Date: Wed, 4 Feb 2026 15:36:27 +0100 Message-ID: <20260204143910.105520045@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260204143909.614719725@linuxfoundation.org> References: <20260204143909.614719725@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-DKIM: signer='linuxfoundation.org' status='pass' reason='' DKIMCheck: Server passes DKIM test, 0 Spam score X-Spam-Score: 0.4 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.4 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: msgid.link] 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender SpamTally: Final spam score: 4 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet [ Upstream commit e67c577d89894811ce4dcd1a9ed29d8b63476667 ] Analog to commit db5b4e39c4e6 ("ip6_gre: make ip6gre_header() robust") Over the years, syzbot found many ways to crash the kernel in ipgre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_headroom and/or dev->hard_header_len In this particular crash mld_newpack() allocated an skb with a too small reserve/headroom, and by the time mld_sendpack() was called, syzbot managed to attach an ipgre device. [1] skbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0 kernel BUG at net/core/skbuff.c:213 ! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: mld mld_ifc_work RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213 Call Trace: skb_under_panic net/core/skbuff.c:223 [inline] skb_push+0xc3/0xe0 net/core/skbuff.c:2641 ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897 dev_hard_header include/linux/netdevice.h:3436 [inline] neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618 NF_HOOK_COND include/linux/netfilter.h:307 [inline] ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247 NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318 mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855 mld_send_cr net/ipv6/mcast.c:2154 [inline] mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Fixes: c54419321455 ("GRE: Refactor GRE tunneling code.") Reported-by: syzbot+7c134e1c3aa3283790b9@syzkaller.appspotmail.com Closes: https://www.spinics.net/lists/netdev/msg1147302.html Signed-off-by: Eric Dumazet Link: https://patch.msgid.link/20260108190214.1667040-1-edumazet@google.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- net/ipv4/ip_gre.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/net/ipv4/ip_gre.c b/net/ipv4/ip_gre.c index 2c311ed84a3b3..b90241aff93c3 100644 --- a/net/ipv4/ip_gre.c +++ b/net/ipv4/ip_gre.c @@ -854,10 +854,17 @@ static int ipgre_header(struct sk_buff *skb, struct net_device *dev, const void *daddr, const void *saddr, unsigned int len) { struct ip_tunnel *t = netdev_priv(dev); - struct iphdr *iph; struct gre_base_hdr *greh; + struct iphdr *iph; + int needed; + + needed = t->hlen + sizeof(*iph); + if (skb_headroom(skb) < needed && + pskb_expand_head(skb, HH_DATA_ALIGN(needed - skb_headroom(skb)), + 0, GFP_ATOMIC)) + return -needed; - iph = skb_push(skb, t->hlen + sizeof(*iph)); + iph = skb_push(skb, needed); greh = (struct gre_base_hdr *)(iph+1); greh->flags = gre_tnl_flags_to_gre_flags(t->parms.o_flags); greh->protocol = htons(type); -- 2.51.0 From - Wed Feb 04 15:20:02 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id YD3KM51jg2lKhhQAYBR5ng (envelope-from ) for ; Wed, 04 Feb 2026 15:19:57 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Wed, 04 Feb 2026 15:19:58 +0000 Received: from sea.lore.kernel.org ([172.234.253.10]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vnefd-00000007DWK-1CBa for hi@josie.lol; Wed, 04 Feb 2026 15:19:57 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sea.lore.kernel.org (Postfix) with ESMTP id 9143D318F70A for ; Wed, 4 Feb 2026 14:59:57 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 349E4413254; Wed, 4 Feb 2026 14:59:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="n/U6Ply1" X-Original-To: stable@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 11B27421890; Wed, 4 Feb 2026 14:59:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217158; cv=none; b=E/GJWZgznbE4CdXcOIqqevf+7W451taLt9ZhsHiZ1+sOk19ttmJNmIMQlUIJTLMQVff4j7b8oXh7N8DH2hdm5SCyUebeINsOg6rq9M9VzcDgBmC4qkc2e0bMfvDt75ys2H6EF4J/kcJYv0Nul/Aky5fCx05o00oLE4SJjuhZqEg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217158; c=relaxed/simple; bh=VMpboJwLIRmyD2GV3kNW3P+AIycb951z1/sueT8vRWs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=HQ8/qQhNhyZRLHRn9+9OJeAMelhXWkKRwLFQPxizTSN+AE/7X+jPHpJNxcdu4jKJ17KRvu/x57gerJ8UKt24w3VwdLVvisfK6cffUTq7dEDWUrlTPSb3YPyCnWgU9Oo47Mz2FYtLybidWnaiYxC6eFGL5QrWd2nKsxvCDWt828g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=n/U6Ply1; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 278D1C4CEF7; Wed, 4 Feb 2026 14:59:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1770217157; bh=VMpboJwLIRmyD2GV3kNW3P+AIycb951z1/sueT8vRWs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n/U6Ply1FqwQYnmtAohNhj5vAOvgHfH7JIJGmTRiBrDIjuSBDsQDQ9izTE4fqQFr7 3yOvjHRKuCv708LQqIWWEtFvuefeYVzWghNRmrgSe2XpSf/baeb0qWk36/cMzCO2hh E60vQAE0RJzj98Q6kZew68ioOJu5/EagzywRFtko= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Tony Nguyen , Jake Keller , IWL , Jesse Brandeburg , Sasha Levin Subject: [PATCH 5.15 141/206] ice: stop counting UDP csum mismatch as rx_errors Date: Wed, 4 Feb 2026 15:39:32 +0100 Message-ID: <20260204143903.284706192@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260204143858.193781818@linuxfoundation.org> References: <20260204143858.193781818@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-DKIM: signer='linuxfoundation.org' status='pass' reason='' DKIMCheck: Server passes DKIM test, 0 Spam score X-Spam-Score: 0.4 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.4 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: linuxfoundation.org] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block for more information. [172.234.253.10 listed in list.dnswl.org] 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender SpamTally: Final spam score: 4 5.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jesse Brandeburg [ Upstream commit 05faf2c0a76581d0a7fdbb8ec46477ba183df95b ] Since the beginning, the Intel ice driver has counted receive checksum offload mismatches into the rx_errors member of the rtnl_link_stats64 struct. In ethtool -S these show up as rx_csum_bad.nic. I believe counting these in rx_errors is fundamentally wrong, as it's pretty clear from the comments in if_link.h and from every other statistic the driver is summing into rx_errors, that all of them would cause a "hardware drop" except for the UDP checksum mismatch, as well as the fact that all the other causes for rx_errors are L2 reasons, and this L4 UDP "mismatch" is an outlier. A last nail in the coffin is that rx_errors is monitored in production and can indicate a bad NIC/cable/Switch port, but instead some random series of UDP packets with bad checksums will now trigger this alert. This false positive makes the alert useless and affects us as well as other companies. This packet with presumably a bad UDP checksum is *already* passed to the stack, just not marked as offloaded by the hardware/driver. If it is dropped by the stack it will show up as UDP_MIB_CSUMERRORS. And one more thing, none of the other Intel drivers, and at least bnxt_en and mlx5 both don't appear to count UDP offload mismatches as rx_errors. Here is a related customer complaint: https://community.intel.com/t5/Ethernet-Products/ice-rx-errros-is-too-sensitive-to-IP-TCP-attack-packets-Intel/td-p/1662125 Fixes: 4f1fe43c920b ("ice: Add more Rx errors to netdev's rx_error counter") Cc: Tony Nguyen Cc: Jake Keller Cc: IWL Signed-off-by: Jesse Brandeburg Acked-by: Jacob Keller Signed-off-by: Tony Nguyen Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/ice/ice_main.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/net/ethernet/intel/ice/ice_main.c b/drivers/net/ethernet/intel/ice/ice_main.c index 04e3f6c424c0c..db5319a8eb241 100644 --- a/drivers/net/ethernet/intel/ice/ice_main.c +++ b/drivers/net/ethernet/intel/ice/ice_main.c @@ -5841,7 +5841,6 @@ void ice_update_vsi_stats(struct ice_vsi *vsi) pf->stats.illegal_bytes + pf->stats.rx_len_errors + pf->stats.rx_undersize + - pf->hw_csum_rx_error + pf->stats.rx_jabber + pf->stats.rx_fragments + pf->stats.rx_oversize; -- 2.51.0 From - Wed Feb 04 15:20:09 2026 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Delivered-To: hi@josie.lol Received: from witcher.mxrouting.net by witcher.mxrouting.net with LMTP id OLPMJKVjg2nghhgAYBR5ng (envelope-from ) for ; Wed, 04 Feb 2026 15:20:05 +0000 Return-path: Envelope-to: hi@josie.lol Delivery-date: Wed, 04 Feb 2026 15:20:05 +0000 Received: from sto.lore.kernel.org ([172.232.135.74]) by witcher.mxrouting.net with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from ) id 1vnefl-00000007Ds8-13lT for hi@josie.lol; Wed, 04 Feb 2026 15:20:05 +0000 Received: from smtp.subspace.kernel.org (conduit.subspace.kernel.org [100.90.174.1]) by sto.lore.kernel.org (Postfix) with ESMTP id BC971308B03A for ; Wed, 4 Feb 2026 15:11:19 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 73990421893; Wed, 4 Feb 2026 15:04:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="Cda5foIv" X-Original-To: stable@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 510152D321B; Wed, 4 Feb 2026 15:04:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217477; cv=none; b=b6Ubcm4amh7V0MPCTYxNWYzBUGAPnsrONPKaGIxnOcENRe14wrJmV4k/4lIGE7cAyyUmTTezUSovCV7Lav/ZqlvCzECHFBJuDFSvoxWXUu7a5hXR2DaH+ndkMLIpmaTwHuknRGPDWtfyQbAg7lSP3H0GaCdpVhlnGzSMIi2xOeY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770217477; c=relaxed/simple; bh=hw9jDZuFIRmePriqY9lnfBDyRfJRvjVMTw5T6PJGYq8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=QGuHjRBFa4IBtPzm2q++OzdoNmEJZ3efBGMEOeo0WsS4zweqrg09ys2iI3IsY6fVPWewaWs76hY2uqpwE55tV+E8e2uJw82s4dGTg1GTIh5HeHUQpA3W8RC6pXxrXxqZdhADcIBYaTtKSL3At/zDl94ldhXnQ2FUc+YHOgirDwI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=Cda5foIv; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id D0B18C4CEF7; Wed, 4 Feb 2026 15:04:36 +0000 (UTC) DKnal permissions to temp file 2026-03-06T21:33:17.743Z [DEBUG] Renaming /home/josie/development/knot-operator/internal/controller/knot_controller_test.go.tmp.1287708.1772832797743 to /home/josie/development/knot-operator/internal/controller/knot_controller_test.go 2026-03-06T21:33:17.743Z [DEBUG] File /home/josie/development/knot-operator/internal/controller/knot_controller_test.go written atomically 2026-03-06T21:33:17.744Z [DEBUG] [LSP PROTOCOL plugin:gopls-lsp:gopls] Sending notification 'textDocument/didSave'. 2026-03-06T21:33:17.744Z [DEBUG] [LSP PROTOCOL plugin:gopls-lsp:gopls] Sending notification 'textDocument/didOpen'. 2026-03-06T21:33:17.745Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:17.745Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:17.745Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:17.745Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:17.745Z [DEBUG] Getting matching hook commands for PostToolUse with query: Edit 2026-03-06T21:33:17.745Z [DEBUG] Found 6 hook matchers in settings 2026-03-06T21:33:17.745Z [DEBUG] Matched 2 unique hooks for query "Edit" (2 before deduplication) 2026-03-06T21:33:17.786Z [DEBUG] High write ratio: blit=0, write=32205 (100.0% writes), screen=473x110 2026-03-06T21:33:17.786Z [DEBUG] Full reset (scrollback changes): scrollbackRows=673, firstChangeY=465 prev: "● Update(internal/controller/knot_controller_test.go) " next: " Update(internal/controller/knot_controller_test.go) " 2026-03-06T21:33:17.890Z [DEBUG] [lspRecommendation] Looking for LSP plugins for .go 2026-03-06T21:33:17.892Z [DEBUG] AutoUpdaterWrapper: Installation type: npm-global 2026-03-06T21:33:17.892Z [DEBUG] LSP: Sent didSave for /home/josie/development/knot-operator/internal/controller/knot_controller_test.go 2026-03-06T21:33:17.892Z [DEBUG] LSP: Sent didOpen for /home/josie/development/knot-operator/internal/controller/knot_controller_test.go (languageId: go) 2026-03-06T21:33:17.909Z [DEBUG] [lspRecommendation] Failed to load marketplace test-marketplace: Error: Failed to load marketplace "test-marketplace" from source (file): Marketplace file not found at /home/josie/development/karpenter-ibm/.claude-plugin/marketplace.json 2026-03-06T21:33:17.909Z [DEBUG] [lspRecommendation] Skipping gopls-lsp@claude-plugins-official (already installed) 2026-03-06T21:33:17.923Z [DEBUG] Hooks: Checking initial response for async: {} 2026-03-06T21:33:17.923Z [DEBUG] Hooks: Parsed initial response: {} 2026-03-06T21:33:17.923Z [DEBUG] Hooks: Initial response is not async, continuing normal processing 2026-03-06T21:33:17.926Z [DEBUG] [LSP PROTOCOL plugin:gopls-lsp:gopls] Received notification 'textDocument/publishDiagnostics'. 2026-03-06T21:33:17.926Z [DEBUG] [PASSIVE DIAGNOSTICS] Handler invoked for plugin:gopls-lsp:gopls! Params type: object 2026-03-06T21:33:17.926Z [DEBUG] Received diagnostics from plugin:gopls-lsp:gopls: 0 diagnostic(s) for file:///home/josie/development/knot-operator/internal/controller/knot_controller_test.go 2026-03-06T21:33:17.926Z [DEBUG] Skipping empty diagnostics from plugin:gopls-lsp:gopls for file:///home/josie/development/knot-operator/internal/controller/knot_controller_test.go 2026-03-06T21:33:17.928Z [DEBUG] Successfully parsed and validated hook JSON output 2026-03-06T21:33:17.928Z [DEBUG] Hook PostToolUse:Edit (PostToolUse) success: {} 2026-03-06T21:33:17.929Z [DEBUG] LSP Diagnostics: getLSPDiagnosticAttachments called 2026-03-06T21:33:17.929Z [DEBUG] LSP Diagnostics: Checking registry - 0 pending 2026-03-06T21:33:17.929Z [DEBUG] Hooks: Found 0 total hooks in registry 2026-03-06T21:33:17.929Z [DEBUG] Hooks: checkForNewResponses returning 0 responses 2026-03-06T21:33:17.930Z [DEBUG] Dynamic tool loading: found 6 discovered tools in message history 2026-03-06T21:33:17.930Z [DEBUG] Dynamic tool loading: 6/222 deferred tools included 2026-03-06T21:33:17.931Z [DEBUG] attribution header x-anthropic-billing-header: cc_version=2.1.70.0a4; cc_entrypoint=cli; cch=00000; 2026-03-06T21:33:17.931Z [DEBUG] [API:request] Creating client, ANTHROPIC_CUSTOM_HEADERS present: false, has Authorization header: false 2026-03-06T21:33:17.932Z [DEBUG] [API:auth] OAuth token check starting 2026-03-06T21:33:17.932Z [DEBUG] [API:auth] OAuth token check complete 2026-03-06T21:33:17.935Z [DEBUG] [useDeferredValue] Messages deferred by 6 (411→417) 2026-03-06T21:33:20.193Z [DEBUG] Stream started - received first chunk 2026-03-06T21:33:21.117Z [DEBUG] executePreToolHooks called for tool: Bash 2026-03-06T21:33:21.118Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:21.118Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:21.118Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:21.118Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:21.118Z [DEBUG] Getting matching hook commands for PreToolUse with query: Bash 2026-03-06T21:33:21.118Z [DEBUG] Found 1 hook matchers in settings 2026-03-06T21:33:21.118Z [DEBUG] Matched 1 unique hooks for query "Bash" (1 before deduplication) 2026-03-06T21:33:21.119Z [DEBUG] [useDeferredValue] Messages deferred by 1 (417→418) 2026-03-06T21:33:21.164Z [DEBUG] High write ratio: blit=0, write=55255 (100.0% writes), screen=711x110 2026-03-06T21:33:21.169Z [DEBUG] Hooks: Checking initial response for async: {} 2026-03-06T21:33:21.169Z [DEBUG] Hooks: Parsed initial response: {} 2026-03-06T21:33:21.169Z [DEBUG] Hooks: Initial response is not async, continuing normal processing 2026-03-06T21:33:21.170Z [DEBUG] [useDeferredValue] Messages deferred by 1 (418→419) 2026-03-06T21:33:21.176Z [DEBUG] Successfully parsed and validated hook JSON output 2026-03-06T21:33:21.176Z [DEBUG] Hook PreToolUse:Bash (PreToolUse) success: {} 2026-03-06T21:33:21.178Z [DEBUG] Permission suggestions for Bash: [ { "type": "addRules", "rules": [ { "toolName": "Bash", "ruleContent": "go test ./internal/controller/ -run TestCreateOrUpdateSkipsNoopUpdates -v" } ], "behavior": "allow", "destination": "localSettings" } ] 2026-03-06T21:33:21.178Z [DEBUG] executePermissionRequestHooks called for tool: Bash 2026-03-06T21:33:21.178Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:21.178Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:21.178Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:21.178Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:21.178Z [DEBUG] Getting matching hook commands for PermissionRequest with query: Bash 2026-03-06T21:33:21.178Z [DEBUG] Found 0 hook matchers in settings 2026-03-06T21:33:21.178Z [DEBUG] Matched 0 unique hooks for query "Bash" (0 before deduplication) 2026-03-06T21:33:21.179Z [DEBUG] [useDeferredValue] Messages deferred by 1 (418→419) 2026-03-06T21:33:21.183Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:21.183Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:21.191Z [DEBUG] [useDeferredValue] Messages deferred by 1 (418→419) 2026-03-06T21:33:21.194Z [DEBUG] [useDeferredValue] Messages deferred by 1 (418→419) 2026-03-06T21:33:27.188Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:27.188Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:27.188Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:33:27.188Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:33:27.188Z [DEBUG] Getting matching hook commands for Notification with query: permission_prompt 2026-03-06T21:33:27.188Z [DEBUG] Found 0 hook matchers in settings 2026-03-06T21:33:27.188Z [DEBUG] Matched 0 unique hooks for query "permission_prompt" (0 before deduplication) 2026-03-06T21:35:12.381Z [DEBUG] High write ratio: blit=0, write=55256 (100.0% writes), screen=711x110 2026-03-06T21:35:12.388Z [DEBUG] AutoUpdaterWrapper: Installation type: npm-global 2026-03-06T21:35:12.389Z [DEBUG] Spawning shell without login (-l flag skipped) 2026-03-06T21:35:13.740Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:35:13.740Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:35:13.740Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:35:13.740Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:35:13.740Z [DEBUG] Getting matching hook commands for PostToolUse with query: Bash 2026-03-06T21:35:13.740Z [DEBUG] Found 6 hook matchers in settings 2026-03-06T21:35:13.740Z [DEBUG] Matched 1 unique hooks for query "Bash" (1 before deduplication) 2026-03-06T21:35:13.774Z [DEBUG] Hooks: Checking initial response for async: {} 2026-03-06T21:35:13.774Z [DEBUG] Hooks: Parsed initial response: {} 2026-03-06T21:35:13.774Z [DEBUG] Hooks: Initial response is not async, continuing normal processing 2026-03-06T21:35:13.777Z [DEBUG] Successfully parsed and validated hook JSON output 2026-03-06T21:35:13.777Z [DEBUG] Hook PostToolUse:Bash (PostToolUse) success: {} 2026-03-06T21:35:13.778Z [DEBUG] LSP Diagnostics: getLSPDiagnosticAttachments called 2026-03-06T21:35:13.778Z [DEBUG] LSP Diagnostics: Checking registry - 0 pending 2026-03-06T21:35:13.778Z [DEBUG] Hooks: Found 0 total hooks in registry 2026-03-06T21:35:13.778Z [DEBUG] Hooks: checkForNewResponses returning 0 responses 2026-03-06T21:35:13.780Z [DEBUG] Dynamic tool loading: found 6 discovered tools in message history 2026-03-06T21:35:13.780Z [DEBUG] Dynamic tool loading: 6/222 deferred tools included 2026-03-06T21:35:13.782Z [DEBUG] attribution header x-anthropic-billing-header: cc_version=2.1.70.0a4; cc_entrypoint=cli; cch=00000; 2026-03-06T21:35:13.782Z [DEBUG] [API:request] Creating client, ANTHROPIC_CUSTOM_HEADERS present: false, has Authorization header: false 2026-03-06T21:35:13.782Z [DEBUG] [API:auth] OAuth token check starting 2026-03-06T21:35:13.782Z [DEBUG] [API:auth] OAuth token check complete 2026-03-06T21:35:13.785Z [DEBUG] [useDeferredValue] Messages deferred by 4 (419→423) 2026-03-06T21:35:15.724Z [DEBUG] Stream started - received first chunk 2026-03-06T21:35:16.647Z [DEBUG] [useDeferredValue] Messages deferred by 1 (423→424) 2026-03-06T21:35:16.662Z [DEBUG] [useDeferredValue] Messages deferred by 1 (423→424) 2026-03-06T21:35:16.681Z [DEBUG] [useDeferredValue] Messages deferred by 1 (423→424) 2026-03-06T21:35:17.149Z [DEBUG] executePreToolHooks called for tool: Bash 2026-03-06T21:35:17.149Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:35:17.149Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:35:17.149Z [DEBUG] detectFileEncoding failed for expected reason: ENOENT 2026-03-06T21:35:17.149Z [DEBUG] Broken symlink or missing file encountered for settings.json at path: /etc/claude-code/managed-settings.json 2026-03-06T21:35:17.149Z [DEBUG] Getting matching hook commands for PreToolUse with query: Bash 2026-03-06T21:35:17.149Z [DEBUG] Found 1 hook matchers in settings 2026-03-06T21:35:17.149Z [DEBUG] Matched 1 unique hooks for query "Bash" (1 before deduplication) 2026-03-06T21:35:17.152Z [DEBUG] [useDeferredValue] Messages deferred by 1 (424→425) 2026-03-06T21:35:17.191Z [DEBUG] High write ratio: blit=0,