Re: [PATCH] veth: fix memory leak in veth_newlink()

2020-08-30 Thread Toshiaki Makita
On 2020/08/31 9:51, Rustam Kovhaev wrote: On Mon, Aug 31, 2020 at 09:16:32AM +0900, Toshiaki Makita wrote: On 2020/08/30 22:13, Rustam Kovhaev wrote: when register_netdevice(dev) fails we should check whether struct veth_rq has been allocated via ndo_init callback and free it, because

Re: [PATCH] veth: fix memory leak in veth_newlink()

2020-08-30 Thread Toshiaki Makita
, register_netdevice() always goto err_uninit and calls priv_destructor() on failure after ndo_init() succeeded. So I could not find such a code path. Would you elaborate on it? Thanks, Toshiaki Makita

Re: [PATCH net] net: ethtool: Allow matching on vlan CFI bit

2019-06-11 Thread Toshiaki Makita
rrent IEEE 802.1Q defines this bit as DEI not CFI, so IMO this should be vlan_dei. Toshiaki Makita

Re: KMSAN: uninit-value in __netif_receive_skb_core

2018-04-13 Thread Toshiaki Makita
e, please reply to this email with: >> #syz fix: exact-commit-title >> To mark this as a duplicate of another syzbot report, please reply with: >> #syz dup: exact-subject-of-another-report >> If it's a one-off invalid bug report, please reply with: >> #syz invalid >> Note: if the crash happens again, it will cause creation of a new bug >> report. >> Note: all commands must start from beginning of the line in the email body. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "syzkaller-bugs" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to syzkaller-bugs+unsubscr...@googlegroups.com. >> To view this discussion on the web visit >> https://groups.google.com/d/msgid/syzkaller-bugs/94eb2c059ce01f643c0569a228ee%40google.com. >> For more options, visit https://groups.google.com/d/optout. > > -- Toshiaki Makita

Re: KMSAN: uninit-value in netif_skb_features

2018-04-13 Thread Toshiaki Makita
t; #syz test: git://repo/address.git branch >> and provide the patch inline or as an attachment. >> To mark this as a duplicate of another syzbot report, please reply with: >> #syz dup: exact-subject-of-another-report >> If it's a one-off invalid bug report, please reply with: >> #syz invalid >> Note: if the crash happens again, it will cause creation of a new bug >> report. >> Note: all commands must start from beginning of the line in the email body. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "syzkaller-bugs" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to syzkaller-bugs+unsubscr...@googlegroups.com. >> To view this discussion on the web visit >> https://groups.google.com/d/msgid/syzkaller-bugs/089e082d0cb81b67d10569a2283f%40google.com. >> For more options, visit https://groups.google.com/d/optout. > > -- Toshiaki Makita

Re: [PATCH bpf-next v3 1/3] libbpf: add function to setup XDP

2017-12-28 Thread Toshiaki Makita
{ > + ret = errno; Still errno is not inverted, > + goto cleanup; > + } > + > + if (addrlen != sizeof(sa)) { > + ret = errno; And not set here. > + goto cleanup; > + } -- Toshiaki Makita

Re: [PATCH 1/4] libbpf: add function to setup XDP

2017-12-27 Thread Toshiaki Makita
errno; forgot to prepend '-'? > + goto cleanup; > + } > + > + if (addrlen != sizeof(sa)) { > + ret = errno; errno is not set? > + goto cleanup; > + } -- Toshiaki Makita

Re: [PATCH net-next] libbpf: add function to setup XDP

2017-12-10 Thread Toshiaki Makita
60c8de3392061254c97b6306a6d > + ret = -LIBBPF_ERRNO__WRNGPID; > + goto cleanup; > + } -- Toshiaki Makita

Re: Sending 802.1Q packets using AF_PACKET socket on filtered bridge forwards with wrong MAC addresses

2017-12-05 Thread Toshiaki Makita
ial patch and submit it. Should I use > another email account? Are my emails being ignored because of that > stupid disclaimer my employer attaches to my messages (outside my > control)? > > Brandon > -- Toshiaki Makita

Re: Inconsistency in packet drop due to MTU (eth vs veth)

2017-02-03 Thread Toshiaki Makita
o 1500, RX buffers are sized to be about 1536 bytes, > so you wont be able to receive a 1700 bytes frame. > > I guess that you could add a specific veth attribute to precisely > control MRU, that would not break existing applications. Ok, I will propose a patch shortly. And thanks, your response time is awesome ! But why do you want to configure MRU? What is the problem with setting MTU instead. Toshiaki Makita

Re: DSA vs envelope frames

2016-12-01 Thread Toshiaki Makita
dev_port_obj_add()? If so, dsa should be able to take into account additional vlan tag size.) If vlan tag is opaque from kernel, e.g. forwarding vlan tagged frames without configuring vlan_filtering in bridge, admin needs to set env_hdr_len manually. This is why I'm proposing manual operation. Regards, Toshiaki Makita

Re: [patch net / RFC] net: fec: increase frame size limitation to actually available buffer

2016-11-30 Thread Toshiaki Makita
problems. http://marc.info/?t=14749669155&r=1&w=2 http://marc.info/?t=14749669153&r=1&w=2 http://marc.info/?t=14749669152&r=1&w=2 http://marc.info/?t=14749669154&r=1&w=2 http://marc.info/?t=14749669151&r=1&w=2 It needs jumbo frame support of NICs though. Regards, Toshiaki Makita

Re: [PATCH] bridge: missing null bridge device check causing null pointer dereference (bugfix)

2014-11-06 Thread Toshiaki Makita
On 2014/11/06 16:58, 박수현 wrote: >> -Original Message- >> From: Toshiaki Makita [mailto:makita.toshi...@lab.ntt.co.jp] >> Sent: Thursday, November 06, 2014 4:07 PM >> To: 박수현; Stephen Hemminger; David S. Miller >> Cc: bri...@lists.linux-foundation.org; net...@

Re: [PATCH] bridge: missing null bridge device check causing null pointer dereference (bugfix)

2014-11-05 Thread Toshiaki Makita
r_data is non NULL. Thanks, Toshiaki Makita > > crash dump snippet: > > <1>BUG: unable to handle kernel NULL pointer dereference at 0021 > <1>IP: [] br_handle_frame+0xe6/0x270 > > <0>Code: 4c 0f 44 f0 89 f8 66 33 15 32 52 24 00 66 33 05 29 52

Re: [PATCH net] bridge: notify user space after fdb update

2014-05-29 Thread Toshiaki Makita
eply was directed > back onto the external network and VM never updated it's ARP cache. This patch > will notify the bridge command, after a fdb has been updated to identify such > port toggling. > > Signed-off-by: Jon Maxwell Acked-by: Toshiaki Makita -- To unsubscribe from

Re: [PATCH net] bridge: notify user space of fdb port change

2014-05-23 Thread Toshiaki Makita
. thank you for rewriting :) Thanks, Toshiaki Makita > > $ diff -Naur br_fdb.c br_fdb.c.patch > --- br_fdb.c2014-05-17 12:43:23.346319609 +1000 > +++ br_fdb.c.patch2014-05-17 16:54:46.280235728 +1000 > @@ -487,6 +487,7 @@ > { > struct hlist_head *he

Re: [PATCH net] bridge: notify user space of fdb port change

2014-05-13 Thread Toshiaki Makita
This notifies fdb entry before updating existing entry. Is this on purpose? I think we should notify the updated fdb entry. Similar code fdb_add_entry() does after updating it. Also, isn't it better to move update of dst into "if" block? if (source != fdb->dst) { fdb

Re: [Bridge] [PATCH 1/3] bridge: preserve random init MAC address

2014-03-19 Thread Toshiaki Makita
On Tue, 2014-03-18 at 18:10 -0700, Luis R. Rodriguez wrote: > On Tue, Mar 18, 2014 at 6:04 PM, Toshiaki Makita > wrote: > > (2014/03/19 9:50), Luis R. Rodriguez wrote: > >> On Tue, Mar 18, 2014 at 5:42 PM, Toshiaki Makita > >> wrote: > >>> nit, > >

Re: [PATCH 1/3] bridge: preserve random init MAC address

2014-03-18 Thread Toshiaki Makita
(2014/03/19 9:50), Luis R. Rodriguez wrote: > On Tue, Mar 18, 2014 at 5:42 PM, Toshiaki Makita > wrote: >> nit, >> If the last detached port happens to have the same addr as >> random_init_addr, this seems to call br_stp_change_bridge_id() even >> though bridge_i

Re: [PATCH 1/3] bridge: preserve random init MAC address

2014-03-18 Thread Toshiaki Makita
, addr)) > return false; /* no change */ > > + if (ether_addr_equal(addr, br_mac_zero)) > + addr = br->random_init_addr; > + > br_stp_change_bridge_id(br, addr); > return true; > } nit, If the last detached port happens to have t

Re: [PATCH 12/21] bridge: slight optimization of addr compare

2013-12-23 Thread Toshiaki Makita
ue but ether_addr_equal() cannot. br_stp_recalculate_bridge_id() is searching the smallest address among its ports. This change breaks it. Thanks, Toshiaki Makita -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/