Re: [PATCH] ipvs: Remove unused net variable from ip_vs_out

2015-10-05 Thread Julian Anastasov
Hello, On Fri, 2 Oct 2015, Simon Horman wrote: > Since 6f2bcea9917d ("ipvs: Pass ipvs into ip_vs_in_icmp and ip_vs_in_icmp_v6") > the net net variable in ip_vs_out() appears to be unused so remove it. > > Signed-off-by: Simon Horman > --- > net/netfilter/ipvs/ip_vs_core.c | 1 - > 1 f

Re: [PATCH v2 net-next] ipv4: Fix compilation errors in fib_rebalance

2015-10-05 Thread David Miller
From: Peter Nørlund Date: Tue, 6 Oct 2015 07:24:47 +0200 > This fixes > > net/built-in.o: In function `fib_rebalance': > fib_semantics.c:(.text+0x9df14): undefined reference to `__divdi3' > > and > > net/built-in.o: In function `fib_rebalance': > net/ipv4/fib_semantics.c:572: undefined refere

Re: [net-next:master 647/682] fib_semantics.c:undefined reference to `__divdi3'

2015-10-05 Thread David Miller
From: Peter Nørlund Date: Mon, 5 Oct 2015 23:31:58 +0200 > What is the proper way to supply fixes for this kind of errors? Should > I submit the original patches again with the bug fixed, or should I > submit a patch fixing this particular problem? I imagine bisecting > becomes annoying when a pa

Re: [PATCH net-next v2] net: Fix unused variable compile warning

2015-10-05 Thread David Miller
From: Cong Wang Date: Mon, 5 Oct 2015 10:53:57 -0700 > On Thu, Oct 1, 2015 at 8:49 AM, David Ahern wrote: >> Eric's net namespace changes in 1b75097dd7a26 leaves net unreferenced if >> CONFIG_IP_VS_IPV6 is not enabled: >> >> ../net/netfilter/ipvs/ip_vs_core.c: In function ‘ip_vs_out’: >> ../net/

Re: [PATCH] amd-xgbe: Check for successful buffer allocation before use

2015-10-05 Thread David Miller
From: Tom Lendacky Date: Mon, 5 Oct 2015 10:51:03 -0500 > The kasprintf function can return NULL if the allocation fails. Check for > successful allocation before attempting to use the returned buffer. > > Signed-off-by: Tom Lendacky Applied, thanks. -- To unsubscribe from this list: send the

Re: [PATCH 1/2] regmap: only call custom reg_update_bits() if reg is marked volatile

2015-10-05 Thread David Miller
From: Mark Brown Date: Mon, 5 Oct 2015 15:57:22 +0100 > On Mon, Oct 05, 2015 at 09:29:31AM -0400, j...@ringle.org wrote: >> From: Jon Ringle >> >> The only time that it makes sense to call a custom provided reg_update_bits >> function, is the register being updated is one that has volatile bits

Re: [PATCH net-next] net/mlx4_core: Test interrupts fail if not all comp vectors called request_irq

2015-10-05 Thread David Miller
From: Carol Soto Date: Mon, 5 Oct 2015 10:24:19 -0500 > > > On 10/4/2015 3:03 AM, Or Gerlitz wrote: >> On 9/29/2015 9:38 PM, cls...@linux.vnet.ibm.com wrote: >>> From: Carol L Soto >>> >>> Test interrupts fails if not all completion vectors called >>> request_irq. This case can happen if only

Re: [PATCH net-next v2 1/2] regmap: Allow installing custom reg_update_bits function

2015-10-05 Thread David Miller
From: Mark Brown Date: Mon, 5 Oct 2015 15:25:31 +0100 > On Mon, Oct 05, 2015 at 06:16:09AM -0700, David Miller wrote: > >> >> Applied. > >> > Thanks David. However, I've sent a v3 patch, and also expecting feedback >> > from Mark Brown on the regmap portion of it. > >> Please send me relative

linux-next: build failure after merge of the net-next tree

2015-10-05 Thread Stephen Rothwell
Hi all, After merging the net-next tree, today's linux-next build (i386 defconfig) failed like this: net/built-in.o: In function `fib_rebalance': fib_semantics.c:(.text+0x9d6d4): undefined reference to `__divdi3' Caused by commit 0e884c78ee19 ("ipv4: L3 hash-based multipath") I have reverted

[PATCH v2 net-next] ipv4: Fix compilation errors in fib_rebalance

2015-10-05 Thread Peter Nørlund
This fixes net/built-in.o: In function `fib_rebalance': fib_semantics.c:(.text+0x9df14): undefined reference to `__divdi3' and net/built-in.o: In function `fib_rebalance': net/ipv4/fib_semantics.c:572: undefined reference to `__aeabi_ldivmod' Fixes: 0e884c78ee19 ("ipv4: L3 hash-based multipath"

Re: [PATCH net-next] Fixes: 0e884c7 ipv4: L3 hash-based multipath: tag

2015-10-05 Thread Peter Nørlund
On Mon, 5 Oct 2015 15:23:10 -0700 Alexander Duyck wrote: > Normally the correct comment would include something like the > following just before the signed-off-by line. > Fixes: 0e884c78ee19 ("ipv4: L3 hash-based multipath") > Got it - I misunderstood the format. I'll submit a revised patc

Re: [patch net-next v2 06/13] rocker: introduce worlds infrastructure

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > This is another step on the way to per-world clean cut. Introduce world > ops hooks which each world can implement in world-specific way. > Also introduce world infrastructure including function for port worlds > change. >

Re: [patch net-next 05/14] rocker: implement set settings mode command

2015-10-05 Thread Scott Feldman
On Sun, Oct 4, 2015 at 2:25 PM, Jiri Pirko wrote: > From: Jiri Pirko > > Introduce a helper to ask HW for change of the port mode (world). > > Signed-off-by: Jiri Pirko Acked-by: Scott Feldman -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majo

Re: [patch net-next v2 04/13] rocker: push tlv processing into separate files

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > Carve out TLV processing helpers into separate files. > > Signed-off-by: Jiri Pirko Acked-by: Scott Feldman -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.

Re: [PATCH net] ppp: don't override sk->sk_state in pppoe_flush_dev()

2015-10-05 Thread Matt Bennett
> > The second one seems to be trickier. It looks like a race wrt. PADT > > message reception. Reproducing the bug will probably require to > > generate some PADT flooding to a host that creates and releases PPPoE > > connections. Ok I think I can see the potential race here, specifically the PADT

Re: [patch net-next v2 03/13] rocker: rename rocker.c to rocker_main.c

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > Since "rocker.c" is going to be split into multiple files, start with > renaming original "rocker.c" file to "rocker_main.c". Multiple code > parts are going to be cut from "rocker_main.c" later on. > > Signed-off-by: Jiri

Re: [patch net-next v2 02/13] rocker: rename rocker.h to rocker_hw.h

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > Since "rocker.h" file is going to be used for different purpose, > rename the hardware-specific header to "rocker_hw.h". > > Signed-off-by: Jiri Pirko Acked-by: Scott Feldman -- To unsubscribe from this list: send the li

Re: [patch net-next v2 01/13] rocker: remove unused rocker_port param from alloc funcs and shorten their names

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > No need to pass rocker_port around to alloc/free rocker functions, > since they now use switchdev_trans for memory management storage. > With the param removal, shorten the name of the functions since they now > has nothing

Re: [PATCH 01/15] pcnet32: use pci_set_dma_mask insted of pci_dma_supported

2015-10-05 Thread Don Fry
On Sat, 2015-10-03 at 17:19 +0200, Christoph Hellwig wrote: > This ensures the dma mask that is supported by the driver is recorded > in the device structure. > > Signed-off-by: Christoph Hellwig > --- > drivers/net/ethernet/amd/pcnet32.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) >

Re: [PATCH RFC 3/3] mlx4: Call skb_csum_offload_check to check offloadability

2015-10-05 Thread Alexander Duyck
On 10/05/2015 04:39 PM, Tom Herbert wrote: This provides an example of a driver calling the skb_csum_offload_check. Signed-off-by: Tom Herbert --- drivers/net/ethernet/mellanox/mlx4/en_netdev.c | 6 +++--- drivers/net/ethernet/mellanox/mlx4/en_tx.c | 20 +++- 2 files ch

[PATCH RFC v1 3/7] net/ncsi: Manage NCSI device

2015-10-05 Thread Gavin Shan
There are multiple packages and channels connecting to NCSI enabled interface. The available packages and channels are probed with NCSI packets when NCSI device is started. Among the available packages and channels, only one channel should be selected to be active to provide service. When the activ

[PATCH RFC v1 1/7] net/ncsi: Resource management

2015-10-05 Thread Gavin Shan
According to NCSI spec (DSP0222), the NCSI enabled interface can connected to multiple packages simultaneously, up to 8 packages. Each package includes multiple channels, up to 32 channels. At one moment, one channel is enabled to provide service to the NCSI enabled interface. Besides, each channel

[PATCH RFC v1 0/7] NCSI Support

2015-10-05 Thread Gavin Shan
This patchset is prototype requesting for comments. This series of patches intends to support NCSI stack, which is specified by DSP0222. One NCSI enabled interface potentially connects to multiple packages and channels, but there is one active channel at once when hardware arbitration is disabled.

Re: [patch net-next v2 00/13] rocker: add support for multiple worlds

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:43 AM, Jiri Pirko wrote: > From: Jiri Pirko > > This patchset allows new rocker worlds to be easily added in future (like eBPF > based one I have been working on). The main part of the patchset is the OF-DPA > carve-out. It resuts in OF-DPA specific file. Clean cut. > >

Re: [PATCH RFC 2/3] net: Add driver helper function to determine checksum offloadability

2015-10-05 Thread Alexander Duyck
On 10/05/2015 04:39 PM, Tom Herbert wrote: Add skb_csum_offload_chk driver helper function to determine if a device with limited checksum offload capabilities is able to offload the checksum for a given packet. This patch includes: - The skb_csum_offload_chk function. Returns true if checksum

[PATCH RFC v1 2/7] net/ncsi: Packet handler

2015-10-05 Thread Gavin Shan
NCSI packet encapsulated in ethernet frame is recognized by the ethernet protocol field (0x88F8). According to NCSI spec, the destination MAC field should be 0xFF's, but the source MAC field could be arbitrary one since channel field in NCSI header indicates the source of the packet. There are 3 t

[PATCH RFC v1 7/7] net/faraday: Enable offload checksum according to device-tree

2015-10-05 Thread Gavin Shan
This enables IP/UDP/TCP offload checksum according to information passed on from bootloader through device-tree. The offload doesn't working properly when the interface works in NCSI mode. Signed-off-by: Gavin Shan --- drivers/net/ethernet/faraday/ftgmac100.c | 6 +- 1 file changed, 5 insert

[PATCH RFC v1 4/7] net/ncsi: Netlink support

2015-10-05 Thread Gavin Shan
This adds netlink support so that userland can retrieve the NCSI topology on the specified interface. Also, more netlink commands are introduced to retrieve information from the active channel or configure the active channel with provided options. Signed-off-by: Gavin Shan --- include/uapi/linux

[PATCH RFC v1 5/7] net/faraday: Replace use_nc_si with use_ncsi

2015-10-05 Thread Gavin Shan
The patch replaces variable name "use_nc_si" with "use_ncsi". No function changed. Signed-off-by: Gavin Shan --- drivers/net/ethernet/faraday/ftgmac100.c | 14 +++--- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/drivers/net/ethernet/faraday/ftgmac100.c b/drivers/net/eth

[PATCH RFC v1 6/7] net/faraday: Enable NCSI interface

2015-10-05 Thread Gavin Shan
The NIC has the possibility to connect to NCSI package and channel. This supports NCSI enabled interface. When the network device is registered, the accompanying NCSI device is registered. When the interface is to be brought up, the NCSI device is started to probe NCSI topology and choose one activ

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Alexei Starovoitov
On 10/5/15 3:14 PM, Daniel Borkmann wrote: One scenario that comes to mind ... what happens when there are kernel pointers stored in skb->cb[] (either from the current layer or an old one from a different layer that the skb went through previously, but which did not get overwritten)? Socket filt

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Alexei Starovoitov
On 10/5/15 3:02 PM, Kees Cook wrote: the array maps that hold FDs (BPF_MAP_TYPE_PROG_ARRAY and >BPF_MAP_TYPE_PERF_EVENT_ARRAY) don't have lookup/update accessors >from the program side, so programs cannot see or manipulate >those pointers. >For the former only bpf_tail_call() is allowed that take

Re: [PATCH net-next V14 3/3] openvswitch: 802.1ad: Flow handling, actions, vlan parsing and netlink attributes

2015-10-05 Thread Pravin Shelar
On Wed, Sep 30, 2015 at 8:33 PM, Thomas F Herbert wrote: > Add support for 802.1ad including the ability to push and pop double > tagged vlans. Add support for 802.1ad to netlink parsing and flow > conversion. Uses double nested encap attributes to represent double > tagged vlan. Inner TPID encode

Re: [PATCH net] ppp: don't override sk->sk_state in pppoe_flush_dev()

2015-10-05 Thread Matt Bennett
On Mon, 2015-10-05 at 14:24 +0200, Guillaume Nault wrote: > On Mon, Oct 05, 2015 at 04:08:51AM +, Matt Bennett wrote: > > Hi, I am seeing this panic occur occasionally however I am unsure how to > > go about reproducing it. Is it enough to simply keep creating and > > tearing down the PPP inter

linux-next: manual merge of the net-next tree with the ipsec tree

2015-10-05 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the net-next tree got a conflict in: net/ipv6/xfrm6_output.c between commit: 93efac3f2e03 ("ipv6: Fix IPsec pre-encap fragmentation check") from the ipsec tree and commit: 7d8c6e391575 ("ipv6: Pass struct net through ip6_fragment") from the net-next

linux-next: manual merge of the net-next tree with the net tree

2015-10-05 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the net-next tree got a conflict in: net/ipv4/inet_connection_sock.c between commit: 2306c704ce28 ("inet: fix race in reqsk_queue_unlink()") from the net tree and commit: 079096f103fa ("tcp/dccp: install syn_recv requests into ehash table") from the

linux-next: manual merge of the net-next tree with the net tree

2015-10-05 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the net-next tree got a conflict in: drivers/net/usb/asix_common.c between commit: f6194bcf03e4 ("net: usb: asix: Fix crash on skb alloc failure") from the net tree and commit: 6a570814cd43 ("asix: Continue processing URB if no RX netdev buffer") (amo

Re: [MM PATCH V4.1 5/6] slub: support for bulk free with SLUB freelists

2015-10-05 Thread Jesper Dangaard Brouer
On Mon, 5 Oct 2015 21:26:39 +0200 Jesper Dangaard Brouer wrote: > My only problem left, is I want a perf measurement that pinpoint these > kind of spots. The difference in L1-icache-load-misses were significant > (1,278,276 vs 2,719,158). I tried to somehow perf record this with > different per

[PATCH RFC 3/3] mlx4: Call skb_csum_offload_check to check offloadability

2015-10-05 Thread Tom Herbert
This provides an example of a driver calling the skb_csum_offload_check. Signed-off-by: Tom Herbert --- drivers/net/ethernet/mellanox/mlx4/en_netdev.c | 6 +++--- drivers/net/ethernet/mellanox/mlx4/en_tx.c | 20 +++- 2 files changed, 18 insertions(+), 8 deletions(-) diff --

[PATCH RFC 2/3] net: Add driver helper function to determine checksum offloadability

2015-10-05 Thread Tom Herbert
Add skb_csum_offload_chk driver helper function to determine if a device with limited checksum offload capabilities is able to offload the checksum for a given packet. This patch includes: - The skb_csum_offload_chk function. Returns true if checksum is offloadable, else false. Optionally, i

[PATCH RFC 1/3] net: Add skb_inner_transport_offset function

2015-10-05 Thread Tom Herbert
Same thing as skb_transport_offset but returns the offset of the inner transport header (when skb->encpasulation is set). Signed-off-by: Tom Herbert --- include/linux/skbuff.h | 5 + 1 file changed, 5 insertions(+) diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index 4398411..

[PATCH RFC 0/3] net: Add driver helper function to determine if checksum is offloadable

2015-10-05 Thread Tom Herbert
When drivers have support for offloading transport IP checksums, they will indicate this in the features for the device. As described in skbuff.h, a driver will usually advertise NETIF_F_HW_CSUM, NETIF_F_IP_CSUM, and/or NETIF_F_IPV6_CSUM. The first of these (NETIF_F_HW_CSUM) is the preferred method

Re: [PATCH net-next] Fixes: 0e884c7 ipv4: L3 hash-based multipath: tag

2015-10-05 Thread Tom Herbert
On Mon, Oct 5, 2015 at 3:23 PM, Alexander Duyck wrote: > On 10/05/2015 03:14 PM, Peter Nørlund wrote: >> >> commit 0e884c78ee19e902f300ed147083c28a0c6302f0 ("ipv4: L3 hash-based >> multipath") broke compilation for i386 and arm due to dependency on >> 64-bit division. >> >> The problem is simply s

Re: Glibc recvmsg from kernel netlink socket hangs forever

2015-10-05 Thread Guenter Roeck
On 10/05/2015 04:26 PM, Steven Schlansker wrote: On Sep 25, 2015, at 7:58 PM, Guenter Roeck wrote: On 09/25/2015 02:37 PM, Steven Schlansker wrote: Thank you for the patches to try, I'll build a kernel with them early next week and report back. It sounds like it may not match my problem e

Re: Glibc recvmsg from kernel netlink socket hangs forever

2015-10-05 Thread Steven Schlansker
On Sep 25, 2015, at 7:58 PM, Guenter Roeck wrote: > On 09/25/2015 02:37 PM, Steven Schlansker wrote: >> >> >> Thank you for the patches to try, I'll build a kernel with them early next >> week >> and report back. It sounds like it may not match my problem exactly so we'll >> see. >> > > Fo

Re: [MM PATCH V4.1 5/6] slub: support for bulk free with SLUB freelists

2015-10-05 Thread Jesper Dangaard Brouer
(trimmed Cc list a little) On Mon, 5 Oct 2015 14:20:45 -0700 Andi Kleen wrote: > > My only problem left, is I want a perf measurement that pinpoint these > > kind of spots. The difference in L1-icache-load-misses were significant > > (1,278,276 vs 2,719,158). I tried to somehow perf record thi

[PATCHv3 net 6/6] openvswitch: Change CT_ATTR_FLAGS to CT_ATTR_COMMIT

2015-10-05 Thread Joe Stringer
Previously, the CT_ATTR_FLAGS attribute, when nested under the OVS_ACTION_ATTR_CT, encoded a 32-bit bitmask of flags that modify the semantics of the ct action. It's more extensible to just represent each flag as a nested attribute, and this requires no additional error checking to reject flags tha

[PATCHv3 net 1/6] openvswitch: Fix typos in CT headers

2015-10-05 Thread Joe Stringer
These comments hadn't caught up to their implementations, fix them. Fixes: 7f8a436 "openvswitch: Add conntrack action" Signed-off-by: Joe Stringer Acked-by: Pravin B Shelar --- v3: No change. v2: Acked. --- include/uapi/linux/openvswitch.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(

[PATCHv3 net 5/6] openvswitch: Extend ct_state match field to 32 bits

2015-10-05 Thread Joe Stringer
The ct_state field was initially added as an 8-bit field, however six of the bits are already being used and use cases are already starting to appear that may push the limits of this field. This patch extends the field to 32 bits while retaining the internal representation of 8 bits. This should co

[PATCHv3 net 3/6] openvswitch: Ensure flow is valid before executing ct

2015-10-05 Thread Joe Stringer
The ct action uses parts of the flow key, so we need to ensure that it is valid before executing that action. Fixes: 7f8a436 "openvswitch: Add conntrack action" Signed-off-by: Joe Stringer Acked-by: Pravin B Shelar --- v3: No change. v2: Acked. --- net/openvswitch/actions.c | 6 ++ 1 file c

[PATCHv3 net 2/6] openvswitch: Fix skb leak in ovs_fragment()

2015-10-05 Thread Joe Stringer
If ovs_fragment() was unable to fragment the skb due to an L2 header that exceeds the supported length, skbs would be leaked. Fix the bug. Fixes: 7f8a436 "openvswitch: Add conntrack action" Signed-off-by: Joe Stringer Acked-by: Pravin B Shelar --- v3: Acked. v2: Drop if condition by returning in

[PATCHv3 net 0/6] OVS conntrack fixes for net

2015-10-05 Thread Joe Stringer
The userspace side of the Open vSwitch conntrack changes is currently undergoing review, which has highlighted some minor bugs in the existing conntrack implementation in the kernel, as well as pointing out some future-proofing that can be done on the interface to reduce the need for additional com

[PATCHv3 net 4/6] openvswitch: Reject ct_state unsupported bits

2015-10-05 Thread Joe Stringer
Previously, if userspace specified ct_state bits in the flow key which are currently undefined (and therefore unsupported), then they would be ignored. This could cause unexpected behaviour in future if userspace is extended to support additional bits but attempts to communicate with the current ve

Re: [PATCH net-next] Fixes: 0e884c7 ipv4: L3 hash-based multipath: tag

2015-10-05 Thread Alexander Duyck
On 10/05/2015 03:14 PM, Peter Nørlund wrote: commit 0e884c78ee19e902f300ed147083c28a0c6302f0 ("ipv4: L3 hash-based multipath") broke compilation for i386 and arm due to dependency on 64-bit division. The problem is simply solved by using the proper macro for 64-bit divison. Signed-off-by: Peter

[PATCH net-next] Fixes: 0e884c7 ipv4: L3 hash-based multipath: tag

2015-10-05 Thread Peter Nørlund
commit 0e884c78ee19e902f300ed147083c28a0c6302f0 ("ipv4: L3 hash-based multipath") broke compilation for i386 and arm due to dependency on 64-bit division. The problem is simply solved by using the proper macro for 64-bit divison. Signed-off-by: Peter Nørlund --- net/ipv4/fib_semantics.c | 4 ++-

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Daniel Borkmann
On 10/05/2015 10:48 PM, Alexei Starovoitov wrote: In order to let unprivileged users load and execute eBPF programs teach verifier to prevent pointer leaks. Verifier will prevent - any arithmetic on pointers (except R10+Imm which is used to compute stack addresses) - comparison of pointers - p

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Kees Cook
On Mon, Oct 5, 2015 at 2:12 PM, Alexei Starovoitov wrote: > On 10/5/15 2:00 PM, Kees Cook wrote: >> >> On Mon, Oct 5, 2015 at 1:48 PM, Alexei Starovoitov >> wrote: >>> >>> >In order to let unprivileged users load and execute eBPF programs >>> >teach verifier to prevent pointer leaks. >>> >Verifier

Re: [PATCH 3.19 and earlier] fib_rules: Fix dump_rules() not to exit early

2015-10-05 Thread Jiri Slaby
On 10/05/2015, 07:29 PM, Roland Dreier wrote: > From: Roland Dreier > > Backports of 41fc014332d9 ("fib_rules: fix fib rule dumps across > multiple skbs") introduced a regression in "ip rule show" - it ends up > dumping the first rule over and over and never exiting, because 3.19 > and earlier ar

Re: simplify configfs attributes V2

2015-10-05 Thread Andrew Morton
On Sat, 3 Oct 2015 15:32:36 +0200 Christoph Hellwig wrote: > This series consolidates the code to implement configfs attributes > by providing the ->show and ->store method in common code and using > container_of in the methods to access the containing structure. > > This reduces source and bin

Re: [net-next:master 647/682] fib_semantics.c:undefined reference to `__divdi3'

2015-10-05 Thread Florian Westphal
Peter Nørlund wrote: > What is the proper way to supply fixes for this kind of errors? Should > I submit the original patches again with the bug fixed, or should I > submit a patch fixing this particular problem? The latter, relative fix, with 'Fixes: ("name of commit") tag'. -- To unsubscribe f

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Alexei Starovoitov
On 10/5/15 2:16 PM, Andy Lutomirski wrote: On Mon, Oct 5, 2015 at 2:12 PM, Alexei Starovoitov wrote: On 10/5/15 2:00 PM, Kees Cook wrote: On Mon, Oct 5, 2015 at 1:48 PM, Alexei Starovoitov wrote: In order to let unprivileged users load and execute eBPF programs teach verifier to prevent po

Re: [net-next:master 647/682] fib_semantics.c:undefined reference to `__divdi3'

2015-10-05 Thread Peter Nørlund
On Mon, 05 Oct 2015 04:26:38 -0700 (PDT) David Miller wrote: > From: kbuild test robot > Date: Mon, 5 Oct 2015 18:54:18 +0800 > > > tree: > > https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git > > master head: 937317c7c1097aa878a5000e3aab616eb5c590c0 commit: > > 0e884c78ee19e9

Re: [MM PATCH V4.1 5/6] slub: support for bulk free with SLUB freelists

2015-10-05 Thread Andi Kleen
> My only problem left, is I want a perf measurement that pinpoint these > kind of spots. The difference in L1-icache-load-misses were significant > (1,278,276 vs 2,719,158). I tried to somehow perf record this with > different perf events without being able to pinpoint the location (even > thoug

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Andy Lutomirski
On Mon, Oct 5, 2015 at 2:12 PM, Alexei Starovoitov wrote: > On 10/5/15 2:00 PM, Kees Cook wrote: >> >> On Mon, Oct 5, 2015 at 1:48 PM, Alexei Starovoitov >> wrote: >>> >>> >In order to let unprivileged users load and execute eBPF programs >>> >teach verifier to prevent pointer leaks. >>> >Verifier

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Alexei Starovoitov
On 10/5/15 2:00 PM, Kees Cook wrote: On Mon, Oct 5, 2015 at 1:48 PM, Alexei Starovoitov wrote: >In order to let unprivileged users load and execute eBPF programs >teach verifier to prevent pointer leaks. >Verifier will prevent >- any arithmetic on pointers > (except R10+Imm which is used to c

Re: [PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Kees Cook
On Mon, Oct 5, 2015 at 1:48 PM, Alexei Starovoitov wrote: > In order to let unprivileged users load and execute eBPF programs > teach verifier to prevent pointer leaks. > Verifier will prevent > - any arithmetic on pointers > (except R10+Imm which is used to compute stack addresses) > - comparis

[PATCH net-next 0/2] bpf: unprivileged

2015-10-05 Thread Alexei Starovoitov
I think it is time to liberate eBPF from CAP_SYS_ADMIN. As was discussed when eBPF was first introduced two years ago the only piece missing in eBPF verifier is 'pointer leak detection' to make it available to non-root users. Patch 1 adds this pointer analysis. The eBPF programs, obviously, need to

[PATCH net-next 1/2] bpf: enable non-root eBPF programs

2015-10-05 Thread Alexei Starovoitov
In order to let unprivileged users load and execute eBPF programs teach verifier to prevent pointer leaks. Verifier will prevent - any arithmetic on pointers (except R10+Imm which is used to compute stack addresses) - comparison of pointers - passing pointers to helper functions - indirectly pass

[PATCH net-next 2/2] bpf: charge user for creation of BPF maps and programs

2015-10-05 Thread Alexei Starovoitov
since eBPF programs and maps use kernel memory consider it 'locked' memory from user accounting point of view and charge it against RLIMIT_MEMLOCK limit. This limit is typically set to 64Kbytes by distros, so almost all bpf+tracing programs would need to increase it, since they use maps, but kernel

Re: HW communication debugging interface - ideas?

2015-10-05 Thread Jiri Pirko
Mon, Oct 05, 2015 at 08:32:33PM CEST, marcelo.leit...@gmail.com wrote: >On Wed, Sep 30, 2015 at 03:51:41PM +0200, Jiri Pirko wrote: >> Hi Dave/all. >> >> There is quite common for drivers to speak with HW using "packet-like" >> messages. In our case, we put message into skb and push that out as >>

Re: [PATCH] ovs: do not allocate memory from offline numa node

2015-10-05 Thread Alexander Duyck
On 10/05/2015 06:59 AM, Vlastimil Babka wrote: On 10/02/2015 12:18 PM, Konstantin Khlebnikov wrote: When openvswitch tries allocate memory from offline numa node 0: stats = kmem_cache_alloc_node(flow_stats_cache, GFP_KERNEL | __GFP_ZERO, 0) It catches VM_BUG_ON(nid < 0 || nid >= MAX_NUMNODES ||

Re: [RFC PATCH] Fix false positives in can_checksum_protocol()

2015-10-05 Thread David Woodhouse
On Mon, 2015-10-05 at 09:23 -0700, Tom Herbert wrote: > > 1) Drivers may advertise NETIF_F_HW_CSUM. The stack will indicate > checksum offload exclusively using the > CHECKSUM_PARTIAL/csum_start/csum_offset interface. No additional > interfaces (bits in skbuff should not be needed) > 2) A driver m

Re: [PATCH net-next] net/mlx4_core: Test interrupts fail if not all comp vectors called request_irq

2015-10-05 Thread Or Gerlitz
On Mon, Oct 5, 2015 at 6:24 PM, Carol Soto wrote: > > > On 10/4/2015 3:03 AM, Or Gerlitz wrote: >> >> On 9/29/2015 9:38 PM, cls...@linux.vnet.ibm.com wrote: >>> >>> From: Carol L Soto >>> >>> Test interrupts fails if not all completion vectors called >>> request_irq. This case can happen if only

[PATCH net-next 0/2] sock_diag: introducing udp_info

2015-10-05 Thread Craig Gallek
From: Craig Gallek These patches introduce a structure for reporting udp statistics through netlink. Simple datagram and byte counters are included. Craig Gallek (2): sock_diag: create udp_info for udp socket stats sock_diag: initial udp_info metrics include/linux/inet_diag.h | 1 +

[PATCH net-next 1/2] sock_diag: create udp_info for udp socket stats

2015-10-05 Thread Craig Gallek
From: Craig Gallek struct udp_info is intended to be the UDP equivalent of tcp_info for the INET_DIAG_INFO netlink attribute of TCPDIAG_GETSOCK and SOCK_DIAG_BY_FAMILY. Unfortunately, since clients may assume that all instances of the INET_DIAG_INFO response attribute are serialized versions of

[PATCH net-next 2/2] sock_diag: initial udp_info metrics

2015-10-05 Thread Craig Gallek
From: Craig Gallek Define per-UDP socket metrics for counting datagrams in and out and bytes in and out. These four metrics are also exposed though the INET_DIAG_UDP_INFO netlink attribute of the SOCK_DIAG_BY_FAMILY interface. Performance test configuration to maximize cache misses across CPU s

Re: [PATCH net] openvswitch: Fix egress tunnel info.

2015-10-05 Thread Pravin Shelar
On Mon, Oct 5, 2015 at 11:40 AM, Jiri Benc wrote: > On Mon, 5 Oct 2015 10:58:17 -0700, Pravin B Shelar wrote: >> --- a/drivers/net/vxlan.c >> +++ b/drivers/net/vxlan.c >> @@ -2337,6 +2337,51 @@ static int vxlan_change_mtu(struct net_device *dev, >> int new_mtu) >> return 0; >> } >> >> +st

Re: [MM PATCH V4.1 5/6] slub: support for bulk free with SLUB freelists

2015-10-05 Thread Jesper Dangaard Brouer
On Fri, 2 Oct 2015 14:50:44 -0700 Andrew Morton wrote: > On Fri, 2 Oct 2015 15:40:39 +0200 Jesper Dangaard Brouer > wrote: > > > > Thus, I need introducing new code like this patch and at the same time > > > have to reduce the number of instruction-cache misses/usage. In this > > > case we so

Request for stable-4.1.y stable inclusion

2015-10-05 Thread Charles (Chas) Williams
Hello Dave, Could you please backport the following to stable-4.1.y: commit 74e98eb085889b0d2d4908f59f6e00026063014f -- RDS: verify the underlying transport exists before creating a connection This fixes CVE-2015-6937. commit 48900cb6af4282fa0fb6ff4d72a81aa3dadb5

Re: [PATCH 12/12] [RFC] can: avoid using timeval for uapi

2015-10-05 Thread Oliver Hartkopp
Hello Arnd, thanks for picking up this y2038 api issue. On 09/30/2015 01:26 PM, Arnd Bergmann wrote: > The can subsystem communicates with user space using a bcm_msg_head > header, which contains two timestamps. This is problematic for > multiple reasons: > > a) The structure layout is currently

Re: [PATCH net] openvswitch: Fix egress tunnel info.

2015-10-05 Thread Jiri Benc
On Mon, 5 Oct 2015 10:58:17 -0700, Pravin B Shelar wrote: > --- a/drivers/net/vxlan.c > +++ b/drivers/net/vxlan.c > @@ -2337,6 +2337,51 @@ static int vxlan_change_mtu(struct net_device *dev, > int new_mtu) > return 0; > } > > +static int egress_ipv4_tun_info(struct net_device *dev, struc

Re: HW communication debugging interface - ideas?

2015-10-05 Thread Marcelo Ricardo Leitner
On Wed, Sep 30, 2015 at 03:51:41PM +0200, Jiri Pirko wrote: > Hi Dave/all. > > There is quite common for drivers to speak with HW using "packet-like" > messages. In our case, we put message into skb and push that out as > an ordinary packet. HW then sends us reply in a packet, similar to other > r

Re: [PATCH v3 05/14] RDS: defer the over_batch work to send worker

2015-10-05 Thread santosh shilimkar
On 10/5/2015 10:56 AM, Santosh Shilimkar wrote: Darn. Header hunk remained in the repo. Resending it. From 4bebdd7a4d2960b2ff6c40b27156d041ea270765 Mon Sep 17 00:00:00 2001 From: Santosh Shilimkar Date: Thu, 10 Sep 2015 11:57:14 -0700 Subject: [PATCH v3 05/14] RDS: defer the over_batch work t

Re: [RFC PATCH] Fix false positives in can_checksum_protocol()

2015-10-05 Thread Rustad, Mark D
> On Oct 5, 2015, at 9:23 AM, Tom Herbert wrote: > > 4) To help drivers for devices with limited offload capabilities we'll > define a helper function to check for typical restrictions (.e.g. IPv4 > only, TCP/UDP only. no encapsulation, no IPv6 extension headers, > etc.). I am working on this hel

Re: [PATCH net-next] net: Lookup actual route when oif is VRF device

2015-10-05 Thread David Ahern
On 10/5/15 12:01 PM, kbuild test robot wrote: Hi David, [auto build test ERROR on v4.3-rc4 -- if it's inappropriate base, please ignore] net-next patches can *not* be applied to Linus' tree. If you are going to run the build bot for patches submitted to netdev, please be sure to apply those

Re: [PATCH net-next v2 4/4] openvswitch: IPv6 support for ovs_tunnel_get_egress_info

2015-10-05 Thread Pravin Shelar
On Fri, Oct 2, 2015 at 5:57 PM, Jesse Gross wrote: > On Fri, Oct 2, 2015 at 12:32 PM, Pravin Shelar wrote: >> On Thu, Oct 1, 2015 at 11:00 PM, Jiri Benc wrote: >>> On Thu, 1 Oct 2015 17:11:56 -0700, Pravin Shelar wrote: I dont see point of adding this code when IPv6 sampling not support by

Re: [PATCH net-next] net: Lookup actual route when oif is VRF device

2015-10-05 Thread kbuild test robot
Hi David, [auto build test ERROR on v4.3-rc4 -- if it's inappropriate base, please ignore] config: x86_64-randconfig-x002-201540 (attached as .config) reproduce: # save the attached .config to linux build tree make ARCH=x86_64 All error/warnings (new ones prefixed by >>): In

[PATCH v3 05/14] RDS: defer the over_batch work to send worker

2015-10-05 Thread Santosh Shilimkar
Current process gives up if its send work over the batch limit. The work queue will get kicked to finish off any other requests. This fixes remainder condition from commit 443be0e5affe ("RDS: make sure not to loop forever inside rds_send_xmit"). The restart condition is only for the case where we

[PATCH v3 03/14] RDS: fix rds_sock reference bug while doing bind

2015-10-05 Thread Santosh Shilimkar
One need to take rds socket reference while using it and release it once done with it. rds_add_bind() code path does not do that so lets fix it. Signed-off-by: Santosh Shilimkar Signed-off-by: Santosh Shilimkar --- net/rds/bind.c | 16 +++- 1 file changed, 11 insertions(+), 5 deleti

[PATCH v3 06/14] RDS: use rds_send_xmit() state instead of RDS_LL_SEND_FULL

2015-10-05 Thread Santosh Shilimkar
In Transport indepedent rds_sendmsg(), we shouldn't make decisions based on RDS_LL_SEND_FULL which is used to manage the ring for RDMA based transports. We can safely issue rds_send_xmit() and the using its return value take decision on deferred work. This will also fix the scenario where at times

[PATCH v3 09/14] RDS: IB: handle rds_ibdev release case instead of crashing the kernel

2015-10-05 Thread Santosh Shilimkar
Just in case we are still handling the QP receive completion while the rds_ibdev is released, drop the connection instead of crashing the kernel. Signed-off-by: Santosh Shilimkar Signed-off-by: Santosh Shilimkar --- net/rds/ib_cm.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff -

[PATCH v3 01/14] RDS: use kfree_rcu in rds_ib_remove_ipaddr

2015-10-05 Thread Santosh Shilimkar
synchronize_rcu() slowing down un-necessarily the socket shutdown path. It is used just kfree() the ip addresses in rds_ib_remove_ipaddr() which is perfect usecase for kfree_rcu(); So lets use that to gain some speedup. Signed-off-by: Santosh Shilimkar Signed-off-by: Santosh Shilimkar --- net/

[PATCH v3 08/14] RDS: IB: split send completion handling and do batch ack

2015-10-05 Thread Santosh Shilimkar
Similar to what we did with receive CQ completion handling, we split the transmit completion handler so that it lets us implement batched work completion handling. We re-use the cq_poll routine and makes use of RDS_IB_SEND_OP to identify the send vs receive completion event handler invocation. Si

[PATCH v3 04/14] RDS: Use per-bucket rw lock for bind hash-table

2015-10-05 Thread Santosh Shilimkar
One global lock protecting hash-tables with 1024 buckets isn't efficient and it shows up in a massive systems with truck loads of RDS sockets serving multiple databases. The perf data clearly highlights the contention on the rw lock in these massive workloads. When the contention gets worse, the c

[PATCH v3 00/14] RDS: connection scalability and performance improvements

2015-10-05 Thread Santosh Shilimkar
[v3] Updated patch "[PATCH v2 05/14] RDS: defer the over_batch work to send worker" as per David Miller's comment [4] to avoid the magic value usage. Patch now makes use of already available but unused send_batch_count module parameter. Rest of the patches are same as earlier version v2 [3] [v2]:

Re: [patch net-next v2 13/13] rocker: move OF-DPA stuff into separate file

2015-10-05 Thread Scott Feldman
On Mon, Oct 5, 2015 at 10:44 AM, Jiri Pirko wrote: > From: Jiri Pirko > > Carve out OF-DPA would specific code from the common file to the world > file. This change required struct rocker and struct rocker_port split > into world specific struct ofdpa and struct ofdpa_port. Along with this > the

[PATCH net] openvswitch: Fix egress tunnel info.

2015-10-05 Thread Pravin B Shelar
While transitioning to netdev based vport we broke OVS feature which allows user to retrieve tunnel packet egress information for lwtunnel devices. Following patch fixes it by introducing ndo operation to get the tunnel egress info. Same ndo operation can be used for lwtunnel devices and compat ov

[PATCH v3 12/14] RDS: IB: mark rds_ib_fmr_wq static

2015-10-05 Thread Santosh Shilimkar
Fix below warning by marking rds_ib_fmr_wq static net/rds/ib_rdma.c:87:25: warning: symbol 'rds_ib_fmr_wq' was not declared. Should it be static? Signed-off-by: Santosh Shilimkar Signed-off-by: Santosh Shilimkar --- net/rds/ib_rdma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[PATCH v3 10/14] RDS: IB: fix the rds_ib_fmr_wq kick call

2015-10-05 Thread Santosh Shilimkar
RDS IB mr pool has its own workqueue 'rds_ib_fmr_wq', so we need to use queue_delayed_work() to kick the work. This was hurting the performance since pool maintenance was less often triggered from other path. Signed-off-by: Santosh Shilimkar Signed-off-by: Santosh Shilimkar --- net/rds/ib_rdma.

[PATCH v3 02/14] RDS: make socket bind/release locking scheme simple and more efficient

2015-10-05 Thread Santosh Shilimkar
RDS bind and release locking scheme is very inefficient. It uses RCU for maintaining the bind hash-table which is great but it also needs to hold spinlock for [add/remove]_bound(). So overall usecase, the hash-table concurrent speedup doesn't pay off. In fact blocking nature of synchronize_rcu() ma

  1   2   3   >