On 16-11-02 09:11 PM, Michael S. Tsirkin wrote:
> On Wed, Nov 02, 2016 at 06:28:34PM -0700, Shrijeet Mukherjee wrote:
>>> -Original Message-
>>> From: Jesper Dangaard Brouer [mailto:bro...@redhat.com]
>>> Sent: Wednesday, November 2, 2016 7:27 AM
>>> To: Thomas Graf
>>> Cc: Shrijeet Mukher
On Wed, Nov 2, 2016 at 4:47 PM, Jakub Kicinski wrote:
>
> Thanks for looking into this! Bisect led me to the following commit:
>
> commit 56989f6d8568c21257dcec0f5e644d5570ba3281
> Author: Johannes Berg
> Date: Mon Oct 24 14:40:05 2016 +0200
>
> genetlink: mark families as __ro_after_init
On Wed, Nov 2, 2016 at 10:25 PM, Cong Wang wrote:
> On Wed, Nov 2, 2016 at 5:25 PM, Andrey Konovalov
> wrote:
>> Hi,
>>
>> I've got the following error report while running the syzkaller fuzzer:
>>
>> ==
>> BUG: KASAN: global-out-of
On Wed, Nov 2, 2016 at 5:25 PM, Andrey Konovalov wrote:
> Hi,
>
> I've got the following error report while running the syzkaller fuzzer:
>
> ==
> BUG: KASAN: global-out-of-bounds in validate_nla+0x49b/0x4e0 at addr
> 8407e3ac
Here we go.
The following program triggers kernel BUG in htab_elem_free.
On commit 0c183d92b20b5c84ca655b45ef57b3318b83eb9e (Oct 31).
Run as "while true; do ./a.out; done".
[ cut here ]
kernel BUG at mm/slub.c:3866!
invalid opcode: [#1] SMP KASAN
Modules linked in:
CP
On Wed, Nov 02, 2016 at 06:28:34PM -0700, Shrijeet Mukherjee wrote:
> > -Original Message-
> > From: Jesper Dangaard Brouer [mailto:bro...@redhat.com]
> > Sent: Wednesday, November 2, 2016 7:27 AM
> > To: Thomas Graf
> > Cc: Shrijeet Mukherjee ; Alexei Starovoitov
> > ; Jakub Kicinski ; Jo
From: Eric Dumazet
dccp_v6_err() does not use pskb_may_pull() and might access garbage.
We only need 4 bytes at the beginning of the DCCP header, like TCP,
so the 8 bytes pulled in icmpv6_notify() are more than enough.
Signed-off-by: Eric Dumazet
---
net/dccp/ipv6.c | 15 ---
1
From: Eric Dumazet
A recent commit removed locking from netlink_diag_dump() but forgot
one error case.
=
[ BUG: bad unlock balance detected! ]
4.9.0-rc3+ #336 Not tainted
-
syz-executor/4018 is trying to release lock ([ 36
Hi Eric,
This fixes the second report, the first one is still there.
Apparently these are two separate issues.
For the second one:
Tested-by: Andrey Konovalov
Thanks for the fix!
On Thu, Nov 3, 2016 at 3:58 AM, Eric Dumazet wrote:
> On Thu, 2016-11-03 at 03:36 +0100, Andrey Konovalov wrote:
>
From: Larry Finger
Date: Wed, 2 Nov 2016 20:00:03 -0500
> On 10/30/2016 05:21 AM, John Heenan wrote:
>> Code tests show data returned by rtl8xxxu_read8(priv, REG_CR), used to
>> set
>> macpower, is never 0xea. It is only ever 0x01 (first time after
>> modprobe)
>> using wpa_supplicant and 0x00 th
On Thu, 2016-11-03 at 03:36 +0100, Andrey Konovalov wrote:
> On Thu, Nov 3, 2016 at 1:15 AM, Andrey Konovalov
> wrote:
> > On Wed, Oct 19, 2016 at 4:13 PM, Andrey Konovalov
> > wrote:
> >> Hi,
> >>
> >> I've got the following error report while running the syzkaller fuzzer:
> >>
> >> kasan: CON
On Thu, Nov 3, 2016 at 1:15 AM, Andrey Konovalov wrote:
> On Wed, Oct 19, 2016 at 4:13 PM, Andrey Konovalov
> wrote:
>> Hi,
>>
>> I've got the following error report while running the syzkaller fuzzer:
>>
>> kasan: CONFIG_KASAN_INLINE enabled
>> kasan: GPF could be caused by NULL-ptr deref or us
From: Eric Dumazet
dccp_v4_err() does not use pskb_may_pull() and might access garbage.
We only need 4 bytes at the beginning of the DCCP header, like TCP,
so the 8 bytes pulled in icmp_socket_deliver() are more than enough.
This patch might allow to process more ICMP messages, as some routers
> -Original Message-
> From: Jesper Dangaard Brouer [mailto:bro...@redhat.com]
> Sent: Wednesday, November 2, 2016 7:27 AM
> To: Thomas Graf
> Cc: Shrijeet Mukherjee ; Alexei Starovoitov
> ; Jakub Kicinski ; John
> Fastabend ; David Miller
> ; alexander.du...@gmail.com; m...@redhat.com;
>
Hi Florian,
On Thu, Nov 3, 2016 at 8:58 AM, Florian Fainelli wrote:
> On 11/02/2016 05:52 PM, Gao Feng wrote:
>> Hi Cong,
>>
>> On Thu, Nov 3, 2016 at 4:22 AM, Cong Wang wrote:
>>> On Wed, Nov 2, 2016 at 2:59 AM, wrote:
From: Gao Feng
Current veth_xmit always returns NETDEV_TX_
From: Eric Dumazet
Andrey reported following warning while fuzzing with syzkaller
WARNING: CPU: 1 PID: 21072 at net/dccp/proto.c:83 dccp_set_state+0x229/0x290
Kernel panic - not syncing: panic_on_warn set ...
CPU: 1 PID: 21072 Comm: syz-executor Not tainted 4.9.0-rc1+ #293
Hardware name: QEMU S
On 10/30/2016 05:21 AM, John Heenan wrote:
Code tests show data returned by rtl8xxxu_read8(priv, REG_CR), used to set
macpower, is never 0xea. It is only ever 0x01 (first time after modprobe)
using wpa_supplicant and 0x00 thereafter using wpa_supplicant. These results
occurs with 'Fix for authent
On 10/30/2016 05:20 AM, John Heenan wrote:
This fix enables the same sequence of init behaviour as the alternative
working driver for the wireless rtl8723bu IC at
https://github.com/lwfinger/rtl8723bu
For exampe rtl8xxxu_init_device is now called each time
userspace wpa_supplicant is executed in
On 11/02/2016 05:52 PM, Gao Feng wrote:
> Hi Cong,
>
> On Thu, Nov 3, 2016 at 4:22 AM, Cong Wang wrote:
>> On Wed, Nov 2, 2016 at 2:59 AM, wrote:
>>> From: Gao Feng
>>>
>>> Current veth_xmit always returns NETDEV_TX_OK whatever if it is really
>>> sent successfully. Now return the actual value
Hi Cong,
On Thu, Nov 3, 2016 at 4:22 AM, Cong Wang wrote:
> On Wed, Nov 2, 2016 at 2:59 AM, wrote:
>> From: Gao Feng
>>
>> Current veth_xmit always returns NETDEV_TX_OK whatever if it is really
>> sent successfully. Now return the actual value instead of NETDEV_TX_OK
>> always.
>>
>> Signed-of
Hi,
I've got the following error report while running the syzkaller fuzzer:
==
BUG: KASAN: global-out-of-bounds in validate_nla+0x49b/0x4e0 at addr
8407e3ac
Read of size 2 by task a.out/3877
Address belongs to variable[<
Hi,
I've got the following error report while running the syzkaller fuzzer:
==
BUG: KASAN: global-out-of-bounds in validate_nla+0x49b/0x4e0 at addr
8407e3ac
Read of size 2 by task a.out/3877
Address belongs to variable[<
On Wed, Oct 19, 2016 at 4:13 PM, Andrey Konovalov wrote:
> Hi,
>
> I've got the following error report while running the syzkaller fuzzer:
>
> kasan: CONFIG_KASAN_INLINE enabled
> kasan: GPF could be caused by NULL-ptr deref or user memory access
> general protection fault: [#1] SMP KASAN
> M
From: Eric Dumazet
Andrey Konovalov reported following error while fuzzing with syzkaller :
IPv4: Attempt to release alive inet socket 880068e98940
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: [#1] SMP KA
You are a recipient to Mrs Julie Leach Donation of $2 million USD. Contact
(julieleach...@gmail.com) for claims
On Wed, 2 Nov 2016 13:30:34 -0700, Cong Wang wrote:
> On Tue, Nov 1, 2016 at 11:56 AM, Jakub Kicinski wrote:
> > On Tue, 1 Nov 2016 11:32:52 -0700, Cong Wang wrote:
> >> On Tue, Nov 1, 2016 at 10:28 AM, Jakub Kicinski wrote:
> >> > unreferenced object 0x8807389cba28 (size 128):
> >> > c
On Wed, Nov 2, 2016 at 3:37 PM, Sebastian Ott wrote:
> Hi,
>
> Ifup on an interface provided by CX4 (MLX5 driver) on s390 fails with:
>
> [ 22.318553] [ cut here ]
> [ 22.318564] WARNING: CPU: 1 PID: 399 at mm/page_alloc.c:3421
> __alloc_pages_nodemask+0x2ee/0x1298
> [
On Wed, Nov 2, 2016 at 3:57 PM, Thomas Graf wrote:
> On 1 November 2016 at 17:07, Tom Herbert wrote:
>> On the other hand, I'm not really sure how to implement for this level
>> of performance this in LWT+BPF either. It seems like one way to do
>> that would be to create a program each destinatio
> Do you expect to return an error if adjust_link is called with
> phydev->duplex == DUPLEX_UNKNOWN, or, do you expect to fallback to
> unforced duplex when setting such value?
ethtool(1) itself does not allow you to specify "unknown". It only
allows "full" or "half". So passing DUPLEX_UNKNOWN mea
On 2 November 2016 at 07:39, Roopa Prabhu wrote:
>> diff --git a/net/core/Makefile b/net/core/Makefile
>> index d6508c2..a675fd3 100644
>> --- a/net/core/Makefile
>> +++ b/net/core/Makefile
>> @@ -23,7 +23,7 @@ obj-$(CONFIG_NETWORK_PHY_TIMESTAMPING) += timestamping.o
>> obj-$(CONFIG_NET_PTP_CLASS
On 1 November 2016 at 17:07, Tom Herbert wrote:
> On the other hand, I'm not really sure how to implement for this level
> of performance this in LWT+BPF either. It seems like one way to do
> that would be to create a program each destination and set it each
> host. As you point out would create a
On 1 November 2016 at 16:12, Hannes Frederic Sowa
wrote:
> On 01.11.2016 21:59, Thomas Graf wrote:
>>> Dumping and verifying which routes get used might actually already be
>>> quite complex on its own. Thus my fear.
>>
>> We even have an API to query which route is used for a tuple. What
>> else
On Wed, Nov 2, 2016 at 1:14 PM, Willem de Bruijn
wrote:
> From: Willem de Bruijn
>
> The check argument is never used. This code has not changed since
> the original introduction in d96535a17dbb ("net: Infrastructure for
> checksum unnecessary conversions"). Remove the unused argument and
> updat
On Wed, Oct 19, 2016 at 6:57 PM, Marcelo Ricardo Leitner
wrote:
> On Wed, Oct 19, 2016 at 02:25:24PM +0200, Andrey Konovalov wrote:
>> Hi,
>>
>> I've got the following error report while running the syzkaller fuzzer:
>>
>> ==
>> BUG:
Hi Andrew,
Andrew Lunn writes:
> On Wed, Nov 02, 2016 at 02:07:09AM +0100, Vivien Didelot wrote:
>> Hi Andrew,
>>
>> Andrew Lunn writes:
>>
>> >> +#define LINK_UNKNOWN -1
>> >> +
>> >> + /* Port's MAC link state
>> >> + * LINK_UNKNOWN for normal link detection, 0 to force link down,
>> >
On Wed, Nov 2, 2016 at 5:41 PM, Eric Dumazet wrote:
> From: Eric Dumazet
>
> After my commit, tcp_sendmsg() might restart its loop after
> processing socket backlog.
>
> If sk_err is set, we blindly return an error, even though we
> copied data to user space before.
>
> We should instead return n
On Wed, Nov 2, 2016 at 2:08 PM, Tyler Baicar wrote:
> Move IRQ free code so that it will happen regardless of the
> link state. Currently the e1000e driver only releases its IRQ
> if the link is up. This is not sufficient because it is
> possible for a link to go down without releasing the IRQ. A
From: Eric Dumazet
After my commit, tcp_sendmsg() might restart its loop after
processing socket backlog.
If sk_err is set, we blindly return an error, even though we
copied data to user space before.
We should instead return number of bytes that could be copied,
otherwise user space might rese
On 10/27/2016 10:26 AM, Eric Dumazet wrote:
> On Wed, 2016-10-26 at 11:09 +1100, Jon Maxwell wrote:
>> We recently encountered a bug where a few customers using ibmveth on the
>> same LPAR hit an issue where a TCP session hung when large receive was
>> enabled. Closer analysis revealed that the se
On 11/2/16 7:14 AM, Cyrill Gorcunov wrote:
> unix, tcp, udp[lite], packet, netlink sockets already support diag
> interface for their collection and killing. Implement support
> for raw sockets.
>
> Signed-off-by: Cyrill Gorcunov
> ---
> include/linux/inet_diag.h | 15 +++
> misc/ss.
Hi,
I've got the following error report while running the syzkaller fuzzer:
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [< (null)>] (null)
PGD 66b6f067 [ 102.549865] PUD 66c6e067
PMD 0 [ 102.549865]
Oops: 0010 [#1] SMP KASAN
Modules linked in
On 11/2/16 2:13 PM, Andrey Konovalov wrote:
> I can confirm that this fixes the null-ptr-deref I've been getting.
>
Thanks, Andrey.
Move IRQ free code so that it will happen regardless of the
link state. Currently the e1000e driver only releases its IRQ
if the link is up. This is not sufficient because it is
possible for a link to go down without releasing the IRQ. A
secondary bus reset can cause this case to happen.
Signed-of
Hi,
I've got the following error report while running the syzkaller fuzzer:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: [#1] SMP KASAN
Modules linked in:
CPU: 0 PID: 4677 Comm: syz-executor Not tainted 4.9.0-
Some configurations (e.g. geneve interface with default
MTU of 1500 over an ethernet interface with 1500 MTU) result
in the transmission of packets that exceed the configured MTU.
While this should be considered to be a "bad" configuration,
it is still allowed and should not result in the sending
o
This introduces the Freescale Data Path Acceleration Architecture
(DPAA) Ethernet driver (dpaa_eth) that builds upon the DPAA QMan,
BMan, PAMU and FMan drivers to deliver Ethernet connectivity on
the Freescale DPAA QorIQ platforms.
Signed-off-by: Madalin Bucur
---
drivers/net/ethernet/freescale/
Signed-off-by: Madalin Bucur
---
arch/powerpc/configs/dpaa.config | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/powerpc/configs/dpaa.config b/arch/powerpc/configs/dpaa.config
index f124ee1..9ad9bc0 100644
--- a/arch/powerpc/configs/dpaa.config
+++ b/arch/powerpc/configs/dpaa.config
@@
This patch series adds the Ethernet driver for the Freescale
QorIQ Data Path Acceleration Architecture (DPAA).
This version includes changes following the feedback received
on previous versions from Eric Dumazet, Bob Cochran, Joe Perches,
Paul Bolle, Joakim Tjernlund, Scott Wood, David Miller - th
Signed-off-by: Madalin Bucur
---
drivers/net/ethernet/freescale/dpaa/Kconfig| 6 ++
drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 23 +++
2 files changed, 29 insertions(+)
diff --git a/drivers/net/ethernet/freescale/dpaa/Kconfig
b/drivers/net/ethernet/freescale/d
Introduce managed counterparts for alloc_percpu() and free_percpu().
Add devm_alloc_percpu() and devm_free_percpu() into the managed
interfaces list.
Signed-off-by: Madalin Bucur
---
Documentation/driver-model/devres.txt | 4 +++
drivers/base/devres.c | 66 ++
On Tue, Nov 1, 2016 at 11:56 AM, Jakub Kicinski wrote:
> On Tue, 1 Nov 2016 11:32:52 -0700, Cong Wang wrote:
>> On Tue, Nov 1, 2016 at 10:28 AM, Jakub Kicinski wrote:
>> > unreferenced object 0x8807389cba28 (size 128):
>> > comm "swapper/0", pid 1, jiffies 4294898463 (age 781.332s)
>> > h
Hi Eric,
Your patch fixes the issue.
Tested-by: Andrey Konovalov
Thanks!
On Wed, Nov 2, 2016 at 9:16 PM, Eric Dumazet wrote:
> On Wed, 2016-11-02 at 19:44 +0100, Andrey Konovalov wrote:
>> Hi,
>>
>> I've got the following error report while running the syzkaller fuzzer:
>>
>> IPv4: Attempt to
On Wed, Nov 2, 2016 at 2:59 AM, wrote:
> From: Gao Feng
>
> Current veth_xmit always returns NETDEV_TX_OK whatever if it is really
> sent successfully. Now return the actual value instead of NETDEV_TX_OK
> always.
>
> Signed-off-by: Gao Feng
> ---
> drivers/net/veth.c | 7 +--
> 1 file cha
Signed-off-by: Madalin Bucur
---
arch/powerpc/configs/dpaa.config | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/powerpc/configs/dpaa.config b/arch/powerpc/configs/dpaa.config
index efa99c0..f124ee1 100644
--- a/arch/powerpc/configs/dpaa.config
+++ b/arch/powerpc/configs/dpaa.config
@@
Signed-off-by: Madalin Bucur
---
arch/powerpc/configs/dpaa.config | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/powerpc/configs/dpaa.config b/arch/powerpc/configs/dpaa.config
index 9ad9bc0..2fe76f5 100644
--- a/arch/powerpc/configs/dpaa.config
+++ b/arch/powerpc/configs/dpaa.config
@@
Add a series of counters to be exported through ethtool:
- add detailed counters for reception errors;
- add detailed counters for QMan enqueue reject events;
- count the number of fragmented skbs received from the stack;
- count all frames received on the Tx confirmation path;
- add congestion gro
Add support for basic ethtool operations.
Signed-off-by: Madalin Bucur
---
drivers/net/ethernet/freescale/dpaa/Makefile | 2 +-
drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 2 +
drivers/net/ethernet/freescale/dpaa/dpaa_eth.h | 3 +
drivers/net/ethernet/freescale/dpaa/dpaa
Add trace points on the hot processing path.
Signed-off-by: Ruxandra Ioana Radulescu
---
drivers/net/ethernet/freescale/dpaa/Makefile | 1 +
drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 15 +++
drivers/net/ethernet/freescale/dpaa/dpaa_eth.h | 1 +
.../net/ethernet/freescal
Hi Lance,
[auto build test WARNING on net/master]
url:
https://github.com/0day-ci/linux/commits/Lance-Richardson/ipv4-allow-local-fragmentation-in-ip_finish_output_gso/20161103-040904
config: x86_64-randconfig-x014-201644 (attached as .config)
compiler: gcc-6 (Debian 6.2.0-3) 6.2.0 20160901
r
Export Frame Queue and Buffer Pool IDs through sysfs.
Signed-off-by: Madalin Bucur
---
drivers/net/ethernet/freescale/dpaa/Makefile | 2 +-
drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 4 +
drivers/net/ethernet/freescale/dpaa/dpaa_eth.h | 4 +
.../net/ethernet/freescale/d
On Wed, 2016-11-02 at 19:44 +0100, Andrey Konovalov wrote:
> Hi,
>
> I've got the following error report while running the syzkaller fuzzer:
>
> IPv4: Attempt to release alive inet socket 880068e98940
> kasan: CONFIG_KASAN_INLINE enabled
> kasan: GPF could be caused by NULL-ptr deref or user
From: Willem de Bruijn
The check argument is never used. This code has not changed since
the original introduction in d96535a17dbb ("net: Infrastructure for
checksum unnecessary conversions"). Remove the unused argument and
update all callers.
Signed-off-by: Willem de Bruijn
---
include/linux/
I can confirm that this fixes the null-ptr-deref I've been getting.
Tested-by: Andrey Konovalov
On Wed, Nov 2, 2016 at 8:08 PM, David Ahern wrote:
> Andrey reported the following error report while running the syzkaller
> fuzzer:
>
> general protection fault: [#1] SMP KASAN
> Dumping ftrac
- Original Message -
> From: "Florian Westphal"
> To: "Lance Richardson"
> Cc: netdev@vger.kernel.org, f...@strlen.de, jtl...@redhat.com
> Sent: Wednesday, November 2, 2016 1:20:36 PM
> Subject: Re: [PATCH net] ipv4: allow local fragmentation in
> ip_finish_output_gso()
>
> Lance Rich
Some configurations (e.g. geneve interface with default
MTU of 1500 over an ethernet interface with 1500 MTU) result
in the transmission of packets that exceed the configured MTU.
While this should be considered to be a "bad" configuration,
it is still allowed and should not result in the sending
o
On Tue, Nov 1, 2016 at 6:54 PM, Eric Dumazet wrote:
> On Tue, 2016-11-01 at 16:04 -0700, Cong Wang wrote:
>> Andrey reported this kernel warning:
>
>> Unlike commit 26cabd31259ba43f68026ce3f62b78094124333f
>> ("sched, net: Clean up sk_wait_event() vs. might_sleep()"), the
>> sleeping function is c
On 11/02/2016 08:24 PM, Jon Mason wrote:
Clean-up the documentation to the bgmac-amac driver, per suggestion by
Rob Herring, and add details for NS2 support.
Signed-off-by: Jon Mason
---
Documentation/devicetree/bindings/net/brcm,amac.txt | 16 +++-
1 file changed, 11 insertions(+),
From: Wei Yongjun
Date: Wed, 2 Nov 2016 12:49:57 +
> From: Wei Yongjun
>
> Remove including that don't need it.
>
> Signed-off-by: Wei Yongjun
Applied.
From: Dongli Zhang
Date: Wed, 2 Nov 2016 09:04:33 +0800
> IS_ERR_VALUE() in commit 87557efc27f6a50140fb20df06a917f368ce3c66
> ("xen-netfront: do not cast grant table reference to signed short") would
> not return true for error code unless we cast ref first to type int.
>
> Signed-off-by: Dongl
From: Govindarajulu Varadarajan
Date: Tue, 1 Nov 2016 17:58:50 -0700
> From: Govindarajulu Varadarajan <_gov...@gmx.com>
>
> Driver sets the skb l4/l3 hash based on NIC_CFG_RSS_HASH_TYPE_*,
> which is bit mask. This is wrong. Hw actually provides us enum.
> Use CQ_ENET_RQ_DESC_RSS_TYPE_* to set
> -Original Message-
> From: David Miller [mailto:da...@davemloft.net]
> Sent: Wednesday, November 02, 2016 3:25 PM
> To: Woojung Huh - C21699
> Cc: netdev@vger.kernel.org; f.faine...@gmail.com; and...@lunn.ch;
> UNGLinuxDriver
> Subject: Re: [PATCH v4 net-next] lan78xx: Use irq_domain for
From: Philippe Reynes
Date: Wed, 2 Nov 2016 00:11:51 +0100
> The ethtool api {get|set}_settings is deprecated.
> We move this driver to new api {get|set}_link_ksettings.
>
> Signed-off-by: Philippe Reynes
Applied.
From: Tom Herbert
Date: Tue, 1 Nov 2016 14:55:25 -0700
> commit ca26893f05e86 ("rhashtable: Add rhlist interface")
> added a field to rhashtable_iter so that length became 56 bytes
> and would exceed the size of args in netlink_callback (which is
> 48 bytes). The netlink diag dump function alread
From: Cyrill Gorcunov
Date: Tue, 1 Nov 2016 23:05:00 +0300
> While being preparing patches for killing raw sockets via
> diag netlink interface I noticed that my runs are stuck:
>
> | [root@pcs7 ~]# cat /proc/`pidof ss`/stack
> | [] __lock_sock+0x80/0xc4
> | [] lock_sock_nested+0x47/0x95
> |
From:
Date: Tue, 1 Nov 2016 20:02:00 +
> From: Woojung Huh
>
> To utilize phylib with interrupt fully than handling some of phy stuff in the
> MAC driver,
> create irq_domain for USB interrupt EP of phy interrupt and
> pass the irq number to phy_connect_direct() instead of PHY_IGNORE_INTER
From: Eli Cooper
Date: Tue, 1 Nov 2016 23:45:13 +0800
> Some IPCB fields are currently set in udp_tunnel6_xmit_skb(), which are
> never used before it reaches ip6tunnel_xmit(), and past that point the
> control buffer is no longer interpreted as IPCB.
>
> This clears these unused IPCB related c
From: Eli Cooper
Date: Tue, 1 Nov 2016 23:45:12 +0800
> skb->cb may contain data from previous layers. In the observed scenario,
> the garbage data were misinterpreted as IP6CB(skb)->frag_max_size, so
> that small packets sent through the tunnel are mistakenly fragmented.
>
> This patch uncondi
From: Philippe Reynes
Date: Tue, 1 Nov 2016 16:32:25 +0100
> The old ethtool api (get_setting and set_setting) has generic mii
> functions mii_ethtool_sset and mii_ethtool_gset.
>
> To support the new ethtool api ({get|set}_link_ksettings), we add
> two generics mii function mii_ethtool_{get|se
From: Philippe Reynes
Date: Tue, 1 Nov 2016 16:32:26 +0100
> The ethtool api {get|set}_settings is deprecated.
> We move this driver to new api {get|set}_link_ksettings.
>
> Signed-off-by: Philippe Reynes
Applied.
From: Philippe Reynes
Date: Tue, 1 Nov 2016 16:32:27 +0100
> The ethtool api {get|set}_settings is deprecated.
> We move this driver to new api {get|set}_link_ksettings.
>
> Signed-off-by: Philippe Reynes
Applied.
Em Wed, Nov 02, 2016 at 03:04:05PM -0400, David Miller escreveu:
> From: Alexei Starovoitov
> Date: Tue, 1 Nov 2016 16:04:35 -0600
>
> > I think these patches has to go through Arnaldo's perf tree, since
> > otherwise they will conflict with Wang's changes.
>
> Ok.
I'll look at it when back fro
From: Saeed Mahameed
Date: Tue, 1 Nov 2016 15:09:58 +0200
> Add myself as a maintainer for mlx5 core driver as well.
>
> Signed-off-by: Saeed Mahameed
Applied.
Andrey reported the following error report while running the syzkaller
fuzzer:
general protection fault: [#1] SMP KASAN
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 648 Comm: syz-executor Not tainted 4.9.0-rc3+ #333
Hardware name: QEMU Standard PC (i440FX + P
From: Tariq Toukan
Date: Wed, 2 Nov 2016 17:12:22 +0200
> This patchset refactors the XDP forwarding case, so that
> its dedicated transmit queues are managed in a complete
> separation from the other regular ones.
>
> It also adds ethtool counters for XDP cases.
>
> Series generated against n
From: Xin Long
Date: Tue, 1 Nov 2016 00:49:41 +0800
> After adding sctp gso, sctp_packet_transmit is a quite big function now.
>
> This patch is to extract the codes for packing packet to sctp_packet_pack
> from sctp_packet_transmit, and add some comments, simplify the err path by
> freeing aut
From: Alexei Starovoitov
Date: Tue, 1 Nov 2016 16:04:35 -0600
> I think these patches has to go through Arnaldo's perf tree, since
> otherwise they will conflict with Wang's changes.
Ok.
From: Roi Dayan
Date: Tue, 1 Nov 2016 16:08:27 +0200
> This series includes two small changes to the TC flower classifier.
Series applied, thanks!
From: Pablo Neira Ayuso
Date: Tue, 1 Nov 2016 22:26:21 +0100
> The following patchset contains Netfilter updates for your net-next
> tree. This includes better integration with the routing subsystem for
> nf_tables, explicit notrack support and smaller updates. More
> specifically, they are:
..
On 16-10-31 04:14 AM, Hayes Wang wrote:
The r8152 driver has been broken since (approx) 3.16.xx
when support was added for hardware RX checksums
on newer chip versions. Symptoms include random
segfaults and silent data corruption over NFS.
The hardware checksum logig does not work on the VER_02
Hi,
I've got the following error report while running the syzkaller fuzzer:
IPv4: Attempt to release alive inet socket 880068e98940
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: [#1] SMP KASAN
Modules linke
On Wed, Nov 02, 2016 at 01:08:04PM -0400, Jon Mason wrote:
> The BCM54810 PHY requires some semi-unique configuration, which results
> in some additional configuration in addition to the standard config.
> Also, some users of the BCM54810 require the PHY lanes to be swapped.
> Since there is no way
Hi David,
I'm able to reproduce it, so I'd be happy to test your fix.
Thanks!
On Wed, Nov 2, 2016 at 7:31 PM, David Ahern wrote:
> On 11/2/16 11:21 AM, Eric Dumazet wrote:
>> Thanks for your report.
>>
>> David, please take a look.
>>
>> TCP MD5 can call __inet_lookup_listener() with a NULL skb
On 11/2/16 11:21 AM, Eric Dumazet wrote:
> Thanks for your report.
>
> David, please take a look.
>
> TCP MD5 can call __inet_lookup_listener() with a NULL skb.
interesting. I did not test md5 before sending, but doing so now I am not able
to trigger the panic with any combination of passwords
On Wed, Nov 02, 2016 at 01:08:03PM -0400, Jon Mason wrote:
> Add the documentation for PHY lane swapping. This is a boolean entry to
> notify the phy device drivers that the TX/RX lanes need to be swapped.
>
> Signed-off-by: Jon Mason
Reviewed-by: Andrew Lunn
Andrew
On 11/02/2016 10:08 AM, Jon Mason wrote:
> Clean-up the documentation to the bgmac-amac driver, per suggestion by
> Rob Herring, and add details for NS2 support.
>
> Signed-off-by: Jon Mason
Reviewed-by: Florian Fainelli
--
Florian
This change allows us to pass DMA_ATTR_SKIP_CPU_SYNC which allows us to
avoid invoking cache line invalidation if the driver will just handle it
via a sync_for_cpu or sync_for_device call.
Cc: Max Filippov
Signed-off-by: Alexander Duyck
---
arch/xtensa/kernel/pci-dma.c |7 +--
1 file ch
On Wed, Nov 02, 2016 at 08:18:51PM +0300, Sergei Shtylyov wrote:
> Hello.
>
> On 11/02/2016 08:08 PM, Jon Mason wrote:
>
> >Clean-up the documentation to the bgmac-amac driver, per suggestion by
> >Rob Herring, and add details for NS2 support.
> >
> >Signed-off-by: Jon Mason
> >---
> > Documenta
This change allows us to pass DMA_ATTR_SKIP_CPU_SYNC which allows us to
avoid invoking cache line invalidation if the driver will just handle it
via a sync_for_cpu or sync_for_device call.
Cc: Chris Metcalf
Signed-off-by: Alexander Duyck
---
arch/tile/kernel/pci-dma.c | 12 ++--
1 fil
This change allows us to pass DMA_ATTR_SKIP_CPU_SYNC which allows us to
avoid invoking cache line invalidation if the driver will just handle it
later via a sync_for_cpu or sync_for_device call.
Cc: Geert Uytterhoeven
Cc: linux-m...@lists.linux-m68k.org
Signed-off-by: Alexander Duyck
---
arch/m
On Wed, 2016-11-02 at 18:01 +0100, Andrey Konovalov wrote:
> Hi,
>
> I've got the following error report while running the syzkaller fuzzer:
>
> general protection fault: [#1] SMP KASAN
> Dumping ftrace buffer:
>(ftrace buffer empty)
> Modules linked in:
> CPU: 0 PID: 648 Comm: syz-execu
1 - 100 of 216 matches
Mail list logo