Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-08-30 Thread Steffen Klassert
On Thu, Aug 30, 2018 at 08:53:50PM +0200, Wolfgang Walter wrote: > Hello, > > kernels > 4.12 do not work on one of our main routers. They crash as soon > as ipsec-tunnels are configured and ipsec-traffic actually flows. Can you please send the backtrace of this crash? Thanks!

Re: [PATCH 1/2] xfrm6: call kfree_skb when skb is toobig

2018-08-30 Thread Steffen Klassert
On Thu, Aug 30, 2018 at 03:23:11PM +0200, Sabrina Dubroca wrote: > 2018-08-30, 09:58:16 -0300, Thadeu Lima de Souza Cascardo wrote: > > After commit d6990976af7c5d8f55903bfb4289b6fb030bf754 ("vti6: fix PMTU > > caching > > and reporting on xmit"), some too big skbs might be potentially passed down

Re: [PATCH 2/2] vti6: do not check for ignore_df in order to update pmtu

2018-08-30 Thread Steffen Klassert
On Thu, Aug 30, 2018 at 09:58:17AM -0300, Thadeu Lima de Souza Cascardo wrote: > Before commit d6990976af7c5d8f55903bfb4289b6fb030bf754 ("vti6: fix PMTU > caching > and reporting on xmit"), skb was scrubbed before checking for ignore_df. The > scrubbing meant ignore_df was false, making the check

[PATCH bpf-next] tools/bpf: bpftool, add xskmap in map types

2018-08-30 Thread Prashant Bhole
When listed all maps, bpftool currently shows (null) for xskmap. Added xskmap type in map_type_name[] to show correct type. Signed-off-by: Prashant Bhole --- tools/bpf/bpftool/map.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/bpf/bpftool/map.c b/tools/bpf/bpftool/map.c index df175b

Re: [PATCH net-next 2/2] netlink: ipv6 MLD join notifications

2018-08-30 Thread kbuild test robot
Hi Patrick, Thank you for the patch! Yet something to improve: [auto build test ERROR on net-next/master] url: https://github.com/0day-ci/linux/commits/Patrick-Ruddy/netlink-ipv4-IGMP-join-notifications/20180831-105548 config: i386-randconfig-s0-201834 (attached as .config) compiler: gcc-6 (

Re: [PATCH net-next 1/2] netlink: ipv4 IGMP join notifications

2018-08-30 Thread kbuild test robot
Hi Patrick, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on net-next/master] url: https://github.com/0day-ci/linux/commits/Patrick-Ruddy/netlink-ipv4-IGMP-join-notifications/20180831-105548 config: i386-randconfig-a1-201834 (attached as .config) compiler: g

[bpf PATCH v2] bpf: avoid misuse of psock when TCP_ULP_BPF collides with another ULP

2018-08-30 Thread John Fastabend
Currently we check sk_user_data is non NULL to determine if the sk exists in a map. However, this is not sufficient to ensure the psock or the ULP ops are not in use by another user, such as kcm or TLS. To avoid this when adding a sock to a map also verify it is of the correct ULP type. Additionall

Re: [PATCH net-next 1/2] netlink: ipv4 IGMP join notifications

2018-08-30 Thread kbuild test robot
Hi Patrick, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on net-next/master] url: https://github.com/0day-ci/linux/commits/Patrick-Ruddy/netlink-ipv4-IGMP-join-notifications/20180831-105548 config: i386-randconfig-s0-201834 (attached as .config) compiler: g

Re: [PATCH bpf-next 2/3] xsk: get rid of useless struct xdp_umem_props

2018-08-30 Thread kbuild test robot
Hi Magnus, I love your patch! Yet something to improve: [auto build test ERROR on bpf-next/master] url: https://github.com/0day-ci/linux/commits/Magnus-Karlsson/i40e-fix-possible-compiler-warning-in-xsk-TX-path/20180831-095442 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-n

[PATCH net-next] bnxt_en: remove set but not used variable 'rx_stats'

2018-08-30 Thread YueHaibing
Fixes gcc '-Wunused-but-set-variable' warning: drivers/net/ethernet/broadcom/bnxt/bnxt_vfr.c: In function 'bnxt_vf_rep_rx': drivers/net/ethernet/broadcom/bnxt/bnxt_vfr.c:212:28: warning: variable 'rx_stats' set but not used [-Wunused-but-set-variable] struct bnxt_vf_rep_stats *rx_stats; Signed

[PATCH net-next] failover: remove set but not used variable 'primary_dev'

2018-08-30 Thread YueHaibing
Fixes gcc '-Wunused-but-set-variable' warning: drivers/net/net_failover.c: In function 'net_failover_slave_unregister': drivers/net/net_failover.c:598:35: warning: variable 'primary_dev' set but not used [-Wunused-but-set-variable] Signed-off-by: YueHaibing --- drivers/net/net_failover.c | 3 +

[PATCH net-next] net: remove duplicated include from net_failover.c

2018-08-30 Thread YueHaibing
Remove duplicated include. Signed-off-by: YueHaibing --- drivers/net/net_failover.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/net/net_failover.c b/drivers/net/net_failover.c index 7ae1856..192ae1c 100644 --- a/drivers/net/net_failover.c +++ b/drivers/net/net_failover.c @@ -19,7

Re: [PATCH v3 bpf-next 0/2] bpf tcp save syn set/get sockoptions

2018-08-30 Thread Alexei Starovoitov
On Thu, Aug 30, 2018 at 07:51:52AM -0700, Nikita V. Shirokov wrote: > > adding supprot for two new bpf's tcp sockopts: > TCP_SAVE_SYN (set) and TCP_SAVED_SYN (get) > this would allow for tcp-bpf program to build some logic based on fields from > ingress syn packet (e.g. doing tcp's tos/tclass refl

Re: [PATCH bpf-next 0/3] xsk: misc code cleanup

2018-08-30 Thread Alexei Starovoitov
On Thu, Aug 30, 2018 at 03:56:40PM +0200, Magnus Karlsson wrote: > This patch set cleans up two code style issues with the xsk zero-copy > code. The resulting code is smaller and simpler. > > Patch 1: Removes a potential compiler warning reported by the Intel > 0-DAY kernel test infrastru

[PATCH bpf-next] samples/bpf: xdpsock, minor fixes

2018-08-30 Thread Prashant Bhole
- xsks_map size was fixed to 4, changed it MAX_SOCKS - Remove redundant definition of MAX_SOCKS in xdpsock_user.c - In dump_stats(), add NULL check for xsks[i] Signed-off-by: Prashant Bhole --- samples/bpf/xdpsock_kern.c | 2 +- samples/bpf/xdpsock_user.c | 3 +-- 2 files changed, 2 insertions(+

[PATCH bpf-next] xsk: remove unnecessary assignment

2018-08-30 Thread Prashant Bhole
Since xdp_umem_query() was added one assignment of bpf.command was missed from cleanup. Removing the assignment statement. Fixes: 84c6b86875e01a0 ("xsk: don't allow umem replace at stack level") Signed-off-by: Prashant Bhole --- net/xdp/xdp_umem.c | 2 -- 1 file changed, 2 deletions(-) diff --g

Re: [bpf PATCH] bpf: avoid kcm psock use and tcp_bpf from colliding

2018-08-30 Thread John Fastabend
On 08/30/2018 03:33 PM, John Fastabend wrote: > Currently we check sk_user_data is non NULL to determine if the sk > exists in a map. However, this is not sufficient to ensure the psock > is not in use by another (non-ULP TCP) user, such as kcm. To avoid > this when adding a sock to a map also veri

[RFC PATCH] bpf: test_maps add a test to catch kcm + sockmap

2018-08-30 Thread John Fastabend
RFC for now, once the fix is in bpf-next will submit there. Adding a socket to both sockmap and kcm is not supported due to collision on sk_user_data usage. At some point we will fix this but until then lets ensure we don't corrupt things. Now if selftests is run without KCM support we will issue

[RFC PATCH] bpf: test case for kcm + sockmap

2018-08-30 Thread John Fastabend
This finds the issue with kcm and sockmap where when a kcm socket is added to a sockmap we fail to notice it is a kcm sock and not a tcp bpf ULP sock. This results in a refcount_inc_not_zero() being called on the psock which is assigned to a smap_psock incorrectly. On my system it just happens to f

[bpf PATCH] bpf: avoid kcm psock use and tcp_bpf from colliding

2018-08-30 Thread John Fastabend
Currently we check sk_user_data is non NULL to determine if the sk exists in a map. However, this is not sufficient to ensure the psock is not in use by another (non-ULP TCP) user, such as kcm. To avoid this when adding a sock to a map also verify it is of the correct ULP type. Signed-off-by: John

Re: [PATCH net] net/ipv6: Only update MTU metric if it set

2018-08-30 Thread David Ahern
On 8/30/18 3:49 PM, Jan Janssen wrote: > You mentioned that systemd-networkd is doing something silly here, so I was > wondering if you could make a bug report to fix the underlying issue? I don't > mind doing it myself but you're the expert and can explain things better. It is silly in the sens

Re: [PATCH 1/2] dt-bindings: net: cpsw: Document cpsw-phy-sel usage but prefer phandle

2018-08-30 Thread Tony Lindgren
* Grygorii Strashko [180830 17:08]: > On 08/29/2018 07:47 PM, Tony Lindgren wrote: > > In general, it seems cpsw is just an interconnect instance > > (L4_FAST) with a control module (CPSW_WR) and a pile of > > independent other modules. That's described nicely in > > am437x TRM chapter "2.1.4 L4 F

Re: [PATCH net] net/ipv6: Only update MTU metric if it set

2018-08-30 Thread Jan Janssen
On Donnerstag, 30. August 2018 23:15:43 CEST dsah...@kernel.org wrote: > From: David Ahern > > Jan reported a regression after an update to 4.18.5. In this case ipv6 > default route is setup by systemd-networkd based on data from an RA. The > RA contains an MTU of 1492 which is used when the rout

[PATCH net] net/ipv6: Only update MTU metric if it set

2018-08-30 Thread dsahern
From: David Ahern Jan reported a regression after an update to 4.18.5. In this case ipv6 default route is setup by systemd-networkd based on data from an RA. The RA contains an MTU of 1492 which is used when the route is first inserted but then systemd-networkd pushes down updates to the default

[net-next v2 13/15] i40e: hold the rtnl lock on clearing interrupt scheme

2018-08-30 Thread Jeff Kirsher
From: Patryk Małek Hold the rtnl lock when we're clearing interrupt scheme in i40e_shutdown and in i40e_remove. Signed-off-by: Patryk Małek Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/i40e/i40e_main.c | 8 1 file changed, 8 insertions(+) diff

[net-next v2 04/15] i40evf: Change a VF mac without reloading the VF driver

2018-08-30 Thread Jeff Kirsher
From: Paweł Jabłoński Add possibility to change a VF mac address from host side without reloading the VF driver on the guest side. Without this patch it is not possible to change the VF mac because executing i40evf_virtchnl_completion function with VIRTCHNL_OP_GET_VF_RESOURCES opcode resets the V

[net-next v2 11/15] i40e: Check and correct speed values for link on open

2018-08-30 Thread Jeff Kirsher
From: Jan Sokolowski If our card has been put in an unstable state due to other drivers interacting with it, speed settings might be incorrect. If incorrect, forcefully reset them on open to known default values. Signed-off-by: Jan Sokolowski Tested-by: Andrew Bowers Signed-off-by: Jeff Kirshe

[net-next v2 15/15] i40e: Prevent deleting MAC address from VF when set by PF

2018-08-30 Thread Jeff Kirsher
From: Patryk Małek To prevent VF from deleting MAC address that was assigned by the PF we need to check for that scenario when we try to delete a MAC address from a VF. Signed-off-by: Patryk Małek Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/i40e/i40e_v

[net-next v2 07/15] i40evf: set IFF_UNICAST_FLT flag for the VF

2018-08-30 Thread Jeff Kirsher
From: Lihong Yang Set IFF_UNICAST_FLT flag for the VF to prevent it from entering promiscuous mode when macvlan is added to the VF. Signed-off-by: Lihong Yang Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/i40evf/i40evf_main.c | 2 ++ 1 file changed, 2 in

[net-next v2 08/15] virtchnl: use u8 type for a field in the virtchnl_filter struct

2018-08-30 Thread Jeff Kirsher
From: Harshitha Ramamurthy The virtchnl_filter struct has a field called field_flags. A previous commit mistakenly had the type to be a __u8. What we want is for the field to be an unsigned 8 bit value, so let's just use the existing kernel type u8 for that. Signed-off-by: Harshitha Ramamurthy

[net-next v2 01/15] i40e: convert queue stats to i40e_stats array

2018-08-30 Thread Jeff Kirsher
From: Jacob Keller Use an i40e_stats array to handle the queue stats, instead of coding similar functionality separately. Because of how the queue stats are accessed on some kernels, we can't easily use i40e_add_ethtool_stats. Instead, implement a separate helper, i40e_add_queue_stats, which we'

[net-next v2 02/15] i40e: move ethtool stats boiler plate code to i40e_ethtool_stats.h

2018-08-30 Thread Jeff Kirsher
From: Jacob Keller Move the boiler plate structures and helper functions we recently added into their own header file, so that the complete collection is located together. Signed-off-by: Jacob Keller Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- v2: Based on feedback from David Mil

[net-next v2 06/15] i40e: use correct length for strncpy

2018-08-30 Thread Jeff Kirsher
From: Mitch Williams Caught by GCC 8. When we provide a length for strncpy, we should not include the terminating null. So we must tell it one less than the size of the destination buffer. Signed-off-by: Mitch Williams Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethe

[net-next v2 12/15] i40evf: Don't enable vlan stripping when rx offload is turned on

2018-08-30 Thread Jeff Kirsher
From: Patryk Małek With current implementation of i40evf_set_features when user sets any offload via ethtool we set I40EVF_FLAG_AQ_ENABLE_VLAN_STRIPPING as a required aq which triggers driver to call i40evf_enable_vlan_stripping. This shouldn't take place. This patches fixes it by setting the fla

[net-next v2 14/15] i40evf: cancel workqueue sync for adminq when a VF is removed

2018-08-30 Thread Jeff Kirsher
From: Lihong Yang If a VF is being removed, there is no need to continue with the workqueue sync for the adminq task, thus cancel it. Without this call, when VFs are created and removed right away, there might be a chance for the driver to crash with events stuck in the adminq. Signed-off-by: Li

[net-next v2 05/15] i40evf: Validate the number of queues a PF sends

2018-08-30 Thread Jeff Kirsher
From: Paul M Stillwell Jr A PF can send any number of queues to the VF and the VF may not be able to support that many. Check to see that the number of queues is less than or equal to the max number of queues the VF can have. Signed-off-by: Paul M Stillwell Jr Tested-by: Andrew Bowers Signed-o

[net-next v2 10/15] i40e: report correct statistics when XDP is enabled

2018-08-30 Thread Jeff Kirsher
From: Björn Töpel When XDP is enabled, the driver will report incorrect statistics. Received frames will reported as transmitted frames. This commits fixes the i40e implementation of ndo_get_stats64 (struct net_device_ops), so that iproute2 will report correct statistics (e.g. when running "ip -

[net-next v2 03/15] i40evf: update ethtool stats code and use helper functions

2018-08-30 Thread Jeff Kirsher
From: Jacob Keller Fix a bug in the way we handled VF queues, by always showing stats for the maximum number of queues, even if they aren't allocated. It is not safe to change the number of strings reported to ethtool, as grabbing statistics occurs over multiple ethtool ops for which the rtnl_loc

[net-next v2 09/15] i40e: static analysis report from community

2018-08-30 Thread Jeff Kirsher
From: Martyna Szapar Static analysis tools report a problem from original driver submission. Removing unnecessary check in condition. Signed-off-by: Martyna Szapar Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/i40e/i40e_main.c | 2 +- 1 file changed, 1 i

[net-next v2 00/15][pull request] 40GbE Intel Wired LAN Driver Updates 2018-08-30

2018-08-30 Thread Jeff Kirsher
This series contains updates to i40e, i40evf and virtchnl. Jake implements helper functions to use an array to handle the queue stats which reduces the boiler plate code as well as keep the complexity localized to a few functions. Paweł adds the ability to change a VF's MAC address from the host

[PATCH net-next 0/2] netlink: multicast join notifications

2018-08-30 Thread Patrick Ruddy
This patch is an update to https://patchwork.ozlabs.org/patch/571127/. The previous patch was based on sending multicast MAC addresses in the netlink messages to allow the programming of hardware. It was agreed to rework this to use RTM_NEW/DELLINK messages which were more appropriate for layer 2 a

Re: [PATCH v2 1/2] IB/ipoib: Use dev_port to expose network interface port numbers

2018-08-30 Thread Doug Ledford
On Thu, 2018-08-30 at 21:22 +0300, Arseny Maslennikov wrote: > Some InfiniBand network devices have multiple ports on the same PCI > function. This initializes the `dev_port' sysfs field of those > network interfaces with their port number. > > Prior to this the kernel erroneously used the `dev_id

[RFC PATCH net-next 4/4] net/core: handle GRO_NORMAL skbs as a list in napi_gro_receive_list

2018-08-30 Thread Edward Cree
Allows GRO-using drivers to get the benefits of batching for non-GROable traffic. Signed-off-by: Edward Cree --- net/core/dev.c | 19 --- 1 file changed, 16 insertions(+), 3 deletions(-) diff --git a/net/core/dev.c b/net/core/dev.c index ac9741273c62..f9391f76feb7 100644 --- a/

[RFC PATCH net-next 3/4] net: make listified RX functions return number of good packets

2018-08-30 Thread Edward Cree
Signed-off-by: Edward Cree --- include/linux/netdevice.h | 4 +-- include/net/ip.h | 4 +-- include/net/ipv6.h| 4 +-- net/core/dev.c| 63 +-- net/ipv4/ip_input.c | 39 ++--- net/ipv6/ip6_inp

[RFC PATCH net-next 2/4] sfc: use batched receive for GRO

2018-08-30 Thread Edward Cree
Signed-off-by: Edward Cree --- drivers/net/ethernet/sfc/efx.c| 11 +-- drivers/net/ethernet/sfc/net_driver.h | 1 + drivers/net/ethernet/sfc/rx.c | 16 +--- 3 files changed, 23 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/sfc/efx.c b/driver

[RFC PATCH net-next 1/4] net: introduce list entry point for GRO

2018-08-30 Thread Edward Cree
Also export napi_frags_skb() so that drivers using the napi_gro_frags() interface can prepare their SKBs properly for submitting on such a list. Signed-off-by: Edward Cree --- include/linux/netdevice.h | 2 ++ net/core/dev.c| 28 +++- 2 files changed, 29 ins

[RFC PATCH net-next 0/4] net: batched receive in GRO path

2018-08-30 Thread Edward Cree
This series listifies part of GRO processing, in a manner which allows those packets which are not GROed (i.e. for which dev_gro_receive returns GRO_NORMAL) to be passed on to the listified regular receive path. I have not listified dev_gro_receive() itself, or the per-protocol GRO callback, sin

Re: [PATCH net-next] packet: add sockopt to ignore outgoing packets

2018-08-30 Thread Willem de Bruijn
On Thu, Aug 30, 2018 at 6:12 AM Vincent Whitchurch wrote: > > Currently, the only way to ignore outgoing packets on a packet socket is > via the BPF filter. With MSG_ZEROCOPY, packets that are looped into > AF_PACKET are copied in dev_queue_xmit_nit(), and this copy happens even > if the filter r

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-08-30 Thread Wolfgang Walter
Hello, kernels > 4.12 do not work on one of our main routers. They crash as soon as ipsec-tunnels are configured and ipsec-traffic actually flows. Just configuring ipsec (that is starting strongswan) does not trigger the oops. I finally found time to bisect that. It bisected down to b

[bpf-next 3/3] selftests/bpf: test bpf flow dissection

2018-08-30 Thread Petar Penkov
From: Petar Penkov Adds a test that sends different types of packets over multiple tunnels and verifies that valid packets are dissected correctly. To do so, a tc-flower rule is added to drop packets on UDP src port 9, and packets are sent from ports 8, 9, and 10. Only the packets on port 9 shou

[bpf-next 2/3] flow_dissector: implements eBPF parser

2018-08-30 Thread Petar Penkov
From: Petar Penkov This eBPF program extracts basic/control/ip address/ports keys from incoming packets. It supports recursive parsing for IP encapsulation, and VLAN, along with IPv4/IPv6 and extension headers. This program is meant to show how flow dissection and key extraction can be done in e

[bpf-next 1/3] flow_dissector: implements flow dissector BPF hook

2018-08-30 Thread Petar Penkov
From: Petar Penkov Adds a hook for programs of type BPF_PROG_TYPE_FLOW_DISSECTOR and attach type BPF_FLOW_DISSECTOR that is executed in the flow dissector path. The BPF program is per-network namespace. Signed-off-by: Petar Penkov Signed-off-by: Willem de Bruijn --- include/linux/bpf.h

[bpf-next 0/3] Introduce eBPF flow dissector

2018-08-30 Thread Petar Penkov
From: Petar Penkov This patch series hardens the RX stack by allowing flow dissection in BPF, as previously discussed [1]. Because of the rigorous checks of the BPF verifier, this provides significant security guarantees. In particular, the BPF flow dissector cannot get inside of an infinite loop

[PATCH v2 1/2] IB/ipoib: Use dev_port to expose network interface port numbers

2018-08-30 Thread Arseny Maslennikov
Some InfiniBand network devices have multiple ports on the same PCI function. This initializes the `dev_port' sysfs field of those network interfaces with their port number. Prior to this the kernel erroneously used the `dev_id' sysfs field of those network interfaces to convey the port number to

[PATCH v2 2/2] Documentation/ABI: document /sys/class/net/*/dev_port

2018-08-30 Thread Arseny Maslennikov
The sysfs field was introduced 4 years ago along with fixes to various drivers that erroneously used `dev_id' for that purpose, but it was not properly documented anywhere. See commit v3.14-rc3-739-g3f85944fe207. Signed-off-by: Arseny Maslennikov --- Documentation/ABI/testing/sysfs-class-net | 1

[PATCH v2 0/2] IB/ipoib: Use dev_port to disambiguate port numbers

2018-08-30 Thread Arseny Maslennikov
Pre-3.15 userspace had trouble distinguishing different ports of a NIC on a single PCI bus/device/function. To solve this, a sysfs field `dev_port' was introduced quite a while ago (commit v3.14-rc3-739-g3f85944fe207), and some relevant device drivers were fixed to use it, but not in case of IPoIB.

[PATCH net] ibmvnic: Include missing return code checks in reset function

2018-08-30 Thread Thomas Falcon
Check the return codes of these functions and halt reset in case of failure. The driver will remain in a dormant state until the next reset event, when device initialization will be re-attempted. Signed-off-by: Thomas Falcon --- drivers/net/ethernet/ibm/ibmvnic.c | 12 +--- 1 file change

Re: [PATCH v2 iproute2-next 0/3] support delivering packets in

2018-08-30 Thread David Ahern
On 8/26/18 8:42 PM, Yousuk Seung wrote: > This series adds support for the new "slot" netem parameter for > slotting. Slotting is an approximation of shared media that gather up > packets within a varying delay window before delivering them nearly at > once. > > Dave Taht (2): > tc: support conv

Re: [PATCH 1/2] dt-bindings: net: cpsw: Document cpsw-phy-sel usage but prefer phandle

2018-08-30 Thread Grygorii Strashko
On 08/29/2018 07:47 PM, Tony Lindgren wrote: * Grygorii Strashko [180830 00:12]: Hi Tony, On 08/29/2018 10:00 AM, Tony Lindgren wrote: The current cpsw usage for cpsw-phy-sel is undocumented but is used for all the boards using cpsw. And cpsw-phy-sel is not really a child of the cpsw devic

Re: [PATCH 2/4] r8169: Get and enable optional ether_clk clock

2018-08-30 Thread Stephen Boyd
Quoting Hans de Goede (2018-08-29 10:09:57) > Hi, > > On 27-08-18 21:14, Stephen Boyd wrote: > > Quoting Hans de Goede (2018-08-27 11:53:19) > >> On 27-08-18 20:47, Stephen Boyd wrote: > >>> How would you know that a clk device driver hasn't probed yet and isn't > >>> the driver that's actually pr

Re: [PATCH net-next 1/2] netlink: ipv4 IGMP join notifications

2018-08-30 Thread Patrick Ruddy
Don't know what happened to the 0/2 cover for this series so here it is: This patch is an update to https://patchwork.ozlabs.org/patch/571127/. The previous patch was based on sending multicast MAC addresses in the netlink messages to allow the programming of hardware. It was agreed to rework this

Re: [PATCH net] ipv6: don't get lwtstate twice in ip6_rt_copy_init()

2018-08-30 Thread David Ahern
On 8/30/18 10:11 AM, Alexey Kodanev wrote: > Commit 80f1a0f4e0cd ("net/ipv6: Put lwtstate when destroying fib6_info") > partially fixed the kmemleak [1], lwtstate can be copied from fib6_info, > with ip6_rt_copy_init(), and it should be done only once there. > > rt->dst.lwtstate is set by ip6_rt_i

[PATCH net] ipv6: don't get lwtstate twice in ip6_rt_copy_init()

2018-08-30 Thread Alexey Kodanev
Commit 80f1a0f4e0cd ("net/ipv6: Put lwtstate when destroying fib6_info") partially fixed the kmemleak [1], lwtstate can be copied from fib6_info, with ip6_rt_copy_init(), and it should be done only once there. rt->dst.lwtstate is set by ip6_rt_init_dst(), at the start of the function ip6_rt_copy_i

Re: [PATCH net 1/2] selftests: pmtu: maximum MTU for vti4 is 2^16-1-20

2018-08-30 Thread Nicolas Dichtel
Le 30/08/2018 à 16:01, Sabrina Dubroca a écrit : > Since commit 82612de1c98e ("ip_tunnel: restore binding to ifaces with a > large mtu"), the maximum MTU for vti4 is based on IP_MAX_MTU instead of > the mysterious constant 0xFFF8. This makes this selftest fail. > > Fixes: 82612de1c98e ("ip_tunnel

Re: [pull request][net-next 00/10] Mellanox, mlx5 and devlink updates 2018-07-31

2018-08-30 Thread Alexander Duyck
I'm dropping all the old comments since the conversation was flattened and only has one level of marks for everything. On Thu, Aug 30, 2018 at 7:43 AM Alex Vesker wrote: > To which devlink interfaces are you referring? All of them. Not just the ones in this patch. If you are exposing an inter

Re: WARNING in handle_irq (3)

2018-08-30 Thread Dmitry Vyukov
On Thu, Aug 30, 2018 at 8:31 AM, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit:58c3f14f86c9 Merge tag 'riscv-for-linus-4.19-rc2' of git:/.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=10be176a40 > kernel config:

[PATCH v3 bpf-next 0/2] bpf tcp save syn set/get sockoptions

2018-08-30 Thread Nikita V. Shirokov
adding supprot for two new bpf's tcp sockopts: TCP_SAVE_SYN (set) and TCP_SAVED_SYN (get) this would allow for tcp-bpf program to build some logic based on fields from ingress syn packet (e.g. doing tcp's tos/tclass reflection (see sample prog)) and do it transparently from userspace program poin

[PATCH v3 bpf-next 1/2] new options for bpf_(set|get)sockopt

2018-08-30 Thread Nikita V. Shirokov
adding support for two new bpf's get/set sockopts: TCP_SAVE_SYN (set) and TCP_SAVED_SYN (get). this would allow for bpf program to build logic based on data from ingress SYN packet Signed-off-by: Nikita V. Shirokov --- net/core/filter.c | 25 + 1 file changed, 21 insertio

[PATCH v3 bpf-next 2/2] new sample bpf prog

2018-08-30 Thread Nikita V. Shirokov
sample program which shows TCP_SAVE_SYN/TCP_SAVED_SYN usage example: bpf's program which is doing TOS/TCLASS reflection (server would reply with a same TOS/TCLASS as client) Signed-off-by: Nikita V. Shirokov --- samples/bpf/Makefile | 1 + samples/bpf/tcp_tos_reflect_kern.c | 87 +

Re: [PATCH net] tcp: do not restart timewait timer on rst reception

2018-08-30 Thread Eric Dumazet
On 08/30/2018 05:24 AM, Florian Westphal wrote: > RFC 1337 says: > ''Ignore RST segments in TIME-WAIT state. >If the 2 minute MSL is enforced, this fix avoids all three hazards.'' > > So with net.ipv4.tcp_rfc1337=1, expected behaviour is to have TIME-WAIT sk > expire rather than removing i

Re: [PATCH iproute2] tc/htb: remove unused variable

2018-08-30 Thread Stephen Hemminger
On Thu, 30 Aug 2018 16:38:54 +0200 Florent Fourcot wrote: > Since introduction of htb module, this variable has never been used. > > Signed-off-by: Florent Fourcot Looks good. Applied

Re: [PATCHv3 iproute2 0/2] clang + misc changes

2018-08-30 Thread Stephen Hemminger
On Wed, 22 Aug 2018 18:01:30 -0700 Mahesh Bandewar wrote: > From: Mahesh Bandewar > > The primary theme is to make clang compile the iproute2 package without > warnings. Along with this there are two other misc patches in the series. > > First patch uses the preferred_family when operating wit

Re: [Patch iproute2 v2] ss: add UNIX_DIAG_VFS and UNIX_DIAG_ICONS for unix sockets

2018-08-30 Thread Stephen Hemminger
On Wed, 29 Aug 2018 10:09:27 -0700 Cong Wang wrote: > UNIX_DIAG_VFS and UNIX_DIAG_ICONS are never used by ss, > make them available in ss -e output. > > Cc: Stephen Hemminger > Signed-off-by: Cong Wang Applied, thanks

Re: [iproute PATCH] iprule: Fix for incorrect space between dst and prefix

2018-08-30 Thread Stephen Hemminger
On Wed, 29 Aug 2018 15:52:57 +0200 Phil Sutter wrote: > This was added by accident when introducing JSON support. > > Fixes: 0dd4ccc56c0e3 ("iprule: add json support") > Signed-off-by: Phil Sutter Applied, thanks.

[PATCH net-next] net/sched: fix type of htb statistics

2018-08-30 Thread Florent Fourcot
tokens and ctokens are defined as s64 in htb_class structure, and clamped to 32bits value during netlink dumps: cl->xstats.tokens = clamp_t(s64, PSCHED_NS2TICKS(cl->tokens), INT_MIN, INT_MAX); Defining it as u32 is working since userspace (tc) is printing it as signed

[PATCH iproute2] tc/htb: remove unused variable

2018-08-30 Thread Florent Fourcot
Since introduction of htb module, this variable has never been used. Signed-off-by: Florent Fourcot --- tc/q_htb.c | 9 - 1 file changed, 9 deletions(-) diff --git a/tc/q_htb.c b/tc/q_htb.c index b93d31d4..c8b2941d 100644 --- a/tc/q_htb.c +++ b/tc/q_htb.c @@ -109,7 +109,6 @@ static int

[PATCH net-next] net: stmmac: Add CBS support in XGMAC2

2018-08-30 Thread Jose Abreu
XGMAC2 uses the same CBS mechanism as GMAC5, only registers offset changes. Lets use the same TC callbacks and implement the .config_cbs callback in XGMAC2 core. Signed-off-by: Jose Abreu Cc: David S. Miller Cc: Joao Pinto Cc: Giuseppe Cavallaro Cc: Alexandre Torgue --- drivers/net/ethernet/

[PATCH net 2/2] selftests: pmtu: detect correct binary to ping ipv6 addresses

2018-08-30 Thread Sabrina Dubroca
Some systems don't have the ping6 binary anymore, and use ping for everything. Detect the absence of ping6 and try to use ping instead. Fixes: d1f1b9cbf34c ("selftests: net: Introduce first PMTU test") Signed-off-by: Sabrina Dubroca Acked-by: Stefano Brivio --- tools/testing/selftests/net/pmtu.

[PATCH net 1/2] selftests: pmtu: maximum MTU for vti4 is 2^16-1-20

2018-08-30 Thread Sabrina Dubroca
Since commit 82612de1c98e ("ip_tunnel: restore binding to ifaces with a large mtu"), the maximum MTU for vti4 is based on IP_MAX_MTU instead of the mysterious constant 0xFFF8. This makes this selftest fail. Fixes: 82612de1c98e ("ip_tunnel: restore binding to ifaces with a large mtu") Signed-off-b

[PATCH bpf-next 3/3] i40e: adapt driver to new xdp_umem structure

2018-08-30 Thread Magnus Karlsson
The struct xdp_umem_props was removed in the xsk code and this commit adapts the i40e af_xdp zero-copy driver code to the new xdp_umem structure. Signed-off-by: Magnus Karlsson --- drivers/net/ethernet/intel/i40e/i40e_xsk.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/

[PATCH bpf-next 1/3] i40e: fix possible compiler warning in xsk TX path

2018-08-30 Thread Magnus Karlsson
With certain gcc versions, it was possible to get the warning "'tx_desc' may be used uninitialized in this function" for the i40e_xmit_zc. This was not possible, however this commit simplifies the code path so that this warning is no longer emitted. Signed-off-by: Magnus Karlsson --- drivers/net

[PATCH bpf-next 0/3] xsk: misc code cleanup

2018-08-30 Thread Magnus Karlsson
This patch set cleans up two code style issues with the xsk zero-copy code. The resulting code is smaller and simpler. Patch 1: Removes a potential compiler warning reported by the Intel 0-DAY kernel test infrastructure. Patches 2-3: Removes the xdp_umem_props structure. At some point, it

[PATCH bpf-next 2/3] xsk: get rid of useless struct xdp_umem_props

2018-08-30 Thread Magnus Karlsson
This commit gets rid of the structure xdp_umem_props. It was there to be able to break a dependency at one point, but this is no longer needed. The values in the struct are instead stored directly in the xdp_umem structure. This simplifies the xsk code as well as af_xdp zero-copy drivers and as a b

Re: [PATCH bpf-next v2] xsk: include XDP meta data in AF_XDP frames

2018-08-30 Thread Daniel Borkmann
On 08/30/2018 03:12 PM, Björn Töpel wrote: > From: Björn Töpel > > Previously, the AF_XDP (XDP_DRV/XDP_SKB copy-mode) ingress logic did > not include XDP meta data in the data buffers copied out to the user > application. > > In this commit, we check if meta data is available, and if so, it is >

Re: [PATCH 00/15] soc: octeontx2: Add RVU admin function driver

2018-08-30 Thread Andrew Lunn
> > > My feeling overall is that we need a review from the network driver > > > folks more than the arm-soc team etc, and that maybe the driver > > > as a whole should go into drivers/net/ethernet. > > > > This driver doesn't handle any network IO and moreever this driver has to > > handle > > con

Re: [PATCH 1/2] xfrm6: call kfree_skb when skb is toobig

2018-08-30 Thread Sabrina Dubroca
2018-08-30, 09:58:16 -0300, Thadeu Lima de Souza Cascardo wrote: > After commit d6990976af7c5d8f55903bfb4289b6fb030bf754 ("vti6: fix PMTU caching > and reporting on xmit"), some too big skbs might be potentially passed down to > __xfrm6_output, causing it to fail to transmit but not free the skb, c

[PATCH bpf-next v2] xsk: include XDP meta data in AF_XDP frames

2018-08-30 Thread Björn Töpel
From: Björn Töpel Previously, the AF_XDP (XDP_DRV/XDP_SKB copy-mode) ingress logic did not include XDP meta data in the data buffers copied out to the user application. In this commit, we check if meta data is available, and if so, it is prepended to the frame. Signed-off-by: Björn Töpel ---

[PATCH 1/2] xfrm6: call kfree_skb when skb is toobig

2018-08-30 Thread Thadeu Lima de Souza Cascardo
After commit d6990976af7c5d8f55903bfb4289b6fb030bf754 ("vti6: fix PMTU caching and reporting on xmit"), some too big skbs might be potentially passed down to __xfrm6_output, causing it to fail to transmit but not free the skb, causing a leak of skb, and consequentially a leak of dst references. Af

[PATCH 2/2] vti6: do not check for ignore_df in order to update pmtu

2018-08-30 Thread Thadeu Lima de Souza Cascardo
Before commit d6990976af7c5d8f55903bfb4289b6fb030bf754 ("vti6: fix PMTU caching and reporting on xmit"), skb was scrubbed before checking for ignore_df. The scrubbing meant ignore_df was false, making the check irrelevant. Now that the scrubbing happens after that, some packets might fail the check

Re: [PATCH bpf-next] xsk: include XDP meta data in AF_XDP frames

2018-08-30 Thread Björn Töpel
Den tors 30 aug. 2018 kl 14:37 skrev Daniel Borkmann : > > On 08/30/2018 10:09 AM, Björn Töpel wrote: > > From: Björn Töpel > > > > Previously, the AF_XDP (XDP_DRV/XDP_SKB copy-mode) ingress logic did > > not include XDP meta data in the data buffers copied out to the user > > application. > > > >

Re: [PATCH bpf-next] xsk: include XDP meta data in AF_XDP frames

2018-08-30 Thread Daniel Borkmann
On 08/30/2018 10:09 AM, Björn Töpel wrote: > From: Björn Töpel > > Previously, the AF_XDP (XDP_DRV/XDP_SKB copy-mode) ingress logic did > not include XDP meta data in the data buffers copied out to the user > application. > > In this commit, we check if meta data is available, and if so, it is >

[PATCH net] tcp: do not restart timewait timer on rst reception

2018-08-30 Thread Florian Westphal
RFC 1337 says: ''Ignore RST segments in TIME-WAIT state. If the 2 minute MSL is enforced, this fix avoids all three hazards.'' So with net.ipv4.tcp_rfc1337=1, expected behaviour is to have TIME-WAIT sk expire rather than removing it instantly when a reset is received. However, Linux will also

Re: [PATCH bpf-next 0/3] bpf: implement percpu map pretty print for bpffs and bpftool

2018-08-30 Thread Daniel Borkmann
On 08/29/2018 11:43 PM, Yonghong Song wrote: > Commit a26ca7c982cb ("bpf: btf: Add pretty print support to the > basic arraymap") and Commit 699c86d6ec21 ("bpf: btf: add pretty print > for hash/lru_hash maps") added bpffs pretty print for array, hash and > lru hash maps. The pretty print gives user

Re: [PATCH bpf-next 08/11] i40e: add AF_XDP zero-copy Rx support

2018-08-30 Thread Björn Töpel
On 2018-08-29 21:14, Jakub Kicinski wrote: > On Tue, 28 Aug 2018 14:44:32 +0200, Björn Töpel wrote: >> From: Björn Töpel >> >> This patch adds zero-copy Rx support for AF_XDP sockets. Instead of >> allocating buffers of type MEM_TYPE_PAGE_SHARED, the Rx frames are >> allocated as MEM_TYPE_ZERO_CO

[PATCH net-next 1/2] netlink: ipv4 IGMP join notifications

2018-08-30 Thread Patrick Ruddy
Some userspace applications need to know about IGMP joins from the kernel for 2 reasons 1. To allow the programming of multicast MAC filters in hardware 2. To form a multicast FORUS list for non link-local multicast groups to be sent to the kernel and from there to the interested party. (1) c

Re: [Patch net-nnext] net_sched: add missing tcf_lock for act_connmark

2018-08-30 Thread Vlad Buslov
On Wed 29 Aug 2018 at 17:15, Cong Wang wrote: > According to the new locking rule, we have to take tcf_lock > for both ->init() and ->dump(), as RTNL will be removed. > However, it is missing for act_connmark. Thank you for finding and fixing this! > > Cc: Vlad Buslov > Signed-off-by: Cong Wang

kernels >= v4.12 oops/crash with ipsec-traffic: partly bisected

2018-08-30 Thread Wolfgang Walter
Hello, kernels >= 4.12 do not work on one of our main routers. They crash as soon as ipsec-tunnels are configured and ipsec-traffic actually flows. Just configuring ipsec (that is starting strongswan) does not trigger the oops. I finally found time to bisect that. Though I have not completed t

[PATCH net-next 2/2] netlink: ipv6 MLD join notifications

2018-08-30 Thread Patrick Ruddy
Some userspace applications need to know about MLD joins from the kernel for 2 reasons: 1. To allow the programming of multicast MAC filters in hardware 2. To form a multicast FORUS list for non link-local multicast groups to be sent to the kernel and from there to the interested party. (1) c

[RFT net-next] net: stmmac: Rework coalesce timer and fix multi-queue races

2018-08-30 Thread Jose Abreu
[ As for now this is only for testing! ] This follows David Miller advice and tries to fix coalesce timer in multi-queue scenarios. We are now using per-queue coalesce values and per-queue TX timer. This assumes that tx_queues == rx_queues, which can not be necessarly true. Official patch will ne

Re: [PATCH] rtnetlink: expose value from SET_NETDEV_DEVTYPE via IFLA_DEVTYPE attribute

2018-08-30 Thread Jiri Pirko
Thu, Aug 30, 2018 at 12:13:40PM CEST, mar...@holtmann.org wrote: >Hi Jiri, > > The name value from SET_NETDEV_DEVTYPE only ended up in the uevent sysfs > file as DEVTYPE= information. To avoid any kind of race conditions > between netlink messages and reading from sysfs, it is useful to

  1   2   >