Re: [PATCH bpf-next 3/8] bpf, sockmap: convert to generic sk_msg interface

2018-10-11 Thread John Fastabend
On 10/11/2018 03:57 PM, Alexei Starovoitov wrote: > On Thu, Oct 11, 2018 at 02:45:42AM +0200, Daniel Borkmann wrote: >> Add a generic sk_msg layer, and convert current sockmap and later >> kTLS over to make use of it. While sk_buff handles network packet >> representation from netdevice up to socke

[PATCHv2 2/2] dt-bindings: can: xilinx_can: add Xilinx CAN FD 2.0 bindings

2018-10-11 Thread shubhrajyoti.datta
From: Shubhrajyoti Datta Add compatible string and new attributes to support the Xilinx CAN FD 2.0. Signed-off-by: Shubhrajyoti Datta --- Documentation/devicetree/bindings/net/can/xilinx_can.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/net/can/xilin

[PATCHv2 1/2] can: xilinx: add can 2.0 support

2018-10-11 Thread shubhrajyoti.datta
From: Shubhrajyoti Datta Add support for can 2.0. Signed-off-by: Shubhrajyoti Datta --- drivers/net/can/xilinx_can.c | 34 +- 1 file changed, 33 insertions(+), 1 deletion(-) diff --git a/drivers/net/can/xilinx_can.c b/drivers/net/can/xilinx_can.c index 045f084.

[PATCH net-next] net: Evict neighbor entries on carrier down

2018-10-11 Thread David Ahern
From: David Ahern When a link's carrier goes down it could be a sign of the port changing networks. If the new network has overlapping addresses with the old one, then the kernel will continue trying to use neighbor entries established based on the old network until the entries finally age out -

[PATCH v2 net-next] net/ipv6: Add knob to skip DELROUTE message on device down

2018-10-11 Thread David Ahern
From: David Ahern Another difference between IPv4 and IPv6 is the generation of RTM_DELROUTE notifications when a device is taken down (admin down) or deleted. IPv4 does not generate a message for routes evicted by the down or delete; IPv6 does. A NOS at scale really needs to avoid these messages

Re: [PATCH bpf-next 2/2] bpf, libbpf: simplify perf RB walk and do incremental updates

2018-10-11 Thread Jakub Kicinski
On Thu, 11 Oct 2018 16:02:07 +0200, Daniel Borkmann wrote: > Clean up and improve bpf_perf_event_read_simple() ring walk a bit > to use similar tail update scheme as in perf and bcc allowing the > kernel to make forward progress not only after full timely walk. The extra memory barriers won't impa

Re: [PATCH net-next v7] net/ncsi: Extend NC-SI Netlink interface to allow user space to send NC-SI command

2018-10-11 Thread Samuel Mendoza-Jonas
On Thu, 2018-10-11 at 18:07 +, justin.l...@dell.com wrote: > The new command (NCSI_CMD_SEND_CMD) is added to allow user space application > to send NC-SI command to the network card. > Also, add a new attribute (NCSI_ATTR_DATA) for transferring request and > response. > > The work flow is as

Re: [PATCH bpf-next v2 3/7] bpf: add MAP_LOOKUP_AND_DELETE_ELEM syscall

2018-10-11 Thread Alexei Starovoitov
On Wed, Oct 10, 2018 at 05:50:01PM -0500, Mauricio Vasquez wrote: > > > Does it make sense to you? > > I reread the other patch, and found it does NOT use the following logic for > > queue and stack: > > > > rcu_read_lock(); > > ptr = map->ops->map_lookup_and_delete

Re: [PATCH bpf-next 3/8] bpf, sockmap: convert to generic sk_msg interface

2018-10-11 Thread Alexei Starovoitov
On Thu, Oct 11, 2018 at 02:45:42AM +0200, Daniel Borkmann wrote: > Add a generic sk_msg layer, and convert current sockmap and later > kTLS over to make use of it. While sk_buff handles network packet > representation from netdevice up to socket, sk_msg handles data > representation from applicatio

Re: [PATCH net 0/2] net: dsa: bcm_sf2: Couple of fixes

2018-10-11 Thread David Miller
From: Florian Fainelli Date: Thu, 11 Oct 2018 15:02:54 -0700 > On 10/10/2018 10:53 PM, David Miller wrote: >> From: Florian Fainelli >> Date: Tue, 9 Oct 2018 16:48:56 -0700 >> >>> Here are two fixes for the bcm_sf2 driver that were found during >>> testing unbind and analysing another issue du

Re: [PATCH net 0/2] net: dsa: bcm_sf2: Couple of fixes

2018-10-11 Thread Florian Fainelli
On 10/10/2018 10:53 PM, David Miller wrote: > From: Florian Fainelli > Date: Tue, 9 Oct 2018 16:48:56 -0700 > >> Here are two fixes for the bcm_sf2 driver that were found during >> testing unbind and analysing another issue during system >> suspend/resume. > > Series applied and queued up for -

Some suggestions for tc-tests

2018-10-11 Thread Cong Wang
Hi, I tried to run tc-tests with some old iproute2 package, it is painful. I'd suggest the following improvements: 1. Create veth pair devices by its own. The most important thing for tc-tests is to automate everything, it is not friendly for users to create their own veth pair named v0p0 to just

[PATCH iproute2 net-next] ipneigh: support for NTF_EXT_LEARNED flag on neigh entries

2018-10-11 Thread Roopa Prabhu
From: Roopa Prabhu Adds new option extern_learn to set NTF_EXT_LEARNED flag on neigh entries. Signed-off-by: Roopa Prabhu --- ip/ipneigh.c| 7 ++- man/man8/ip-neighbour.8 | 9 - 2 files changed, 14 insertions(+), 2 deletions(-) diff --git a/ip/ipneigh.c b/ip/ipneigh.c

Re: [PATCH net-next] rxrpc: Remove set but not used variable 'ioc'

2018-10-11 Thread David Howells
Dan Carpenter wrote: > I told him to do that because it wasn't a bugfix... Probably just Fixes > is the right thing to use though. But the correct fix *is* a bug fix. David

[PATCH net-next 1/2] net: phy: improve handling of PHY_RUNNING in state machine

2018-10-11 Thread Heiner Kallweit
Handling of state PHY_RUNNING seems to be more complex than it needs to be. If not polling, then we don't have to do anything, we'll receive an interrupt and go to state PHY_CHANGELINK once the link goes down. If polling and link is down, we don't have to go the extra mile over PHY_CHANGELINK and c

[PATCH net-next 2/2] net: phy: simplify handling of PHY_RESUMING in state machine

2018-10-11 Thread Heiner Kallweit
Simplify code for handling state PHY_RESUMING, no functional change intended. Signed-off-by: Heiner Kallweit --- drivers/net/phy/phy.c | 43 ++- 1 file changed, 14 insertions(+), 29 deletions(-) diff --git a/drivers/net/phy/phy.c b/drivers/net/phy/phy.c i

[PATCH net-next 0/2] net: phy: improve and simplify state machine

2018-10-11 Thread Heiner Kallweit
Improve / simplify handling of states PHY_RUNNING and PHY_RESUMING in phylib state machine. Heiner Kallweit (2): net: phy: improve handling of PHY_RUNNING in state machine net: phy: simplify handling of PHY_RESUMING in state machine drivers/net/phy/phy.c | 72 ++--

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Jamal Hadi Salim
On 2018-10-11 2:44 p.m., David Ahern wrote: On 10/11/18 12:05 PM, Jamal Hadi Salim wrote: On 2018-10-11 1:04 p.m., David Ahern wrote: I meant the general API of users passing filter arguments as attributes to the dump (or values in the header) -- KIND, MASTER, device index, etc. This is an e

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Miller
From: Sowmini Varadhan Date: Thu, 11 Oct 2018 15:32:48 -0400 > Without getting into Ahern's patchset, which he obviously feels > quite passionately about.. > > On (10/11/18 12:28), David Miller wrote: >> >> Once you've composed the message, the whole point of filtering is lost. > > it would b

[PATCH net-next v2] vxlan: support NTF_USE refresh of fdb entries

2018-10-11 Thread Roopa Prabhu
From: Roopa Prabhu This makes use of NTF_USE in vxlan driver consistent with bridge driver. Signed-off-by: Roopa Prabhu --- v2: fix patch prefix drivers/net/vxlan.c | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/net/vxlan.c b/drivers/net/vxlan.c index f

Re: [PATCH cumulus-4.18.y] vxlan: support NTF_USE refresh of fdb entries

2018-10-11 Thread Roopa Prabhu
On Thu, Oct 11, 2018 at 12:33 PM Roopa Prabhu wrote: > > From: Roopa Prabhu > > This makes use of NTF_USE in vxlan driver consistent > with bridge driver. > > Signed-off-by: Roopa Prabhu > --- pls ignore. wrong patch prefix :)

[PATCH cumulus-4.18.y] vxlan: support NTF_USE refresh of fdb entries

2018-10-11 Thread Roopa Prabhu
From: Roopa Prabhu This makes use of NTF_USE in vxlan driver consistent with bridge driver. Signed-off-by: Roopa Prabhu --- drivers/net/vxlan.c | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/net/vxlan.c b/drivers/net/vxlan.c index fb0cdbb..018406c 100644

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Sowmini Varadhan
Without getting into Ahern's patchset, which he obviously feels quite passionately about.. On (10/11/18 12:28), David Miller wrote: > > Once you've composed the message, the whole point of filtering is lost. it would be nice to apply the filter *before* constructing the skb, but afaict most

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Miller
From: David Ahern Date: Thu, 11 Oct 2018 12:44:49 -0600 > I disagree with your overall premise of bpf the end-all hammer. It is a > tool but not the only tool. For starters, you are proposing building the > message, run the filter on it, and potentially back the message up to > drop the recently

Re: [PATCH net] net: udp: fix handling of CHECKSUM_COMPLETE packets

2018-10-11 Thread Eric Dumazet
On 10/11/2018 11:30 AM, Sean Tranchetti wrote: > Current handling of CHECKSUM_COMPLETE packets by the UDP stack is > incorrect for any packet that has an incorrect checksum value. > > udp4/6_csum_init() will both make a call to > __skb_checksum_validate_complete() to initialize/validate the csu

Re: [PATCH net-next] nfp: replace long license headers with SPDX

2018-10-11 Thread David Miller
From: Jakub Kicinski Date: Thu, 11 Oct 2018 08:57:42 -0700 > Replace the repeated license text with SDPX identifiers. > While at it bump the Copyright dates for files we touched > this year. > > Signed-off-by: Edwin Peer > Signed-off-by: Jakub Kicinski > Signed-off-by: Nic Viljoen > Reviewed-

Re: [PATCH] net: phy: sfp: remove sfp_mutex's definition

2018-10-11 Thread David Miller
From: Sebastian Andrzej Siewior Date: Thu, 11 Oct 2018 17:06:21 +0200 > The sfp_mutex variable is defined but never used in this file. Not even > in the commit that introduced that variable. > > Remove sfp_mutex, it has no purpose. > > Cc: Andrew Lunn > Cc: Florian Fainelli > Cc: "David S. Mi

Re: [PATCH 1/1] net: socionext: clear rx irq correctly

2018-10-11 Thread David Miller
From: Ilias Apalodimas Date: Thu, 11 Oct 2018 15:28:26 +0300 > commit 63ae7949e94a ("net: socionext: Use descriptor info instead of MMIO > reads on Rx") > removed constant mmio reads from the driver and started using a descriptor > field to check if packet should be processed. > This lead the n

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
On 10/11/18 12:05 PM, Jamal Hadi Salim wrote: > On 2018-10-11 1:04 p.m., David Ahern wrote: > >> You can already filter link dumps by kind. How? By passing in the KIND >> attribute on a dump request. This type of filtering exists for link >> dumps, neighbor dumps, fdb dumps. Why is there a push to

[PATCH net] net: udp: fix handling of CHECKSUM_COMPLETE packets

2018-10-11 Thread Sean Tranchetti
Current handling of CHECKSUM_COMPLETE packets by the UDP stack is incorrect for any packet that has an incorrect checksum value. udp4/6_csum_init() will both make a call to __skb_checksum_validate_complete() to initialize/validate the csum field when receiving a CHECKSUM_COMPLETE packet. When this

Re: [PATCH net-next 2/9] net/ipv4: Plumb support for filtering route dumps

2018-10-11 Thread Andrew Lunn
On Thu, Oct 11, 2018 at 10:44:04AM -0600, David Ahern wrote: > On 10/11/18 9:56 AM, Andrew Lunn wrote: > >> @@ -866,10 +866,13 @@ static int inet_dump_fib(struct sk_buff *skb, struct > >> netlink_callback *cb) > >>hlist_for_each_entry_rcu(tb, head, tb_hlist) { > >>i

[Patch net] llc: set SOCK_RCU_FREE in llc_sap_add_socket()

2018-10-11 Thread Cong Wang
WHen an llc sock is added into the sk_laddr_hash of an llc_sap, it is not marked with SOCK_RCU_FREE. This causes that the sock could be freed while it is still being read by __llc_lookup_established() with RCU read lock. sock is refcounted, but with RCU read lock, nothing prevents the readers gett

[PATCH net-next v7] net/ncsi: Extend NC-SI Netlink interface to allow user space to send NC-SI command

2018-10-11 Thread Justin.Lee1
The new command (NCSI_CMD_SEND_CMD) is added to allow user space application to send NC-SI command to the network card. Also, add a new attribute (NCSI_ATTR_DATA) for transferring request and response. The work flow is as below. Request: User space application -> Netlink interface (msg)

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Jamal Hadi Salim
On 2018-10-11 1:04 p.m., David Ahern wrote: You can already filter link dumps by kind. How? By passing in the KIND attribute on a dump request. This type of filtering exists for link dumps, neighbor dumps, fdb dumps. Why is there a push to make route dumps different? Why can't they be consistent

[PATCH net-next] net: phy: trigger state machine immediately in phy_start_machine

2018-10-11 Thread Heiner Kallweit
When starting the state machine there may be work to be done immediately, e.g. if the initial state is PHY_UP then the state machine may trigger an autonegotiation. Having said that I see no need to wait a second until the state machine is run first time. Signed-off-by: Heiner Kallweit --- drive

Re: [PATCH net] net/mlx4_core: Fix warnings during boot on driverinit param set failures

2018-10-11 Thread David Miller
From: Tariq Toukan Date: Thu, 11 Oct 2018 15:01:19 +0300 > From: Moshe Shemesh > > During boot, mlx4_core sets the driverinit configuration parameters and > updates the devlink module on the initial values calling > devlink_param_driverinit_value_set(). > If devlink_param_driverinit_value_set()

Re: [PATCH net-next] selftests: use posix-style redirection in ip_defrag.sh

2018-10-11 Thread David Miller
From: Paolo Abeni Date: Thu, 11 Oct 2018 11:17:37 +0200 > The ip_defrag.sh script requires bash-style output redirection but > use the default shell. This may cause random failures if the default > shell is not bash. > Address the above using posix compliant output redirection. > > Fixes: 02c7f3

Re: [PATCH net 0/2] net: explicitly requires bash when needed.

2018-10-11 Thread David Miller
From: Paolo Abeni Date: Thu, 11 Oct 2018 10:54:51 +0200 > Some test scripts require bash-only features but use the default shell. > This may cause random failures if the default shell is not bash. > Instead of doing a potentially complex rewrite of such scripts, these patches > require the bash

Re: [PATCH V2 net-next 00/12] Improving performance and reducing latencies, by using latest capabilities exposed in ENA device

2018-10-11 Thread David Miller
From: Date: Thu, 11 Oct 2018 11:26:15 +0300 > From: Arthur Kiyanovski > > This patchset introduces the following: > 1. A new placement policy of Tx headers and descriptors, which takes > advantage of an option to place headers + descriptors in device memory > space. This is sometimes referred t

Re: [PATCH net-next 00/19] mlxsw: Preparations for VxLAN support

2018-10-11 Thread David Miller
From: Ido Schimmel Date: Thu, 11 Oct 2018 07:47:48 + > This patchset prepares mlxsw for VxLAN support. It contains small and > mostly non-functional changes. Series applied, thanks.

Re: [PATCH net-next] octeontx2-af: Remove set but not used variable 'dev'

2018-10-11 Thread David Miller
From: YueHaibing Date: Thu, 11 Oct 2018 07:37:07 + > Fixes gcc '-Wunused-but-set-variable' warning: > > drivers/net/ethernet/marvell/octeontx2/af/cgx.c: In function > 'cgx_fwi_event_handler': > drivers/net/ethernet/marvell/octeontx2/af/cgx.c:257:17: warning: > variable 'dev' set but not us

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
On 10/11/18 10:46 AM, Jamal Hadi Salim wrote: > On 2018-10-11 12:16 p.m., David Ahern wrote: > > Yes, you can do it with cBPF but some complexity may occur. Example: > if i was interested to netdevice events of "kind = vxlan && > admin flag is down" then that is non trivial to do with classical bu

Re: [PATCH net-next v6] net/ncsi: Extend NC-SI Netlink interface to allow user space to send NC-SI command

2018-10-11 Thread David Miller
From: Date: Thu, 11 Oct 2018 06:21:10 + > @@ -366,6 +368,203 @@ static int ncsi_clear_interface_nl(struct sk_buff *msg, > struct genl_info *info) > return 0; > } > > +static int ncsi_send_cmd_nl(struct sk_buff *msg, struct genl_info *info) > +{ > + struct ncsi_dev_priv *ndp; > +

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Jamal Hadi Salim
On 2018-10-11 12:16 p.m., David Ahern wrote: IMO, bpf at the fill_info stage is not appropriate. Somewhere before the skb is formed (and nlmsg is built). If you go as far as constructing it, then cBPF per what Sowmini should work; but there will be constructs which are trickier. skb->sk

Re: [PATCH net-next 2/9] net/ipv4: Plumb support for filtering route dumps

2018-10-11 Thread David Ahern
On 10/11/18 9:56 AM, Andrew Lunn wrote: >> @@ -866,10 +866,13 @@ static int inet_dump_fib(struct sk_buff *skb, struct >> netlink_callback *cb) >> hlist_for_each_entry_rcu(tb, head, tb_hlist) { >> if (e < s_e) >> goto next; >> +

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Sowmini Varadhan
On (10/11/18 09:33), Roopa Prabhu wrote: > 3. All networking subsystems already have this type of netlink > attribute filtering that apps rely on. This series > just makes it consistent for route dumps. Apps use such mechanism > already when requesting dumps. > Like everywhere else, BPF hook can be

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Roopa Prabhu
On Thu, Oct 11, 2018 at 9:16 AM David Ahern wrote: > > On 10/11/18 10:07 AM, Jamal Hadi Salim wrote: > > On 2018-10-11 11:46 a.m., Sowmini Varadhan wrote: > >> On (10/11/18 08:26), Stephen Hemminger wrote: > >>> You can do the something like this already with BPF socket filters. > >>> But writing

[PATCH 1/2] can: xilinx: add can 2.0 support

2018-10-11 Thread Shubhrajyoti Datta
Add support for can 2.0. Signed-off-by: Shubhrajyoti Datta --- drivers/net/can/xilinx_can.c | 34 +- 1 file changed, 33 insertions(+), 1 deletion(-) diff --git a/drivers/net/can/xilinx_can.c b/drivers/net/can/xilinx_can.c index 045f084..7c4f5ad 100644 --- a/drive

[PATCH 2/2] dt-bindings: can: xilinx_can: add Xilinx CAN FD 2.0 bindings

2018-10-11 Thread Shubhrajyoti Datta
Add compatible string and new attributes to support the Xilinx CAN FD 2.0. Signed-off-by: Shubhrajyoti Datta --- Documentation/devicetree/bindings/net/can/xilinx_can.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/net/can/xilinx_can.txt b/Documentation/

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
On 10/11/18 10:07 AM, Jamal Hadi Salim wrote: > On 2018-10-11 11:46 a.m., Sowmini Varadhan wrote: >> On (10/11/18 08:26), Stephen Hemminger wrote: >>> You can do the something like this already with BPF socket filters. >>> But writing BPF for multi-part messages is hard. >> >> Indeed. And I was jus

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
On 10/11/18 10:10 AM, Sowmini Varadhan wrote: > On (10/11/18 09:32), David Ahern wrote: >> >> Route dumps are done for the entire FIB for each address family. As we >> approach internet routing tables (700k+ routes for IPv4, currently >> around 55k for IPv6) with many VRFs dumping the entire table

Wohltätigkeitsspende in Höhe von € 2.000.000,00

2018-10-11 Thread ines_valdiviezo
Lieber Freund, Ich bin Herr Tayeb Souami, New Jersey, Vereinigte Staaten von Amerika, der Mega-Gewinner von $ 315million In Mega Millions Jackpot, spende ich an 5 zufällige Personen, wenn Sie diese E-Mail erhalten, dann wurde Ihre E-Mail nach einem Spinball ausgewählt.Ich habe den größten Teil

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Sowmini Varadhan
On (10/11/18 09:32), David Ahern wrote: > > Route dumps are done for the entire FIB for each address family. As we > approach internet routing tables (700k+ routes for IPv4, currently > around 55k for IPv6) with many VRFs dumping the entire table is grossly > inefficient when for example only a si

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Jamal Hadi Salim
On 2018-10-11 11:46 a.m., Sowmini Varadhan wrote: On (10/11/18 08:26), Stephen Hemminger wrote: You can do the something like this already with BPF socket filters. But writing BPF for multi-part messages is hard. Indeed. And I was just experimenting with this for ARP just last week. So to hand

[PATCH net-next] nfp: replace long license headers with SPDX

2018-10-11 Thread Jakub Kicinski
Replace the repeated license text with SDPX identifiers. While at it bump the Copyright dates for files we touched this year. Signed-off-by: Edwin Peer Signed-off-by: Jakub Kicinski Signed-off-by: Nic Viljoen Reviewed-by: Simon Horman --- drivers/net/ethernet/netronome/nfp/abm/ctrl.c | 35 ++-

Re: [PATCH net-next 2/9] net/ipv4: Plumb support for filtering route dumps

2018-10-11 Thread Andrew Lunn
> @@ -866,10 +866,13 @@ static int inet_dump_fib(struct sk_buff *skb, struct > netlink_callback *cb) > hlist_for_each_entry_rcu(tb, head, tb_hlist) { > if (e < s_e) > goto next; > + if (filter.table_id && filter.

Re: [PATCH] net: phy: sfp: remove sfp_mutex's definition

2018-10-11 Thread Andrew Lunn
On Thu, Oct 11, 2018 at 05:06:21PM +0200, Sebastian Andrzej Siewior wrote: > The sfp_mutex variable is defined but never used in this file. Not even > in the commit that introduced that variable. > > Remove sfp_mutex, it has no purpose. Reviewed-by: Andrew Lunn Andrew

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Sowmini Varadhan
On (10/11/18 08:26), Stephen Hemminger wrote: > You can do the something like this already with BPF socket filters. > But writing BPF for multi-part messages is hard. Indeed. And I was just experimenting with this for ARP just last week. So to handle the caes of "ip neigh show a.b.c.d" without wal

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
On 10/11/18 9:26 AM, Stephen Hemminger wrote: >> > > You can do the something like this already with BPF socket filters. > But writing BPF for multi-part messages is hard. > > Maybe a generic eBPF filter mechanism would be more flexible? > That exists today and does not cover what is needed her

Re: [PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread Stephen Hemminger
On Thu, 11 Oct 2018 08:06:18 -0700 David Ahern wrote: > From: David Ahern > > Implement kernel side filtering of route dumps by protocol (e.g., which > routing daemon installed the route), route type (e.g., unicast), table > id and nexthop device. > > iproute2 has been doing this filtering in

Re: [PATCH iproute 2/2] utils: fix get_rtnl_link_stats_rta stats parsing

2018-10-11 Thread Stephen Hemminger
On Thu, 11 Oct 2018 14:24:03 +0200 Lorenzo Bianconi wrote: > > > iproute2 walks through the list of available tunnels using netlink > > > protocol in order to get device info instead of reading > > > them from proc filesystem. However the kernel reports device statistics > > > using IFLA_INET6_ST

[PATCH net-next 7/9] net/mpls: Handle kernel side filtering of route dumps

2018-10-11 Thread David Ahern
From: David Ahern Update the dump request parsing in MPLS for the non-INET case to enable kernel side filtering. If INET is disabled the other filters that make sense for MPLS are protocol and nexthop device. Signed-off-by: David Ahern --- net/mpls/af_mpls.c | 32 +++---

[PATCH net-next 4/9] net/mpls: Plumb support for filtering route dumps

2018-10-11 Thread David Ahern
From: David Ahern Implement kernel side filtering of routes by egress device index and protocol. MPLS uses only a single table and route type. Signed-off-by: David Ahern --- net/mpls/af_mpls.c | 42 +- 1 file changed, 41 insertions(+), 1 deletion(-) dif

[PATCH net-next 2/9] net/ipv4: Plumb support for filtering route dumps

2018-10-11 Thread David Ahern
From: David Ahern Implement kernel side filtering of routes by table id, egress device index, protocol and route type. Signed-off-by: David Ahern --- include/net/ip_fib.h| 2 +- net/ipv4/fib_frontend.c | 5 - net/ipv4/fib_trie.c | 37 ++--- 3 files

[PATCH] net: phy: sfp: remove sfp_mutex's definition

2018-10-11 Thread Sebastian Andrzej Siewior
The sfp_mutex variable is defined but never used in this file. Not even in the commit that introduced that variable. Remove sfp_mutex, it has no purpose. Cc: Andrew Lunn Cc: Florian Fainelli Cc: "David S. Miller" Signed-off-by: Sebastian Andrzej Siewior --- drivers/net/phy/sfp.c | 2 -- 1 fi

[PATCH net-next 3/9] net/ipv6: Plumb support for filtering route dumps

2018-10-11 Thread David Ahern
From: David Ahern Implement kernel side filtering of routes by table id, egress device index, protocol, and route type. Move the existing route flags check for prefix only routes to the new filter. Signed-off-by: David Ahern --- net/ipv6/ip6_fib.c | 9 + net/ipv6/route.c | 40 +

[PATCH net-next 1/9] net: Add struct for fib dump filter

2018-10-11 Thread David Ahern
From: David Ahern Add struct fib_dump_filter for options on limiting which routes are returned in a dump request. The current list is table id, protocol, route type, rtm_flags and nexthop device index. struct net is needed to lookup the net_device from the index. Plumb the new arguments from dum

[PATCH net-next 6/9] net: Enable kernel side filtering of route dumps

2018-10-11 Thread David Ahern
From: David Ahern Update parsing of route dump request to enable kernel side filtering. Allow filtering results by protocol (e.g., which routing daemon installed the route), route type (e.g., unicast), table id and nexthop device. These amount to the low hanging fruit, yet a huge improvement, for

[PATCH net-next 5/9] net: Plumb support for filtering ipv4 and ipv6 multicast route dumps

2018-10-11 Thread David Ahern
From: David Ahern Implement kernel side filtering of routes by egress device index and table id. Signed-off-by: David Ahern --- include/linux/mroute_base.h | 5 +++-- net/ipv4/ipmr.c | 2 +- net/ipv4/ipmr_base.c| 33 - net/ipv6/ip6mr.c

[PATCH net-next 8/9] net/ipv6: Bail early if user only wants cloned entries

2018-10-11 Thread David Ahern
From: David Ahern Similar to IPv4, IPv6 fib no longer contains cloned routes. If a user requests a route dump for only cloned entries, no sense walking the FIB and returning everything. Signed-off-by: David Ahern --- net/ipv6/ip6_fib.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(

[PATCH net-next 9/9] net/ipv4: Bail early if user only wants prefix entries

2018-10-11 Thread David Ahern
From: David Ahern Unlike IPv6, IPv4 does not have routes marked with RTF_PREFIX_RT. If the flag is set in the dump request, just return. In the process of this change, move the CLONE check to use the new filter flags. Signed-off-by: David Ahern --- net/ipv4/fib_frontend.c | 8 ++-- 1 file

[PATCH net-next 0/9] net: Kernel side filtering for route dumps

2018-10-11 Thread David Ahern
From: David Ahern Implement kernel side filtering of route dumps by protocol (e.g., which routing daemon installed the route), route type (e.g., unicast), table id and nexthop device. iproute2 has been doing this filtering in userspace for years; pushing the filters to the kernel side reduces th

Re: [virtio-dev] Re: [PATCH net-next v2 0/5] virtio: support packed ring

2018-10-11 Thread Tiwei Bie
On Thu, Oct 11, 2018 at 10:17:15AM -0400, Michael S. Tsirkin wrote: > On Thu, Oct 11, 2018 at 10:13:31PM +0800, Tiwei Bie wrote: > > On Thu, Oct 11, 2018 at 09:48:48AM -0400, Michael S. Tsirkin wrote: > > > On Thu, Oct 11, 2018 at 08:12:21PM +0800, Tiwei Bie wrote: > > > > > > But if it's not too l

9p/RDMA for syzkaller (Was: BUG: corrupted list in p9_read_work)

2018-10-11 Thread Dominique Martinet
Dmitry Vyukov wrote on Thu, Oct 11, 2018: > > Now we are talking! > > We generally assume that all modules are simply compiled into kernel. > > At least that's we have on syzbot. If somebody can't compile them in, > > we can suggest to add modprobe into init. > > So this boils down to just writing

9p/RDMA for syzkaller (Was: BUG: corrupted list in p9_read_work)

2018-10-11 Thread Dominique Martinet
Dmitry Vyukov wrote on Thu, Oct 11, 2018: > But again we don't need to support all of the available hardware. I agree with that, I just have no idea what the "librxe-rdmav16.so" lib could be doing and described something I am slightly more familiar with (e.g. libmlx5) I talked about a common subse

Re: [virtio-dev] Re: [PATCH net-next v2 0/5] virtio: support packed ring

2018-10-11 Thread Michael S. Tsirkin
On Thu, Oct 11, 2018 at 10:13:31PM +0800, Tiwei Bie wrote: > On Thu, Oct 11, 2018 at 09:48:48AM -0400, Michael S. Tsirkin wrote: > > On Thu, Oct 11, 2018 at 08:12:21PM +0800, Tiwei Bie wrote: > > > > > But if it's not too late, I second for a OUT_OF_ORDER feature. > > > > > Starting from in order c

Re: [virtio-dev] Re: [PATCH net-next v2 0/5] virtio: support packed ring

2018-10-11 Thread Tiwei Bie
On Thu, Oct 11, 2018 at 09:48:48AM -0400, Michael S. Tsirkin wrote: > On Thu, Oct 11, 2018 at 08:12:21PM +0800, Tiwei Bie wrote: > > > > But if it's not too late, I second for a OUT_OF_ORDER feature. > > > > Starting from in order can have much simpler code in driver. > > > > > > > > Thanks > > >

Re: [PATCH stable 4.4 V2 0/6] fix SegmentSmack in stable branch (CVE-2018-5390)

2018-10-11 Thread Greg KH
On Wed, Sep 26, 2018 at 10:21:21PM +0200, Greg KH wrote: > On Tue, Sep 25, 2018 at 10:10:15PM +0800, maowenan wrote: > > Hi Greg: > > > > can you review this patch set? > > It is still in the queue, don't worry. It will take some more time to > properly review and test it. > > Ideally you could

Re: Possible bug in traffic control?

2018-10-11 Thread Josh Coombs
I'm actually leaning towards macsec now. I'm at 6TB transferred in a double hop, no macsec over the bridge setup without triggering the fault. I'm going to let it continue to churn and setup a second testbed that JUST uses macsec without traffic control bridging to see if I can trip the issue the

[PATCH bpf-next 2/2] bpf, libbpf: simplify perf RB walk and do incremental updates

2018-10-11 Thread Daniel Borkmann
Clean up and improve bpf_perf_event_read_simple() ring walk a bit to use similar tail update scheme as in perf and bcc allowing the kernel to make forward progress not only after full timely walk. Also few other improvements to use realloc() instead of free() and malloc() combination and for the ca

[PATCH bpf-next 0/2] Two libbpf RB walk improvements

2018-10-11 Thread Daniel Borkmann
Two small improvements to libbpf's perf RB walk: first one fixes used barriers and second one simplifies ring walking code. For details see individual patches. Thanks! Daniel Borkmann (2): bpf, libbpf: use proper barriers in perf RB walk bpf, libbpf: simplify perf RB walk and do incremental u

[PATCH bpf-next 1/2] bpf, libbpf: use proper barriers in perf RB walk

2018-10-11 Thread Daniel Borkmann
User proper CPU barrier instead of just a compile barrier when fetching ring's data_head in bpf_perf_event_read_simple() which is not correct. Also, add two small helpers bpf_perf_read_head() and bpf_perf_write_tail() to make used barriers more obvious and a comment to what they pair to. Fixes: d0

[PATCH] r8169: set RX_MULTI_EN bit in RxConfig for 8168F-family chips

2018-10-11 Thread Maciej S. Szmigiero
It has been reported that since commit 05212ba8132b42 ("r8169: set RxConfig after tx/rx is enabled for RTL8169sb/8110sb devices") at least RTL_GIGA_MAC_VER_38 NICs work erratically after a resume from suspend. The problem has been traced to a missing RX_MULTI_EN bit in the RxConfig register. We al

Re: [PATCH 1/1] net: socionext: clear rx irq correctly

2018-10-11 Thread Ard Biesheuvel
On 11 October 2018 at 14:28, Ilias Apalodimas wrote: > commit 63ae7949e94a ("net: socionext: Use descriptor info instead of MMIO > reads on Rx") > removed constant mmio reads from the driver and started using a descriptor > field to check if packet should be processed. > This lead the napi rx han

Re: [PATCH net 2/2] selftests: udpgso_bench.sh explicitly requires bash

2018-10-11 Thread Willem de Bruijn
On Thu, Oct 11, 2018 at 4:58 AM Paolo Abeni wrote: > > The udpgso_bench.sh script requires several bash-only features. This > may cause random failures if the default shell is not bash. > Address the above explicitly requiring bash as the script interpreter > > Fixes: 3a687bef148d ("selftests: udp

Re: [virtio-dev] Re: [PATCH net-next v2 0/5] virtio: support packed ring

2018-10-11 Thread Michael S. Tsirkin
On Thu, Oct 11, 2018 at 08:12:21PM +0800, Tiwei Bie wrote: > > > But if it's not too late, I second for a OUT_OF_ORDER feature. > > > Starting from in order can have much simpler code in driver. > > > > > > Thanks > > > > It's tricky to change the flag polarity because of compatibility > > with l

Re: BUG: corrupted list in p9_read_work

2018-10-11 Thread Dmitry Vyukov
On Thu, Oct 11, 2018 at 3:27 PM, Dmitry Vyukov wrote: > On Thu, Oct 11, 2018 at 3:10 PM, Dominique Martinet > wrote: >> Dmitry Vyukov wrote on Thu, Oct 11, 2018: >>> > That's still the tricky part, I'm afraid... Making a separate server >>> > would have been easy because I could have reused some

RE: [PATCH net] tipc: eliminate possible recursive locking detected by LOCKDEP

2018-10-11 Thread Jon Maloy
Acked-by: Jon Maloy ///jon > -Original Message- > From: Ying Xue > Sent: October 11, 2018 7:58 AM > To: Jon Maloy ; dvyu...@google.com > Cc: da...@davemloft.net; parthasarathy.bhuvara...@ericsson.com; > netdev@vger.kernel.org; linux-ker...@vger.kernel.org; tipc- > discuss...@lists.sour

Re: BUG: corrupted list in p9_read_work

2018-10-11 Thread Dmitry Vyukov
On Thu, Oct 11, 2018 at 3:10 PM, Dominique Martinet wrote: > Dmitry Vyukov wrote on Thu, Oct 11, 2018: >> > That's still the tricky part, I'm afraid... Making a separate server >> > would have been easy because I could have reused some of my junk for the >> > actual connection handling (some rdma

Re: BUG: corrupted list in p9_read_work

2018-10-11 Thread Dominique Martinet
Dmitry Vyukov wrote on Thu, Oct 11, 2018: > > That's still the tricky part, I'm afraid... Making a separate server > > would have been easy because I could have reused some of my junk for the > > actual connection handling (some rdma helper library I wrote ages > > ago[1]), but if you're going to j

Re: [PATCH] virtio_net: enable tx after resuming from suspend

2018-10-11 Thread Jason Wang
On 2018年10月11日 18:22, ake wrote: On 2018年10月11日 18:44, Jason Wang wrote: On 2018年10月11日 15:51, Ake Koomsin wrote: commit 713a98d90c5e ("virtio-net: serialize tx routine during reset") disabled the virtio tx before going to suspend to avoid a use after free. However, after resuming, it caus

[PATCH] net: cdc_ncm: use tasklet_init() for tasklet_struct init

2018-10-11 Thread Ben Dooks
The tasklet initialisation would be better done by tasklet_init() instead of assuming all the fields are in an ok state by default. This does not fix any actual know bug. Signed-off-by: Ben Dooks --- drivers/net/usb/cdc_ncm.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a

Re: BUG: corrupted list in p9_read_work

2018-10-11 Thread Dmitry Vyukov
On Wed, Oct 10, 2018 at 5:58 PM, Dominique Martinet wrote: > Dmitry Vyukov wrote on Wed, Oct 10, 2018: >> > The problem is that you can't just give the client a file like trans fd; >> > you'd need to open an ""rdma socket"" (simplifying wording a bit), and >> > afaik there is no standard tool for

[PATCH 1/1] net: socionext: clear rx irq correctly

2018-10-11 Thread Ilias Apalodimas
commit 63ae7949e94a ("net: socionext: Use descriptor info instead of MMIO reads on Rx") removed constant mmio reads from the driver and started using a descriptor field to check if packet should be processed. This lead the napi rx handler being constantly called while no packets needed processing

Re: [PATCH iproute 2/2] utils: fix get_rtnl_link_stats_rta stats parsing

2018-10-11 Thread Lorenzo Bianconi
> > iproute2 walks through the list of available tunnels using netlink > > protocol in order to get device info instead of reading > > them from proc filesystem. However the kernel reports device statistics > > using IFLA_INET6_STATS/IFLA_INET6_ICMP6STATS attributes nested in > > IFLA_PROTINFO one

Re: net/tipc: recursive locking in tipc_link_reset

2018-10-11 Thread Ying Xue
Jon, please help to review the patch: https://patchwork.ozlabs.org/patch/982447. Thanks, Ying On 10/11/2018 06:55 PM, Jon Maloy wrote: > Hi Dmitry, > Yes, we are aware of this, the kernel test robot warned us about this a few > days ago. > I am looking into it. > > ///jon

Re: [virtio-dev] Re: [PATCH net-next v2 0/5] virtio: support packed ring

2018-10-11 Thread Tiwei Bie
On Wed, Oct 10, 2018 at 10:36:26AM -0400, Michael S. Tsirkin wrote: > On Thu, Sep 13, 2018 at 05:47:29PM +0800, Jason Wang wrote: > > On 2018年09月13日 16:59, Tiwei Bie wrote: > > > > If what you say is true then we should take a careful look > > > > and not supporting these generic things with packed

Re: net/tipc: recursive locking in tipc_link_reset

2018-10-11 Thread Dmitry Vyukov
On Thu, Oct 11, 2018 at 2:03 PM, Ying Xue wrote: >>> Hi, >>> >>> I am getting the following error while booting the latest kernel on >>> bb2d8f2f61047cbde08b78ec03e4ebdb01ee5434 (Oct 10). Config is attached. >>> >>> Since this happens during boot, this makes LOCKDEP completely >>> unusable, does n

Re: net/tipc: recursive locking in tipc_link_reset

2018-10-11 Thread Ying Xue
On 10/11/2018 03:59 PM, Dmitry Vyukov wrote: > On Thu, Oct 11, 2018 at 9:55 AM, Dmitry Vyukov wrote: >> Hi, >> >> I am getting the following error while booting the latest kernel on >> bb2d8f2f61047cbde08b78ec03e4ebdb01ee5434 (Oct 10). Config is attached. >> >> Since this happens during boot, this

[PATCH net] tipc: eliminate possible recursive locking detected by LOCKDEP

2018-10-11 Thread Ying Xue
When booting kernel with LOCKDEP option, below warning info was found: WARNING: possible recursive locking detected 4.19.0-rc7+ #14 Not tainted swapper/0/1 is trying to acquire lock: dcfc0fc8 (&(&list->lock)->rlock#4){+...}, at: spin_lock_bh inc

  1   2   >