Re: [PATCH net] net: sched: Remove TCA_OPTIONS from policy

2018-10-24 Thread Jiri Pirko
Wed, Oct 24, 2018 at 05:32:49PM CEST, dsah...@kernel.org wrote: >From: David Ahern > >Marco reported an error with hfsc: >root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 >Error: Attribute failed policy validation. > >Apparently a few implementations pass TCA_OPTIONS as a bina

Re: [PATCH] octeontx2-af: Use GFP_ATOMIC under spin lock

2018-10-24 Thread Sunil Kovvuri
On Thu, Oct 25, 2018 at 7:02 AM Wei Yongjun wrote: > > The function nix_update_mce_list() is called from > nix_update_bcast_mce_list(), and a spin lock is held > here, so we should use GFP_ATOMIC instead. > > Fixes: 4b05528ebf0c ("octeontx2-af: Update bcast list upon NIXLF alloc/free") > Signed-of

[PATCH] octeontx2-af: Use GFP_ATOMIC under spin lock

2018-10-24 Thread Wei Yongjun
The function nix_update_mce_list() is called from nix_update_bcast_mce_list(), and a spin lock is held here, so we should use GFP_ATOMIC instead. Fixes: 4b05528ebf0c ("octeontx2-af: Update bcast list upon NIXLF alloc/free") Signed-off-by: Wei Yongjun --- drivers/net/ethernet/marvell/octeontx2/af

Re: [PATCH bpf 7/7] bpf: make direct packet write unclone more robust

2018-10-24 Thread Song Liu
On Wed, Oct 24, 2018 at 3:08 PM Daniel Borkmann wrote: > > On 10/24/2018 11:42 PM, Song Liu wrote: > > On Wed, Oct 24, 2018 at 1:06 PM Daniel Borkmann > > wrote: > >> > >> Given this seems to be quite fragile and can easily slip through the > >> cracks, lets make direct packet write more robust

Re: [net 0/7][pull request] Intel Wired LAN Driver Fixes 2018-10-24

2018-10-24 Thread David Miller
From: Jeff Kirsher Date: Wed, 24 Oct 2018 14:47:24 -0700 > This series contains fixes for the ice driver. > > Anirudh fixes a namespace issue which was introduced with a previous > patch to remove ice_netpoll. Fixed up the device ID define names to > align with the branding string names. Use t

Re: [PATCH bpf 5/7] bpf: fix direct packet write into pop/peek helpers

2018-10-24 Thread Mauricio Vasquez
On 10/24/18 3:05 PM, Daniel Borkmann wrote: Commit f1a2e44a3aec ("bpf: add queue and stack maps") probably just copy-pasted .pkt_access for bpf_map_{pop,peek}_elem() helpers, but this is buggy in this context since it would allow writes into cloned skbs which is invalid. Therefore, disable .pkt

Re: [PATCH bpf 6/7] bpf: fix leaking uninitialized memory on pop/peek helpers

2018-10-24 Thread Mauricio Vasquez
On 10/24/18 3:05 PM, Daniel Borkmann wrote: Commit f1a2e44a3aec ("bpf: add queue and stack maps") added helpers with ARG_PTR_TO_UNINIT_MAP_VALUE. Meaning, the helper is supposed to fill the map value buffer with data instead of reading from it like in other helpers such as map update. However, gi

Re: [PATCH bpf 7/7] bpf: make direct packet write unclone more robust

2018-10-24 Thread Daniel Borkmann
On 10/24/2018 11:42 PM, Song Liu wrote: > On Wed, Oct 24, 2018 at 1:06 PM Daniel Borkmann wrote: >> >> Given this seems to be quite fragile and can easily slip through the >> cracks, lets make direct packet write more robust by requiring that >> future program types which allow for such write must

[PATCH net] net: ethernet: cadence: fix socket buffer corruption problem

2018-10-24 Thread Tristram.Ha
From: Tristram Ha Socket buffer is not re-created when headroom is 2 and tailroom is 1. Signed-off-by: Tristram Ha --- drivers/net/ethernet/cadence/macb_main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/cadence/macb_main.c b/drivers/net/ethernet/c

Re: [PATCH] r8169: Add new device ID support

2018-10-24 Thread Heiner Kallweit
On 24.10.2018 23:22, David Miller wrote: > From: Shawn Lin > Date: Wed, 24 Oct 2018 09:46:47 +0800 > >> It's found my r8169 ethernet card at hand has a device ID >> of 0x which wasn't on the list of rtl8169_pci_tbl. Add >> a new entry to make it work: >> >> [2.165785] r8169 Gigabit Ethernet d

[net 4/7] ice: Use capability count returned by the firmware

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan The firmware now returns the capability count in the command buffer. Use it. Signed-off-by: Anirudh Venkataramanan Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/ice/ice_common.c | 4 +--- 1 file changed, 1 insertion(+), 3 del

[net 2/7] ice: Change device ID define names to align with branding string

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan Basically remove references to C810 and use E810C (from the branding string) instead. Signed-off-by: Anirudh Venkataramanan Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/ice/ice_devids.h | 6 +++--- drivers/net/ethernet/intel

Re: [PATCH bpf 0/7] Batch of direct packet access fixes for BPF

2018-10-24 Thread Song Liu
On Wed, Oct 24, 2018 at 1:08 PM Daniel Borkmann wrote: > > Several fixes to get direct packet access in order from verifier > side. Also test suite fix to run cg_skb as unpriv and an improvement > to make direct packet write less error prone in future. > > Thanks! > > Daniel Borkmann (7): > bpf:

[net 6/7] ice: Allocate VF interrupts and set queue map

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan Allocate VF interrupts using VPINT_ALLOC_PCI. Multiple interrupts are specified as a range from "first" to "last". Also, according to the spec, the queue mapping for a VF needs to be set in both contig and scatter queue modes. So make this change as well. Signed-off

[net 3/7] ice: Update expected FW version

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan Update to the current firmware major and minor version which are 1 and 3 respectively. Also remove an empty comment line. Signed-off-by: Anirudh Venkataramanan Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/ice/ice_controlq.h

[net 5/7] ice: Introduce ice_dev_onetime_setup

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan ice_dev_onetime_setup contains a couple of driver workarounds for current firmware limitations. These workarounds are expected to go away once these limitations are fixed in the firmware. On a firmware release that has these issues addressed, these workarounds (while

[net 7/7] ice: Poll for link status change

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan When the physical link goes up or down, the driver is supposed to receive a link status event (LSE). The driver currently has the code to handle LSEs but there is no firmware support for this feature yet. So this patch adds the ability for the driver to poll for link

[net 1/7] ice: Make ice_msix_clean_rings static

2018-10-24 Thread Jeff Kirsher
From: Anirudh Venkataramanan commit 158a08a694c4e ("ice: remove ndo_poll_controller") removed ice_netpoll and introduced a namespace warning for ice_msix_clean_rings. Fix the namespace warning by making ice_msix_clean_rings static. Signed-off-by: Anirudh Venkataramanan Tested-by: Andrew Bowers

[net 0/7][pull request] Intel Wired LAN Driver Fixes 2018-10-24

2018-10-24 Thread Jeff Kirsher
This series contains fixes for the ice driver. Anirudh fixes a namespace issue which was introduced with a previous patch to remove ice_netpoll. Fixed up the device ID define names to align with the branding string names. Use the capability count returned by the firmware, instead of calculating

Re: [PATCH bpf 7/7] bpf: make direct packet write unclone more robust

2018-10-24 Thread Song Liu
On Wed, Oct 24, 2018 at 1:06 PM Daniel Borkmann wrote: > > Given this seems to be quite fragile and can easily slip through the > cracks, lets make direct packet write more robust by requiring that > future program types which allow for such write must provide a prologue > callback. In case of XDP

Re: [PATCH net] net/ipv6: Allow onlink routes to have a device mismatch if it is the default route

2018-10-24 Thread David Miller
From: David Ahern Date: Wed, 24 Oct 2018 13:58:39 -0700 > From: David Ahern > > The intent of ip6_route_check_nh_onlink is to make sure the gateway > given for an onlink route is not actually on a connected route for > a different interface (e.g., 2001:db8:1::/64 is on dev eth1 and then > an on

Re: [PATCH net] net: sched: Remove TCA_OPTIONS from policy

2018-10-24 Thread David Miller
From: David Ahern Date: Wed, 24 Oct 2018 08:32:49 -0700 > From: David Ahern > > Marco reported an error with hfsc: > root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 > Error: Attribute failed policy validation. > > Apparently a few implementations pass TCA_OPTIONS as a bin

Re: [PATCH net-next] octeontx2-af: Copy the right amount of memory

2018-10-24 Thread David Miller
From: Dan Carpenter Date: Wed, 24 Oct 2018 11:32:21 +0300 > This is a copy and paste bug where we copied the sizeof() from the chunk > before. We're copying more data than intended but the destination is a > union so it doesn't cause memory corruption. > > Fixes: ffb0abd7e9cb ("octeontx2-af: NI

Re: [PATCH net-next 1/3] net/sock: factor out dequeue/peek with offset code

2018-10-24 Thread Alexei Starovoitov
On Tue, Oct 23, 2018 at 09:28:03AM +0200, Paolo Abeni wrote: > Hi, > > On Mon, 2018-10-22 at 21:49 -0700, Alexei Starovoitov wrote: > > On Mon, May 15, 2017 at 11:01:42AM +0200, Paolo Abeni wrote: > > > And update __sk_queue_drop_skb() to work on the specified queue. > > > This will help the udp p

Re: [PATCH] r8169: Add new device ID support

2018-10-24 Thread David Miller
From: Shawn Lin Date: Wed, 24 Oct 2018 09:46:47 +0800 > It's found my r8169 ethernet card at hand has a device ID > of 0x which wasn't on the list of rtl8169_pci_tbl. Add > a new entry to make it work: > > [2.165785] r8169 Gigabit Ethernet driver 2.3LK-NAPI loaded > [2.165863] r8169 :01:

Re: [PATCH net v2] net: udp: fix handling of CHECKSUM_COMPLETE packets

2018-10-24 Thread David Miller
From: Sean Tranchetti Date: Tue, 23 Oct 2018 16:04:31 -0600 > Current handling of CHECKSUM_COMPLETE packets by the UDP stack is > incorrect for any packet that has an incorrect checksum value. > > udp4/6_csum_init() will both make a call to > __skb_checksum_validate_complete() to initialize/vali

Re: [PATCH net 0/4] net: Fixups for recent dump filtering changes

2018-10-24 Thread David Miller
From: David Ahern Date: Wed, 24 Oct 2018 12:58:58 -0700 > Li RongQing noted that tgt_net is leaked in ipv4 due to the recent change > to handle address dumps for a specific device. The report also applies to > ipv6 and other error paths. Patches 1 and 2 fix those leaks. > > Patch 3 stops route d

Re: Regression in 4.19 net/phy/realtek: garbled sysfs output

2018-10-24 Thread David Miller
From: Holger Hoffstätte Date: Wed, 24 Oct 2018 21:36:02 +0200 Adding Heiner to CC: > Since 4.19 r8169 depends on phylib: > > $lsmod | grep r8169 > r8169 81920 0 > libphy 57344 2 r8169,realtek > > Unfortunately this now gives me the following sysfs error: > >

[PATCH net] net/ipv6: Allow onlink routes to have a device mismatch if it is the default route

2018-10-24 Thread David Ahern
From: David Ahern The intent of ip6_route_check_nh_onlink is to make sure the gateway given for an onlink route is not actually on a connected route for a different interface (e.g., 2001:db8:1::/64 is on dev eth1 and then an onlink route has a via 2001:db8:1::1 dev eth2). If the gateway lookup hi

Re: Regression in 4.19 net/phy/realtek: garbled sysfs output

2018-10-24 Thread Andrew Lunn
On Wed, Oct 24, 2018 at 09:36:02PM +0200, Holger Hoffstätte wrote: > Hi, > > Since 4.19 r8169 depends on phylib: > > $lsmod | grep r8169 > r8169 81920 0 > libphy 57344 2 r8169,realtek > > Unfortunately this now gives me the following sysfs error: > > $cd /sys/

[PATCH bpf 1/7] bpf: fix test suite to enable all unpriv program types

2018-10-24 Thread Daniel Borkmann
Given BPF_PROG_TYPE_CGROUP_SKB program types are also valid in an unprivileged setting, lets not omit these tests and potentially have issues fall through the cracks. Make this more obvious by adding a small test_as_unpriv() helper. Signed-off-by: Daniel Borkmann Acked-by: Alexei Starovoitov ---

[PATCH bpf 5/7] bpf: fix direct packet write into pop/peek helpers

2018-10-24 Thread Daniel Borkmann
Commit f1a2e44a3aec ("bpf: add queue and stack maps") probably just copy-pasted .pkt_access for bpf_map_{pop,peek}_elem() helpers, but this is buggy in this context since it would allow writes into cloned skbs which is invalid. Therefore, disable .pkt_access for the two. Fixes: f1a2e44a3aec ("bpf:

[PATCH bpf 4/7] bpf: fix cg_skb types to hint access type in may_access_direct_pkt_data

2018-10-24 Thread Daniel Borkmann
Commit b39b5f411dcf ("bpf: add cg_skb_is_valid_access for BPF_PROG_TYPE_CGROUP_SKB") added direct packet access for skbs in cg_skb program types, however allowed access type was not added to the may_access_direct_pkt_data() helper. Therefore the latter always returns false. This is not directly an

[PATCH bpf 6/7] bpf: fix leaking uninitialized memory on pop/peek helpers

2018-10-24 Thread Daniel Borkmann
Commit f1a2e44a3aec ("bpf: add queue and stack maps") added helpers with ARG_PTR_TO_UNINIT_MAP_VALUE. Meaning, the helper is supposed to fill the map value buffer with data instead of reading from it like in other helpers such as map update. However, given the buffer is allowed to be uninitialized

[PATCH bpf 7/7] bpf: make direct packet write unclone more robust

2018-10-24 Thread Daniel Borkmann
Given this seems to be quite fragile and can easily slip through the cracks, lets make direct packet write more robust by requiring that future program types which allow for such write must provide a prologue callback. In case of XDP and sk_msg it's noop, thus add a generic noop handler there. The

[PATCH bpf 3/7] bpf: fix direct packet access for flow dissector progs

2018-10-24 Thread Daniel Borkmann
Commit d58e468b1112 ("flow_dissector: implements flow dissector BPF hook") added direct packet access for skbs in may_access_direct_pkt_data() function where this enables read and write access to the skb->data. This is buggy because without a prologue generator such as bpf_unclone_prologue() we wou

[PATCH bpf 2/7] bpf: disallow direct packet access for unpriv in cg_skb

2018-10-24 Thread Daniel Borkmann
Commit b39b5f411dcf ("bpf: add cg_skb_is_valid_access for BPF_PROG_TYPE_CGROUP_SKB") added support for returning pkt pointers for direct packet access. Given this program type is allowed for both unprivileged and privileged users, we shouldn't allow unprivileged ones to use it, e.g. besides others

[PATCH bpf 0/7] Batch of direct packet access fixes for BPF

2018-10-24 Thread Daniel Borkmann
Several fixes to get direct packet access in order from verifier side. Also test suite fix to run cg_skb as unpriv and an improvement to make direct packet write less error prone in future. Thanks! Daniel Borkmann (7): bpf: fix test suite to enable all unpriv program types bpf: disallow direc

[PATCH net 4/4] net: rtnl_dump_all needs to propagate error from dumpit function

2018-10-24 Thread David Ahern
From: David Ahern If an address, route or netconf dump request is sent for AF_UNSPEC, then rtnl_dump_all is used to do the dump across all address families. If one of the dumpit functions fails (e.g., invalid attributes in the dump request) then rtnl_dump_all needs to propagate that error so the

[PATCH net 3/4] net: Don't return invalid table id error when dumping all families

2018-10-24 Thread David Ahern
From: David Ahern When doing a route dump across all address families, do not error out if the table does not exist. This allows a route dump for AF_UNSPEC with a table id that may only exist for some of the families. Do return the table does not exist error if dumping routes for a specific fami

[PATCH net 2/4] net/ipv6: Put target net when address dump fails due to bad attributes

2018-10-24 Thread David Ahern
From: David Ahern If tgt_net is set based on IFA_TARGET_NETNSID attribute in the dump request, make sure all error paths call put_net. Fixes: 6371a71f3a3b ("net/ipv6: Add support for dumping addresses for a specific device") Fixes: ed6eff11790a ("net/ipv6: Update inet6_dump_addr for strict data

[PATCH net 0/4] net: Fixups for recent dump filtering changes

2018-10-24 Thread David Ahern
From: David Ahern Li RongQing noted that tgt_net is leaked in ipv4 due to the recent change to handle address dumps for a specific device. The report also applies to ipv6 and other error paths. Patches 1 and 2 fix those leaks. Patch 3 stops route dumps from erroring out when dumping across addre

[PATCH net 1/4] net/ipv4: Put target net when address dump fails due to bad attributes

2018-10-24 Thread David Ahern
From: David Ahern If tgt_net is set based on IFA_TARGET_NETNSID attribute in the dump request, make sure all error paths call put_net. Fixes: 5fcd266a9f64 ("net/ipv4: Add support for dumping addresses for a specific device") Fixes: c33078e3dfb1 ("net/ipv4: Update inet_dump_ifaddr for strict dat

Re: Fw: [Bug 201423] New: eth0: hw csum failure

2018-10-24 Thread Andre Tomt
On 21.10.2018 15:34, Andre Tomt wrote: On 20.10.2018 00:25, Eric Dumazet wrote: On 10/19/2018 02:58 PM, Eric Dumazet wrote: On 10/16/2018 06:00 AM, Eric Dumazet wrote: On Mon, Oct 15, 2018 at 11:30 PM Andre Tomt wrote: I've seen similar on several systems with mlx4 cards when using 4.18.x -

Regression in 4.19 net/phy/realtek: garbled sysfs output

2018-10-24 Thread Holger Hoffstätte
Hi, Since 4.19 r8169 depends on phylib: $lsmod | grep r8169 r8169 81920 0 libphy 57344 2 r8169,realtek Unfortunately this now gives me the following sysfs error: $cd /sys/module/realtek/drivers $ls -l ls: cannot access 'mdio_bus:RTL8201F 10/100Mbps Ethernet':

Re: [PATCH v2 bpf] bpf: devmap: fix wrong interface selection in notifier_call

2018-10-24 Thread Song Liu
On Wed, Oct 24, 2018 at 4:16 AM Taehee Yoo wrote: > > The dev_map_notification() removes interface in devmap if > unregistering interface's ifindex is same. > But only checking ifindex is not enough because other netns can have > same ifindex. so that wrong interface selection could occurred. > He

Re: [PATCH] r8169: Add new device ID support

2018-10-24 Thread Stephen Hemminger
On Wed, 24 Oct 2018 14:29:34 +0800 Shawn Lin wrote: > On 2018/10/24 13:54, David Miller wrote: > > From: Shawn Lin > > Date: Wed, 24 Oct 2018 13:48:55 +0800 > > > >> Hi David, > >> > >> On 2018/10/24 10:19, David Miller wrote: > >>> From: Shawn Lin > >>> Date: Wed, 24 Oct 2018 09:46:47 +08

[PATCH net] net: sched: Remove TCA_OPTIONS from policy

2018-10-24 Thread David Ahern
From: David Ahern Marco reported an error with hfsc: root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 Error: Attribute failed policy validation. Apparently a few implementations pass TCA_OPTIONS as a binary instead of nested attribute, so drop TCA_OPTIONS from the policy. F

Re: [net-next][PATCH] net/ipv4: fix a net leak

2018-10-24 Thread David Ahern
On 10/24/18 9:02 AM, David Ahern wrote: > On 10/24/18 3:36 AM, Li RongQing wrote: >> put net when input a invalid ifindex, otherwise it will be leaked >> >> Fixes: 5fcd266a9f64("net/ipv4: Add support for dumping addresses for a >> specific device") >> Cc: David Ahern >> Signed-off-by: Zhang Yu >

Re: [net-next][PATCH] net/ipv4: fix a net leak

2018-10-24 Thread David Ahern
On 10/24/18 3:36 AM, Li RongQing wrote: > put net when input a invalid ifindex, otherwise it will be leaked > > Fixes: 5fcd266a9f64("net/ipv4: Add support for dumping addresses for a > specific device") > Cc: David Ahern > Signed-off-by: Zhang Yu > Signed-off-by: Li RongQing > --- > net/ipv4/

Re: Attribute failed policy validation

2018-10-24 Thread David Ahern
On 10/24/18 7:07 AM, Florian Westphal wrote: > Marco Berizzi wrote: > > [ CC David ] > >> root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 >> Error: Attribute failed policy validation. > > caused by: > commit 8b4c3cdd9dd8290343ce959a132d3b334062c5b9 > net: sched: Add policy

RE: [RFC] arm64: dts: lx2160aqds: Add mdio mux nodes

2018-10-24 Thread Pankaj Bansal
Hi All, As per the device tree ePappr https://elinux.org/images/c/cf/Power_ePAPR_APPROVED_v1.1.pdf section 2.2.1 Each node in the device tree is named according to the following convention: node-name@unit-address The node-name shall start with a lower or uppercase character and should describ

Re: Attribute failed policy validation

2018-10-24 Thread Florian Westphal
Marco Berizzi wrote: [ CC David ] > root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 > Error: Attribute failed policy validation. caused by: commit 8b4c3cdd9dd8290343ce959a132d3b334062c5b9 net: sched: Add policy validation for tc attributes Looks like TCA_OPTIONS is NLA_BI

Resolved: Was: PROBLEM: NETDEV WATCHDOG r8169 transmit queue time out in commit 4fd48c4ac0a0578862819295222a825c97686ac7 onwards.

2018-10-24 Thread Iain Price
Not sure if this was picked up when I originally posted it, or if this feedback is useful but: I noticed some rtl8169 driver changes in 4.18.15, pulled that from git last friday and rolled it and did some bandwith intensive rsync tests etc that would provoke the problem quite reliably before,

[PATCH net] ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called

2018-10-24 Thread Stefano Brivio
Commit a61bbcf28a8c ("[NET]: Store skb->timestamp as offset to a base timestamp") introduces a neighbour control buffer and zeroes it out in ndisc_rcv(), as ndisc_recv_ns() uses it. Commit f2776ff04722 ("[IPV6]: Fix address/interface handling in UDP and DCCP, according to the scoping architecture.

Re: [PATCH net-next 3/4] net: phy-c45: Implement reset/suspend/resume callbacks

2018-10-24 Thread Andrew Lunn
> Since 719655a14971 ("net: phy: Replace phy driver features u32 > with link_mode bitmap"), phy_probe() calls > ethtool_convert_link_mode_to_legacy_u32() with phydrv->features > as argument. Since features are NULL, we will get NULL pointer > dereference. Hi Jose Thanks for pointing that out. I w

Hello My Dear Friend,

2018-10-24 Thread Mr Marc Joseph Hebert
I am Mr Marc Joseph Hebert a I work in the Finance Risk control/Accounts Broker Unit of a prestigious bank in London. Under varying state laws in United Kingdom, financial institutions and other companies are required to turn over any funds considered "abandoned," including uncashed paychecks

Re: [net-next 03/11] igc: Add netdev

2018-10-24 Thread Neftin, Sasha
On 10/18/2018 20:15, Jakub Kicinski wrote: On Wed, 17 Oct 2018 15:23:14 -0700, Jeff Kirsher wrote: +/** + * igc_ioctl - I/O control method + * @netdev: network interface device structure + * @ifreq: frequency Is it? :) Ah... Good catch. I will fix that and submit patch. + * @cmd: command +

[PATCH v2 bpf] bpf: devmap: fix wrong interface selection in notifier_call

2018-10-24 Thread Taehee Yoo
The dev_map_notification() removes interface in devmap if unregistering interface's ifindex is same. But only checking ifindex is not enough because other netns can have same ifindex. so that wrong interface selection could occurred. Hence netdev pointer comparison code is added. v2: compare netde

Re: [PATCH v3 net-next 03/11] net: dsa: microchip: Initialize mutex before use

2018-10-24 Thread Pavel Machek
On Mon 2018-10-22 19:26:07, tristram...@microchip.com wrote: > From: Tristram Ha > > Initialize mutex before use. > > Signed-off-by: Tristram Ha > --- > drivers/net/dsa/microchip/ksz_common.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/net/dsa/microchi

Re: [PATCH v3 net-next 01/11] net: dsa: microchip: Replace license with GPL

2018-10-24 Thread Pavel Machek
On Mon 2018-10-22 19:26:05, tristram...@microchip.com wrote: > From: Tristram Ha > > Replace license with GPL. > > Signed-off-by: Tristram Ha > Reviewed-by: Woojung Huh > Reviewed-by: Andrew Lunn Acked-by: Pavel Machek > @@ -1,19 +1,20 @@ > /* > * Microchip KSZ9477 register definitions

Re: [PATCH bpf] bpf: devmap: fix wrong interface selection in notifier_call

2018-10-24 Thread Taehee Yoo
Hi Daniel! On Wed, 24 Oct 2018 at 18:07, Daniel Borkmann wrote: > > [ +John ] > > On 10/22/2018 05:41 PM, Taehee Yoo wrote: > > The dev_map_notification() removes interface in devmap if > > unregistering interface's ifindex is same. > > But only checking ifindex is not enough because other netns

Re: [RFC PATCH v2 00/10] udp: implement GRO support

2018-10-24 Thread Steffen Klassert
On Tue, Oct 23, 2018 at 02:22:12PM +0200, Paolo Abeni wrote: > On Tue, 2018-10-23 at 14:10 +0200, Steffen Klassert wrote: > > > Some quick benchmark numbers with UDP packet forwarding > > (1460 byte packets) through two gateways: > > > > net-next: 16.4 Gbps > > > > net-next + UDP GRO: 20.3 Gbps

Re: [PATCH][next] igc: fix error return handling from call to netif_set_real_num_tx_queues

2018-10-24 Thread Neftin, Sasha
On 10/19/2018 21:16, Colin King wrote: From: Colin Ian King The call to netif_set_real_num_tx_queues is not assigning the error return to variable err even though the next line checks err for an error. Fix this by adding the missing err assignment. Detected by CoverityScan, CID#1474551 ("Logi

Re: [PATCH net-next] igc: Remove set but not used variables 'ctrl_ext, link_mode'

2018-10-24 Thread Neftin, Sasha
On 10/19/2018 15:40, YueHaibing wrote: Fixes gcc '-Wunused-but-set-variable' warning: drivers/net/ethernet/intel/igc/igc_base.c: In function 'igc_init_phy_params_base': drivers/net/ethernet/intel/igc/igc_base.c:240:6: warning: variable 'ctrl_ext' set but not used [-Wunused-but-set-variable]

Attribute failed policy validation

2018-10-24 Thread Marco Berizzi
Hi Folks, I'm getting this message after the upgrade from linux 4.18 to 4.19 root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 Error: Attribute failed policy validation. root@Calimero:~# lsmod | grep hfsc sch_hfsc 24576 0 root@Calimero:~# tc -V tc utility,

Re: [PATCH net-next] igc: Remove set but not used variable 'pci_using_dac'

2018-10-24 Thread Neftin, Sasha
On 10/19/2018 15:48, YueHaibing wrote: Fixes gcc '-Wunused-but-set-variable' warning: drivers/net/ethernet/intel/igc/igc_main.c: In function 'igc_probe': drivers/net/ethernet/intel/igc/igc_main.c:3535:11: warning: variable 'pci_using_dac' set but not used [-Wunused-but-set-variable] It never

[net-next][PATCH] net/ipv4: fix a net leak

2018-10-24 Thread Li RongQing
put net when input a invalid ifindex, otherwise it will be leaked Fixes: 5fcd266a9f64("net/ipv4: Add support for dumping addresses for a specific device") Cc: David Ahern Signed-off-by: Zhang Yu Signed-off-by: Li RongQing --- net/ipv4/devinet.c | 4 +++- 1 file changed, 3 insertions(+), 1 del

Re: [PATCH bpf] bpf: devmap: fix wrong interface selection in notifier_call

2018-10-24 Thread Daniel Borkmann
[ +John ] On 10/22/2018 05:41 PM, Taehee Yoo wrote: > The dev_map_notification() removes interface in devmap if > unregistering interface's ifindex is same. > But only checking ifindex is not enough because other netns can have > same ifindex. so that wrong interface selection could occurred. > He

Re: [net-next 01/11] igc: Add skeletal frame for Intel(R) 2.5G Ethernet Controller support

2018-10-24 Thread Neftin, Sasha
On 10/18/2018 20:14, Jakub Kicinski wrote: On Wed, 17 Oct 2018 15:23:12 -0700, Jeff Kirsher wrote: From: Sasha Neftin This patch adds the beginning framework onto which I am going to add the igc driver which supports the Intel(R) I225-LM/I225-V 2.5G Ethernet Controller. Signed-off-by: Sasha N

[PATCH net-next] octeontx2-af: Copy the right amount of memory

2018-10-24 Thread Dan Carpenter
This is a copy and paste bug where we copied the sizeof() from the chunk before. We're copying more data than intended but the destination is a union so it doesn't cause memory corruption. Fixes: ffb0abd7e9cb ("octeontx2-af: NIX AQ instruction enqueue support") Signed-off-by: Dan Carpenter ---

Re: [PATCH net-next 3/4] net: phy-c45: Implement reset/suspend/resume callbacks

2018-10-24 Thread Jose Abreu
On 23-10-2018 11:58, Russell King - ARM Linux wrote: > On Tue, Oct 23, 2018 at 11:28:09AM +0100, Jose Abreu wrote: >> On 23-10-2018 11:20, Russell King - ARM Linux wrote: >>> I have no idea what you're proposing there - your patches weren't copied >>> to me. >> They just set / unset MDIO_CTRL1_