Re: [RFC PATCH 1/3] can: m_can: Create m_can core to leverage common code

2019-01-09 Thread Rizvi, Mohammad Faiz Abbas
Hi Dan, Wolfgang, On 1/10/2019 1:14 PM, Wolfgang Grandegger wrote: Hello Dan, sorry for my late response on that topic... Am 09.01.19 um 21:58 schrieb Dan Murphy: Wolfgang On 11/3/18 5:45 AM, Wolfgang Grandegger wrote: Hello Dan, Am 31.10.2018 um 21:15 schrieb Dan Murphy: Wolfgang Thanks

Re: [RFC PATCH 1/3] can: m_can: Create m_can core to leverage common code

2019-01-09 Thread Wolfgang Grandegger
Hello Dan, sorry for my late response on that topic... Am 09.01.19 um 21:58 schrieb Dan Murphy: > Wolfgang > > On 11/3/18 5:45 AM, Wolfgang Grandegger wrote: >> Hello Dan, >> >> Am 31.10.2018 um 21:15 schrieb Dan Murphy: >>> Wolfgang >>> >>> Thanks for the review >>> >>> On 10/27/2018 09:19 AM,

Q: is it possible to use macvtap with lowerdev hotplug?

2019-01-09 Thread Mike Rapoport
Hi, I have a setup in which VMs are connected with macvtap to the network. The macvtap interfaces are attached to a physical NIC. There is a question if it is possible to hot-unplug - hot-plug the physical NIC and retain the VMs connectivity to the network (of course with some hiccup for the unpl

[PATCH v2] nft_flow_offload: Make flow offload work with vrf slave device correct

2019-01-09 Thread wenxu
From: wenxu In the forward chain the iif is changed from slave device to master vrf device. It will lead the offload not match on lower slave device. This patch the flow table iif and oif based on route cache dst->dev, not the skb->iif This patch make the flollowing example can work correct i

Re: [PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing

2019-01-09 Thread Greg Kroah-Hartman
On Thu, Jan 10, 2019 at 07:29:17AM +0100, Greg Kroah-Hartman wrote: > The L2CAP_CONF_EFS and L2CAP_CONF_RFC messages can be sent from > userspace so their structure sizes need to be checked before parsing > them. > > Based on a patch from Ran Menscher. Ran, can you verify if these two patches sol

[PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing

2019-01-09 Thread Greg Kroah-Hartman
The L2CAP_CONF_EFS and L2CAP_CONF_RFC messages can be sent from userspace so their structure sizes need to be checked before parsing them. Based on a patch from Ran Menscher. Reported-by: Ran Menscher Signed-off-by: Greg Kroah-Hartman --- net/bluetooth/l2cap_core.c | 12 1 file ch

[PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt

2019-01-09 Thread Greg Kroah-Hartman
l2cap_get_conf_opt can handle a "default" message type, but it needs to be verified that it really is the correct type (CONF_EFS or CONF_RFC) before passing it back to the caller. To do this we need to check the return value of this call now and handle the error correctly up the stack. Based on a

Re: [BUG] moving fq back to clock monotonic breaks my setup

2019-01-09 Thread Eric Dumazet
On Wed, Jan 9, 2019 at 4:48 PM Ian Kumlien wrote: > > Hi, > > Just been trough ~5+ hours of bisecting and eventually actually found > the culprit =) > > commit fb420d5d91c1274d5966917725e71f27ed092a85 (refs/bisect/bad) > Author: Eric Dumazet > Date: Fri Sep 28 10:28:44 2018 -0700 > > tcp/fq

Re: Regression in v4.20 with net phy soft reset changes

2019-01-09 Thread Keerthy
On Thursday 10 January 2019 10:36 AM, Keerthy wrote: > > > On Thursday 10 January 2019 03:06 AM, Tony Lindgren wrote: >> Hi, >> >> * Heiner Kallweit [190109 19:28]: >>> On 09.01.2019 20:06, Tony Lindgren wrote: Commit 6e2d85ec0559 ("net: phy: Stop with excessive soft reset") caused

[PATCH v2] isdn: avm: Fix string plus integer warning from Clang

2019-01-09 Thread Nathan Chancellor
A recent commit in Clang expanded the -Wstring-plus-int warning, showing some odd behavior in this file. drivers/isdn/hardware/avm/b1.c:426:30: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] cinfo->version[j] = "\0\0" + 1;

Re: IPSec ESN: Packets decryption fail with ESN enabled connection

2019-01-09 Thread Harsh Jain
On 04-01-2019 14:04, Steffen Klassert wrote: > On Thu, Jan 03, 2019 at 04:16:56PM +0530, Harsh Jain wrote: >> On 02-01-2019 18:21, Herbert Xu wrote: >>> Does this occur if you use software crypto on the receiving end >>> while keeping the sending end unchanged? >> I tried with "authencesn(hmac(sh

[PATCH v2] netfilter: x_tables: add xt_tunnel match

2019-01-09 Thread wenxu
From: wenxu This patch allows us to match on the tunnel metadata that is available of the packet. We can use this to validate if the packet comes from/goes to tunnel and the corresponding tunnel ID in the iptables. Signed-off-by: wenxu --- include/uapi/linux/netfilter/xt_tunnel.h | 12 +++

Re: [PATCH] netfilter: x_tables: add xt_tunnel match

2019-01-09 Thread wenxu
On 1/10/2019 12:05 PM, wenxu wrote: > On 1/10/2019 12:41 AM, Pablo Neira Ayuso wrote: >> On Fri, Dec 21, 2018 at 06:12:24PM +0800, we...@ucloud.cn wrote: >> [...] >>> +static struct xt_match tunnel_mt_reg __read_mostly = { >>> + .name = "tunnel", >>> + .revision = 0, >>> + .

[PATCH] iavf: Use printf instead of gnu_printf for iavf_debug_d

2019-01-09 Thread Nathan Chancellor
Clang warns: In file included from drivers/net/ethernet/intel/iavf/iavf_main.c:4: In file included from drivers/net/ethernet/intel/iavf/iavf.h:37: In file included from drivers/net/ethernet/intel/iavf/iavf_type.h:8: drivers/net/ethernet/intel/iavf/iavf_osdep.h:49:18: warning: 'format' attribute a

Re: [PATCH] netfilter: x_tables: add xt_tunnel match

2019-01-09 Thread wenxu
On 1/10/2019 12:41 AM, Pablo Neira Ayuso wrote: > On Fri, Dec 21, 2018 at 06:12:24PM +0800, we...@ucloud.cn wrote: > [...] >> +static struct xt_match tunnel_mt_reg __read_mostly = { >> +.name = "tunnel", >> +.revision = 0, >> +.family = NFPROTO_UNSPEC, >> +

[PATCH net] ip6_gre: update version related info when changing link

2019-01-09 Thread Hangbin Liu
We forgot to update ip6erspan version related info when changing link, which will cause setting new hwid failed. Reported-by: Jianlin Shi Fixes: 94d7d8f292870 ("ip6_gre: add erspan v2 support") Signed-off-by: Hangbin Liu --- net/ipv6/ip6_gre.c | 4 1 file changed, 4 insertions(+) diff --g

Re: [PATCH v6 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Alexei Starovoitov
On 1/9/19 11:21 AM, Song Liu wrote: > For better performance analysis of BPF programs, this patch introduces > PERF_RECORD_BPF_EVENT, a new perf_event_type that exposes BPF program > load/unload information to user space. > > Each BPF program may contain up to BPF_MAX_SUBPROGS (256) sub programs.

Re: [PATCH RFC 1/4] include/linux/compiler*.h: fix OPTIMIZER_HIDE_VAR

2019-01-09 Thread Michael S. Tsirkin
On Wed, Jan 09, 2019 at 11:35:52AM +0100, Miguel Ojeda wrote: > On Tue, Jan 8, 2019 at 6:44 PM Nick Desaulniers > wrote: > > > > Also for more context, see: > > commit 7829fb09a2b4 ("lib: make memzero_explicit more robust against > > dead store elimination") > > By the way, shouldn't that barrie

RE: [RFT][PATCH V2 09/10] net: dsa: microchip: Factor out regmap config generation into common header

2019-01-09 Thread Tristram.Ha
> > I just looked at your regmap code and you use 3 regmap pointers for > specific 8-bit, 16-bit, and 32-bit accesses. The switch access is always > 8-bit. It > has automatic register increment so that you can access arbitrary length of > registers. The use of 16-bit and 32-bit accesses makes a

Re: [PATCH 3/3] iwlwifi: Load firmware exclusively for Intel WiFi

2019-01-09 Thread João Paulo Rechi Vita
On Wed, Jan 9, 2019 at 10:39 AM Emmanuel Grumbach wrote: > > Hello, > > > > > > > > > > > our hardware teams from the Bluetooth and WiFi side really need to > > > > > look at this. > > > > > > Were you able to get attention from the hardware teams with the logs > > > I've provided? Are there any

Re: [RFT][PATCH V2 09/10] net: dsa: microchip: Factor out regmap config generation into common header

2019-01-09 Thread Marek Vasut
On 1/9/19 8:58 PM, tristram...@microchip.com wrote: >> This is the regmap_config I used in Linux 4.9: >> >> .reg_bits = SPI_REGMAP_REG, >> .val_bits = SPI_REGMAP_VAL, >> .pad_bits = SPI_REGMAP_PAD, >> .read_flag_mask = KS_SPIOP_RD << SPI

Re: [RFT][PATCH V2 09/10] net: dsa: microchip: Factor out regmap config generation into common header

2019-01-09 Thread Marek Vasut
On 1/9/19 8:08 PM, tristram...@microchip.com wrote: > + { \ > + .val_bits = (width),\ > + .reg_stride = (width) / 8, \ > + .reg_bits

[BUG] moving fq back to clock monotonic breaks my setup

2019-01-09 Thread Ian Kumlien
Hi, Just been trough ~5+ hours of bisecting and eventually actually found the culprit =) commit fb420d5d91c1274d5966917725e71f27ed092a85 (refs/bisect/bad) Author: Eric Dumazet Date: Fri Sep 28 10:28:44 2018 -0700 tcp/fq: move back to CLOCK_MONOTONIC [--8<--] So this might be because my

Re: [PATCH] nft_flow_offload: Make flow offload work with vrf slave device correct

2019-01-09 Thread Pablo Neira Ayuso
On Sat, Dec 29, 2018 at 06:10:25PM +0800, we...@ucloud.cn wrote: > From: wenxu > > In the forward chain the iif is changed from slave device to master vrf > device. It will lead the offload not match on lower slave device. > > This patch make the flollowing example can work correct > > ip addr

Re: [BUG] v4.20 - bridge not getting DHCP responses? (works in 4.19.13)

2019-01-09 Thread Ian Kumlien
Confirmed, sending a new mail with summary etc On Thu, Jan 10, 2019 at 1:16 AM Ian Kumlien wrote: > > On Wed, Jan 9, 2019 at 12:17 AM Ian Kumlien wrote: > > On Wed, Jan 9, 2019, 00:09 Florian Fainelli > [--8<---] > > >> > when looking at "git log v4.19...v4.20 > >> > drivers/net/ethernet/intel

Re: [BUG] v4.20 - bridge not getting DHCP responses? (works in 4.19.13)

2019-01-09 Thread Ian Kumlien
On Wed, Jan 9, 2019 at 12:17 AM Ian Kumlien wrote: > On Wed, Jan 9, 2019, 00:09 Florian Fainelli > > when looking at "git log v4.19...v4.20 >> > drivers/net/ethernet/intel/ixgbe/" nothing else really stands out... >> > The machine is also running NAT for my home network and all of that >> > works

[PATCH] Fix ERROR:do not initialise statics to 0 in af_vsock.c

2019-01-09 Thread Lepton Wu
Found by scripts/checkpatch.pl --- net/vmw_vsock/af_vsock.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index 43a1dec08825..a60df252d3cc 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -505,7 +505,7

Re: [PATCH] samples: bpf: user proper argument index

2019-01-09 Thread Matteo Croce
On Wed, Jan 9, 2019 at 5:07 PM Ioana Ciornei wrote: > > Use optind as index for argv instead of a hardcoded value. > When the program has options this leads to improper parameter handling. > > Fixes: dc378a1ab5b6 ("samples: bpf: get ifindex from ifname") > > Signed-off-by: Ioana Ciornei > --- >

Re: [PATCH bpf] bpf: correctly set initial window on active Fast Open sender

2019-01-09 Thread Alexei Starovoitov
On Tue, Jan 08, 2019 at 06:12:24PM -0800, Yuchung Cheng wrote: > The existing BPF TCP initial congestion window (TCP_BPF_IW) does not > to work on (active) Fast Open sender. This is because it changes the > (initial) window only if data_segs_out is zero -- but data_segs_out > is also incremented on

Re: [PATCH bpf] bpf: correctly set initial window on active Fast Open sender

2019-01-09 Thread Lawrence Brakmo
On 1/8/19, 6:13 PM, "netdev-ow...@vger.kernel.org on behalf of Yuchung Cheng" wrote: The existing BPF TCP initial congestion window (TCP_BPF_IW) does not to work on (active) Fast Open sender. This is because it changes the (initial) window only if data_segs_out is zero -- but data_se

Re: [PATCH v2] net: ethernet: mediatek: fix warning in phy_start_aneg

2019-01-09 Thread Sean Wang
On Wed, Jan 9, 2019 at 10:31 AM Heiner Kallweit wrote: > > On 09.01.2019 08:20, Frank Wunderlich wrote: > > From: Heiner Kallweit > > > > linux 5.0-rc1 shows following warning on bpi-r2/mt7623 bootup: > > > > [ 5.170597] WARNING: CPU: 3 PID: 1 at drivers/net/phy/phy.c:548 > > phy_start_aneg+0x11

Re: [PATCH] ipset: fix a missing check of nla_parse

2019-01-09 Thread Pablo Neira Ayuso
On Wed, Dec 26, 2018 at 12:16:25PM +0300, Kirill Tkhai wrote: > On 26.12.2018 06:50, Kangjie Lu wrote: > > When nla_parse fails, we should not use the results (the first > > argument). The fix checks if it fails, and if so, returns its error code > > upstream. > > > > Signed-off-by: Kangjie Lu >

Re: Regression in v4.20 with net phy soft reset changes

2019-01-09 Thread Heiner Kallweit
On 09.01.2019 22:36, Tony Lindgren wrote: > Hi, > > * Heiner Kallweit [190109 19:28]: >> On 09.01.2019 20:06, Tony Lindgren wrote: >>> Commit 6e2d85ec0559 ("net: phy: Stop with excessive soft reset") caused >>> a regression where suspend resume cycle fails to bring up Ethernet on at >>> least cps

Re: IPv6 neighbor discovery issues on 4.18 (and now 4.19)

2019-01-09 Thread Brian Rak
On 8/31/2018 10:49 AM, Brian Rak wrote: We've upgraded a few machines to a 4.18.3 kernel and we're running into weird IPv6 neighbor discovery issues.  Basically, the machines stop responding to inbound IPv6 neighbor solicitation requests, which very quickly breaks all IPv6 connectivity. It

Re: Regression in v4.20 with net phy soft reset changes

2019-01-09 Thread Tony Lindgren
Hi, * Heiner Kallweit [190109 19:28]: > On 09.01.2019 20:06, Tony Lindgren wrote: > > Commit 6e2d85ec0559 ("net: phy: Stop with excessive soft reset") caused > > a regression where suspend resume cycle fails to bring up Ethernet on at > > least cpsw on am437x-sk-evm. > > > What kind of PHY and w

Re: [PATCH net] net: phy: fix too strict check in phy_start_aneg

2019-01-09 Thread Chris Wilson
Quoting Heiner Kallweit (2019-01-09 19:34:56) > When adding checks to detect wrong usage of the phylib API we added > a check to phy_start_aneg() which is too strict. If the phylib > state machine is in state PHY_HALTED we should allow reconfiguring > and restarting aneg, and just don't touch the s

Re: [RFC PATCH 1/3] can: m_can: Create m_can core to leverage common code

2019-01-09 Thread Dan Murphy
Wolfgang On 11/3/18 5:45 AM, Wolfgang Grandegger wrote: > Hello Dan, > > Am 31.10.2018 um 21:15 schrieb Dan Murphy: >> Wolfgang >> >> Thanks for the review >> >> On 10/27/2018 09:19 AM, Wolfgang Grandegger wrote: >>> Hello Dan, >>> >>> for the RFC, could you please just do the necessary changes t

RE: [RFT][PATCH V2 09/10] net: dsa: microchip: Factor out regmap config generation into common header

2019-01-09 Thread Tristram.Ha
> This is the regmap_config I used in Linux 4.9: > > .reg_bits = SPI_REGMAP_REG, > .val_bits = SPI_REGMAP_VAL, > .pad_bits = SPI_REGMAP_PAD, > .read_flag_mask = KS_SPIOP_RD << SPI_REGMAP_MASK_S, > .write_flag_mask= KS_

[PATCH 3/3] doc: networking: add scaling doc into index file

2019-01-09 Thread Otto Sabart
Add reference to scaling document into main table of contents in network documentation. Signed-off-by: Otto Sabart --- Documentation/networking/index.rst | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/networking/index.rst b/Documentation/networking/index.rst index 6a47629ef8e

[PATCH 2/3] doc: networking: convert scaling doc into RST

2019-01-09 Thread Otto Sabart
Just rename the scaling file to be found by Sphinx. There are no references to "scaling.txt" file. Whole kernel tree was checked using: $ grep -r "scaling\.txt" Signed-off-by: Otto Sabart --- Documentation/networking/{scaling.txt => scaling.rst} | 0 1 file changed, 0 insertions(+), 0 deletions

[PATCH 1/3] doc: networking: prepare scaling document for conversion into RST

2019-01-09 Thread Otto Sabart
Add markups which are necessary for successful conversion into reStructuredText. There are no semantic changes. Signed-off-by: Otto Sabart --- Documentation/networking/scaling.txt | 131 +-- 1 file changed, 85 insertions(+), 46 deletions(-) diff --git a/Documentation/ne

[PATCH 0/3] doc: networking: integrate scaling document into doc tree

2019-01-09 Thread Otto Sabart
These patches integrate scaling document into documentation tree. There are no semantic changes. Otto Sabart (3): doc: networking: prepare scaling document for conversion into RST doc: networking: convert scaling doc into RST doc: networking: add scaling doc into index file Documentation/

Re: [PATCH net] net: ipv4: Fix memory leak in network namespace dismantle

2019-01-09 Thread David Ahern
On 1/9/19 2:57 AM, Ido Schimmel wrote: > IPv4 routing tables are flushed in two cases: > > 1. In response to events in the netdev and inetaddr notification chains > 2. When a network namespace is being dismantled > > In both cases only routes associated with a dead nexthop group are > flushed. Ho

Re: tg3 vs commit 2b3e88ea6528 ("net: phy: improve phy state checking")

2019-01-09 Thread Heiner Kallweit
On 09.01.2019 14:11, Chris Wilson wrote: > Hi, we've hit a snag with > > commit 2b3e88ea65287ba738a798622405b15344871085 > Author: Heiner Kallweit > Date: Sun Dec 16 18:30:14 2018 +0100 > > net: phy: improve phy state checking > > as it is detecting that the call from tg3 during suspend i

[PATCH net] net: phy: fix too strict check in phy_start_aneg

2019-01-09 Thread Heiner Kallweit
When adding checks to detect wrong usage of the phylib API we added a check to phy_start_aneg() which is too strict. If the phylib state machine is in state PHY_HALTED we should allow reconfiguring and restarting aneg, and just don't touch the state. Fixes: 2b3e88ea6528 ("net: phy: improve phy sta

Re: Regression in v4.20 with net phy soft reset changes

2019-01-09 Thread Heiner Kallweit
On 09.01.2019 20:06, Tony Lindgren wrote: > Hi all, > > Commit 6e2d85ec0559 ("net: phy: Stop with excessive soft reset") caused > a regression where suspend resume cycle fails to bring up Ethernet on at > least cpsw on am437x-sk-evm. > What kind of PHY and which PHY driver is used with this board

Re: [PATCH net-next v3] Documentation: networking: Clarify switchdev devices behavior

2019-01-09 Thread Randy Dunlap
Hi Florian, Just a few more comments... On 1/8/19 8:39 PM, Florian Fainelli wrote: > This patch provides details on the expected behavior of switchdev > enabled network devices when operating in a "stand alone" mode, as well > as when being bridge members. This clarifies a number of things that

[PATCH v6 perf, bpf-next 7/7] perf tools: synthesize PERF_RECORD_* for loaded BPF programs

2019-01-09 Thread Song Liu
This patch synthesize PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT for BPF programs loaded before perf-record. This is achieved by gathering information about all BPF programs via sys_bpf. Signed-off-by: Song Liu --- tools/perf/builtin-record.c | 6 ++ tools/perf/util/bpf-event.c | 205 ++

[PATCH v6 perf, bpf-next 2/7] sync tools/include/uapi/linux/perf_event.h

2019-01-09 Thread Song Liu
sync changes for PERF_RECORD_KSYMBOL Signed-off-by: Song Liu --- tools/include/uapi/linux/perf_event.h | 26 +- 1 file changed, 25 insertions(+), 1 deletion(-) diff --git a/tools/include/uapi/linux/perf_event.h b/tools/include/uapi/linux/perf_event.h index 9de8780ac8d9.

[PATCH v6 perf, bpf-next 1/7] perf, bpf: Introduce PERF_RECORD_KSYMBOL

2019-01-09 Thread Song Liu
For better performance analysis of dynamically JITed and loaded kernel functions, such as BPF programs, this patch introduces PERF_RECORD_KSYMBOL, a new perf_event_type that exposes kernel symbol register/unregister information to user space. The following data structure is used for PERF_RECORD_KS

[PATCH v6 perf, bpf-next 5/7] perf util: handle PERF_RECORD_KSYMBOL

2019-01-09 Thread Song Liu
This patch handles PERF_RECORD_KSYMBOL in perf record/report. Specifically, map and symbol are created for ksymbol register, and removed for ksymbol unregister. This patch also set perf_event_attr.ksymbol properly. The flag is ON by default. Signed-off-by: Song Liu --- tools/perf/util/event.c

[PATCH v6 perf, bpf-next 4/7] sync tools/include/uapi/linux/perf_event.h

2019-01-09 Thread Song Liu
sync for PERF_RECORD_BPF_EVENT Signed-off-by: Song Liu --- tools/include/uapi/linux/perf_event.h | 29 ++- 1 file changed, 28 insertions(+), 1 deletion(-) diff --git a/tools/include/uapi/linux/perf_event.h b/tools/include/uapi/linux/perf_event.h index 68c4da0227c5..8bd7

[PATCH v6 perf, bpf-next 0/7] reveal invisible bpf programs

2019-01-09 Thread Song Liu
This set catches symbol for all bpf programs loaded/unloaded before/during/after perf-record run PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT. PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT includes key information of a bpf program load and unload. They are sent through perf ringbuffer, and stored

[PATCH v6 perf, bpf-next 6/7] perf util: handle PERF_RECORD_BPF_EVENT

2019-01-09 Thread Song Liu
This patch adds basic handling of PERF_RECORD_BPF_EVENT. Tracking of PERF_RECORD_BPF_EVENT is OFF by default. Option --bpf-event is added to turn it on. Signed-off-by: Song Liu --- tools/perf/builtin-record.c | 1 + tools/perf/perf.h | 1 + tools/perf/util/Build | 2 ++ tools/

[PATCH v6 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Song Liu
For better performance analysis of BPF programs, this patch introduces PERF_RECORD_BPF_EVENT, a new perf_event_type that exposes BPF program load/unload information to user space. Each BPF program may contain up to BPF_MAX_SUBPROGS (256) sub programs. The following example shows kernel symbols for

RE: [RFT][PATCH V2 09/10] net: dsa: microchip: Factor out regmap config generation into common header

2019-01-09 Thread Tristram.Ha
> >>> + { \ > >>> + .val_bits = (width),\ > >>> + .reg_stride = (width) / 8, \ > >>> + .reg_bits = (regbits) + (regalign), \ > >

Regression in v4.20 with net phy soft reset changes

2019-01-09 Thread Tony Lindgren
Hi all, Commit 6e2d85ec0559 ("net: phy: Stop with excessive soft reset") caused a regression where suspend resume cycle fails to bring up Ethernet on at least cpsw on am437x-sk-evm. Keerthy noticed this may not happen on the first resume, but usually happens after few suspend resume cycles. The m

Re: [PATCH RESEND] nft_flow_offload: Fix the peer route get from wrong daddr

2019-01-09 Thread Pablo Neira Ayuso
On Wed, Jan 09, 2019 at 08:03:58PM +0100, Pablo Neira Ayuso wrote: > On Wed, Jan 09, 2019 at 10:40:11AM +0800, we...@ucloud.cn wrote: > > From: wenxu > > > > For nat example: > > client 1.1.1.7 ---> 2.2.2.7 which dnat to 10.0.0.7 server > > > > When syn_rcv pkt from server it get the peer(client

Re: [PATCH RESEND] nft_flow_offload: Fix the peer route get from wrong daddr

2019-01-09 Thread Pablo Neira Ayuso
On Wed, Jan 09, 2019 at 10:40:11AM +0800, we...@ucloud.cn wrote: > From: wenxu > > For nat example: > client 1.1.1.7 ---> 2.2.2.7 which dnat to 10.0.0.7 server > > When syn_rcv pkt from server it get the peer(client->server) route > through daddr = ct->tuplehash[!dir].tuple.dst.u3.ip, the value

Re: [PATCH v1 net] net: dsa: mv88x6xxx: mv88e6390 errata

2019-01-09 Thread Andrew Lunn
On Wed, Jan 09, 2019 at 09:43:52PM +0300, Maxim Uvarov wrote: > Is this errata documented somewhere? What happends without that magic > wirtes? Software reset doen't clear registers into initial state? Hi Max Marvell have documentation for it. From what i understand, if the PHY establishes link w

Re: [PATCH v1 net] net: dsa: mv88x6xxx: mv88e6390 errata

2019-01-09 Thread Maxim Uvarov
Is this errata documented somewhere? What happends without that magic wirtes? Software reset doen't clear registers into initial state? Max. ср, 9 янв. 2019 г. в 02:40, Andrew Lunn : > > The 6390 copper ports have an errata which require poking magic values > into undocumented magic registers and

Re: [PATCH 3/3] iwlwifi: Load firmware exclusively for Intel WiFi

2019-01-09 Thread Emmanuel Grumbach
Hello, > > > > > > > > our hardware teams from the Bluetooth and WiFi side really need to look > > > > at this. > > > > Were you able to get attention from the hardware teams with the logs > > I've provided? Are there any news or an idea of when / if we can > > expect this to be fixed in firmware

Re: [PATCH v2] net: ethernet: mediatek: fix warning in phy_start_aneg

2019-01-09 Thread Heiner Kallweit
On 09.01.2019 08:20, Frank Wunderlich wrote: > From: Heiner Kallweit > > linux 5.0-rc1 shows following warning on bpi-r2/mt7623 bootup: > > [ 5.170597] WARNING: CPU: 3 PID: 1 at drivers/net/phy/phy.c:548 > phy_start_aneg+0x110/0x144 > [ 5.178826] called from state READY > > [ 5.264111] []

[net] Revert "igb: reduce CPU0 latency when updating statistics"

2019-01-09 Thread Jeff Kirsher
This reverts commit 59361316afcb08569af21e1af83e89c7051c055a. Due to problems found in additional testing, this causes an illegal context switch in the RCU read-side critical section. CC: Dave Jones CC: Cong Wang CC: Jan Jablonsky Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/intel/ig

[PATCH] samples: bpf: user proper argument index

2019-01-09 Thread Ioana Ciornei
Use optind as index for argv instead of a hardcoded value. When the program has options this leads to improper parameter handling. Fixes: dc378a1ab5b6 ("samples: bpf: get ifindex from ifname") Signed-off-by: Ioana Ciornei --- samples/bpf/xdp1_user.c | 2 +- 1 file changed, 1 insertion(+), 1 del

Re: igb: Illegal context switch in RCU read-side critical section!

2019-01-09 Thread Jeff Kirsher
On Mon, 2019-01-07 at 18:34 -0800, Cong Wang wrote: > On Mon, Jan 7, 2019 at 11:19 AM Dave Jones > wrote: > > [ 32.845071] = > > [ 32.845084] WARNING: suspicious RCU usage > > [ 32.845098] 5.0.0-rc1-backup+ #1 Not tainted > > [ 32.845111] ---

Re: [PATCH] netfilter: x_tables: add xt_tunnel match

2019-01-09 Thread Pablo Neira Ayuso
On Fri, Dec 21, 2018 at 06:12:24PM +0800, we...@ucloud.cn wrote: [...] > +static struct xt_match tunnel_mt_reg __read_mostly = { > + .name = "tunnel", > + .revision = 0, > + .family = NFPROTO_UNSPEC, > + .match = tunnel_mt, > + .matchsize =

Re: [PATCH v1 net-next] net: dsa: microchip: add KSZ9477 I2C driver

2019-01-09 Thread Marek Vasut
On 1/9/19 5:05 PM, Pavel Machek wrote: > On Wed 2018-12-19 22:50:16, tristram...@microchip.com wrote: >>> This header file makes no sense. Please move the functions into .c >> >> No, that would make code bigger & slower. >> >> It makes sense to me. But I'd add "inline" keyword t

[PATCH v2] sch_api: Change signature of qdisc_tree_reduce_backlog() to use ints

2019-01-09 Thread Toke Høiland-Jørgensen
There are now several places where qdisc_tree_reduce_backlog() is called with a negative number of packets (to signal an increase in number of packets in the queue). Rather than rely on overflow behaviour, change the function signature to use signed integers to communicate this usage to people read

[PATCH v2 3/3] sch_cake: Correctly update parent qlen when splitting GSO packets

2019-01-09 Thread Toke Høiland-Jørgensen
To ensure parent qdiscs have the same notion of the number of enqueued packets even after splitting a GSO packet, update the qdisc tree with the number of packets that was added due to the split. Reported-by: Pete Heist Tested-by: Pete Heist Signed-off-by: Toke Høiland-Jørgensen --- net/sched/

[PATCH v2 2/3] sched: Fix detection of empty queues in child qdiscs

2019-01-09 Thread Toke Høiland-Jørgensen
Several qdiscs check on enqueue whether the packet was enqueued to a class with an empty queue, in which case the class is activated. This is done by checking if the qlen is exactly 1 after enqueue. However, if GSO splitting is enabled in the child qdisc, a single packet can result in a qlen longer

[PATCH v2 1/3] sched: Avoid dereferencing skb pointer after child enqueue

2019-01-09 Thread Toke Høiland-Jørgensen
Parent qdiscs may dereference the pointer to the enqueued skb after enqueue. However, both CAKE and TBF call consume_skb() on the original skb when splitting GSO packets, leading to a potential use-after-free in the parent. Fix this by avoiding dereferencing the skb pointer after enqueueing to the

[PATCH v2 0/3] sched: Fix qdisc interactions exposed by using sch_cake as a leaf qdisc

2019-01-09 Thread Toke Høiland-Jørgensen
This series fixes a couple of issues exposed by running sch_cake as a leaf qdisc in an HFSC tree, which were discovered and reported by Pete Heist. The interaction between CAKE's GSO splitting and the parent qdisc's notion of its own queue length could cause queue stalls. While investigating the re

Re: [PATCH v1 net-next] net: dsa: microchip: add KSZ9477 I2C driver

2019-01-09 Thread Pavel Machek
On Wed 2018-12-19 22:50:16, tristram...@microchip.com wrote: > > This header file makes no sense. Please move the functions into .c > > >>> > > >>> No, that would make code bigger & slower. > > >>> > > >>> It makes sense to me. But I'd add "inline" keyword to make the goal > > >>> explicit. >

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Song Liu
> On Jan 9, 2019, at 4:59 AM, Peter Zijlstra wrote: > > On Wed, Jan 09, 2019 at 11:32:50AM +, Song Liu wrote: >> I was thinking about modifying the text in-place scenario. In this case, >> we can use something like >> >> struct perf_record_text_modify { >>u64 addr; >>u_big_enough

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Song Liu
> On Jan 9, 2019, at 4:41 AM, Peter Zijlstra wrote: > > On Tue, Jan 08, 2019 at 08:45:19PM +, Alexei Starovoitov wrote: >> On 1/8/19 12:29 PM, Peter Zijlstra wrote: >>> On Thu, Dec 20, 2018 at 10:29:00AM -0800, Song Liu wrote: The following example shows kernel symbols for a BPF progr

Re: [PATCH] PCI: Add no-D3 quirk for Mellanox ConnectX-[45]

2019-01-09 Thread Jason Gunthorpe
On Wed, Jan 09, 2019 at 04:09:02PM +1100, Benjamin Herrenschmidt wrote: > > POWER 8 firmware is good? If the link does eventually come back, is > > the POWER8's D3 resumption timeout long enough? > > > > If this doesn't lead to an obvious conclusion you'll probably need to > > connect to IBM's Me

[PATCH ipsec] xfrm: refine validation of template and selector families

2019-01-09 Thread Florian Westphal
The check assumes that in transport mode, the first templates family must match the address family of the policy selector. Syzkaller managed to build a template using MODE_ROUTEOPTIMIZATION, with ipv4-in-ipv6 chain, leading to following splat: BUG: KASAN: stack-out-of-bounds in xfrm_state_find+0x

Re: [PATCH RFC 1/4] include/linux/compiler*.h: fix OPTIMIZER_HIDE_VAR

2019-01-09 Thread Michael S. Tsirkin
On Wed, Jan 09, 2019 at 11:35:52AM +0100, Miguel Ojeda wrote: > On Tue, Jan 8, 2019 at 6:44 PM Nick Desaulniers > wrote: > > > > Also for more context, see: > > commit 7829fb09a2b4 ("lib: make memzero_explicit more robust against > > dead store elimination") > > By the way, shouldn't that barrie

Re: MSG_ZEROCOPY doesn't work on half-open TCP sockets

2019-01-09 Thread Willy Tarreau
On Wed, Jan 09, 2019 at 08:55:14AM -0500, Willem de Bruijn wrote: > > In other words: because the socket needs to be ESTABLISHED for > > MSG_ZEROCOPY to work, and because remote party can send FIN and move > > the socket to CLOSE_WAIT, a sending party must implement a fallback > > from EINVAL retur

Re: [PATCH net-next V2 1/3] virtio: introduce in order feature bit

2019-01-09 Thread Michael S. Tsirkin
On Wed, Jan 09, 2019 at 04:05:28PM +0800, Jason Wang wrote: > Signed-off-by: Jason Wang > --- > include/uapi/linux/virtio_config.h | 6 ++ > 1 file changed, 6 insertions(+) > > diff --git a/include/uapi/linux/virtio_config.h > b/include/uapi/linux/virtio_config.h > index 1196e1c1d4f6..2698e

Re: [PATCH net V2] vhost: log dirty page correctly

2019-01-09 Thread Michael S. Tsirkin
On Wed, Jan 09, 2019 at 03:29:47PM +0800, Jason Wang wrote: > Vhost dirty page logging API is designed to sync through GPA. But we > try to log GIOVA when device IOTLB is enabled. This is wrong and may > lead to missing data after migration. > > To solve this issue, when logging with device IOTLB

Re: Explaining the XDP page-requirement (Was: [PATCH v2 net-next 0/8] dpaa2-eth: Introduce XDP support)

2019-01-09 Thread Ilias Apalodimas
Hi Madalin, > > > Thanks a lot for the info, will look into this. Do you have any > > > pointers as to why the full page restriction exists in the first > > > place? Sorry if it's a dumb question, but I haven't found details on > > > this and I'd really like to understand it. > > > > Hi Ioana, >

RE: Explaining the XDP page-requirement (Was: [PATCH v2 net-next 0/8] dpaa2-eth: Introduce XDP support)

2019-01-09 Thread Madalin-cristian Bucur
> -Original Message- > From: netdev-ow...@vger.kernel.org On > Behalf Of Jesper Dangaard Brouer > Sent: Friday, December 21, 2018 5:31 PM > To: Ioana Ciocoi Radulescu > Cc: Ilias Apalodimas ; > netdev@vger.kernel.org; da...@davemloft.net; Ioana Ciornei > ; dsah...@gmail.com; Camelia Alexa

Re: MSG_ZEROCOPY doesn't work on half-open TCP sockets

2019-01-09 Thread Willem de Bruijn
On Wed, Jan 9, 2019 at 7:50 AM Marek Majkowski wrote: > > I got it slightly wrong, and it's even worse than this. As far as I > understand it, the current semantics of MSG_ZEROCOPY on TCP make it > close to unusable. The problem is that the remote party can move your > MSG_ZEROCOPY socket from EST

Re: [PATCH net] selftests/txtimestamp: Fix an equals vs assign bug

2019-01-09 Thread Willem de Bruijn
On Wed, Jan 9, 2019 at 5:52 AM Dan Carpenter wrote: > > This should be == instead of =. > > Fixes: b52354aa068e ("selftests: expand txtimestamp with ipv6 dgram + raw and > pf_packet") > Signed-off-by: Dan Carpenter Acked-by: Willem de Bruijn Thanks for the fix, Dan.

Re: [PATCH net] bonding: update nest level on unlink

2019-01-09 Thread Willem de Bruijn
On Tue, Jan 8, 2019 at 11:00 PM David Miller wrote: > > > Willem, this was an empty reply to your own patch. > > Were you trying to say something that I should know? I corrected a typo in Eric's email address. Sorry for the confusing email, David. Should have added a short comment (and Eric proba

tg3 vs commit 2b3e88ea6528 ("net: phy: improve phy state checking")

2019-01-09 Thread Chris Wilson
Hi, we've hit a snag with commit 2b3e88ea65287ba738a798622405b15344871085 Author: Heiner Kallweit Date: Sun Dec 16 18:30:14 2018 +0100 net: phy: improve phy state checking as it is detecting that the call from tg3 during suspend is from the HALTED state. <4> [74.170194] [ cut

Re: [PATCH ipsec 7/7] xfrm: policy: fix infinite loop when merging src-nodes

2019-01-09 Thread Steffen Klassert
On Sat, Jan 05, 2019 at 10:59:08AM +0100, Florian Westphal wrote: > Cong Wang wrote: > > > - hlist_for_each_entry(tmp, &node->hhead, bydst) > > > - tmp->bydst_reinsert = true; > > > - hlist_for_each_entry(tmp, &n->hhead, byd

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Peter Zijlstra
On Wed, Jan 09, 2019 at 11:32:50AM +, Song Liu wrote: > I was thinking about modifying the text in-place scenario. In this case, > we can use something like > > struct perf_record_text_modify { > u64 addr; > u_big_enough old_instr; > u_big_enough new_instr; char[15] for x86 ;-)

Re: MSG_ZEROCOPY doesn't work on half-open TCP sockets

2019-01-09 Thread Marek Majkowski
I got it slightly wrong, and it's even worse than this. As far as I understand it, the current semantics of MSG_ZEROCOPY on TCP make it close to unusable. The problem is that the remote party can move your MSG_ZEROCOPY socket from ESTABLISHED to CLOSE_WAIT without your involvement. This will mean t

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Peter Zijlstra
On Tue, Jan 08, 2019 at 08:45:19PM +, Alexei Starovoitov wrote: > On 1/8/19 12:29 PM, Peter Zijlstra wrote: > > On Thu, Dec 20, 2018 at 10:29:00AM -0800, Song Liu wrote: > >> The following example shows kernel symbols for a BPF program with 7 > >> sub programs: > >> > >> a0257cf9 t

Re: [PATCH net-next V2 0/3] basic in order support for vhost_net

2019-01-09 Thread Jason Wang
On 2019/1/9 下午4:05, Jason Wang wrote: Hi: This series implement basic in order feature support for vhost_net. This feature requires both driver and device to use descriptors in order which can simplify the implementation and optimizaton for both side. The series also implement a simple optimiz

MSG_ZEROCOPY doesn't work on half-open TCP sockets

2019-01-09 Thread Marek Majkowski
Hi, Current implementation of MSG_ZEROCOPY for TCP requires the socket to be ESTABLISHED: https://elixir.bootlin.com/linux/v5.0-rc1/source/net/ipv4/tcp.c#L1188 if (sk->sk_state != TCP_ESTABLISHED) { err = -EINVAL; goto out_err; } In TCP it's totally fine to have half-open sockets, for ex

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Song Liu
> On Jan 9, 2019, at 2:18 AM, Peter Zijlstra wrote: > > On Tue, Jan 08, 2019 at 11:54:04PM +, Song Liu wrote: > >> I think Intel PT case is at instruction granularity (instead of ksymbol >> granularity)? > > Yes. > >> If this is true, modules, BPF, and PT could still share >> the ksymb

Re: [PATCH] net: brcm80211: add a check for the status of usb_register

2019-01-09 Thread Kalle Valo
Arend Van Spriel writes: > On 1/8/2019 5:43 PM, Kalle Valo wrote: >> Kangjie Lu writes: >> >>> usb_register() may fail, so let's check its status and issue an error >>> message if it fails. >>> >>> Signed-off-by: Kangjie Lu >>> --- >>> drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c |

[PATCH net] selftests/txtimestamp: Fix an equals vs assign bug

2019-01-09 Thread Dan Carpenter
This should be == instead of =. Fixes: b52354aa068e ("selftests: expand txtimestamp with ipv6 dgram + raw and pf_packet") Signed-off-by: Dan Carpenter --- tools/testing/selftests/networking/timestamping/txtimestamp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/test

Re: [PATCH RFC 1/4] include/linux/compiler*.h: fix OPTIMIZER_HIDE_VAR

2019-01-09 Thread Miguel Ojeda
On Tue, Jan 8, 2019 at 6:44 PM Nick Desaulniers wrote: > > Also for more context, see: > commit 7829fb09a2b4 ("lib: make memzero_explicit more robust against > dead store elimination") By the way, shouldn't that barrier_data() be directly in compiler.h too, since it is for both gcc & clang? > Re

Re: [PATCH v5 perf, bpf-next 3/7] perf, bpf: introduce PERF_RECORD_BPF_EVENT

2019-01-09 Thread Peter Zijlstra
On Tue, Jan 08, 2019 at 11:54:04PM +, Song Liu wrote: > I think Intel PT case is at instruction granularity (instead of ksymbol > granularity)? Yes. > If this is true, modules, BPF, and PT could still share > the ksymbol record for basic profiling. And advanced use cases like > annotation

[PATCH net] ip6_gre: fix tunnel list corruption for x-netns

2019-01-09 Thread Olivier Matz
In changelink ops, the ip6gre_net pointer is retrieved from dev_net(dev), which is wrong in case of x-netns. Thus, the tunnel is not unlinked from its current list and is relinked into another net namespace. This corrupts the tunnel lists and can later trigger a kernel oops. Fix this by retrieving

  1   2   >