Re: [PATCH net-next] trace: events: neigh_update: print new state in string format

2019-02-23 Thread David Miller
From: Roopa Prabhu Date: Sat, 23 Feb 2019 22:25:12 -0800 > From: Roopa Prabhu > > Also, extend neigh_state_str to include neigh dummy states > noarp and permanent > > Fixes: 9c03b282badb ("trace: events: add a few neigh tracepoints") > Signed-off-by: Roopa Prabhu Applied, thanks Roopa.

WARNING: bad unlock balance detected! (3)

2019-02-23 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:40e196a906d9 Merge git://git.kernel.org/pub/scm/linux/kern.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=12a49614c0 kernel config: https://syzkaller.appspot.com/x/.config?x=7132344728e7ec3f da

[PATCH net-next 10/15] mlxsw: spectrum_acl: Remove RTNL lock assertions from ERP code

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko No longer require RTNL lock in this code. Newly introduced mutexes take care of guarding objagg and bloom filter. There is no need to guard gen_pool_alloc()/gen_pool_free() as they are fine to be called lockless. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- drive

[PATCH net-next 13/15] mlxsw: spectrum_acl: Add vregion migration end tracepoint

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Hit the new tracepoint once the vregion migration ends. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../mellanox/mlxsw/spectrum_acl_tcam.c| 11 +++--- include/trace/events/mlxsw.h | 20 +++ 2 files changed, 28 inserti

[PATCH net-next 11/15] mlxsw: spectrum_acl: Don't take mutex in mlxsw_sp_acl_tcam_vregion_rehash_work()

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Other mutexes are taking care of proper locking for this, no longer needed to take RTNL mutex here. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c | 5 - 1 file changed, 5 deletions(-) diff --git a/driver

[PATCH net-next 14/15] selftests: mlxsw: spectrum-2: Check migrate end trace

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Add checking of newly added trace. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../selftests/drivers/net/mlxsw/spectrum-2/tc_flower.sh | 8 1 file changed, 8 insertions(+) diff --git a/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/tc_flower.sh

[PATCH net-next 12/15] selftests: mlxsw: spectrum-2: Add IPv6 variant of simple delta rehash test

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Track the basic codepaths of delta rehash handling, using mlxsw tracepoints. Use IPv6 addresses. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../drivers/net/mlxsw/spectrum-2/tc_flower.sh | 71 +++ 1 file changed, 71 insertions(+) diff --git a/to

[PATCH net-next 15/15] selftests: mlxsw: spectrum-2: Add massive delta rehash test

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Do insertions and removal of filters during rehash in higher volumes. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../drivers/net/mlxsw/spectrum-2/tc_flower.sh | 166 ++ 1 file changed, 166 insertions(+) diff --git a/tools/testing/selftests/driv

[PATCH net-next 07/15] mlxsw: spectrum_acl: Introduce a mutex to guard objagg instance manipulation

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Protect objagg structures by adding a mutex to ERP code and take it during the structure manipulation. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../mellanox/mlxsw/spectrum_acl_erp.c | 25 +++ 1 file changed, 20 insertions(+), 5 deletio

[PATCH net-next 08/15] mlxsw: spectrum_acl: Enable vregion rehash per-profile

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko For MR ACL profile is does not make sense to do periodical rehashes, as there is only one mask in use during the whole vregion lifetime. Therefore periodical work is scheduled but the rehash never happens. So allow to enable/disable rehash for the whole group, which is added per-

[PATCH net-next 06/15] mlxsw: spectrum_acl: Introduce mutex to guard Bloom Filter updates

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Bloom filter is shared within multiple regions. For updates, it needs to be guarded by a separate mutex. Do that in order to not rely on RTNL mutex. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../mlxsw/spectrum_acl_bloom_filter.c | 34 +++---

[PATCH net-next 09/15] mlxsw: spectrum_acl: Don't take rtnl lock during vregion_rehash_intrvl_set()

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Relax dependency on rtnl mutex during vregion_rehash_intrvl_set(). The vregion list is protected with newly introduced mutex. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c | 11 +-- .../net/ethernet/mel

[PATCH net-next 00/15] mlxsw: spectrum_acl: Don't take rtnl mutex for region rehash

2019-02-23 Thread Ido Schimmel
Jiri says: During region rehash, a new region is created with a more optimized set of masks (ERPs). When transitioning to the new region, all the rules from the old region are copied one-by-one to the new region. This transition can be time consuming and currently done under RTNL lock. In order t

[PATCH net-next 02/15] mlxsw: spectrum_acl: Split TCAM group structure into two

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Make the existing group structure to contain fields needed for HW region list manipulations. Move the rest of the fields into new vgroup struct. This makes layering cleaner as the vgroup struct is on higher level than low-level group struct. Also, this makes it possible to introd

[PATCH net-next 03/15] mlxsw: spectrum_acl: Introduce a mutex to guard region list updates

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko In order to remove RTNL lock dependency, it is needed to protect the regions list in a group. Introduce a mutex to do the job. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../ethernet/mellanox/mlxsw/spectrum_acl_tcam.c | 16 ++-- 1 file changed, 14

[PATCH net-next 04/15] mlxsw: spectrum_acl: Refactor vregion association code

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Refactor existing _vchunk_assoc/_vchunk_deassoc() functions into _vregion_get()/_vregion_put() to make the code simpler and prepared for vregion locking. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../mellanox/mlxsw/spectrum_acl_tcam.c| 133 +---

[PATCH net-next 01/15] mlxsw: spectrum_acl: Remove unused ops field from group structure

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko Never used, remove it. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c b/drivers/net/ethernet/mellanox

[PATCH net-next 05/15] mlxsw: spectrum_acl: Introduce vregion mutex

2019-02-23 Thread Ido Schimmel
From: Jiri Pirko In order to remove dependency on RTNL, introduce a mutex to guard vregion structure, list of chunks and list of entries in chunks. Signed-off-by: Jiri Pirko Signed-off-by: Ido Schimmel --- .../mellanox/mlxsw/spectrum_acl_tcam.c| 26 +++ 1 file changed,

[Q] why do we ever try to call unix_dgram_peer_wake_disconnect() for SOCK_STREAM?

2019-02-23 Thread Al Viro
What's the point of calling unix_dgram_peer_wake_disconnect() in unix_release_sock() of SOCK_STREAM/SOCK_SEQPACKET sockets? AFAICS, for those we never call unix_dgram_peer_wake_connect(), i.e. ->peer_wake.private of any non-SOCK_DGRAM socker has to remain NULL. Which makes that call simpl

[PATCH net-next] trace: events: neigh_update: print new state in string format

2019-02-23 Thread Roopa Prabhu
From: Roopa Prabhu Also, extend neigh_state_str to include neigh dummy states noarp and permanent Fixes: 9c03b282badb ("trace: events: add a few neigh tracepoints") Signed-off-by: Roopa Prabhu --- include/trace/events/neigh.h | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff

Re: kTLS getsockopt TLS_RX support

2019-02-23 Thread Hayakawa Yutaro
> 2019/02/24 14:33、Vakul Garg のメール: > > > >> -Original Message- >> From: Hayakawa Yutaro >> Sent: Sunday, February 24, 2019 11:01 AM >> To: Vakul Garg >> Cc: netdev@vger.kernel.org >> Subject: Re: kTLS getsockopt TLS_RX support >> >> >>> 2019/02/24 10:50、Vakul Garg のメール: >>> >>>

RE: kTLS getsockopt TLS_RX support

2019-02-23 Thread Vakul Garg
> -Original Message- > From: Hayakawa Yutaro > Sent: Sunday, February 24, 2019 11:01 AM > To: Vakul Garg > Cc: netdev@vger.kernel.org > Subject: Re: kTLS getsockopt TLS_RX support > > > > 2019/02/24 10:50、Vakul Garg のメール: > > > > > > > >> -Original Message- > >> From: netdev-o

Re: kTLS getsockopt TLS_RX support

2019-02-23 Thread Hayakawa Yutaro
> 2019/02/24 10:50、Vakul Garg のメール: > > > >> -Original Message- >> From: netdev-ow...@vger.kernel.org On >> Behalf Of Hayakawa Yutaro >> Sent: Saturday, February 23, 2019 10:59 PM >> To: netdev@vger.kernel.org >> Subject: kTLS getsockopt TLS_RX support >> >> Hello, >> >> While tryin

Re: [PATCH v2 bpf-next 0/9] bpf: Network Resource Manager (NRM)

2019-02-23 Thread Alexei Starovoitov
On Sat, Feb 23, 2019 at 09:58:57PM -0500, David Ahern wrote: > On 2/23/19 6:25 PM, Alexei Starovoitov wrote: > >>> hmm. please see our NRM presentation at LPC. > > Reference? > > We also gave a talk about a resource manager in November 2017: > > https://netdevconf.org/2.2/papers/roulin-hardwarer

Re: [PATCH v2 bpf-next 2/9] bpf: Add bpf helper bpf_tcp_enter_cwr

2019-02-23 Thread Alexei Starovoitov
On Sun, Feb 24, 2019 at 03:08:48AM +, Martin Lau wrote: > On Sat, Feb 23, 2019 at 05:32:14PM -0800, Eric Dumazet wrote: > > > > > > On 02/22/2019 05:06 PM, brakmo wrote: > > > From: Martin KaFai Lau > > > > > > This patch adds a new bpf helper BPF_FUNC_tcp_enter_cwr > > > "int bpf_tcp_enter

[PATCH net-next v4] route: Add multipath_hash in flowi_common to make user-define hash

2019-02-23 Thread wenxu
From: wenxu Current fib_multipath_hash_policy can make hash based on the L3 or L4. But it only work on the outer IP. So a specific tunnel always has the same hash value. But a specific tunnel may contain so many inner connections. This patch provide a generic multipath_hash in floi_common. It ca

Re: [PATCH][net-next] ipv6: sanitize RCU usage on fib6_next

2019-02-23 Thread kbuild test robot
Hi Li, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on net/master] [also build test WARNING on v5.0-rc4 next-20190222] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/

Re: [PATCH v2 bpf-next 2/9] bpf: Add bpf helper bpf_tcp_enter_cwr

2019-02-23 Thread Martin Lau
On Sat, Feb 23, 2019 at 05:32:14PM -0800, Eric Dumazet wrote: > > > On 02/22/2019 05:06 PM, brakmo wrote: > > From: Martin KaFai Lau > > > > This patch adds a new bpf helper BPF_FUNC_tcp_enter_cwr > > "int bpf_tcp_enter_cwr(struct bpf_tcp_sock *tp)". > > It is added to BPF_PROG_TYPE_CGROUP_SKB

Re: [PATCH v2 bpf-next 0/9] bpf: Network Resource Manager (NRM)

2019-02-23 Thread David Ahern
On 2/23/19 6:25 PM, Alexei Starovoitov wrote: >>> hmm. please see our NRM presentation at LPC. Reference? We also gave a talk about a resource manager in November 2017: https://netdevconf.org/2.2/papers/roulin-hardwareresourcesmgmt-talk.pdf in this case the context is hardware resources for net

Re: [PATCH net-next v3] route: Add multipath_hash in flowi_common to make user-define hash

2019-02-23 Thread kbuild test robot
Hi wenxu, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on net-next/master] url: https://github.com/0day-ci/linux/commits/wenxu-ucloud-cn/route-Add-multipath_hash-in-flowi_common-to-make-user-define-hash/20190224-075532 reproduce: # apt-get install s

[GIT] Networking

2019-02-23 Thread David Miller
Hopefully the last pull request for this release. Fingers crossed: 1) Only refcount ESP stats on full sockets, from Martin Willi. 2) Missing barriers in AF_UNIX, from Al Viro. 3) RCU protection fixes in ipv6 route code, from Paolo Abeni. 4) Avoid false positives in untrusted GSO validation,

Re: [PATCH v2] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread David Miller
From: Linus Walleij Date: Sun, 24 Feb 2019 01:11:15 +0100 > This fixes a regression introduced by > commit 0d2e778e38e0ddffab4bb2b0e9ed2ad5165c4bf7 > "net: phy: replace PHY_HAS_INTERRUPT with a check for > config_intr and ack_interrupt". > > This assumes that a PHY cannot trigger interrupt unles

Re: [PATCH net] tcp: repaired skbs must init their tso_segs

2019-02-23 Thread David Miller
From: Eric Dumazet Date: Sat, 23 Feb 2019 15:51:51 -0800 > syzbot reported a WARN_ON(!tcp_skb_pcount(skb)) > in tcp_send_loss_probe() [1] > > This was caused by TCP_REPAIR sent skbs that inadvertenly > were missing a call to tcp_init_tso_segs() ... > Fixes: 79861919b889 ("tcp: fix TCP_REPAIR xm

Re: [PATCH net] net/x25: fix a race in x25_bind()

2019-02-23 Thread David Miller
From: Eric Dumazet Date: Sat, 23 Feb 2019 13:24:59 -0800 > syzbot was able to trigger another soft lockup [1] > > I first thought it was the O(N^2) issue I mentioned in my > prior fix (f657d22ee1f "net/x25: do not hold the cpu > too long in x25_new_lci()"), but I eventually found > that x25_bind

Re: [PATCH] net: dsa: Remove documentation for port_fdb_prepare

2019-02-23 Thread David Miller
From: Hauke Mehrtens Date: Fri, 22 Feb 2019 20:07:45 +0100 > This callback was removed some time ago, also remove the documentation. > > Fixes: 1b6dd556c304 ("net: dsa: Remove prepare phase for FDB") > Signed-off-by: Hauke Mehrtens Applied.

Re: [PATCH net] Revert "bridge: do not add port to router list when receives query with source 0.0.0.0"

2019-02-23 Thread David Miller
From: Hangbin Liu Date: Fri, 22 Feb 2019 21:22:32 +0800 > This reverts commit 5a2de63fd1a5 ("bridge: do not add port to router list > when receives query with source 0.0.0.0") and commit 0fe5119e267f ("net: > bridge: remove ipv6 zero address check in mcast queries") > > The reason is RFC 4541 is

Re: [PATCH] selftests: fib_tests: sleep after changing carrier. again.

2019-02-23 Thread David Miller
From: Thadeu Lima de Souza Cascardo Date: Fri, 22 Feb 2019 07:27:41 -0300 > Just like commit e2ba732a1681 ("selftests: fib_tests: sleep after > changing carrier"), wait one second to allow linkwatch to propagate the > carrier change to the stack. > > There are two sets of carrier tests. The firs

Re: [PATCH v3 net-next 2/2] net: sock: undefine SOCK_DEBUGGING

2019-02-23 Thread David Miller
From: Cong Wang Date: Sat, 23 Feb 2019 17:11:08 -0800 > On Sat, Feb 23, 2019 at 1:21 PM David Miller wrote: >> >> You are forcing everyone who wants to use this to add a curstom local >> source code change into their build. > > What's wrong with this? People carry custom changes in anyway, > do

[PATCH net-next] net: fix double-free in bpf_lwt_xmit_reroute

2019-02-23 Thread Peter Oskolkov
dst_output() frees skb when it fails (see, for example, ip_finish_output2), so it must not be freed in this case. Fixes: 3bd0b15281af ("bpf: add handling of BPF_LWT_REROUTE to lwt_bpf.c") Signed-off-by: Peter Oskolkov --- net/core/lwt_bpf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

RE: kTLS getsockopt TLS_RX support

2019-02-23 Thread Vakul Garg
> -Original Message- > From: netdev-ow...@vger.kernel.org On > Behalf Of Hayakawa Yutaro > Sent: Saturday, February 23, 2019 10:59 PM > To: netdev@vger.kernel.org > Subject: kTLS getsockopt TLS_RX support > > Hello, > > While trying the kTLS, I found out that currently, there is no su

Re: [PATCH v2 bpf-next 2/9] bpf: Add bpf helper bpf_tcp_enter_cwr

2019-02-23 Thread Eric Dumazet
On 02/22/2019 05:06 PM, brakmo wrote: > From: Martin KaFai Lau > > This patch adds a new bpf helper BPF_FUNC_tcp_enter_cwr > "int bpf_tcp_enter_cwr(struct bpf_tcp_sock *tp)". > It is added to BPF_PROG_TYPE_CGROUP_SKB which can be attached > to the egress path where the bpf prog is called by >

Re: [PATCH v3 net-next 2/2] net: sock: undefine SOCK_DEBUGGING

2019-02-23 Thread Cong Wang
On Sat, Feb 23, 2019 at 1:21 PM David Miller wrote: > > From: Yafang Shao > Date: Sun, 17 Feb 2019 22:26:32 +0800 > > The reason why I don't remove it comepletely is that someone may still > > would like to use it for debugging. Please remove it completely. The rule here is we upstream only car

Re: [PATCH net] tcp: repaired skbs must init their tso_segs

2019-02-23 Thread Neal Cardwell
On Sat, Feb 23, 2019 at 6:51 PM Eric Dumazet wrote: > > syzbot reported a WARN_ON(!tcp_skb_pcount(skb)) > in tcp_send_loss_probe() [1] > > This was caused by TCP_REPAIR sent skbs that inadvertenly > were missing a call to tcp_init_tso_segs() > Acked-by: Neal Cardwell Thanks, Eric! neal

Re: [PATCH v3 net-next 2/2] net: sock: undefine SOCK_DEBUGGING

2019-02-23 Thread Cong Wang
On Sat, Feb 23, 2019 at 1:21 PM David Miller wrote: > > You are forcing everyone who wants to use this to add a curstom local > source code change into their build. What's wrong with this? People carry custom changes in anyway, do we really need to care about all the downstream changes? If yes,

Re: [PATCH v2] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread Andrew Lunn
On Sun, Feb 24, 2019 at 01:11:15AM +0100, Linus Walleij wrote: > This fixes a regression introduced by > commit 0d2e778e38e0ddffab4bb2b0e9ed2ad5165c4bf7 > "net: phy: replace PHY_HAS_INTERRUPT with a check for > config_intr and ack_interrupt". > > This assumes that a PHY cannot trigger interrupt un

[PATCH net-next v3] ip_tunnel: Add ip tunnel tun_info type dst_cache in ip_tunnel_xmit

2019-02-23 Thread wenxu
From: wenxu ip l add dev tun type gretap key 1000 Non-tunnel-dst ip tunnel device can send packet through lwtunnel This patch provide the tun_inf dst cache support for this mode. Signed-off-by: wenxu --- net/ipv4/ip_tunnel.c | 38 +++--- 1 file changed, 27 inse

Re: [PATCH] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread Linus Walleij
On Sun, Feb 24, 2019 at 1:07 AM Andrew Lunn wrote: > > They are handled by the irqchip mask/unmask inside > > the RTL8366RB, see: > > drivers/net/dsa/rtl8366rb.c > > > > So as soon as the phy core request the threaded IRQ > > the irqchip will deal with this business on its own. > > > > How exactl

[PATCH v2] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread Linus Walleij
This fixes a regression introduced by commit 0d2e778e38e0ddffab4bb2b0e9ed2ad5165c4bf7 "net: phy: replace PHY_HAS_INTERRUPT with a check for config_intr and ack_interrupt". This assumes that a PHY cannot trigger interrupt unless it has .config_intr() or .ack_interrupt() implemented. A later patch m

Re: [PATCH] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread Andrew Lunn
> They are handled by the irqchip mask/unmask inside > the RTL8366RB, see: > drivers/net/dsa/rtl8366rb.c > > So as soon as the phy core request the threaded IRQ > the irqchip will deal with this business on its own. > > How exactly the RTL8366RB IRQ machine looks inside > I doubt even Realtek kno

Re: [PATCH net] tcp: repaired skbs must init their tso_segs

2019-02-23 Thread Soheil Hassas Yeganeh
On Sat, Feb 23, 2019 at 6:51 PM Eric Dumazet wrote: > > syzbot reported a WARN_ON(!tcp_skb_pcount(skb)) > in tcp_send_loss_probe() [1] > > This was caused by TCP_REPAIR sent skbs that inadvertenly > were missing a call to tcp_init_tso_segs() > > [1] > WARNING: CPU: 1 PID: 0 at net/ipv4/tcp_output.

Re: [PATCH] net: phy: realtek: Dummy IRQ calls for RTL8366RB

2019-02-23 Thread Linus Walleij
On Sat, Feb 23, 2019 at 4:17 PM Andrew Lunn wrote: > On Sat, Feb 23, 2019 at 03:36:39AM +0100, Linus Walleij wrote: > > This fixes a regression introduced by > > commit 0d2e778e38e0ddffab4bb2b0e9ed2ad5165c4bf7 > > "net: phy: replace PHY_HAS_INTERRUPT with a check for > > config_intr and ack_inter

Re: No traffic with Marvell switch and latest linux-next

2019-02-23 Thread Florian Fainelli
Le 2/23/19 à 1:48 PM, Heiner Kallweit a écrit : > On 18.02.2019 19:21, Andrew Lunn wrote: Hi Heiner Watch out for boot vs reboot, and when rebooting if port 8 had link or not before you reboot. >>> Will do. Is there some known issue or bug? >> >> Hi Heiner >> >> No, but it

[PATCH net] tcp: repaired skbs must init their tso_segs

2019-02-23 Thread Eric Dumazet
syzbot reported a WARN_ON(!tcp_skb_pcount(skb)) in tcp_send_loss_probe() [1] This was caused by TCP_REPAIR sent skbs that inadvertenly were missing a call to tcp_init_tso_segs() [1] WARNING: CPU: 1 PID: 0 at net/ipv4/tcp_output.c:2534 tcp_send_loss_probe+0x771/0x8a0 net/ipv4/tcp_output.c:2534 Ke

r8169 Kernel bug in 4.20.11

2019-02-23 Thread Ron Murray
Hi.    I've encountered this bug in the last couple of kernel versions now (since, say 4.20.8 +/- 0.0.2).    I don't see a mention in this mailing list/ Apologies if you've already seen it. -- Ron Murray PGP Fingerprint: 4D99 70E3 2317 334B 141E 7B63 12F7 E865 B5E2 E761 Feb 21 15:54:04 khufu

Re: No traffic with Marvell switch and latest linux-next

2019-02-23 Thread Andrew Lunn
> it took me quite some time to debug this issue .. > > At first a bisect pointed to one of my commits: > 5502b218e001 ("net: phy: use phy_resolve_aneg_linkmode in genphy_read_status") > > Further digging lead me to some suspicious dsa code: > In dsa_port_fixed_link_register_of() there's a call t

Re: [PATCH net-next 2/2] xdp: Add devmap_idx map type for looking up devices by ifindex

2019-02-23 Thread kbuild test robot
Hi Toke, I love your patch! Yet something to improve: [auto build test ERROR on net-next/master] url: https://github.com/0day-ci/linux/commits/Toke-H-iland-J-rgensen/xdp-Always-use-a-devmap-for-XDP_REDIRECT-to-a-device/20190224-054907 config: i386-randconfig-l1-02240344 (attached as .config)

Re: [PATCH] ip_tunnel: Add ip tunnel tunnel_info dst_cache in ip_tunnel_xmit

2019-02-23 Thread kbuild test robot
Hi wenxu, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on net/master] [also build test WARNING on v5.0-rc4 next-20190222] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/lin

Re: [PATCH net-next 2/2] xdp: Add devmap_idx map type for looking up devices by ifindex

2019-02-23 Thread kbuild test robot
Hi Toke, I love your patch! Perhaps something to improve: [auto build test WARNING on net-next/master] url: https://github.com/0day-ci/linux/commits/Toke-H-iland-J-rgensen/xdp-Always-use-a-devmap-for-XDP_REDIRECT-to-a-device/20190224-054907 config: i386-randconfig-a1-201907 (attached as .con

Re: [PATCH v2 bpf-next 0/9] bpf: Network Resource Manager (NRM)

2019-02-23 Thread Alexei Starovoitov
On Sat, Feb 23, 2019 at 12:43:51PM -0800, Eric Dumazet wrote: > > > On 02/23/2019 12:40 PM, Alexei Starovoitov wrote: > > On Sat, Feb 23, 2019 at 10:39:53AM -0800, Eric Dumazet wrote: > >> > >> > >> On 02/22/2019 07:03 PM, David Ahern wrote: > >>> On 2/22/19 8:06 PM, brakmo wrote: > Network

Re: [PATCH bpf] bpf: properly check TCP_CONGESTION optlen

2019-02-23 Thread Alexei Starovoitov
On Sat, Feb 23, 2019 at 12:48:53PM -0800, Eric Dumazet wrote: > > > On 02/23/2019 12:38 PM, Alexei Starovoitov wrote: > > On Sat, Feb 23, 2019 at 11:07:09AM -0800, Eric Dumazet wrote: > >> If caller of bpf_setsockopt() is silly passing a negative optlen > >> bad things happen. > >> > >> Fixes: 91

Re: [PATCH v3 net-next 2/2] net: sock: undefine SOCK_DEBUGGING

2019-02-23 Thread Joe Perches
On Sat, 2019-02-23 at 13:21 -0800, David Miller wrote: > From: Yafang Shao > Date: Sun, 17 Feb 2019 22:26:32 +0800 > > > SOCK_DEBUG() is a old facility for debugging. > > If the user want to use it for debugging, the user must modify the > > application first, that doesn't seem like a good way. >

Re: [PATCH net-next 0/5] net: phy: aquantia: improve and extend driver

2019-02-23 Thread David Miller
From: Heiner Kallweit Date: Fri, 22 Feb 2019 23:45:53 +0100 > This series improves and extends the Aquantia PHY driver. Series applied, thanks Heiner.

Re: [pull request][net-next 0/9] Mellanox, mlx5 updates 2019-02-21

2019-02-23 Thread David Miller
From: Saeed Mahameed Date: Fri, 22 Feb 2019 13:44:17 -0800 > This series adds misc updates to mlx5 driver. > For more information please see tag log below. > > Please pull and let me know if there is any problem. Pulled, thanks Saeed.

Re: [PATCH net-next 00/10] mlxsw: Add support for new port types and speeds for Spectrum-2

2019-02-23 Thread David Miller
From: Ido Schimmel Date: Fri, 22 Feb 2019 13:56:35 + > This patchset adds support for new port types and speeds for Spectrum-2. ... Series applied, thank you.

Re: No traffic with Marvell switch and latest linux-next

2019-02-23 Thread Heiner Kallweit
On 18.02.2019 19:21, Andrew Lunn wrote: >>> Hi Heiner >>> >>> Watch out for boot vs reboot, and when rebooting if port 8 had link or >>> not before you reboot. >>> >> Will do. Is there some known issue or bug? > > Hi Heiner > > No, but it is a variable which can make a difference. The fix i made

Re: [PATCH net v3] net: set static variable an initial value in atl2_probe()

2019-02-23 Thread David Miller
From: Mao Wenan Date: Fri, 22 Feb 2019 14:57:23 +0800 > cards_found is a static variable, but when it enters atl2_probe(), > cards_found is set to zero, the value is not consistent with last probe, > so next behavior is not our expect. > > Signed-off-by: Mao Wenan Applied and queued up for -st

Re: [PATCH net-next] kcm: Remove unnecessary SLAB_PANIC for kmem_cache_create() in kcm_init

2019-02-23 Thread David Miller
From: Yue Haibing Date: Fri, 22 Feb 2019 14:15:30 +0800 > From: YueHaibing > > There has check NULL on kmem_cache_create on failure in kcm_init, > no need use SLAB_PANIC to panic the system. > > Signed-off-by: YueHaibing I'll apply this, thank you.

Re: [PATCH net-next 0/4] -Wformat fixes

2019-02-23 Thread David Miller
From: Florian Fainelli Date: Thu, 21 Feb 2019 20:09:25 -0800 > This is a collection of some -Wformat fixes found during build, nothing > critical, but nice to have for people turning on more warnings with > their builds. Applied, thanks Florian.

Re: [PATCH] bpfilter: re-add header search paths to tools include to fix build error

2019-02-23 Thread David Miller
From: Masahiro Yamada Date: Fri, 22 Feb 2019 12:23:19 +0900 > I thought header search paths to tools/include(/uapi) were unneeded, > but it looks like a build error occurs depending on the compiler. > > Commit 303a339f30a9 ("bpfilter: remove extra header search paths for > bpfilter_umh") reintro

[PATCH AUTOSEL 4.20 05/72] netfilter: nft_compat: use refcnt_t type for nft_xt reference count

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 12c44aba6618b7f6c437076e5722237190f6cd5f ] Using standard integer type was fine while all operations on it were guarded by the nftnl subsys mutex. This isn't true anymore: 1. transactions are guarded only by a pernet mutex, so concurrent rule manipula

[PATCH AUTOSEL 4.20 01/72] vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel

2019-02-23 Thread Sasha Levin
From: Su Yanjun [ Upstream commit dd9ee3444014e8f28c0eefc9fffc9ac9c5248c12 ] Recently we run a network test over ipcomp virtual tunnel.We find that if a ipv4 packet needs fragment, then the peer can't receive it. We deep into the code and find that when packet need fragment the smaller fragment

[PATCH AUTOSEL 4.20 02/72] xfrm: refine validation of template and selector families

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 35e6103861a3a970de6c84688c6e7a1f65b164ca ] The check assumes that in transport mode, the first templates family must match the address family of the policy selector. Syzkaller managed to build a template using MODE_ROUTEOPTIMIZATION, with ipv4-in-ipv6 ch

[PATCH AUTOSEL 4.20 06/72] netfilter: nft_compat: make lists per netns

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit cf52572ebbd7189a1966c2b5fc34b97078cd1dce ] There are two problems with nft_compat since the netlink config plane uses a per-netns mutex: 1. Concurrent add/del accesses to the same list 2. accesses to a list element after it has been free'd already. This

[PATCH AUTOSEL 4.20 07/72] netfilter: nft_compat: destroy function must not have side effects

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit b2e3d68d1251a051a620f9086e18f7ffa6833b5b ] The nft_compat destroy function deletes the nft_xt object from a list. This isn't allowed anymore. Destroy functions are called asynchronously, i.e. next batch can find the object that has a pending ->destroy() i

[PATCH AUTOSEL 4.20 17/72] ipvs: Fix signed integer overflow when setsockopt timeout

2019-02-23 Thread Sasha Levin
From: ZhangXiaoxu [ Upstream commit 53ab60baa1ac4f20b080a22c13b77b6373922fd7 ] There is a UBSAN bug report as below: UBSAN: Undefined behaviour in net/netfilter/ipvs/ip_vs_ctl.c:2227:21 signed integer overflow: -2147483647 * 1000 cannot be represented in type 'int' Reproduce program: #i

[PATCH AUTOSEL 4.20 34/72] net: hns: Restart autoneg need return failed when autoneg off

2019-02-23 Thread Sasha Levin
From: Yonglong Liu [ Upstream commit ed29ca8b9592562559c64d027fb5eb126e463e2c ] The hns driver of earlier devices, when autoneg off, restart autoneg will return -EINVAL, so make the hns driver for the latest devices do the same. Signed-off-by: Yonglong Liu Signed-off-by: Peng Li Signed-off-by

[PATCH AUTOSEL 4.20 32/72] net: altera_tse: fix msgdma_tx_completion on non-zero fill_level case

2019-02-23 Thread Sasha Levin
From: Tomonori Sakita [ Upstream commit 6571ebce112a21ec9be68ef2f53b96fcd41fd81b ] If fill_level was not zero and status was not BUSY, result of "tx_prod - tx_cons - inuse" might be zero. Subtracting 1 unconditionally results invalid negative return value on this case. Make sure not to return an

[PATCH AUTOSEL 4.20 35/72] net: hns: Fix wrong read accesses via Clause 45 MDIO protocol

2019-02-23 Thread Sasha Levin
From: Yonglong Liu [ Upstream commit cec8abba13e6a26729dfed41019720068eeeff2b ] When reading phy registers via Clause 45 MDIO protocol, after write address operation, the driver use another write address operation, so can not read the right value of any phy registers. This patch fixes it. Signe

[PATCH AUTOSEL 4.20 33/72] net: hns: Fix for missing of_node_put() after of_parse_phandle()

2019-02-23 Thread Sasha Levin
From: Yonglong Liu [ Upstream commit 263c6d75f9a544a3c2f8f6a26de4f4808d8f59cf ] In hns enet driver, we use of_parse_handle() to get hold of the device node related to "ae-handle" but we have missed to put the node reference using of_node_put() after we are done using the node. This patch fixes i

[PATCH AUTOSEL 4.20 44/72] qed: Fix LACP pdu drops for VFs

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit ff9296966e5e00b0d0d00477b2365a178f0f06a3 ] VF is always configured to drop control frames (with reserved mac addresses) but to work LACP on the VFs, it would require LACP control frames to be forwarded or transmitted successfully. This patch fixes this in s

[PATCH AUTOSEL 4.20 40/72] selftests: net: use LDLIBS instead of LDFLAGS

2019-02-23 Thread Sasha Levin
From: Fathi Boudra [ Upstream commit 870f193d48c25a97d61a8e6c04e3c29a2c606850 ] reuseport_bpf_numa fails to build due to undefined reference errors: aarch64-linaro-linux-gcc --sysroot=/build/tmp-rpb-glibc/sysroots/hikey -Wall -Wl,--no-as-needed -O2 -g -I../../../../usr/include/ -Wl,-O1 -Wl

[PATCH AUTOSEL 4.20 37/72] netfilter: ebtables: compat: un-break 32bit setsockopt when no rules are present

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 2035f3ff8eaa29cfb5c8e2160b0f6e85eeb21a95 ] Unlike ip(6)tables ebtables only counts user-defined chains. The effect is that a 32bit ebtables binary on a 64bit kernel can do 'ebtables -N FOO' only after adding at least one rule, else the request fails with

[PATCH AUTOSEL 4.20 43/72] qed: Fix bug in tx promiscuous mode settings

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit 9e71a15d8b5bbce25c637f7f8833cd3f45b65646 ] When running tx switched traffic between VNICs created via a bridge(to which VFs are added), adapter drops the unicast packets in tx flow due to VNIC's ucast mac being unknown to it. But VF interfaces being in promi

[PATCH AUTOSEL 4.20 38/72] netfilter: nfnetlink_osf: add missing fmatch check

2019-02-23 Thread Sasha Levin
From: Fernando Fernandez Mancera [ Upstream commit 1a6a0951fc009f6d9fe8ebea2d2417d80d54097b ] When we check the tcp options of a packet and it doesn't match the current fingerprint, the tcp packet option pointer must be restored to its initial value in order to do the proper tcp options check fo

[PATCH AUTOSEL 4.20 45/72] qed: Fix VF probe failure while FLR

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit 327852ec64205bb651be391a069784872098a3b2 ] VFs may hit VF-PF channel timeout while probing, as in some cases it was observed that VF FLR and VF "acquire" message transaction (i.e first message from VF to PF in VF's probe flow) could occur simultaneously whic

[PATCH AUTOSEL 4.20 36/72] net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup()

2019-02-23 Thread Sasha Levin
From: Alexey Khoroshilov [ Upstream commit c69c29a1a0a8f68cd87e98ba4a5a79fb8ef2a58c ] If phy_power_on() fails in rk_gmac_powerup(), clocks are left enabled. Found by Linux Driver Verification project (linuxtesting.org). Signed-off-by: Alexey Khoroshilov Signed-off-by: David S. Miller Signed-

[PATCH AUTOSEL 4.20 47/72] qed: Fix stack out of bounds bug

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit ffb057f98928aa099b08e419bbe5afc26ec9f448 ] KASAN reported following bug in qed_init_qm_get_idx_from_flags due to inappropriate casting of "pq_flags". Fix the type of "pq_flags". [ 196.624707] BUG: KASAN: stack-out-of-bounds in qed_init_qm_get_idx_from_fla

[PATCH AUTOSEL 4.19 02/65] xfrm: refine validation of template and selector families

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 35e6103861a3a970de6c84688c6e7a1f65b164ca ] The check assumes that in transport mode, the first templates family must match the address family of the policy selector. Syzkaller managed to build a template using MODE_ROUTEOPTIMIZATION, with ipv4-in-ipv6 ch

[PATCH AUTOSEL 4.19 04/65] netfilter: nft_compat: use refcnt_t type for nft_xt reference count

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 12c44aba6618b7f6c437076e5722237190f6cd5f ] Using standard integer type was fine while all operations on it were guarded by the nftnl subsys mutex. This isn't true anymore: 1. transactions are guarded only by a pernet mutex, so concurrent rule manipula

Re: [PATCH net] net: phy: marvell10g: Fix Multi-G advertisement to only advertise 10G

2019-02-23 Thread David Miller
From: Maxime Chevallier Date: Thu, 21 Feb 2019 17:54:11 +0100 > Some Marvell Alaska PHYs support 2.5G, 5G and 10G BaseT links. Their > default behaviour is to advertise all of these modes, but at the moment, > only 10GBaseT is supported. To prevent link partners from establishing > link at that s

[PATCH AUTOSEL 4.19 01/65] vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel

2019-02-23 Thread Sasha Levin
From: Su Yanjun [ Upstream commit dd9ee3444014e8f28c0eefc9fffc9ac9c5248c12 ] Recently we run a network test over ipcomp virtual tunnel.We find that if a ipv4 packet needs fragment, then the peer can't receive it. We deep into the code and find that when packet need fragment the smaller fragment

[PATCH AUTOSEL 4.19 14/65] ipvs: Fix signed integer overflow when setsockopt timeout

2019-02-23 Thread Sasha Levin
From: ZhangXiaoxu [ Upstream commit 53ab60baa1ac4f20b080a22c13b77b6373922fd7 ] There is a UBSAN bug report as below: UBSAN: Undefined behaviour in net/netfilter/ipvs/ip_vs_ctl.c:2227:21 signed integer overflow: -2147483647 * 1000 cannot be represented in type 'int' Reproduce program: #i

[PATCH AUTOSEL 4.19 05/65] netfilter: nft_compat: make lists per netns

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit cf52572ebbd7189a1966c2b5fc34b97078cd1dce ] There are two problems with nft_compat since the netlink config plane uses a per-netns mutex: 1. Concurrent add/del accesses to the same list 2. accesses to a list element after it has been free'd already. This

[PATCH AUTOSEL 4.19 39/65] qed: Fix bug in tx promiscuous mode settings

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit 9e71a15d8b5bbce25c637f7f8833cd3f45b65646 ] When running tx switched traffic between VNICs created via a bridge(to which VFs are added), adapter drops the unicast packets in tx flow due to VNIC's ucast mac being unknown to it. But VF interfaces being in promi

[PATCH AUTOSEL 4.19 42/65] qed: Fix system crash in ll2 xmit

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit 7c81626a3c37e4ac320b8ad785694ba498f24794 ] Cache number of fragments in the skb locally as in case of linear skb (with zero fragments), tx completion (or freeing of skb) may happen before driver tries to get number of frgaments from the skb which could lead

[PATCH AUTOSEL 4.19 40/65] qed: Fix LACP pdu drops for VFs

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit ff9296966e5e00b0d0d00477b2365a178f0f06a3 ] VF is always configured to drop control frames (with reserved mac addresses) but to work LACP on the VFs, it would require LACP control frames to be forwarded or transmitted successfully. This patch fixes this in s

[PATCH AUTOSEL 4.19 32/65] net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup()

2019-02-23 Thread Sasha Levin
From: Alexey Khoroshilov [ Upstream commit c69c29a1a0a8f68cd87e98ba4a5a79fb8ef2a58c ] If phy_power_on() fails in rk_gmac_powerup(), clocks are left enabled. Found by Linux Driver Verification project (linuxtesting.org). Signed-off-by: Alexey Khoroshilov Signed-off-by: David S. Miller Signed-

[PATCH AUTOSEL 4.19 33/65] netfilter: ebtables: compat: un-break 32bit setsockopt when no rules are present

2019-02-23 Thread Sasha Levin
From: Florian Westphal [ Upstream commit 2035f3ff8eaa29cfb5c8e2160b0f6e85eeb21a95 ] Unlike ip(6)tables ebtables only counts user-defined chains. The effect is that a 32bit ebtables binary on a 64bit kernel can do 'ebtables -N FOO' only after adding at least one rule, else the request fails with

[PATCH AUTOSEL 4.19 41/65] qed: Fix VF probe failure while FLR

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit 327852ec64205bb651be391a069784872098a3b2 ] VFs may hit VF-PF channel timeout while probing, as in some cases it was observed that VF FLR and VF "acquire" message transaction (i.e first message from VF to PF in VF's probe flow) could occur simultaneously whic

[PATCH AUTOSEL 4.19 43/65] qed: Fix stack out of bounds bug

2019-02-23 Thread Sasha Levin
From: Manish Chopra [ Upstream commit ffb057f98928aa099b08e419bbe5afc26ec9f448 ] KASAN reported following bug in qed_init_qm_get_idx_from_flags due to inappropriate casting of "pq_flags". Fix the type of "pq_flags". [ 196.624707] BUG: KASAN: stack-out-of-bounds in qed_init_qm_get_idx_from_fla

  1   2   3   >