ila_xlat_nl_cmd_flush uses rhashtable walkers allocated from the
stack but it never frees them. This corrupts the walker list of
the hash table.
This patch fixes it.
Reported-by: syzbot+dae72a112334aa65a...@syzkaller.appspotmail.com
Fixes: b6e71bdebb12 ("ila: Flush netlink command to clear xlat.
On Mon, Mar 25, 2019 at 01:48:27AM -0700, Eric Dumazet wrote:
>
>
> On 03/25/2019 01:33 AM, Eric Dumazet wrote:
> >
> >
> > On 03/24/2019 09:19 AM, Alexei Starovoitov wrote:
>
> >> Cover letter also explains why bpf_skb_ecn_set_ce is not enough.
> >> Please realize that existing qdiscs already
On Sun, Mar 24, 2019 at 10:32:03PM +0200, Vladimir Oltean wrote:
> I didn't want to pollute LKML with the entire driver patchset from the
> get-go, just receive some initial feedback from netdev first (hence the
> RFC).
> How should I proceed? Should I resend just this patch to LKML, or a v2
> patc
From: wenxu
There is currently no support for the multicast/broadcast aspects
of VXLAN in ovs. In the datapath flow the tun_dst must specific.
But in the IP_TUNNEL_INFO_BRIDGE mode the tun_dst can not be specific.
And the packet can forward through the fdb table of vxlan devcice. In
this mode the
On Mon, Mar 25, 2019 at 11:02:07AM -0600, David Ahern wrote:
>
> That is followed by refactoring IPv6 again in a direction that makes
> IPv4 and IPv6 more consistent and enables changes (outside of the
> nexthop sets) that will improve IPv6 for a number of cases by removing
> the need to always ge
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> Signed-off-by: Vladimir Oltean
> ---
[snip]
> +
> +int sja1105_get_sset_count(struct dsa_switch *ds, int port, int sset)
> +{
> + int count = ARRAY_SIZE(sja1105_port_stats);
> + struct sja1105_private *priv = ds->priv;
There is a missing
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> VLAN filtering cannot be properly disabled in SJA1105. So in order to
> emulate the "no VLAN awareness" behavior (not dropping traffic that is
> tagged with a VID that isn't configured on the port), we need to hack
> another switch feature: programm
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> Currently only the (more difficult) first generation E/T series is
> supported. Here the TCAM is only 4-way associative, and to know where
> the hardware will search for a FDB entry, we need to perform the same
> hash algorithm in order to install t
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> Signed-off-by: Vladimir Oltean
Reviewed-by: Florian Fainelli
--
Florian
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> In order to support this, we are creating a make-shift switch tag out of
> a VLAN trunk configured on the CPU port. Termination on switch ports
> only works when not under a vlan_filtering bridge. We are making use of
> the generic CONFIG_NET_DSA_TA
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> Signed-off-by: Vladimir Oltean
> ---
> .../devicetree/bindings/net/dsa/sja1105.txt | 123 ++
> 1 file changed, 123 insertions(+)
> create mode 100644 Documentation/devicetree/bindings/net/dsa/sja1105.txt
>
> diff --git a/Docume
On 3/24/19 9:26 PM, Alexei Starovoitov wrote:
> The kernel has to be fast as a dataplane but these extra features
> will slow down the routing by making kernel-as-database scale a bit better.
I took Vincent Bernat's fib lookup microbenchmark and added input and
output route lookups to it. Through
On 3/23/2019 8:23 PM, Vladimir Oltean wrote:
> This patch provides generic DSA code for using VLAN (802.1Q) tags for
> the same purpose as a dedicated switch tag for injection/extraction.
> It is based on the discussions and interest that has been so far
> expressed in https://www.spinics.net/li
From: Numan Siddique
This patch adds a new action - 'check_pkt_len' which checks the
packet length and executes a set of actions if the packet
length is greater than the specified length or executes
another set of actions if the packet length is lesser or equal to.
This action takes below nlattr
v1->v2:
- add fs/proc/proc_sysctl.c mainteners to Cc:.
The patch set introduces new BPF hook for sysctl.
It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type
BPF_CGROUP_SYSCTL.
BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so
that accesses (read/write)
On Sat, Mar 23, 2019 at 09:05:31AM -0700, Stanislav Fomichev wrote:
> On 03/22, Alexei Starovoitov wrote:
> > On Fri, Mar 22, 2019 at 06:19:57PM -0700, Stanislav Fomichev wrote:
> > > Are we ok with breaking api in this case? I'm all in on removing this
> > > extra information. We can always put it
From: Heiner Kallweit
Date: Fri, 22 Mar 2019 20:00:20 +0100
> So far we effectively clear the BMCR register. Some PHY's can deal
> with this (e.g. because they reset BMCR to a default as part of a
> soft-reset) whilst on others this causes issues because e.g. the
> autoneg bit is cleared. Marvell
Am 25.03.19 um 22:58 schrieb Cong Wang:
> On Mon, Mar 25, 2019 at 2:37 PM Reindl Harald wrote:
>>
>> Am 25.03.19 um 20:07 schrieb Cong Wang:
>>> On Mon, Mar 25, 2019 at 5:08 AM Reindl Harald
>>> wrote:
besides that i get tired about random crashes over the last months (yeah
the
On Mon, Mar 25, 2019 at 2:37 PM Reindl Harald wrote:
>
>
>
> Am 25.03.19 um 20:07 schrieb Cong Wang:
> > On Mon, Mar 25, 2019 at 5:08 AM Reindl Harald
> > wrote:
> >>
> >> besides that i get tired about random crashes over the last months (yeah
> >> the connlimit crashes are fixed in the meantim
Add support for fine-grain timeout support to conntrack action.
The new OVS_CT_ATTR_TIMEOUT attribute of the conntrack action
specifies a timeout to be associated with this connection.
If no timeout is specified, it acts as is, that is the default
timeout for the connection will be automatically ap
This patch exports nf_ct_set_timeout() and nf_ct_destroy_timeout().
The two functions are derived from xt_ct_destroy_timeout() and
xt_ct_set_timeout() in xt_CT.c, and moved to nf_conntrack_timeout.c
without any functional change.
It would be useful for other users (i.e. OVS) that utilizes the
finer
Am 25.03.19 um 20:07 schrieb Cong Wang:
> On Mon, Mar 25, 2019 at 5:08 AM Reindl Harald wrote:
>>
>> besides that i get tired about random crashes over the last months (yeah
>> the connlimit crashes are fixed in the meantime but there is still
>> something broken) which are pretty sure in the n
MAINTAINERS still pointed to phy.txt after moving this file into the rst
format, fix this.
Reported-by: Joe Perches
Fixes: 25fe02d00a1e ("Documentation: net: phy: switch documentation to rst
format")
Signed-off-by: Florian Fainelli
---
MAINTAINERS | 2 +-
1 file changed, 1 insertion(+), 1 dele
On Sun, Mar 24, 2019 at 11:47 AM wrote:
>
> From: Numan Siddique
>
> This patch adds a new action - 'check_pkt_len' which checks the
> packet length and executes a set of actions if the packet
> length is greater than the specified length or executes
> another set of actions if the packet length
On Mon, Mar 25, 2019 at 4:48 PM Soheil Hassas Yeganeh wrote:
>
> On Mon, Mar 25, 2019 at 4:44 PM Eric Dumazet wrote:
> >
> > My recent patch had at least two problems :
> >
> > 1) TX zerocopy wants notification when skb is acknowledged,
> >thus we need to call skb_zcopy_clear() if the skb is
On Mon, Mar 25, 2019 at 4:44 PM Eric Dumazet wrote:
>
> My recent patch had at least two problems :
>
> 1) TX zerocopy wants notification when skb is acknowledged,
>thus we need to call skb_zcopy_clear() if the skb is
>cached into sk->sk_tx_skb_cache
>
> 2) Some applications might expect p
My recent patch had at least two problems :
1) TX zerocopy wants notification when skb is acknowledged,
thus we need to call skb_zcopy_clear() if the skb is
cached into sk->sk_tx_skb_cache
2) Some applications might expect precise EPOLLOUT notifications,
so we need to update sk->sk_wmem_
> -Original Message-
> From: netdev-ow...@vger.kernel.org On
> Behalf Of Parav Pandit
> Sent: Friday, March 22, 2019 7:40 PM
> To: Jiri Pirko
> Cc: Jakub Kicinski ; Samudrala, Sridhar
> ; da...@davemloft.net;
> netdev@vger.kernel.org; oss-driv...@netronome.com
> Subject: RE: [PATCH net-
From: Maciej Fijalkowski
Introduce ice_can_reuse_rx_page which will verify whether the page can
be reused and return the boolean result to caller.
Signed-off-by: Maciej Fijalkowski
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Signed-off-by: Jeff Kirsher
---
drivers/net/eth
From: Preethi Banala
Update VF VSI tc info along with vsi->num_txq/num_rxq when VF requests to
configure queues.
Signed-off-by: Preethi Banala
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Signed-off-by: Jeff Kirsher
---
drivers/net/ethernet/intel/ice/ice_virtchnl_pf.c | 3
From: Brett Creeley
The hardware now supports link events over the admin receive queue (ARQ),
so enable HW link events over the ARQ and remove code for link event
polling.
Signed-off-by: Brett Creeley
Reviewed-by: Bruce Allan
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Sig
From: Maciej Fijalkowski
{get,put}_page are atomic operations which we use for page count
handling. The current logic for refcount handling is that we increment
it when passing a skb with the data from the first half of page up to
netstack and recycle the second half of page. This operation prote
From: Maciej Fijalkowski
Provide DMA_ATTR_WEAK_ORDERING and DMA_ATTR_SKIP_CPU_SYNC attributes to
the DMA API during the mapping operations on Rx side. With this change
the non-x86 platforms will be able to sync only with what is being used
(2k buffer) instead of entire page. This should yield a s
From: Maciej Fijalkowski
Introduce ice_get_rx_buf, which will fetch the Rx buffer and do the DMA
synchronization. Length of the packet that hardware Rx descriptor
contains is now read in ice_clean_rx_irq, so we can feed ice_get_rx_buf
with it and resign from rx_desc passed as argument in ice_fetc
From: Maciej Fijalkowski
Pull out the code responsible for page counting and buffer recycling so
that it will be possible to clean up the Rx buffers in cases where we
won't allocate skb (ex. XDP)
Signed-off-by: Maciej Fijalkowski
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
From: Victor Raj
When VSI increases the number of queues dynamically, the scheduler
just needs to add the new required nodes rather than re-adjusting with
previously allocated number of nodes. Readjusting didn't provide enough
parents to add the upper layer nodes also can't place lan and rdma
sub
From: Bruce Allan
There are numerous for() loops iterating over each of the max traffic
classes. Use a simple iterator macro instead to make the code cleaner.
Signed-off-by: Bruce Allan
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Signed-off-by: Jeff Kirsher
---
drivers/n
From: Alan Brady
Someone went through the effort of making this a variable so let's use
it instead of recalculating it again.
Signed-off-by: Alan Brady
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Signed-off-by: Jeff Kirsher
---
drivers/net/ethernet/intel/ice/ice_main.c |
From: Maciej Fijalkowski
Instead of adding a frag and later when dealing with EOP frame accessing
that frag in order to copy the headers onto linear part of skb, we can do
this in ice_add_rx_frag in case where the data_len is still 0 and frame
won't fit onto the linear part as a whole.
Function
From: Michal Swiatkowski
The VLAN rule is lost when VM starts or the AVF driver (iavf.ko) is
reloaded. So it is necessary to add this rule again.
Signed-off-by: Michal Swiatkowski
Signed-off-by: Anirudh Venkataramanan
Tested-by: Andrew Bowers
Signed-off-by: Jeff Kirsher
---
drivers/net/ethe
From: Dave Ertman
In the current implementation of ice_reset_subtask, if multiple reset
types are set in the pf->state, the most intrusive one is meant to be
performed only, but the bits requesting the other types are not being
cleared. This would lead to another reset being performed the next ti
From: Maciej Fijalkowski
Refactor ice_fetch_rx_buf and ice_add_rx_frag in a way that we have
standalone functions that do either the skb construction or frag
addition to previously constructed skb.
The skb handling between rx_bufs is spread among various functions. The
ice_get_rx_buf will retrie
From: Chinh T Cao
This structure is used to define the packet flags. These flags are
applicable for both TX and RX packet. Thus, this patch changes its
name from ice_rx_flag64_bits to ice_flg64_bits, and its member definition.
Signed-off-by: Chinh T Cao
Reviewed-by: Bruce Allan
Signed-off-by:
This series contains updates to the ice driver only.
Victor updates the ice driver to be able to update the VSI queue
configuration dynamically, by providing the ability to increase or
decrease the VSI's number of queues.
Michal fixes an issue when the VM starts or the VF driver is reloaded,
the
> Any news regarding your test?
No, sorry, I fell ill and don't have that specific hardware at home,
only at work. I will probably test it on thursday or friday.
Marek
On Sat, Mar 23, 2019 at 4:03 AM wrote:
>
> From: wenxu
>
> There is currently no support for the multicast/broadcast aspects
> of VXLAN in ovs. In the datapath flow the tun_dst must specific.
> But in the IP_TUNNEL_INFO_BRIDGE mode the tun_dst can not be specific.
> And the packet can forward thr
On Sun, Mar 24, 2019 at 6:24 PM wenxu wrote:
>
> On 2019/3/25 上午2:46, Pravin Shelar wrote:
> > On Sun, Mar 24, 2019 at 12:03 AM wenxu wrote:
> >> On 2019/3/24 上午5:39, Pravin Shelar wrote:
> >>> On Sat, Mar 23, 2019 at 2:18 AM wenxu wrote:
> On 2019/3/23 下午3:50, Pravin Shelar wrote:
>
>
On 3/25/19 12:13 PM, Heiner Kallweit wrote:
> On 25.03.2019 19:44, Florian Fainelli wrote:
>> On 3/25/19 11:35 AM, Heiner Kallweit wrote:
>>> 1000BaseT standard requires that a link is reported as down earliest
>>> after 750ms. Several use case however require a much faster detecion
>>> of a broken
On Sat, Mar 23, 2019 at 10:45 AM Kevin 'ldir' Darbyshire-Bryant
wrote:
>
> I will remove the functionality from conndscp that changes the conntrack
> mark, so that it only restores the mark into the diffserv field.
>
> So that I’m clear about which direction I should be headed:
>
> Bearing in min
On 25.03.2019 19:44, Florian Fainelli wrote:
> On 3/25/19 11:35 AM, Heiner Kallweit wrote:
>> 1000BaseT standard requires that a link is reported as down earliest
>> after 750ms. Several use case however require a much faster detecion
>> of a broken link. Fast Link Down supports this by intentional
On Mon, Mar 25, 2019 at 5:08 AM Reindl Harald wrote:
>
> besides that i get tired about random crashes over the last months (yeah
> the connlimit crashes are fixed in the meantime but there is still
> something broken) which are pretty sure in the netedev/netfilter area
> and "kernel.panic = 1" is
On Mon, Mar 25, 2019 at 07:34:58PM +0100, Heiner Kallweit wrote:
> This adds support for Fast Link Down as new PHY tunable.
> Fast Link Down reduces the time until a link down event is reported
> for 1000BaseT. According to the standard it's 750ms what is too long
> for several use cases.
>
> v2:
On 3/25/19 11:35 AM, Heiner Kallweit wrote:
> 1000BaseT standard requires that a link is reported as down earliest
> after 750ms. Several use case however require a much faster detecion
> of a broken link. Fast Link Down supports this by intentionally
> violating a the standard. This patch exposes
On 3/25/19 11:34 AM, Heiner Kallweit wrote:
> This adds support for Fast Link Down as new PHY tunable.
> Fast Link Down reduces the time until a link down event is reported
> for 1000BaseT. According to the standard it's 750ms what is too long
> for several use cases.
>
> v2:
> - add comment descr
1000BaseT standard requires that a link is reported as down earliest
after 750ms. Several use case however require a much faster detecion
of a broken link. Fast Link Down supports this by intentionally
violating a the standard. This patch exposes the Fast Link Down
feature of 88E1540 and 88E6390. T
This adds support for Fast Link Down as new PHY tunable.
Fast Link Down reduces the time until a link down event is reported
for 1000BaseT. According to the standard it's 750ms what is too long
for several use cases.
v2:
- add comment describing the constants
Signed-off-by: Heiner Kallweit
---
This adds support for Fast Link Down as new PHY tunable.
Fast Link Down reduces the time until a link down event is reported
for 1000BaseT. According to the standard it's 750ms what is too long
for several use cases.
This is the kernel-related series, the ethtool userspace extension
I'd submit onc
2019-03-25, 09:17:23 -0700, Bart Van Assche wrote:
> diff --git a/net/core/datagram.h b/net/core/datagram.h
> new file mode 100644
> index ..bcfb75bfa3b2
> --- /dev/null
> +++ b/net/core/datagram.h
> @@ -0,0 +1,15 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +
> +#ifndef _NET_CORE_DAT
On 25.03.2019 18:49, Michal Kubecek wrote:
> On Sun, Mar 24, 2019 at 04:02:43PM +0100, Heiner Kallweit wrote:
>> This adds support for Fast Link Down as new PHY tunable.
>> Fast Link Down reduces the time until a link down event is reported
>> for 1000BaseT. According to the standard it's 750ms wha
On Sun, Mar 24, 2019 at 04:02:43PM +0100, Heiner Kallweit wrote:
> This adds support for Fast Link Down as new PHY tunable.
> Fast Link Down reduces the time until a link down event is reported
> for 1000BaseT. According to the standard it's 750ms what is too long
> for several use cases.
>
> Sign
On Thursday, March 21, 2019 8:55:55 PM CET Marek Behun wrote:
> Hi,
>
> Oh, I didn't know about Christian's patch.
>
> I shall test on our device tomorrow. If it works, we will use internal
> PHY access.
>
> But I think that qca8k_port_to_phy should be used in the external mode
> as well. On our
Daniel Borkmann [Mon, 2019-03-25 03:27 -0700]:
> Hi Andrey,
Hi Daniel,
> On 03/24/2019 01:12 AM, Andrey Ignatov wrote:
> > The patch set introduces new BPF hook for sysctl.
...
> The change in patch 2 which this whole series is centered around would
> need a consent from fs maintainers:
>
> dif
On 3/23/19 8:23 PM, Vladimir Oltean wrote:
> This refactors the two-phase transaction from dsa_slave_vlan_rx_add_vid
> and also makes that code available for other functions from within DSA.
> The newly exposed function either adds or deletes the specified VLAN
> entry based on a boolean argument.
On 3/24/19 9:26 PM, Alexei Starovoitov wrote:
> On Sun, Mar 24, 2019 at 06:56:42AM -0600, David Ahern wrote:
>>
>> This change also enables many other key features:
>> 1. IPv4 multipath routes are not evicted just because 1 hop goes down.
>> 2. IPv6 multipath routes with device only nexthops (e.g.,
On 3/23/19 8:23 PM, Vladimir Oltean wrote:
> This allows the driver to perform some manipulations of its own during
> setup, using generic code.
> One current usage scenario is for the driver to request DSA to set up
> 802.1Q based switch tagging for its ports.
>
> Signed-off-by: Vladimir Oltean
On 03/25, Daniel Borkmann wrote:
> On 03/19/2019 10:53 PM, Stanislav Fomichev wrote:
> > When running stacktrace_build_id_nmi, try to query
> > kernel.perf_event_max_sample_rate sysctl and use it as a sample_freq.
> > If there was an error reading sysctl, fallback to 5000.
> >
> > kernel.perf_even
On 3/23/19 8:23 PM, Vladimir Oltean wrote:
> This allows drivers to query the VLAN setting imposed by the bridge
> driver directly from DSA, instead of keeping their own state based on
> the .port_vlan_filtering callback.
>
> Signed-off-by: Vladimir Oltean
After you address Andrew's comment:
Re
Yet another duplicate of syzbot+a25307ad099309f1c...@syzkaller.appspotmail.com
A fix has been posted.
///jon
> -Original Message-
> From: netdev-ow...@vger.kernel.org
> On Behalf Of syzbot
> Sent: 23-Mar-19 19:03
> To: da...@davemloft.net; Jon Maloy ;
> kuz...@ms2.inr.ac.ru; linux-ker
On 3/23/19 8:23 PM, Vladimir Oltean wrote:
> This patchset adds a DSA driver for the SPI-managed NXP SJA1105 driver.
> Due to the hardware's unfriendliness, most of its state needs to be
> shadowed in kernel memory by the driver. To support this and keep a
> decent amount of cleanliness in the code
This patch avoids that the following warnings are reported when building
with W=1:
net/core/rtnetlink.c:3580: warning: Function parameter or member 'ndm' not
described in 'ndo_dflt_fdb_add'
net/core/rtnetlink.c:3580: warning: Function parameter or member 'tb' not
described in 'ndo_dflt_fdb_add'
Instead of declaring a function in a .c file, declare it in a header
file and include that header file from the source files that define
and that use the function. That allows the compiler to verify
consistency of declaration and definition. See also commit
52267790ef52 ("sock: add MSG_ZEROCOPY") #
Hi Dave,
This patch series addresses the compiler warnings reported when
building the code in net/core with W=1. Please consider this patch
series for kernel v5.2.
Thanks,
Bart.
Changes compared to v1:
- Dropped two patches from this series.
- Rebased this patch series on top of
git://git.ker
This patch avoids that the following warning is reported when building
with W=1:
warning: Function parameter or member 'bind_inany' not described in
'reuseport_add_sock'
Cc: Martin KaFai Lau
Fixes: 2dbb9b9e6df6 ("bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT") # v4.19.
Signed-off-by: Bart Van Assch
This patch avoids that the following warning is reported when building
with W=1:
warning: Function parameter or member 'flags' not described in
'__skb_flow_dissect'
Cc: Tom Herbert
Fixes: cd79a2382aa5 ("flow_dissector: Add flags argument to skb_flow_dissector
functions") # v4.3.
Signed-off-by:
This patch avoids that the following warnings are reported when building
with W=1:
net/core/dev_ioctl.c:378: warning: Function parameter or member 'ifr' not
described in 'dev_ioctl'
net/core/dev_ioctl.c:378: warning: Function parameter or member 'need_copyout'
not described in 'dev_ioctl'
net/co
On 3/25/19 7:12 AM, Jesper Dangaard Brouer wrote:
> Section 2.2.1 BTF_KIND_INT a bullet list was collapsed due to
> text reflow in commit 9ab5305dbe3f ("docs/btf: reflow text to
> fill up to 78 characters").
>
> This patch correct the mistake. Also adjust next bullet list,
> which is used for compa
On Mon, 25 Mar 2019 10:35:35 +0100 Felix Fietkau wrote:
> On 2019-03-25 10:31, Eric Dumazet wrote:
> > On 03/25/2019 02:09 AM, Felix Fietkau wrote:
> >> On 2019-03-25 09:51, Eric Dumazet wrote:
> >>> On 03/24/2019 09:56 AM, Felix Fietkau wrote:
>
> Since we're freeing multiple skbs
On Fri, 2019-03-22 at 18:46 +, Rustad, Mark D wrote:
> This doesn't look right to me. The original code seemingly would stop the
> copy before getting to a possible '%' character. The new code only stops at
> eol. So this appears to change the functionality and I assume is broken in
> any
On Mon, 25 Mar 2019 02:27:14 -0700
Eric Dumazet wrote:
> > +#ifdef CONFIG_SLUB
> > + /* SLUB writes into objects when freeing */
> > + prefetchw(segs);
> > +#endif
>
> This is done too late :
> You should probably either remove this prefetchw()
> or do it before reading se
Just a comment: on the system that I work on, the kernel closely
matches the hardware data plane, so the kernel has both roles as data
and control plane.
Whatever routes are installed on the hardware are installed also in the kernel.
On Sun, Mar 24, 2019 at 11:27 PM Alexei Starovoitov
wrote:
>
>
Section 2.2.1 BTF_KIND_INT a bullet list was collapsed due to
text reflow in commit 9ab5305dbe3f ("docs/btf: reflow text to
fill up to 78 characters").
This patch correct the mistake. Also adjust next bullet list,
which is used for comparison, to get rendered the same way.
Fixes: 9ab5305dbe3f ("d
On 03/22/2019 11:38 PM, Javier Honduvilla Coto wrote:
> This patch adds the bpf_progenyof helper which receives a PID and returns
> 1 if the process currently being executed is in the process hierarchy
> including itself or 0 if not.
>
> This is very useful in tracing programs when we want to filt
On 03/25/2019 10:36 AM, Alan Maguire wrote:
> test_tc_tunnel.sh sets up a pair of namespaces connected by a
> veth pair to verify encap/decap using bpf_skb_adjust_room. In
> testing this, it uses tunnel links as the peer of the bpf-based
> encap/decap. However because the same IP header is used f
Take advantage of the software Rx batching by using
netif_receive_skb_list instead of napi_gro_receive.
Signed-off-by: Ioana Ciornei
---
drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c | 8 +++-
drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.h | 1 +
2 files changed, 8 insertions(+), 1 dele
esp_output_udp_encap can produce a length that doesn't fit in the 16
bits of a UDP header's length field. In that case, we'll send a
fragmented packet whose length is larger than IP_MAX_MTU (resulting in
"Oversized IP packet" warnings on receive) and with a bogus UDP
length.
To prevent this, add a
Christoph reported a stall while peeking datagram with an offset when
busy polling is enabled. __skb_try_recv_datagram() uses as the loop
termination condition 'queue empty'. When peeking, the socket
queue can be not empty, even when no additional packets are received.
Address the issue explicitly
On Mon, Mar 25, 2019 at 5:36 AM Alan Maguire wrote:
>
> test_tc_tunnel.sh sets up a pair of namespaces connected by a
> veth pair to verify encap/decap using bpf_skb_adjust_room. In
> testing this, it uses tunnel links as the peer of the bpf-based
> encap/decap. However because the same IP heade
It might happen that Tx conf acknowledges a frame before it was
subscribed in bql, as subscribing was previously done after the enqueue
operation.
This patch moves the netdev_tx_sent_queue call before the actual frame
enqueue, so that this can never happen.
Fixes: 569dac6 ("dpaa2-eth: bql support
besides that i get tired about random crashes over the last months (yeah
the connlimit crashes are fixed in the meantime but there is still
something broken) which are pretty sure in the netedev/netfilter area
and "kernel.panic = 1" is not a persistent solution
what in the world makes kdump on a V
On 03/19/2019 10:53 PM, Stanislav Fomichev wrote:
> When running stacktrace_build_id_nmi, try to query
> kernel.perf_event_max_sample_rate sysctl and use it as a sample_freq.
> If there was an error reading sysctl, fallback to 5000.
>
> kernel.perf_event_max_sample_rate sysctl can drift and/or can
On Mon, 25 Mar 2019 09:42:22 +
Ioana Ciocoi Radulescu wrote:
> > -Original Message-
> > From: Jesper Dangaard Brouer
> > Sent: Sunday, March 24, 2019 8:29 PM
> > To: Ioana Ciocoi Radulescu
> > Cc: netdev@vger.kernel.org; da...@davemloft.net; Ioana Ciornei
> > ; bro...@redhat.com
> >
On 03/15/2019 07:42 AM, Daniel T. Lee wrote:
> Since, ksym_search added with verification logic for symbols existence,
> it could return NULL when the kernel symbols are not loaded.
>
> This commit will add NULL check logic after ksym_search.
>
> Signed-off-by: Daniel T. Lee
> ---
> samples/bpf
On Fri, Mar 22, 2019 at 04:26:19PM -0700, Cong Wang wrote:
> In commit 6a53b7593233 ("xfrm: check id proto in validate_tmpl()")
> I introduced a check for xfrm protocol, but according to Herbert
> IPSEC_PROTO_ANY should only be used as a wildcard for lookup, so
> it should be removed from validate_
Hi Andrey,
On 03/24/2019 01:12 AM, Andrey Ignatov wrote:
> The patch set introduces new BPF hook for sysctl.
>
> It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type
> BPF_CGROUP_SYSCTL.
>
> BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so
> that access
> -Original Message-
> From: Jesper Dangaard Brouer
> Sent: Sunday, March 24, 2019 8:29 PM
> To: Ioana Ciocoi Radulescu
> Cc: netdev@vger.kernel.org; da...@davemloft.net; Ioana Ciornei
> ; bro...@redhat.com
> Subject: Re: [PATCH net] dpaa2-eth: Fix possible access beyond end of array
>
>
test_tc_tunnel.sh sets up a pair of namespaces connected by a
veth pair to verify encap/decap using bpf_skb_adjust_room. In
testing this, it uses tunnel links as the peer of the bpf-based
encap/decap. However because the same IP header is used for inner
and outer IP, when packets arrive at the tu
On 2019-03-25 10:31, Eric Dumazet wrote:
>
>
> On 03/25/2019 02:09 AM, Felix Fietkau wrote:
>> On 2019-03-25 09:51, Eric Dumazet wrote:
>>>
>>>
>>> On 03/24/2019 09:56 AM, Felix Fietkau wrote:
Since we're freeing multiple skbs, we might as well use bulk free to save a
few cycles. Use th
On 03/25/2019 02:09 AM, Felix Fietkau wrote:
> On 2019-03-25 09:51, Eric Dumazet wrote:
>>
>>
>> On 03/24/2019 09:56 AM, Felix Fietkau wrote:
>>> Since we're freeing multiple skbs, we might as well use bulk free to save a
>>> few cycles. Use the same conditions for bulk free as in napi_consume_s
On 03/25/2019 02:14 AM, Felix Fietkau wrote:
> Since we're freeing multiple skbs, we might as well use bulk free to save a
> few cycles. Use the same conditions for bulk free as in napi_consume_skb.
>
> Signed-off-by: Felix Fietkau
> ---
> v3: reorder checks to prevent skb double unref
> v2: c
Hi Sven,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on staging/staging-testing]
[also build test ERROR on v5.1-rc2 next-20190325]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system]
url:
https://github.com/0day
1 - 100 of 112 matches
Mail list logo