On Fri, Oct 04, 2019 at 05:46:15PM -0700, Jeff Kirsher wrote:
> On Fri, 2019-10-04 at 23:45 +, Jason Gunthorpe wrote:
> > On Fri, Oct 04, 2019 at 01:12:22PM -0700, Jeff Kirsher wrote:
> >
> > > > > + if (ldev->version.major != I40E_CLIENT_VERSION_MAJOR ||
> > > > > + ldev->version.m
From: Jiri Pirko
For newly allocated devlink instance allow drivers to set net struct
Signed-off-by: Jiri Pirko
---
include/net/devlink.h | 2 ++
net/core/devlink.c| 15 ---
2 files changed, 14 insertions(+), 3 deletions(-)
diff --git a/include/net/devlink.h b/include/net/dev
From: Jiri Pirko
Add a test that creates netdevsim instance inside network namespace
and verifies that the related devlink instance and port netdevices
reside in the namespace.
Signed-off-by: Jiri Pirko
---
.../drivers/net/netdevsim/devlink_in_netns.sh | 72 +++
tools/testing/s
From: Jiri Pirko
When user does create new netdevsim instance using sysfs bus file,
create the devlink instance and related netdev instance in the namespace
of the caller.
Signed-off-by: Jiri Pirko
---
drivers/net/netdevsim/bus.c | 1 +
drivers/net/netdevsim/dev.c | 1 +
drivers/ne
From: Jiri Pirko
Allow user to create netdevsim devlink and netdevice instances in a
network namespace according to the namespace where the user resides in.
Add a selftest to test this.
Jiri Pirko (3):
net: devlink: export devlink net setter
netdevsim: create devlink and netdev instances in
On 10/4/19 10:03 PM, Alexei Starovoitov wrote:
> Pointer to BTF object is a pointer to kernel object or NULL.
> Such pointers can only be used by BPF_LDX instructions.
> The verifier changed their opcode from LDX|MEM|size
> to LDX|PROBE_MEM|size to make JITing easier.
> The number of entries in
Pointer to BTF object is a pointer to kernel object or NULL.
Such pointers can only be used by BPF_LDX instructions.
The verifier changed their opcode from LDX|MEM|size
to LDX|PROBE_MEM|size to make JITing easier.
The number of entries in extable is the number of BPF_LDX insns
that access kernel me
Pointer to BTF object is a pointer to kernel object or NULL.
The memory access in the interpreter has to be done via probe_kernel_read
to avoid page faults.
Signed-off-by: Alexei Starovoitov
---
include/linux/filter.h | 3 +++
kernel/bpf/core.c | 19 +++
kernel/bpf/verifier
Introduce new helper that reuses existing skb perf_event output
implementation, but can be called from raw_tracepoint programs
that receive 'struct sk_buff *' as tracepoint argument or
can walk other kernel data structures to skb pointer.
In order to do that teach verifier to resolve true C types
If in-kernel BTF exists parse it and prepare 'struct btf *btf_vmlinux'
for further use by the verifier.
In-kernel BTF is trusted just like kallsyms and other build artifacts
embedded into vmlinux.
Yet run this BTF image through BTF verifier to make sure
that it is valid and it wasn't mangled during
Revolutionize bpf tracing and bpf C programming.
C language allows any pointer to be typecasted to any other pointer
or convert integer to a pointer.
Though bpf verifier is operating at assembly level it has strict type
checking for fixed number of types.
Known types are defined in 'enum bpf_reg_ty
When pahole converts dwarf to btf it emits only used types.
Wrap existing __bpf_trace_##template() function into
btf_trace_##template typedef and use it in type cast to
make gcc emits this type into dwarf. Then pahole will convert it to btf.
The "btf_trace_" prefix will be used to identify BTF enab
When pahole converts dwarf to btf it emits only used types.
Wrap existing bpf helper functions into typedef and use it in
typecast to make gcc emits this type into dwarf.
Then pahole will convert it to btf.
The "btf_#name_of_helper" types will be used to figure out
types of arguments of bpf helpers
Disallow bpf_probe_read() and bpf_probe_read_str() helpers in
raw_tracepoint bpf programs that use in-kernel BTF to track
types of memory accesses.
Signed-off-by: Alexei Starovoitov
---
kernel/trace/bpf_trace.c | 4
1 file changed, 4 insertions(+)
diff --git a/kernel/trace/bpf_trace.c b/ke
Load basic cls_bpf program.
Load raw_tracepoint program and attach to kfree_skb raw tracepoint.
Trigger cls_bpf via prog_test_run.
At the end of test_run kernel will call kfree_skb
which will trigger trace_kfree_skb tracepoint.
Which will call our raw_tracepoint program.
Which will take that skb an
libbpf analyzes bpf C program, searches in-kernel BTF for given type name
and stores it into expected_attach_type.
The kernel verifier expects this btf_id to point to something like:
typedef void (*btf_trace_kfree_skb)(void *, struct sk_buff *skb, void *loc);
which represents signature of raw_trace
For raw tracepoint program types libbpf will try to find
btf_id of raw tracepoint in vmlinux's BTF.
It's a responsiblity of bpf program author to annotate the program
with SEC("raw_tracepoint/name") where "name" is a valid raw tracepoint.
If "name" is indeed a valid raw tracepoint then in-kernel BT
On 2019/9/30 17:27, Jiri Pirko wrote:
> Sun, Sep 29, 2019 at 02:13:43PM CEST, linyunsh...@huawei.com wrote:
>> This patch adds the devlink health dump support for hw mac tbl,
>> which helps to debug some hardware packet switching problem or
>> misconfiguation of the hardware mac table.
>
> So you
From: Jakub Kicinski
Date: Fri, 4 Oct 2019 17:36:50 -0700
> nettest is missing from gitignore.
>
> Fixes: acda655fefae ("selftests: Add nettest")
> Signed-off-by: Jakub Kicinski
Applied.
From: Eric Dumazet
Date: Fri, 4 Oct 2019 11:08:34 -0700
> sysbot reported a memory leak after a bind() has failed.
>
> While we are at it, abort the operation if kmemdup() has failed.
>
> BUG: memory leak
...
> Fixes: 30cc4587659e ("NFC: Move LLCP code to the NFC top level diirectory")
> Sign
From: Eric Dumazet
Date: Fri, 4 Oct 2019 10:34:45 -0700
> Make sure TCA_DSMARK_INDICES was provided by the user.
>
> syzbot reported :
...
> Fixes: 758cc43c6d73 ("[PKT_SCHED]: Fix dsmark to apply changes consistent")
> Signed-off-by: Eric Dumazet
> Reported-by: syzbot
Applied and queued up
From: Russell King - ARM Linux admin
Date: Fri, 4 Oct 2019 17:05:25 +0100
> The following series attempts to address an issue spotted by tinywrkb
> with the AR8035 on the Cubox-i2 in a situation where the PHY downgrades
> the negotiated link.
...
Series applied.
From: David Ahern
Date: Fri, 4 Oct 2019 08:03:09 -0700
> From: David Ahern
>
> Rajendra reported a kernel panic when a link was taken down:
>
> [ 6870.263084] BUG: unable to handle kernel NULL pointer dereference at
> 00a8
> [ 6870.271856] IP: [] __ipv6_ifa_notify+0x154/0
From: Andrea Merello
Date: Fri, 4 Oct 2019 15:53:32 +0200
> mdio_device_reset() makes use of the atomic-pretending API flavor for
> handling the PHY reset GPIO line.
>
> I found no hint that mdio_device_reset() is called from atomic context
> and indeed it uses usleep_range() since long time, s
On Fri, Oct 04, 2019 at 08:21:22PM -0400, Vivien Didelot wrote:
> On Fri, 4 Oct 2019 23:09:33 +0200, Andrew Lunn wrote:
> > Add plumbing to allow DSA drivers to register parameters with devlink.
> >
> > To keep with the abstraction, the DSA drivers pass the ds structure to
> > these helpers, and
On Fri, 2019-10-04 at 23:45 +, Jason Gunthorpe wrote:
> On Fri, Oct 04, 2019 at 01:12:22PM -0700, Jeff Kirsher wrote:
>
> > > > + if (ldev->version.major != I40E_CLIENT_VERSION_MAJOR ||
> > > > + ldev->version.minor != I40E_CLIENT_VERSION_MINOR) {
> > > > + pr_err
nettest is missing from gitignore.
Fixes: acda655fefae ("selftests: Add nettest")
Signed-off-by: Jakub Kicinski
---
tools/testing/selftests/net/.gitignore | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/testing/selftests/net/.gitignore
b/tools/testing/selftests/net/.gitignore
index c7
Hi Andrew,
On Fri, 4 Oct 2019 23:09:34 +0200, Andrew Lunn wrote:
> Some of the marvell switches have bits controlling the hash algorithm
> the ATU uses for MAC addresses. In some industrial settings, where all
> the devices are from the same manufacture, and hence use the same OUI,
> the default
From: Paolo Abeni
Date: Fri, 4 Oct 2019 15:11:17 +0200
> Since commit c09551c6ff7f ("net: ipv4: use a dedicated counter
> for icmp_v4 redirect packets") we use 'n_redirects' to account
> for redirect packets, but we still use 'rate_tokens' to compute
> the redirect packets exponential backoff.
>
From: Kai-Heng Feng
Date: Fri, 4 Oct 2019 20:51:04 +0800
> r8152 may fail to establish network connection after resume from system
> suspend.
>
> If the USB port connects to r8152 lost its power during system suspend,
> the MAC address was written before is lost. The reason is that The MAC
> ad
From: zhengbin
Date: Fri, 4 Oct 2019 17:57:30 +0800
> Fix sparse warnings:
>
> drivers/net/dsa/sja1105/sja1105_spi.c:159:5: warning: symbol
> 'sja1105_xfer_long_buf' was not declared. Should it be static?
>
> Reported-by: Hulk Robot
> Signed-off-by: zhengbin
Applied.
On Fri, 4 Oct 2019 23:09:33 +0200, Andrew Lunn wrote:
> Add plumbing to allow DSA drivers to register parameters with devlink.
>
> To keep with the abstraction, the DSA drivers pass the ds structure to
> these helpers, and the DSA core then translates that to the devlink
> structure associated t
On Fri, 4 Oct 2019 16:23:40 -0700, Cong Wang wrote:
> On Fri, Oct 4, 2019 at 3:54 PM Jakub Kicinski wrote:
> > On Thu, 3 Oct 2019 16:45:25 -0300, Marcelo Ricardo Leitner wrote:
> > > On Sat, Sep 21, 2019 at 07:24:34PM -0700, Jakub Kicinski wrote:
> > > > Applied, queued for 4.14+, thanks!
> >
On Fri, Oct 04, 2019 at 01:12:22PM -0700, Jeff Kirsher wrote:
> > > + if (ldev->version.major != I40E_CLIENT_VERSION_MAJOR ||
> > > + ldev->version.minor != I40E_CLIENT_VERSION_MINOR) {
> > > + pr_err("version mismatch:\n");
> > > + pr_err("expected major ver %d, caller specifi
On Fri, Oct 4, 2019 at 3:51 PM Andrii Nakryiko
wrote:
>
> On Fri, Oct 4, 2019 at 3:47 PM Andrii Nakryiko
> wrote:
> >
> > On Fri, Oct 4, 2019 at 2:58 PM Daniel Borkmann wrote:
> > >
> > > On Fri, Oct 04, 2019 at 11:06:13PM +0200, Daniel Borkmann wrote:
> > > > On Fri, Oct 04, 2019 at 01:21:55PM
On Fri, Oct 4, 2019 at 3:54 PM Jakub Kicinski
wrote:
>
> On Thu, 3 Oct 2019 16:45:25 -0300, Marcelo Ricardo Leitner wrote:
> > On Sat, Sep 21, 2019 at 07:24:34PM -0700, Jakub Kicinski wrote:
> > > Applied, queued for 4.14+, thanks!
> >
> > Ahm, this breaks some user applications.
> >
> > I'm getti
On 10/4/19 11:43 AM, Roopa Prabhu wrote:
> On Fri, Oct 4, 2019 at 9:38 AM David Ahern wrote:
>>
>> On 10/4/19 8:43 AM, Ido Schimmel wrote:
Sounds like there are 2 cases for prefixes that should be flagged to the
user -- "offloaded" (as in traffic is offloaded) and "in_hw" (prefix is
>>>
Add a statistic for TLS record decryption errors.
Since devices are supposed to pass records as-is when they
encounter errors this statistic will count bad records in
both pure software and inline crypto configurations.
Signed-off-by: Jakub Kicinski
---
Documentation/networking/tls.rst | 3 +++
Add a statistic for number of RX resyncs sent down to the NIC.
Signed-off-by: Jakub Kicinski
---
Documentation/networking/tls.rst | 3 +++
include/uapi/linux/snmp.h| 1 +
net/tls/tls_device.c | 1 +
net/tls/tls_proc.c | 1 +
4 files changed, 6 insertions(+)
dif
Add a skeleton structure for adding TLS statistics.
Signed-off-by: Jakub Kicinski
---
Documentation/networking/tls.rst | 6 ++
include/net/netns/mib.h | 3 +++
include/net/snmp.h | 6 ++
include/net/tls.h| 13 +++
include/uapi/linux/snmp.
Hi!
This set adds trace events related to TLS offload and basic MIB stats
for TLS.
First patch contains the TLS offload related trace points. Those are
helpful in troubleshooting offload issues, especially around the
resync paths.
Second patch adds a tracepoint to the fastpath of device offload,
Add SNMP stats for number of sockets with successfully
installed sessions. Break them down to software and
hardware ones. Note that if hardware offload fails
stack uses software implementation, and counts the
session appropriately.
Signed-off-by: Jakub Kicinski
---
Documentation/networking/tls
Add tracing of device-related interaction to aid performance
analysis, especially around resync:
tls:tls_device_offload_set
tls:tls_device_rx_resync_send
tls:tls_device_rx_resync_nh_schedule
tls:tls_device_rx_resync_nh_delay
tls:tls_device_tx_resync_req
tls:tls_device_tx_resync_send
Signed-
Add a tracepoint to the TLS offload's fast path. This tracepoint
can be used to track the decrypted and encrypted status of received
records. Records decrypted by the device should have decrypted set
to 1, records which have neither decrypted nor decrypted set are
partially decrypted, require re-en
On Fri, 04 Oct 2019 19:22:42 +0200, Toke Høiland-Jørgensen wrote:
> From: Alan Maguire
>
> This adds support for setting and deleting bpf chain call programs through
> a couple of new commands in the bpf() syscall. The CHAIN_ADD and CHAIN_DEL
> commands take two eBPF program fds and a return code
On Fri, 04 Oct 2019 19:22:41 +0200, Toke Høiland-Jørgensen wrote:
> From: Toke Høiland-Jørgensen
>
> This adds support for injecting chain call logic into eBPF programs before
> they return. The code injection is controlled by a flag at program load
> time; if the flag is set, the verifier will a
On Mon, Sep 23, 2019 at 5:56 PM Jeff Kirsher
wrote:
>
> From: Tony Nguyen
>
> The ice driver must load a package file to the firmware to utilize full
> functionality; add the package file to /lib/firmware/intel/ice/ddp. Also
> add a symlink, ice.pkg, so the driver can refer to the package by a
>
On Thu, 3 Oct 2019 16:45:25 -0300, Marcelo Ricardo Leitner wrote:
> On Sat, Sep 21, 2019 at 07:24:34PM -0700, Jakub Kicinski wrote:
> > Applied, queued for 4.14+, thanks!
>
> Ahm, this breaks some user applications.
>
> I'm getting "Attribute failed policy validation" extack error while
> addin
On Fri, Oct 4, 2019 at 3:47 PM Andrii Nakryiko
wrote:
>
> On Fri, Oct 4, 2019 at 2:58 PM Daniel Borkmann wrote:
> >
> > On Fri, Oct 04, 2019 at 11:06:13PM +0200, Daniel Borkmann wrote:
> > > On Fri, Oct 04, 2019 at 01:21:55PM -0700, Andrii Nakryiko wrote:
> > > > On Fri, Oct 4, 2019 at 11:30 AM J
On Fri, Oct 4, 2019 at 2:58 PM Daniel Borkmann wrote:
>
> On Fri, Oct 04, 2019 at 11:06:13PM +0200, Daniel Borkmann wrote:
> > On Fri, Oct 04, 2019 at 01:21:55PM -0700, Andrii Nakryiko wrote:
> > > On Fri, Oct 4, 2019 at 11:30 AM Jakub Kicinski
> > > wrote:
> > > > On Fri, 4 Oct 2019 09:00:42 -07
Verify new bpf_object__open_mem() and bpf_object__open_file() APIs work
as expected by switching test_attach_probe test to use embedded BPF
object and bpf_object__open_mem() and test_reference_tracking to
bpf_object__open_file().
Signed-off-by: Andrii Nakryiko
---
tools/testing/selftests/bpf/Mak
Kernel version enforcement for kprobes/kretprobes was removed from
5.0 kernel in 6c4fc209fcf9 ("bpf: remove useless version check for prog load").
Since then, BPF programs were specifying SEC("version") just to please
libbpf. We should stop enforcing this in libbpf, if even kernel doesn't
care. Fur
bpf_object__name() was returning file path, not name. Fix this.
Signed-off-by: Andrii Nakryiko
---
tools/lib/bpf/libbpf.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index d471d33400ae..a02cdedc4e3f 100644
--- a/tools/lib/bp
Add new set of bpf_object__open APIs using new approach to optional
parameters extensibility allowing simpler ABI compatibility approach.
This patch demonstrates an approach to implementing libbpf APIs that
makes it easy to extend existing APIs with extra optional parameters in
such a way, that AB
Add bpf_object__open_file() and bpf_object__open_mem() APIs that use a new
approach to providing future-proof non-ABI-breaking API changes. It relies on
APIs accepting optional self-describing "opts" struct, containing its own
size, filled out and provided by potentially outdated (as well as
newer-
Currently, building the bpf samples isn't working.
Running make from the directory 'samples/bpf' will just shows following
result without compiling any samples.
$ make
make -C ../../ /git/linux/samples/bpf/ BPF_SAMPLES_PATH=/git/linux/samples/bpf
make[1]: Entering directory '/git/linux'
CALL
From: Jiri Pirko
Date: Fri, 4 Oct 2019 11:50:12 +0200
> From: Jiri Pirko
>
> Currently, some dumpit function may end-up with error which is not
> -EMSGSIZE and this error is silently ignored. Use does not have clue
> that something wrong happened. Instead of silent ignore, propagate
> the erro
On Fri, Oct 04, 2019 at 11:06:13PM +0200, Daniel Borkmann wrote:
> On Fri, Oct 04, 2019 at 01:21:55PM -0700, Andrii Nakryiko wrote:
> > On Fri, Oct 4, 2019 at 11:30 AM Jakub Kicinski
> > wrote:
> > > On Fri, 4 Oct 2019 09:00:42 -0700, Andrii Nakryiko wrote:
> > > > On Fri, Oct 4, 2019 at 8:44 AM D
From: Vladimir Oltean
Date: Fri, 4 Oct 2019 03:33:47 +0300
> Amazingly, of all features, this does not require a switch reset.
>
> Tested with:
>
> tc qdisc add dev swp2 clsact
> tc filter add dev swp2 ingress matchall skip_sw \
> action mirred egress mirror dev swp3
> tc filter show dev
From: Vishal Kulkarni
Date: Fri, 4 Oct 2019 04:06:15 +0530
> When fetching free MSI-X vectors for ULDs, check for the error code
> before accessing MSI-X info array. Otherwise, an out-of-bounds access is
> attempted, which results in kernel panic.
>
> Fixes: 94cdb8bb993a ("cxgb4: Add support fo
On Fri, Oct 04, 2019 at 02:32:36PM -0700, Jakub Kicinski wrote:
> On Fri, 4 Oct 2019 23:09:34 +0200, Andrew Lunn wrote:
> > diff --git a/Documentation/networking/devlink-params-mv88e6xxx.txt
> > b/Documentation/networking/devlink-params-mv88e6xxx.txt
> > new file mode 100644
> > index 000
On Fri, 4 Oct 2019 23:09:34 +0200, Andrew Lunn wrote:
> diff --git a/Documentation/networking/devlink-params-mv88e6xxx.txt
> b/Documentation/networking/devlink-params-mv88e6xxx.txt
> new file mode 100644
> index ..cc5c1ac87c36
> --- /dev/null
> +++ b/Documentation/networking/devlink-p
From: David Ahern
Date: Thu, 3 Oct 2019 14:46:15 -0700
> From: David Ahern
>
> This reverts commit a3ce2a21bb8969ae27917281244fa91bf5f286d7.
>
> Eric reported tests failings with commit. After digging into it,
> the bottom line is that the DAD sequence is not to be messed with.
> There are to
From: Alexey Dobriyan
Date: Fri, 4 Oct 2019 00:44:40 +0300
> This function returns string literals which are "const char *".
>
> Signed-off-by: Alexey Dobriyan
Applied.
From: Alexey Dobriyan
Date: Fri, 4 Oct 2019 00:26:52 +0300
> This function is only used via function pointer.
>
> "inline" doesn't hurt given that taking address of an inline function
> forces out-of-line version but it doesn't help either.
>
> Signed-off-by: Alexey Dobriyan
Applied.
On Fri, 4 Oct 2019 11:50:12 +0200, Jiri Pirko wrote:
> From: Jiri Pirko
>
> Currently, some dumpit function may end-up with error which is not
> -EMSGSIZE and this error is silently ignored. Use does not have clue
> that something wrong happened. Instead of silent ignore, propagate
> the error t
From: Alexey Dobriyan
Date: Thu, 3 Oct 2019 23:56:37 +0300
> Some ints are "enum sock_flags" in fact.
>
> Signed-off-by: Alexey Dobriyan
Applied.
From: Alexey Dobriyan
Date: Thu, 3 Oct 2019 23:29:24 +0300
> Add casts to fix these warnings:
>
> ./usr/include/linux/netfilter_arp/arp_tables.h:200:19: error: pointer of type
> 'void *' used in arithmetic [-Werror=pointer-arith]
> ./usr/include/linux/netfilter_bridge/ebtables.h:197:19: error:
Hi "Toke,
I love your patch! Perhaps something to improve:
[auto build test WARNING on bpf-next/master]
url:
https://github.com/0day-ci/linux/commits/Toke-H-iland-J-rgensen/bpf-Support-injecting-chain-calls-into-BPF-programs-on-load/20191005-035650
base: https://git.kernel.org/pub/scm/linu
On 9/29/19 10:32 AM, Joakim Zhang wrote:
> Use the new helper devm_platform_ioremap_resource() which wraps the
> platform_get_resource() and devm_ioremap_resource() together to simplify
> the code.
>
> Signed-off-by: Joakim Zhang
Applied to linux-can-next.
tnx,
Marc
--
Pengutronix e.K.
Add plumbing to allow DSA drivers to register parameters with devlink.
To keep with the abstraction, the DSA drivers pass the ds structure to
these helpers, and the DSA core then translates that to the devlink
structure associated to the device.
Signed-off-by: Andrew Lunn
---
include/net/dsa.h
Some of the marvell switches have bits controlling the hash algorithm
the ATU uses for MAC addresses. In some industrial settings, where all
the devices are from the same manufacture, and hence use the same OUI,
the default hashing algorithm is not optimal. Allow the other
algorithms to be selected
The Marvell switches allow the hash algorithm for MAC addresses in the
address translation unit to be configured. Add support to the DSA core
to allow DSA drivers to make use of devlink parameters, and allow the
ATU hash to be get/set via such a parameter.
v2:
Pass a pointer for where the hash sh
From: Jakub Kicinski
Date: Thu, 3 Oct 2019 11:18:53 -0700
> We have 3 modes of operation of TLS - software, crypto offload
> (Mellanox, Netronome) and TCP Offload Engine-based (Chelsio).
> The last one takes over the socket, like any TOE would, and
> is not really compatible with how we want to
On Fri, Oct 04, 2019 at 01:21:55PM -0700, Andrii Nakryiko wrote:
> On Fri, Oct 4, 2019 at 11:30 AM Jakub Kicinski
> wrote:
> > On Fri, 4 Oct 2019 09:00:42 -0700, Andrii Nakryiko wrote:
> > > On Fri, Oct 4, 2019 at 8:44 AM David Ahern wrote:
> > >> > I'm not following you; my interpretation of you
On Fri, 4 Oct 2019 18:37:44 +, Yonghong Song wrote:
> > Having a header which works today, but may not work tomorrow is going
> > to be pretty bad user experience :( No matter how many warnings you put
> > in the source people will get caught off guard by this :(
> >
> > If you define the curr
From: Reinhard Speyerer
Date: Thu, 3 Oct 2019 18:34:39 +0200
> Add support for Cinterion CLS8 devices.
> Use QMI_QUIRK_SET_DTR as required for Qualcomm MDM9x07 chipsets.
...
> Signed-off-by: Reinhard Speyerer
Applied.
Hi "Toke,
I love your patch! Yet something to improve:
[auto build test ERROR on bpf-next/master]
url:
https://github.com/0day-ci/linux/commits/Toke-H-iland-J-rgensen/bpf-Support-injecting-chain-calls-into-BPF-programs-on-load/20191005-035650
base: https://git.kernel.org/pub/scm/linux/kern
Fri, Oct 04, 2019 at 07:42:17PM CEST, jakub.kicin...@netronome.com wrote:
>On Fri, 4 Oct 2019 08:19:14 +0200, Jiri Pirko wrote:
>> >> @@ -84,20 +82,10 @@ int nsim_fib_set_max(struct nsim_fib_data *fib_data,
>> >> entry = &fib_data->ipv6.rules;
>> >> break;
>> >> default:
>> >>
On Fri, Oct 4, 2019 at 11:30 AM Jakub Kicinski
wrote:
>
> On Fri, 4 Oct 2019 09:00:42 -0700, Andrii Nakryiko wrote:
> > On Fri, Oct 4, 2019 at 8:44 AM David Ahern wrote:
> >> > I'm not following you; my interpretation of your comment seems like you
> > > are making huge assumptions.
> > >
> > > I
On Thu, 2019-09-26 at 20:30 +0300, Leon Romanovsky wrote:
> On Thu, Sep 26, 2019 at 09:45:03AM -0700, Jeff Kirsher wrote:
> > From: Mustafa Ismail
> >
> > Register irdma as a platform driver capable of supporting platform
> > devices from multi-generation RDMA capable Intel HW. Establish the
> >
On 10/3/19 9:41 AM, Steven Rostedt wrote:
> On Thu, 3 Oct 2019 09:18:40 -0700
> Alexei Starovoitov wrote:
>
>> I think dropping last events is just as bad. Is there a mode to overwrite old
>> and keep the last N (like perf does) ?
>
> Well, it drops it by pages. Thus you should always have the l
On Thu, Oct 3, 2019 at 2:08 PM John Fastabend wrote:
>
> Song Liu wrote:
> > On Wed, Oct 2, 2019 at 5:30 PM Daniel Borkmann wrote:
> > >
> > > Replace 'cmp reg, 0' with 'test reg, reg' for comparisons against
> > > zero. Saves 1 byte of instruction encoding per occurrence. The flag
> > > results
> -Original Message-
> From: Intel-wired-lan [mailto:intel-wired-lan-boun...@osuosl.org] On
> Behalf Of Igor Pylypiv
> Sent: Thursday, October 3, 2019 11:54 PM
> To: Kirsher, Jeffrey T ; David S . Miller
>
> Cc: netdev@vger.kernel.org; intel-wired-...@lists.osuosl.org; Igor Pylypiv
>
> Su
On 10/4/19 11:30 AM, Jakub Kicinski wrote:
> On Fri, 4 Oct 2019 09:00:42 -0700, Andrii Nakryiko wrote:
>> On Fri, Oct 4, 2019 at 8:44 AM David Ahern wrote:
I'm not following you; my interpretation of your comment seems like you
>>> are making huge assumptions.
>>>
>>> I build bpf programs f
On Fri, 4 Oct 2019 09:00:42 -0700, Andrii Nakryiko wrote:
> On Fri, Oct 4, 2019 at 8:44 AM David Ahern wrote:
>> > I'm not following you; my interpretation of your comment seems like you
> > are making huge assumptions.
> >
> > I build bpf programs for specific kernel versions using the devel
> >
On Fri, Oct 04, 2019 at 12:21:33PM +0300, Ioana Ciornei wrote:
> From: Ioana Radulescu
>
> Throughout the driver there are several places where we wait
> indefinitely for DPIO portal commands to be executed, while
> the portal returns a busy response code.
>
> Even though in theory we are guaran
On 10/4/19 8:03 AM, David Ahern wrote:
> From: David Ahern
>
> Rajendra reported a kernel panic when a link was taken down:
>
>
> up. There is a race between addrcond_dad_work getting scheduled and
> taking the rtnl lock and a process taking the link down (under rtnl).
> The latter removes
From: Jiri Pirko
Date: Thu, 3 Oct 2019 11:49:25 +0200
> Devlink from the beginning counts with network namespaces, but the
> instances has been fixed to init_net.
>
> Implement change of network namespace as part of "devlink reload"
> procedure like this:
>
> $ ip netns add testns1
> $ devlink
sysbot reported a memory leak after a bind() has failed.
While we are at it, abort the operation if kmemdup() has failed.
BUG: memory leak
unreferenced object 0x888105d83ec0 (size 32):
comm "syz-executor067", pid 7207, jiffies 4294956228 (age 19.430s)
hex dump (first 32 bytes):
00 69
On Fri, Oct 4, 2019 at 8:58 AM Stanislav Fomichev wrote:
>
> Make sure non-root namespaces get an error if root flow dissector is
> attached.
>
> Cc: Petar Penkov
> Signed-off-by: Stanislav Fomichev
Acked-by: Song Liu
On Fri, Oct 4, 2019 at 8:58 AM Stanislav Fomichev wrote:
>
> Always use init_net flow dissector BPF program if it's attached and fall
> back to the per-net namespace one. Also, deny installing new programs if
> there is already one attached to the root namespace.
> Users can still detach their BPF
On Fri, Oct 04, 2019 at 05:06:04PM +0100, Russell King wrote:
> Move reading the link partner advertisement out of genphy_read_status()
> into its own separate function. This will allow re-use of this code by
> PHY drivers that are able to read the resolved status from the PHY.
>
> Tested-by: tin
On Fri, Oct 4, 2019 at 9:38 AM David Ahern wrote:
>
> On 10/4/19 8:43 AM, Ido Schimmel wrote:
> >> Sounds like there are 2 cases for prefixes that should be flagged to the
> >> user -- "offloaded" (as in traffic is offloaded) and "in_hw" (prefix is
> >> in hardware but forwarding is not offloaded
On Fri, 4 Oct 2019 08:19:14 +0200, Jiri Pirko wrote:
> >> @@ -84,20 +82,10 @@ int nsim_fib_set_max(struct nsim_fib_data *fib_data,
> >>entry = &fib_data->ipv6.rules;
> >>break;
> >>default:
> >> - return 0;
> >> - }
> >> -
> >> - /* not allowing a new max to b
Make sure TCA_DSMARK_INDICES was provided by the user.
syzbot reported :
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8799 Comm: syz-executor235 Not tainted 5.3.0+ #0
Hardwar
From: Toke Høiland-Jørgensen
This adds new self tests for the XDP chain call functionality.
Signed-off-by: Toke Høiland-Jørgensen
---
tools/testing/selftests/bpf/.gitignore|1
tools/testing/selftests/bpf/Makefile |3
tools/testing/selftests/bpf/progs/xdp_dummy.c |
From: Toke Høiland-Jørgensen
This adds simple syscall wrappers for the new BPF_PROG_CHAIN_* commands to
libbpf.
Signed-off-by: Toke Høiland-Jørgensen
---
tools/lib/bpf/bpf.c | 34 ++
tools/lib/bpf/bpf.h |4
tools/lib/bpf/libbpf.map |3 ++
From: Alan Maguire
This adds support for setting and deleting bpf chain call programs through
a couple of new commands in the bpf() syscall. The CHAIN_ADD and CHAIN_DEL
commands take two eBPF program fds and a return code, and install the
'next' program to be chain called after the 'prev' program
This series adds support for executing multiple XDP programs on a single
interface in sequence, through the use of chain calls, as discussed at the Linux
Plumbers Conference last month:
https://linuxplumbersconf.org/event/4/contributions/460/
# HIGH-LEVEL IDEA
Since the response to the previous
1 - 100 of 166 matches
Mail list logo