Hi Francesco,
On Thu, 8 Oct 2020, Francesco Ruggeri wrote:
> On Wed, Oct 7, 2020 at 12:32 PM Francesco Ruggeri wrote:
> >
> > If the first packet conntrack sees after a re-register is an outgoing
> > keepalive packet with no data (SEG.SEQ = SND.NXT-1), td_end is set to
> > SND.NXT-1. When the
чт, 8 окт. 2020 г. в 23:27, Yonghong Song :
>
>
>
> On 10/8/20 10:08 PM, Nikita V. Shirokov wrote:
> > Adding support for TCP_NOTSENT_LOWAT sockoption
> > (https://lwn.net/Articles/560082/ ) in tcpbpf
> >
> > Signed-off-by: Nikita V. Shirokov
> > ---
> > include/uapi/linux/bpf.h
On 10/8/20 6:12 PM, Alexei Starovoitov wrote:
From: Alexei Starovoitov
The main purpose of the profiler test to check different llvm generation
patterns to make sure the verifier can load these large programs.
Note that profiler.inc.h test doesn't follow strict kernel coding style.
The code
On 10/8/20 10:08 PM, Nikita V. Shirokov wrote:
Adding support for TCP_NOTSENT_LOWAT sockoption
(https://lwn.net/Articles/560082/ ) in tcpbpf
Signed-off-by: Nikita V. Shirokov
---
include/uapi/linux/bpf.h | 2 +-
net/core/filter.c |
Fix up a compiler error on 64bit architectures where pointers.
In file included from drivers/net/ethernet/intel/ice/ice_flex_pipe.c:6:0:
drivers/net/ethernet/intel/ice/ice_flex_pipe.c: In function
'ice_free_flow_profs':
drivers/net/ethernet/intel/ice/ice_flow.h:197:33: warning: cast from pointer
;>
>> git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can.git
>> tags/linux-can-fixes-for-5.9-20201008
>>
>> I've send a proper pull request some seconds ago.
>
> Sorry for the rush but I didn't want to wait too much, since we're
> already
On Thu Oct 08 2020, Vladimir Oltean wrote:
> On Tue, Oct 06, 2020 at 12:13:04PM +0200, Kurt Kanzenbach wrote:
>> >> >> +static const struct hellcreek_platform_data de1soc_r1_pdata = {
>> >> >> + .num_ports = 4,
>> >> >> + .is_100_mbits= 1,
>> >> >> + .qbv_support = 1,
>
Remove one of the two instances of the function prototype for
tls_validate_xmit_skb().
Signed-off-by: Randy Dunlap
Cc: Boris Pismenny
Cc: Aviad Yehezkel
Cc: John Fastabend
Cc: Daniel Borkmann
Cc: Jakub Kicinski
To: netdev@vger.kernel.org
---
Sorry, resending to netdev@ also.
include/net/tl
Taehee Yoo writes:
> On Fri, 9 Oct 2020 at 01:14, Johannes Berg wrote:
> On Thu, 2020-10-08 at 15:59 +, David Laight wrote:
>
>> From: Taehee Yoo
>> > Sent: 08 October 2020 16:49
>> >
>> > When debugfs file is opened, its module should not be removed until
>> > it's closed.
>> > Because debu
Adding support for TCP_NOTSENT_LOWAT sockoption
(https://lwn.net/Articles/560082/) in tcpbpf
Signed-off-by: Nikita V. Shirokov
---
include/uapi/linux/bpf.h | 2 +-
net/core/filter.c | 4
tools/testing/selftests/bpf/progs/connect4_pr
Johannes Berg writes:
> On Thu, 2020-10-08 at 15:59 +, David Laight wrote:
>> From: Taehee Yoo
>> > Sent: 08 October 2020 16:49
>> >
>> > When debugfs file is opened, its module should not be removed until
>> > it's closed.
>> > Because debugfs internally uses the module's data.
>> > So, it
Move skb->sk assignment out of sk_psock_bpf_run() and into individual
callers. Then we can use proper skb_set_owner_r() call to assign a
sk to a skb. This improves things by also charging the truesize against
the sockets sk_rmem_alloc counter. With this done we get some accounting
in place to ensur
In the sk_skb redirect case we didn't handle the case where we overrun
the sk_rmem_alloc entry on ingress redirect or sk_wmem_alloc on egress.
Because we didn't have anything implemented we simply dropped the skb.
This meant data could be dropped if socket memory accounting was in
place.
This fixe
Calling skb_orphan() is unnecessary in the strp rcv handler because the skb
is from a skb_clone() in __strp_recv. So it never has a destructor or a
sk assigned. Plus its confusing to read because it might hint to the reader
that the skb could have an sk assigned which is not true. Even if we did
ha
The skb_set_owner_w is unnecessary here. The sendpage call will create a
fresh skb and set the owner correctly from workqueue. Its also not entirely
harmless because it consumes cycles, but also impacts resource accounting
by increasing sk_wmem_alloc. This is charging the socket we are going to
sen
When we receive an skb and the ingress skb verdict program returns
SK_PASS we currently set the ingress flag and put it on the workqueue
so it can be turned into a sk_msg and put on the sk_msg ingress queue.
Then finally telling userspace with data_ready hook.
Here we observe that if the workqueue
Users of sockmap and skmsg trying to build proxys and other tools
have pointed out to me the error handling can be problematic. If
the proxy is under-provisioned and/or the BPF admin does not have
the ability to update/modify memory provisions on the sockets
its possible data may be dropped. For so
For sk_skb case where skb_verdict program returns SK_PASS to continue to
pass packet up the stack, the memory limits were already checked before
enqueuing in skb_queue_tail from TCP side. So, lets remove the extra checks
here. The theory is if the TCP stack believes we have memory to receive
the pa
Hi Jon, Jakub,
I tried with your comment. But looks like we got into circular locking and
deadlock could happen like this:
CPU0CPU1
lock(&n->lock#2);
lock(&tn->nametbl_lock);
On 10/8/20 7:09 AM, Jesper Dangaard Brouer wrote:
> The BPF-helpers for FIB lookup (bpf_xdp_fib_lookup and bpf_skb_fib_lookup)
> can perform MTU check and return BPF_FIB_LKUP_RET_FRAG_NEEDED. The BPF-prog
> don't know the MTU value that caused this rejection.
>
> If the BPF-prog wants to implemen
On 2020/10/9 上午4:42, Stefano Garzarella wrote:
If riov and wiov are both defined and they point to different
objects, only riov is initialized. If the wiov is not initialized
by the caller, the function fails returning -EINVAL and printing
"Readable desc 0x... after writable" error message.
Th
On 2020/9/28 下午11:44, Eugenio Perez Martin wrote:
-u64 iova, u64 size)
+static int vhost_vdpa_unmap(struct vhost_vdpa *v,
+ struct vhost_iotlb *iotlb,
+ u64 iova, u64 size)
{
struct vdpa_device *vdpa = v-
On 10/8/20 2:31 PM, Daniel Borkmann wrote:
Rename into test_tc_redirect.sh and move setup and test code into separate
functions so they can be reused for newly added tests in here. Also remove
the crude hack to override ifindex inside the object file via xxd and sed
and just use a simple map i
On 2020/10/1 下午9:29, Eli Cohen wrote:
On Thu, Sep 24, 2020 at 11:21:11AM +0800, Jason Wang wrote:
This patch introduces a new bus operation to allow the vDPA bus driver
to associate an ASID to a virtqueue group.
So in case of virtio_net, I would expect that all the data virtqueues
will be as
On 2020/10/1 下午9:23, Eli Cohen wrote:
+ /* Only support 1 address space */
+ if (vdpa->ngroups != 1)
+ return -ENOTSUPP;
Checkpatch warning: prefer EOPNOTSUPP
Will fix.
Thanks
On 2020/10/1 下午9:21, Eli Cohen wrote:
On Thu, Sep 24, 2020 at 11:21:10AM +0800, Jason Wang wrote:
This patches introduces the multiple address spaces support for vDPA
device. This idea is to identify a specific address space via an
dedicated identifier - ASID.
During vDPA device allocation, v
On 2020/9/28 下午11:44, Eugenio Perez Martin wrote:
On Thu, Sep 24, 2020 at 5:23 AM Jason Wang wrote:
This patch introduces virtqueue groups to vDPA device. The virtqueue
group is the minimal set of virtqueues that must share an address
space. And the adddress space identifier could only be att
On 2020/9/30 下午8:02, Eli Cohen wrote:
On Thu, Sep 24, 2020 at 11:21:07AM +0800, Jason Wang wrote:
To ease the implementation of per group ASID support for vDPA
device. This patch switches to use a vhost-vdpa specific IOTLB to
avoid the unnecessary refactoring of the vhost core.
Signed-off-by:
Hi,
sob., 20 cze 2020 o 11:21 Russell King napisał(a):
>
> Add a helper to convert the struct phylink_config pointer passed in
> from phylink to the drivers internal struct mvpp2_port.
>
> Signed-off-by: Russell King
> ---
> .../net/ethernet/marvell/mvpp2/mvpp2_main.c | 29 +--
On 10/8/20 2:31 PM, Daniel Borkmann wrote:
Extend the "diff_size" subtest to also include a non-inlined array map variant
where dynamic inner #elems are possible.
Signed-off-by: Daniel Borkmann
Ack with a minor comment below.
Acked-by: Yonghong Song
---
.../selftests/bpf/prog_tests/b
Begin forwarded message:
Date: Thu, 08 Oct 2020 07:33:23 +
From: bugzilla-dae...@bugzilla.kernel.org
To: step...@networkplumber.org
Subject: [Bug 209579] New: MPLS not forwarding packet, if packet type is not
ipv4, ipv6
https://bugzilla.kernel.org/show_bug.cgi?id=209579
Bug
On 10/8/20 2:31 PM, Daniel Borkmann wrote:
Recent work in f4d05259213f ("bpf: Add map_meta_equal map ops") and 134fede4eecf
("bpf: Relax max_entries check for most of the inner map types") added support
for dynamic inner max elements for most map-in-map types. Exceptions were maps
like array o
On Fri, Oct 9, 2020 at 1:45 AM Cong Wang wrote:
>
> On Thu, Oct 8, 2020 at 1:45 AM Xin Long wrote:
> >
> > On Thu, Oct 8, 2020 at 12:12 PM Cong Wang wrote:
> > >
> > > skb_unshare() drops a reference count on the old skb unconditionally,
> > > so in the failure case, we end up freeing the skb tw
On 10/8/2020 7:20 PM, Calvin Johnson wrote:
Hi Rob,
On Thu, Oct 08, 2020 at 11:35:07AM -0500, Rob Herring wrote:
On Thu, Oct 8, 2020 at 9:47 AM Calvin Johnson
wrote:
Better place for of_mdio.c is drivers/net/mdio.
Move of_mdio.c from drivers/of to drivers/net/mdio
One thing off my todo
Hi Rob,
On Thu, Oct 08, 2020 at 11:35:07AM -0500, Rob Herring wrote:
> On Thu, Oct 8, 2020 at 9:47 AM Calvin Johnson
> wrote:
> >
> > Better place for of_mdio.c is drivers/net/mdio.
> > Move of_mdio.c from drivers/of to drivers/net/mdio
>
> One thing off my todo list. I'd started this ages ago[1
1-UDP-Encapsulation-of-SCTP/20201008-175211
> base: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git
> 9faebeb2d80065926dfbc09cb73b1bb7779a89cd
> config: i386-randconfig-s002-20201008 (attached as .config)
> compiler: gcc-9 (Debian 9.3.0-15) 9.3.0
> rep
On 2020/9/30 下午7:26, Eli Cohen wrote:
On Thu, Sep 24, 2020 at 11:21:06AM +0800, Jason Wang wrote:
To prepare for the ASID support for vhost-vdpa, try to pass IOTLB
object to dma helpers.
Maybe it's worth mentioning here that this patch does not change any
functionality and is presented as a p
On Fri, Oct 9, 2020 at 2:30 AM kernel test robot wrote:
>
> Hi Xin,
>
> Thank you for the patch! Yet something to improve:
>
> [auto build test ERROR on net-next/master]
>
> url:
> https://github.com/0day-ci/linux/commits/Xin-Long/sctp-Implement-RFC6951-UDP-Enc
On Fri, Oct 9, 2020 at 5:20 AM kernel test robot wrote:
>
> Hi Xin,
>
> Thank you for the patch! Yet something to improve:
>
> [auto build test ERROR on net-next/master]
>
> url:
> https://github.com/0day-ci/linux/commits/Xin-Long/sctp-Implement-RFC6951-UDP-Enc
On Thu, Oct 8, 2020 at 8:45 PM Willem de Bruijn
wrote:
>
> On Thu, Oct 8, 2020 at 5:48 AM Xin Long wrote:
> >
> > For some protocol's gso, like SCTP, it's using GSO_BY_FRAGS for
> > gso_size. When using UDP to encapsulate its packet, it will
> > return error in udp6_ufo_fragment() as skb->len < g
On Wed, Sep 30, 2020 at 6:05 PM Willem de Bruijn
wrote:
>
> On Wed, Sep 30, 2020 at 4:05 AM wrote:
> >
> > From: Tonghao Zhang
> >
> > Allow user configuring RXCSUM separately with ethtool -K,
> > reusing the existing virtnet_set_guest_offloads helper
> > that configures RXCSUM for XDP. This is
From: Alexei Starovoitov
The llvm register allocator may use two different registers representing the
same virtual register. In such case the following pattern can be observed:
1047: (bf) r9 = r6
1048: (a5) if r6 < 0x1000 goto pc+1
1050: ...
1051: (a5) if r9 < 0x2 goto pc+66
1052: ...
1053: (bf)
From: Yonghong Song
Under register pressure the llvm may spill registers with bounds into the stack.
The verifier has to track them through spill/fill otherwise many kinds of bound
errors will be seen. The spill/fill of induction variables was already
happening. This patch extends this logic from
From: Alexei Starovoitov
v1->v2:
- fixed 32-bit mov issue spotted by John.
- allowed r2=r1; r3=r2; sequence as suggested by John.
- added comments, acks, more tests.
Make two verifier improvements:
- The llvm register allocator may use two different registers representing the
same virtual regi
From: Alexei Starovoitov
The main purpose of the profiler test to check different llvm generation
patterns to make sure the verifier can load these large programs.
Note that profiler.inc.h test doesn't follow strict kernel coding style.
The code was formatted in the kernel style, but variable de
From: Alexei Starovoitov
Add asm tests for register allocator tracking logic.
Signed-off-by: Alexei Starovoitov
Acked-by: Andrii Nakryiko
---
.../testing/selftests/bpf/verifier/regalloc.c | 243 ++
1 file changed, 243 insertions(+)
create mode 100644 tools/testing/selftests/b
On Tue, 6 Oct 2020 18:56:06 +0200 Armin Wolf wrote:
> Enable the ne2k-pci Read-before-Write Bugfix
> since not doing so could (according to the Datasheet)
> cause the system to lock up with some chips.
>
> Signed-off-by: Armin Wolf
> ---
> drivers/net/ethernet/8390/ne2k-pci.c | 2 +-
> 1 file c
On Tue, 06 Oct 2020 18:12:45 +0200 Paolo Abeni wrote:
> On Tue, 2020-10-06 at 18:06 +0200, Matthieu Baerts wrote:
> > In case of errors, this message was printed:
> >
> > (...)
> > balanced bwidth with unbalanced delay 5233 max 5005 [ fail ]
> > client exit code 0, server 0
> > \nne
On Tue, 6 Oct 2020 18:02:48 +0300 Vladimir Oltean wrote:
> Without these definitions, the driver will crash in:
> mscc_ocelot_probe
> -> ocelot_init
>-> ocelot_vcap_init
> -> __ocelot_target_read_ix
>
> I missed this because I did not have the VSC7514 hardware to test, only
> the VSC99
On Tue, 6 Oct 2020 15:52:53 +0200 Marek Vasut wrote:
> The phy_reset_after_clk_enable() does a PHY reset, which means the PHY
> loses its register settings. The fec_enet_mii_probe() starts the PHY
> and does the necessary calls to configure the PHY via PHY framework,
> and loads the correct regist
On Wed, 7 Oct 2020 00:02:42 +0200 Marek Vasut wrote:
> On 10/6/20 11:09 PM, Florian Fainelli wrote:
> > On 10/6/2020 1:20 PM, Marek Vasut wrote:
> >> The phy_reset_after_clk_enable() is always called with ndev->phydev,
> >> however that pointer may be NULL even though the PHY device instance
> >>
On Tue, 6 Oct 2020 08:27:34 +0200 Paolo Abeni wrote:
> If recvmsg() and the workqueue race to dequeue the data
> pending on some subflow, the current mapping for such
> subflow covers several skbs and some of them have not
> reached yet the received, either the worker or recvmsg()
> can find a sub
On Wed, 7 Oct 2020 09:51:11 -0700 Eric Dumazet wrote:
> diff --git a/include/net/sch_generic.h b/include/net/sch_generic.h
> index
> 6c762457122fd0091cb0f2bf41bda73babc4ac12..d8fd8676fc724110630904909f64d7789f3a4b47
> 100644
> --- a/include/net/sch_generic.h
> +++ b/include/net/sch_generic.h
> @
On Thu, Oct 08, 2020 at 04:39:40PM +0300, Dan Carpenter wrote:
On Thu, Oct 08, 2020 at 07:58:04PM +0800, Coiby Xu wrote:
-static int
-qlge_reporter_coredump(struct devlink_health_reporter *reporter,
- struct devlink_fmsg *fmsg, void *priv_ctx,
- struct
On Thu, Oct 08, 2020 at 04:31:42PM +0300, Dan Carpenter wrote:
On Thu, Oct 08, 2020 at 07:58:03PM +0800, Coiby Xu wrote:
Initialize devlink health dump framework for the dlge driver so the
coredump could be done via devlink.
Signed-off-by: Coiby Xu
---
drivers/staging/qlge/Kconfig| 1
On 9/30/20 9:20 AM, Boris Pismenny wrote:
This series adds support for nvme-tcp receive offloads
which do not mandate the offload of the network stack to the device.
Instead, these work together with TCP to offload:
1. copy from SKB to the block layer buffers
2. CRC verification for received P
On Tue, 6 Oct 2020 11:23:32 +0530 Allen Pais wrote:
> From: Allen Pais
>
> In preparation for unconditionally passing the
> struct tasklet_struct pointer to all tasklet
> callbacks, switch to using the new tasklet_setup()
> and from_tasklet() to pass the tasklet pointer explicitly.
>
> Signed-o
On Tue, 6 Oct 2020 11:41:54 +0530 Allen Pais wrote:
> From: Allen Pais
>
> In preparation for unconditionally passing the
> struct tasklet_struct pointer to all tasklet
> callbacks, switch to using the new tasklet_setup()
> and from_tasklet() to pass the tasklet pointer explicitly.
> @@ -815,7
On Thu, Oct 08, 2020 at 05:27:49PM +0100, John Keeping wrote:
> With threadirqs, stmmac_interrupt() is called on a thread with hardirqs
> enabled so we cannot call __napi_schedule_irqoff(). Under lockdep it
> leads to:
>
> [ cut here ]
> WARNING: CPU: 0 PID: 28
On Wed, Oct 7, 2020 at 12:32 PM Francesco Ruggeri wrote:
>
> If the first packet conntrack sees after a re-register is an outgoing
> keepalive packet with no data (SEG.SEQ = SND.NXT-1), td_end is set to
> SND.NXT-1.
> When the peer correctly acknowledges SND.NXT, tcp_in_window fails
> check III (U
On Thu, Oct 8, 2020 at 2:54 PM Xie He wrote:
>
> OK. If the t->encap_hlen header needs to be placed before the GRE
> header, then I think the ipgre_header function should leave some space
> before the GRE header to place the t->encap_hlen header, rather than
> leaving space after the GRE header.
On Wed, 7 Oct 2020 12:53:50 +0200 Johannes Berg wrote:
> From: Johannes Berg
>
> The ETHTOOL_A_STRSET_COUNTS_ONLY flag attribute was previously
> not allowed to be used, but now due to the policy size reduction
> we would access the tb[] array out of bounds since we tried to
> check for the attr
You probably want Al to have a look at this..
static
int nvme_tcp_offload_socket(struct nvme_tcp_queue *queue,
struct nvme_tcp_config *config)
@@ -630,6 +720,7 @@ static void nvme_tcp_error_recovery(struct
nvme_ctrl *ctrl)
static int nvme_tcp_process_nvme_cqe(struct nvme_tcp_queue *queue,
struct nvme_com
On 9/30/20 9:20 AM, Boris Pismenny wrote:
From: Or Gerlitz
For ddp setup/teardown and resync, the offloading logic
uses HW resources at the NIC driver such as SQ and CQ.
These resources are destroyed when the netdevice does down
and hence we must stop using them before the NIC driver
destro
crc offload of the nvme capsule. Check if all the skb bits
are on, and if not recalculate the crc in SW and check it.
Can you clarify in the patch description that this is only
for pdu data digest and not header digest?
This patch reworks the receive-side crc calculation to always
run at t
On Thu, Oct 8, 2020 at 3:04 PM Ertman, David M wrote:
>
> > -Original Message-
> > From: Leon Romanovsky
> > Sent: Tuesday, October 6, 2020 10:23 AM
> > To: Ertman, David M
> > Cc: alsa-de...@alsa-project.org; ti...@suse.de; broo...@kernel.org; linux-
> > r...@vger.kernel.org; j...@nvidi
bool nvme_tcp_resync_request(struct sock *sk, u32 seq, u32 flags);
+void nvme_tcp_ddp_teardown_done(void *ddp_ctx);
const struct tcp_ddp_ulp_ops nvme_tcp_ddp_ulp_ops __read_mostly = {
+
.resync_request = nvme_tcp_resync_request,
+ .ddp_teardown_done = nvme_tcp_ddp
>
> That tag includes my previous oneline-patch-pull-request from 20201006, that
> fixes the c_can driver on basically all stm32mp1 based boards. Would be good
> to
> see that in 5.9, as well.
>
> git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can.git
> tags/linux-
On 9/30/20 9:20 AM, Boris Pismenny wrote:
This commit introduces direct data placement offload to NVME
TCP. There is a context per queue, which is established after the
handshake
using the tcp_ddp_sk_add/del NDOs.
Additionally, a resynchronization routine is used to assist
hardware recovery f
> -Original Message-
> From: Leon Romanovsky
> Sent: Tuesday, October 6, 2020 10:23 AM
> To: Ertman, David M
> Cc: alsa-de...@alsa-project.org; ti...@suse.de; broo...@kernel.org; linux-
> r...@vger.kernel.org; j...@nvidia.com; dledf...@redhat.com;
> netdev@vger.kernel.org; da...@davemloft
In order to enable -Wimplicit-fallthrough for Clang[1], replace the
existing /* fall-through */ comments with the new pseudo-keyword
macro fallthrough[2].
[1] https://git.kernel.org/linus/e2079e93f562c7f7a030eb7642017ee5eabaaa10
[2]
https://www.kernel.org/doc/html/v5.7/process/deprecated.html?hig
On 10/8/20 2:31 PM, Daniel Borkmann wrote:
> Follow-up to address David's feedback that we should better describe internals
> of the bpf_redirect_neigh() helper.
>
> Suggested-by: David Ahern
> Signed-off-by: Daniel Borkmann
> ---
> include/uapi/linux/bpf.h | 10 +++---
> tools/includ
On 10/8/20 1:57 PM, Toke Høiland-Jørgensen wrote:
> David Ahern writes:
>
>> On 10/8/20 7:53 AM, Toke Høiland-Jørgensen wrote:
>>> The bpf_fib_lookup() helper performs a neighbour lookup for the destination
>>> IP and returns BPF_FIB_LKUP_NO_NEIGH if this fails, with the expectation
>>> that the
In order to enable -Wimplicit-fallthrough for Clang[1], replace the
existing /* fall through */ comments with the new pseudo-keyword
macro fallthrough[2].
[1] https://git.kernel.org/linus/e2079e93f562c7f7a030eb7642017ee5eabaaa10
[2]
https://www.kernel.org/doc/html/v5.7/process/deprecated.html?hig
Reviewed-by: Sagi Grimberg
On Thu, Oct 8, 2020 at 2:48 PM Willem de Bruijn
wrote:
>
> > I see the ipgre_xmit function would pull the header our header_ops
> > creates, and then call __gre_xmit. __gre_xmit will call
> > gre_build_header to complete the GRE header. gre_build_header expects
> > to find the base GRE header afte
This commit itroduces support for CRC offload to direct data placement
introduces
ULP on the receive side. Both DDP and CRC share a common API to
initialize the offload for a TCP socket. But otherwise, both can
be executed independently.
From the API it not clear that the offl
+ * tcp_ddp.h
+ * Author: Boris Pismenny
+ * Copyright (C) 2020 Mellanox Technologies.
+ */
+#ifndef _TCP_DDP_H
+#define _TCP_DDP_H
+
+#include
Why is blkdev.h needed?
+#include
+#include
+#include
+
+/* limits returned by the offload driver, zero means don't care */
+struct tc
On Thu, Oct 8, 2020 at 5:36 PM Xie He wrote:
>
> On Thu, Oct 8, 2020 at 1:32 PM Willem de Bruijn
> wrote:
> >
> > On Thu, Oct 8, 2020 at 4:11 PM Xie He wrote:
> > >
> > > OK. I understand that t->tun_hlen is the GRE header length. What is
> > > t->encap_hlen?
> >
> > I've looked at that closely
to net, in case there is a last
> minute PR to Linus for 5.9?
Yes, of you can pull Cong Wang's patch and my patch, that fixes the other
missing init of skbcnt.
That tag includes my previous oneline-patch-pull-request from 20201006, that
fixes the c_can driver on basically all stm32mp1 ba
From: Lucas Stach
0704c5743694 can: m_can_platform: remove unnecessary m_can_class_resume()
call
removed the m_can_class_resume() call in the runtime resume path to get
rid of a infinite recursion, so the runtime resume now only handles the device
clocks.
Unfortunately it did not remove th
This patch add the initialization of skbcnt, similar to:
e009f95b1543 can: j1935: j1939_tp_tx_dat_new(): fix missing initialization
of skbcnt
Let's play save and initialize this skbcnt as well.
Suggested-by: Jakub Kicinski
Fixes: 9d71dd0c7009 ("can: add support of SAE J1939 protocol")
Sign
On 10/1/20 11:49 AM, Frederic Weisbecker wrote:
> On Mon, Sep 28, 2020 at 02:35:25PM -0400, Nitesh Narayan Lal wrote:
>> Nitesh Narayan Lal (4):
>> sched/isolation: API to get number of housekeeping CPUs
>> sched/isolation: Extend nohz_full to isolate managed IRQs
>> i40e: Limit msix vectors
/mkl/linux-can.git
tags/linux-can-fixes-for-5.9-20201008
for you to fetch changes up to 13ba4c434422837d7c8c163f9c8d854e67bf3c99:
net: j1939: j1939_session_fresh_new(): fix missing initialization of skbcnt
(2020-10-08 23:28:09 +0200)
--
From: Cong Wang
This fixes an uninit-value warning:
BUG: KMSAN: uninit-value in can_receive+0x26b/0x630 net/can/af_can.c:650
Reported-and-tested-by: syzbot+3f3837e61a48d32b4...@syzkaller.appspotmail.com
Fixes: 9d71dd0c7009 ("can: add support of SAE J1939 protocol")
Cc: Robin van der Gracht
Cc:
The pull request you sent on Thu, 8 Oct 2020 13:23:29 -0700:
> git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git refs/heads/master
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6288c1d8024eebb7a1ccdbab80f6e857ac94eeb0
Thank you!
--
Deet-doot-dot, I am a
The pull request you sent on Thu, 8 Oct 2020 16:30:51 -0400:
> https://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git tags/for_linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3fdd47c3b40ac48e6e6e5904cf24d12e6e073a96
Thank you!
--
Deet-doot-dot, I am a bo
On Thu, Oct 8, 2020 at 1:32 PM Willem de Bruijn
wrote:
>
> On Thu, Oct 8, 2020 at 4:11 PM Xie He wrote:
> >
> > OK. I understand that t->tun_hlen is the GRE header length. What is
> > t->encap_hlen?
>
> I've looked at that closely either.
>
> Appears to be to account for additional FOU/GUE encap:
Recent work in f4d05259213f ("bpf: Add map_meta_equal map ops") and 134fede4eecf
("bpf: Relax max_entries check for most of the inner map types") added support
for dynamic inner max elements for most map-in-map types. Exceptions were maps
like array or prog array where the map_gen_lookup() callback
Add an efficient ingress to ingress netns switch that can be used out of tc BPF
programs in order to redirect traffic from host ns ingress into a container
veth device ingress without having to go via CPU backlog queue [0]. For local
containers this can also be utilized and path via CPU backlog que
Extend the "diff_size" subtest to also include a non-inlined array map variant
where dynamic inner #elems are possible.
Signed-off-by: Daniel Borkmann
---
.../selftests/bpf/prog_tests/btf_map_in_map.c | 39 -
.../selftests/bpf/progs/test_btf_map_in_map.c | 43 +++
Follow-up to address David's feedback that we should better describe internals
of the bpf_redirect_neigh() helper.
Suggested-by: David Ahern
Signed-off-by: Daniel Borkmann
---
include/uapi/linux/bpf.h | 10 +++---
tools/include/uapi/linux/bpf.h | 10 +++---
2 files changed, 14 ins
This series addresses most of the feedback [0] that was to be followed
up from the last series, that is, UAPI helper comment improvements and
getting rid of the ifindex obj file hacks in the selftest by using a
BPF map instead. The __sk_buff data/data_end pointer work, I'm planning
to do in a later
Rename into test_tc_redirect.sh and move setup and test code into separate
functions so they can be reused for newly added tests in here. Also remove
the crude hack to override ifindex inside the object file via xxd and sed
and just use a simple map instead. Map given iproute2 does not support BTF
Extend the test_tc_redirect test and add a small test that exercises the new
redirect_peer() helper for the IPv4 and IPv6 case.
Signed-off-by: Daniel Borkmann
---
.../selftests/bpf/progs/test_tc_peer.c| 45 +++
.../testing/selftests/bpf/test_tc_redirect.sh | 25 +++---
On Thu, 08 Oct 2020 19:10:57 +0200 Bjørn Mork wrote:
> Jakub Kicinski writes:
>
> > I'm guessing that I'm supposed to take this patch into the networking
> > tree, correct?
>
> Correct.
>
> > Is this net or net-next candidate? Bjørn?
>
> Sorry, should have made that explicit. This is for n
Hi Xin,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on net-next/master]
url:
https://github.com/0day-ci/linux/commits/Xin-Long/sctp-Implement-RFC6951-UDP-Encapsulation-of-SCTP/20201008-175211
base: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net
On 10/8/2020 2:03 PM, Linus Walleij wrote:
The MTU setting for this DSA switch is global so we need
to keep track of the MTU set for each port, then as soon
as any MTU changes, roof the MTU to the biggest common
denominator and poke that into the switch MTU setting.
To achieve this we need a
On Thu, 8 Oct 2020 16:51:54 +0200 Daniel Borkmann wrote:
> Hi David,
>
> The following pull-request contains BPF updates for your *net* tree.
>
> We've added 2 non-merge commits during the last 8 day(s) which contain
> a total of 2 files changed, 10 insertions(+), 4 deletions(-).
>
> The main c
1 - 100 of 451 matches
Mail list logo