Lee Jones wrote:
> Fixes the following W=1 kernel build warning(s):
>
> drivers/net/wireless/ath/regd.c:378: warning: Function parameter or member
> 'reg' not described in 'ath_reg_apply_ir_flags'
>
> Cc: Kalle Valo
> Cc: "David S. Miller"
> Cc: Jakub Kicinski
> Cc: linux-wirel...@vger.ker
On Wed, 2 Dec 2020 13:17:46 + Camelia Alexandra Groza wrote:
> > The timestamp fields should be copied to new skb too in
> > A-050385 workaround for later TX timestamping handling.
> >
> > Fixes: 3c68b8fffb48 ("dpaa_eth: FMan erratum A050385 workaround")
> > Signed-off-by: Yangbo Lu
>
> Acked
On Tue, 1 Dec 2020 12:39:09 +0100 Schrempf Frieder wrote:
> From: Frieder Schrempf
>
> There are other NXP NCI compatible NFC controllers such as the PN7150
> that use an integrated firmware and therefore do not have a GPIO to
> select firmware downloading mode. To support this kind of controlle
On Wed, 2 Dec 2020 12:33:00 +0530 Sunil Kovvuri wrote:
> On Wed, Dec 2, 2020 at 12:28 PM Dan Carpenter
> wrote:
> > These debugfs never return NULL so all this code will never be run.
> >
> > In the normal case, (and in this case particularly), the debugfs
> > functions are not supposed to be che
On Wed, 2 Dec 2020 09:16:57 -0800 Eric Dumazet wrote:
> From: Eric Dumazet
>
> If a packet is ready in receive queue, and application isssues
> a recvmsg()/recvfrom()/recvmmsg() request asking for zero bytes,
> we hang in mptcp_recvmsg().
>
> Fixes: ea4ca586b16f ("mptcp: refine MPTCP-level ack
It was <2020-12-02 śro 09:18>, when Jakub Kicinski wrote:
> On Wed, 02 Dec 2020 11:46:28 +0100 Lukasz Stelmach wrote:
>> >> + status = netif_rx(skb);
>> >
>> > If I'm reading things right this is in process context, so netif_rx_ni()
>> >
>>
>> Is it? The stack looks as follows
>>
>> ax887
Hi Jakub,
This pull request includes [1] low level mlx5 updates required by both netdev
and rdma trees, needed for upcoming mlx5 netdev submission.
Please pull and let me know if there's any problem.
[1]
https://patchwork.kernel.org/project/linux-rdma/cover/20201120230339.651609-1-sae...@nvidia
On Wed, Dec 02, 2020 at 10:17:44AM -0600, Mario Limonciello wrote:
> From: Vitaly Lifshits
>
> Changed a configuration in the flows to align with
> architecture requirements to achieve S0i3.2 substate.
I guess this is really talking about requirements of a specific
CPU/SOC before it will enter S
s/it's/its/ (in subject as well as below).
Previous patches used "S0ix", not "s0ix" (in subject as well as
below, as well as subject and commit log of 3/5 and 5/5).
On Wed, Dec 02, 2020 at 10:17:45AM -0600, Mario Limonciello wrote:
> Introduce a flag to indicate the device should be using the s0i
s/s0ix/S0ix/ in subject.
On Wed, Dec 02, 2020 at 10:17:47AM -0600, Mario Limonciello wrote:
> These comet lake systems are not yet released, but have been validated
> on pre-release hardware.
s/comet lake/Comet Lake/ to match previous usage in patch 3/5.
> This is being submitted separately from
On Wed, Dec 02, 2020 at 07:24:28PM +, Limonciello, Mario wrote:
> > -Original Message-
> > From: Jakub Kicinski
> > Sent: Wednesday, December 2, 2020 13:07
> > To: Limonciello, Mario
> > Cc: Tony Nguyen; intel-wired-...@lists.osuosl.org; Linux PM; Netdev;
> > Alexander
> > Duyck; Sash
On Wed, 2020-12-02 at 11:20 -0800, Jakub Kicinski wrote:
> On Wed, 02 Dec 2020 11:17:16 -0800 Saeed Mahameed wrote:
> > On Wed, 2020-12-02 at 10:48 -0800, Jakub Kicinski wrote:
> > > On Tue, 1 Dec 2020 14:41:53 -0800 Saeed Mahameed wrote:
> > > > Please note that the series starts with a merge of
Jarod Wilson wrote:
>On Wed, Dec 2, 2020 at 12:55 PM Jay Vosburgh
>wrote:
>>
>> Jarod Wilson wrote:
>>
>> >Don't try to adjust XFRM support flags if the bond device isn't yet
>> >registered. Bad things can currently happen when netdev_change_features()
>> >is called without having wanted_featu
> > > On Wed, 2 Dec 2020 10:17:43 -0600 Mario Limonciello wrote:
> > > > commit e086ba2fccda ("e1000e: disable s0ix entry and exit flows for ME
> > > systems")
> > > > disabled s0ix flows for systems that have various incarnations of the
> > > > i219-LM ethernet controller. This was done because
This patch contains support to set tcp window_field field from bpf setsockops.
v2: Used TCP_WINDOW_CLAMP setsockopt logic for bpf_setsockopt (review comment
addressed)
v3: Created a common function for duplicated code (review comment addressed)
Prankur gupta (2):
bpf: Adds support for settin
Adds a new bpf_setsockopt for TCP sockets, TCP_BPF_WINDOW_CLAMP,
which sets the maximum receiver window size. It will be useful for
limiting receiver window based on RTT.
Signed-off-by: Prankur gupta
---
include/net/tcp.h | 1 +
net/core/filter.c | 3 +++
net/ipv4/tcp.c| 23 ++-
Adding selftests for new added functionality to set TCP_WINDOW_CLAMP
from bpf setsockopt.
Signed-off-by: Prankur gupta
---
tools/testing/selftests/bpf/bpf_tcp_helpers.h | 1 +
.../selftests/bpf/prog_tests/tcpbpf_user.c| 4 +++
.../selftests/bpf/progs/test_tcpbpf_kern.c| 33
From: Arthur Kiyanovski
XDP subsystem has a function to free XDP frames and their associated
pages. Using this function would help the driver's XDP implementation to
adjust to new changes in the XDP subsystem in the kernel (e.g.
introduction of XDP MB).
Also, remove 'xdp_rx_page' field from ena_
On Wed, 2 Dec 2020 12:11:41 -0800 Saeed Mahameed wrote:
> Hi Jakub,
>
> This pull request includes [1] low level mlx5 updates required by both netdev
> and rdma trees, needed for upcoming mlx5 netdev submission.
>
> Please pull and let me know if there's any problem.
>
> [1]
> https://patchwork
From: Arthur Kiyanovski
Introduce ena_increase_stat() function to increase statistics by a
certain number.
The function includes the
- lock aquire (on 32bit machines)
- stat increase
- lock release (on 32bit machines)
line sequence that is ubiquitous across the driver.
The function
From: Arthur Kiyanovski
This patch adds explicit casting to some implicit conversions in the ena
driver. The implicit conversions fail some of our static checkers that
search for accidental conversions in our driver.
Adding this cast won't affect the end results, and would sooth the
checkers.
Si
From: Arthur Kiyanovski
Rename the ena_xdp_xmit_buff() function to ena_xdp_xmit_frame() and pass
it an xdp_frame struct instead of xdp_buff.
This change lays the ground for XDP redirect implementation which uses
xdp_frames when 'xmit'ing packets.
Signed-off-by: Shay Agroskin
Signed-off-by: Arth
On Wed, 02 Dec 2020 12:15:15 -0800 Saeed Mahameed wrote:
> On Wed, 2020-12-02 at 11:20 -0800, Jakub Kicinski wrote:
> > To be clear - I'm asking you to send a PR for the pre-reqs and then
> > send the ethernet patches. So that the pre-reqs are in the tree
> > already
> > by the time the ethernet pa
From: Arthur Kiyanovski
This patch adds a partial support for the XDP_REDIRECT directive which
instructs the driver to pass the packet to an interface specified by the
program. The directive is passed to the driver by calling bpf_redirect()
or bpf_redirect_map() functions from the eBPF program.
From: Arthur Kiyanovski
V3 Changes:
---
1. Removed RFC, the commits that this patchset relies on where
merged from net already so no more conflicts are expected.
2. Fixed checkpatch errors.
V2 Changes:
---
1. Changed this to RFC, since we are waiting for the recently merge
From: Arthur Kiyanovski
ENA logs are adjusted to display the full ENA representation to
distinct each ENA device in case of multiple interfaces.
Using netdev_err/warn and dev_info functions for logging provides
uniform printing with clear distinction of the device and interface.
This patch chang
From: Arthur Kiyanovski
This commit fixes two nits, but it does not generate any change to binary
because of the optimization of gcc.
- use `count` instead of `channels->combined_count`
- change return type from `int` to `bool`
Also add spaces and change macro order in OR assignment to make
On 12/2/20 9:29 PM, Prankur gupta wrote:
> Adds a new bpf_setsockopt for TCP sockets, TCP_BPF_WINDOW_CLAMP,
> which sets the maximum receiver window size. It will be useful for
> limiting receiver window based on RTT.
>
> Signed-off-by: Prankur gupta
> ---
> include/net/tcp.h | 1 +
> net/co
From: Arthur Kiyanovski
This patch implements the ndo_xdp_xmit() net_device function which is
called when a packet is redirected to this driver using an
XDP_REDIRECT directive.
The function receives an array of xdp frames that it needs to xmit.
The TX queues that are used to xmit these frames ar
From: Arthur Kiyanovski
The patch changes the maximum number of RX/TX queues it advertises to
the kernel (via alloc_etherdev_mq()) from a value received from the
device to a constant value which is the minimum between 128 and the
number of CPUs in the system.
By allocating the net_device struct
The pull request you sent on Wed, 2 Dec 2020 06:51:47 -0500:
> https://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git tags/for_linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2c6ffa9e9b11bdfa267fe05ad1e98d3491b4224f
Thank you!
--
Deet-doot-dot, I am a bo
On Wed, Dec 02, 2020 at 04:07:21PM +0100, Magnus Karlsson wrote:
> Optimize run_xdp_zc() for the XDP program verdict being XDP_REDIRECT
> in the zsk zero-copy path. This path is only used when having AF_XDP
> zero-copy on and in that case most packets will be directed to user
> space. This provides
On Tue, Dec 1, 2020 at 6:38 PM Jakub Kicinski wrote:
>
> On Tue, 1 Dec 2020 12:24:38 -0800 Mahesh Bandewar (महेश बंडेवार) wrote:
> > On Thu, Nov 19, 2020 at 8:56 PM Jakub Kicinski wrote:
> > > Do you have more details on what the use cases are that expect no
> > > networking?
> > >
> > > TBH I do
This patch updates the sending algorithm for roundrobin to avoid
over-subscribing interface(s) when one or more interfaces in the bond is
not able to send packets. This happened when order was not random and
more than 2 interfaces were used.
Previously the algorithm would find the next available i
The eBPF program iterates over all entries (well, only one) of a socket
local storage map and deletes them all. The test makes sure that the
entry is indeed deleted.
Signed-off-by: Florent Revest
Acked-by: Martin KaFai Lau
---
.../selftests/bpf/prog_tests/bpf_iter.c | 64 +
This extends the existing bpf_sk_storage_get test where a socket is
created and tagged with its creator's pid by a task_file iterator.
A TCP iterator is now also used at the end of the test to negate the
values already stored in the local storage. The test therefore expects
-getpid() to be stored
Iterators are currently used to expose kernel information to userspace
over fast procfs-like files but iterators could also be used to
manipulate local storage. For example, the task_file iterator could be
used to initialize a socket local storage with associations between
processes and sockets or
The eBPF program iterates over all files and tasks. For all socket
files, it stores the tgid of the last task it encountered with a handle
to that socket. This is a heuristic for finding the "owner" of a socket
similar to what's done by lsof, ss, netstat or fuser. Potentially, this
information coul
On Wed, Dec 2, 2020 at 3:17 PM Jay Vosburgh wrote:
>
> Jarod Wilson wrote:
>
> >On Wed, Dec 2, 2020 at 12:55 PM Jay Vosburgh
> >wrote:
> >>
> >> Jarod Wilson wrote:
> >>
> >> >Don't try to adjust XFRM support flags if the bond device isn't yet
> >> >registered. Bad things can currently happen
Currently, the sock_from_file prototype takes an "err" pointer that is
either not set or set to -ENOTSOCK IFF the returned socket is NULL. This
makes the error redundant and it is ignored by a few callers.
This patch simplifies the API by letting callers deduce the error based
on whether the retur
While eBPF programs can check whether a file is a socket by file->f_op
== &socket_file_ops, they cannot convert the void private_data pointer
to a struct socket BTF pointer. In order to do this a new helper
wrapping sock_from_file is added.
This is useful to tracing programs but also other program
On Tue, Dec 01, 2020 at 04:16:12PM -0800, Andrii Nakryiko wrote:
> diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
> index c3458ec1f30a..60b95b51ccb8 100644
> --- a/include/uapi/linux/bpf.h
> +++ b/include/uapi/linux/bpf.h
> @@ -558,6 +558,7 @@ union bpf_attr {
> __u3
> > So it will access the MDIO bus of the PHY that is attached to the
> > MAC.
>
> If that's the case, wouldn't the ioctl() calls "just work" even when
> only the fixed-phy mdio bus and fake PHY are declared in the device
> tree?
The fixed-link PHY is connected to the MAC. So the IOCTL calls will
On Tue, Dec 01, 2020 at 01:21:27AM -0800, syzbot wrote:
> Hello,
>
> syzbot found the following issue on:
>
> HEAD commit:c84e1efa Merge tag 'asm-generic-fixes-5.10-2' of git://git..
> git tree: upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=14a9856550
> kernel
Make it possible to opt-out from Hyper-V support, for minimized kernels
that never will by run under Hyper-V. (eg. high-density virtualization
or embedded systems)
Average distro kernel will leave it on, therefore default to y.
Signed-off-by: Enrico Weigelt
---
arch/x86/Kconfig
On 2020-12-02, Andrew Lunn wrote:
>> > So it will access the MDIO bus of the PHY that is attached to the
>> > MAC.
>>
>> If that's the case, wouldn't the ioctl() calls "just work" even when
>> only the fixed-phy mdio bus and fake PHY are declared in the device
>> tree?
>
> The fixed-link PHY is c
Make it possible to opt-out from VMware support, for minimized kernels
that never will be run under Vmware (eg. high-density virtualization
or embedded systems).
Average distro kernel will leave it on, therefore default to y.
Signed-off-by: Enrico Weigelt
---
arch/x86/Kconfig |
From: Tom Rix
The macro use will already have a semicolon.
Clean up escaped newlines
Signed-off-by: Tom Rix
---
v2: more macros fixed, escaped newlines cleaned
---
include/trace/events/xdp.h | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/include/trace/events/x
On Wed, Dec 02, 2020 at 10:58, Jakub Kicinski wrote:
> On Wed, 2 Dec 2020 10:13:54 +0100 Tobias Waldekranz wrote:
>> Monitor the following events and notify the driver when:
>>
>> - A DSA port joins/leaves a LAG.
>> - A LAG, made up of DSA ports, joins/leaves a bridge.
>> - A DSA port in a LAG i
This patch contains support to set tcp window_field field from bpf setsockops.
v2: Used TCP_WINDOW_CLAMP setsockopt logic for bpf_setsockopt (review comment
addressed)
v3: Created a common function for duplicated code (review comment addressed)
v4: Removing logic to pass struct sock and struct
Adds a new bpf_setsockopt for TCP sockets, TCP_BPF_WINDOW_CLAMP,
which sets the maximum receiver window size. It will be useful for
limiting receiver window based on RTT.
Signed-off-by: Prankur gupta
---
include/net/tcp.h | 1 +
net/core/filter.c | 3 +++
net/ipv4/tcp.c| 25 +++
Adding selftests for new added functionality to set TCP_WINDOW_CLAMP
from bpf setsockopt.
Signed-off-by: Prankur gupta
---
tools/testing/selftests/bpf/bpf_tcp_helpers.h | 1 +
.../selftests/bpf/prog_tests/tcpbpf_user.c| 4 +++
.../selftests/bpf/progs/test_tcpbpf_kern.c| 33
On Wed, Dec 02, 2020 at 10:29:38PM +0100, Tobias Waldekranz wrote:
> Sorry about this. I missed an rtnl_dereference in the refactor between
> v2->v3. I have now integrated sparse into my workflow so at least this
> should not happen again.
Please do not resend right away. Give me one more day or s
On 11/20/20 5:18 PM, Jesper Dangaard Brouer wrote:
BPF end-user on Cilium slack-channel (Carlo Carraro) wants to use
bpf_fib_lookup for doing MTU-check, but *prior* to extending packet size,
by adjusting fib_params 'tot_len' with the packet length plus the
expected encap size. (Just like the bpf_
This is a driver for AX88796C Ethernet Adapter connected in SPI mode as
found on ARTIK5 evaluation board. The driver has been ported from a
v3.10.9 vendor kernel for ARTIK5 board.
Changes in v8:
- fixed the entry in MAINTAINERS
- removed unnecessary netif_err()
- changed netif_rx() to netif_
ASIX AX88796[1] is a versatile ethernet adapter chip, that can be
connected to a CPU with a 8/16-bit bus or with an SPI. This driver
supports SPI connection.
The driver has been ported from the vendor kernel for ARTIK5[2]
boards. Several changes were made to adapt it to the current kernel
which in
Add the prefix for ASIX Electronics Corporation.
Signed-off-by: Łukasz Stelmach
Reviewed-by: Krzysztof Kozlowski
Acked-by: Rob Herring
---
Documentation/devicetree/bindings/vendor-prefixes.yaml | 2 ++
1 file changed, 2 insertions(+)
diff --git a/Documentation/devicetree/bindings/vendor-prefi
Add bindings for AX88796C SPI Ethernet Adapter.
Signed-off-by: Łukasz Stelmach
Reviewed-by: Rob Herring
Acked-by: Krzysztof Kozlowski
---
.../bindings/net/asix,ax88796c.yaml | 73 +++
1 file changed, 73 insertions(+)
create mode 100644 Documentation/devicetree/bindin
On Wed, Dec 02, 2020 at 11:09, Jay Vosburgh wrote:
> Tobias Waldekranz wrote:
>
>>When creating a static bond (e.g. balance-xor), all ports will always
>>be enabled. This is set, and the corresponding notification is sent
>>out, before the port is linked to the bond upper.
>>
>>In the offloaded c
Am 02.12.2020 um 21:03 schrieb akiy...@amazon.com:
> From: Arthur Kiyanovski
>
> The patch changes the maximum number of RX/TX queues it advertises to
> the kernel (via alloc_etherdev_mq()) from a value received from the
> device to a constant value which is the minimum between 128 and the
> numb
On 12/2/20 1:19 PM, Enrico Weigelt, metux IT consult wrote:
> Make it possible to opt-out from Hyper-V support, for minimized kernels
> that never will by run under Hyper-V. (eg. high-density virtualization
> or embedded systems)
>
> Average distro kernel will leave it on, therefore default to y.
On 12/2/20 1:19 PM, Enrico Weigelt, metux IT consult wrote:
> Make it possible to opt-out from VMware support, for minimized kernels
> that never will be run under Vmware (eg. high-density virtualization
> or embedded systems).
>
> Average distro kernel will leave it on, therefore default to y.
>
On 12/2/20 10:44 PM, Daniel Borkmann wrote:
On 11/20/20 5:18 PM, Jesper Dangaard Brouer wrote:
BPF end-user on Cilium slack-channel (Carlo Carraro) wants to use
bpf_fib_lookup for doing MTU-check, but *prior* to extending packet size,
by adjusting fib_params 'tot_len' with the packet length plus
From: Arjun Roy
This patchset contains several optimizations for TCP Recv. Zerocopy.
Note this is v2 of the patchset, fixing two 32-bit compilation errors
and a stylistic error.
Summarized:
1. It is possible that a read payload is not exactly page aligned -
that there may exist "straggler" byte
From: Arjun Roy
When TCP receive zerocopy does not successfully map the entire
requested space, it outputs a 'hint' that the caller should recvmsg().
Augment zerocopy to accept a user buffer that it tries to copy this
hint into - if it is possible to copy the entire hint, it will do so.
This eli
From: Arjun Roy
Set zerocopy hint, event when falling back to copy, so that the
pending data can be efficiently received using zerocopy when
possible.
---
net/ipv4/tcp.c | 45 +
1 file changed, 45 insertions(+)
diff --git a/net/ipv4/tcp.c b/net/ipv4/t
From: Arjun Roy
Sometimes, we may call tcp receive zerocopy when inq is 0,
or inq < PAGE_SIZE, in which case we cannot remap pages. In this case,
simply return the appropriate hint for regular copying without taking
mmap_sem.
---
net/ipv4/tcp.c | 8
1 file changed, 8 insertions(+)
diff
From: Arjun Roy
Sometimes, we may call tcp receive zerocopy when inq is 0,
or inq < PAGE_SIZE, or inq is generally small enough that
it is cheaper to copy rather than remap pages.
In these cases, we may want to either return early (inq=0) or
attempt to use the provided copy buffer to simply copy
From: Arjun Roy
Zapping pages is required only if we are calling vm_insert_page into a
region where pages had previously been mapped. Receive zerocopy allows
reusing such regions, and hitherto called zap_page_range() before
calling vm_insert_page() in that range.
zap_page_range() can also be tri
From: Arjun Roy
Refactor skb frag fast-forwarding for tcp receive zerocopy. This is
part of a patch set that introduces short-circuited hybrid copies
for small receive operations, which results in roughly 33% fewer
syscalls for small RPC scenarios.
skb_advance_to_frag(), given a skb and an offse
From: Arjun Roy
Refactor frag-is-remappable test for tcp receive zerocopy. This is
part of a patch set that introduces short-circuited hybrid copies
for small receive operations, which results in roughly 33% fewer
syscalls for small RPC scenarios.
---
net/ipv4/tcp.c | 34
From: Arjun Roy
Refactor tcp_recvmsg() by splitting it into locked and unlocked
portions. Callers already holding the socket lock and not using
ERRQUEUE/cmsg/busy polling can simply call tcp_recvmsg_locked().
This is in preparation for a short-circuit copy performed by
TCP receive zerocopy for sm
On Thu, Dec 3, 2020 at 2:16 AM Krzysztof Kozlowski wrote:
>
> On Wed, Dec 02, 2020 at 08:47:38PM +0900, Bongsu Jeon wrote:
> > From: Bongsu Jeon
> >
> > Since S3FWRN82 NFC Chip, The UART interface can be used.
> > S3FWRN82 supports I2C and UART interface.
> >
> > Signed-off-by: Bongsu Jeon
> > -
On Tue, Dec 1, 2020 at 11:48 AM Jakub Kicinski wrote:
>
> On Fri, 27 Nov 2020 22:36:31 +0900 bongsu.je...@gmail.com wrote:
> > From: Bongsu Jeon
> >
> > implement the NCI 2.x initial sequence to support NCI 2.x NFCC.
> > Since NCI 2.0, CORE_RESET and CORE_INIT sequence have been changed.
> > If N
Hi Steen,
On Wed, Dec 02, 2020 at 02:04:34PM +0100, Steen Hegelund wrote:
> Adding the Sparx5 Serdes driver
>
> This series of patches provides the serdes driver for the Microchip Sparx5
> ethernet switch.
>
> The serdes driver supports the 10G and 25G serdes instances available in the
> Sparx5.
>
On 11/27/20 7:06 PM, Jesper Dangaard Brouer wrote:
The BPF-helpers for FIB lookup (bpf_xdp_fib_lookup and bpf_skb_fib_lookup)
can perform MTU check and return BPF_FIB_LKUP_RET_FRAG_NEEDED. The BPF-prog
don't know the MTU value that caused this rejection.
If the BPF-prog wants to implement PMTU
On Wed, Dec 2, 2020 at 3:19 AM Toke Høiland-Jørgensen wrote:
>
> When we added sanitising of map names before loading programs to libbpf, we
> still allowed periods in the name. While the kernel will accept these for
> the map names themselves, they are not allowed in file names when pinning
> map
From: Bongsu Jeon
implement the NCI 2.x initial sequence to support NCI 2.x NFCC.
Since NCI 2.0, CORE_RESET and CORE_INIT sequence have been changed.
If NFCEE supports NCI 2.x, then NCI 2.x initial sequence will work.
In NCI 1.0, Initial sequence and payloads are as below:
(DH)
On Wed, Dec 2, 2020 at 12:58 PM Alexei Starovoitov
wrote:
>
> On Tue, Dec 01, 2020 at 04:16:12PM -0800, Andrii Nakryiko wrote:
> > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
> > index c3458ec1f30a..60b95b51ccb8 100644
> > --- a/include/uapi/linux/bpf.h
> > +++ b/include/uapi/
On Wed, Dec 2, 2020 at 9:52 AM Stanislav Fomichev wrote:
>
> I've seen a situation, where a process that's under pprof constantly
> generates SIGPROF which prevents program loading indefinitely.
> The right thing to do probably is to disable signals in the upper
> layers while loading, but it stil
From: Arjun Roy
When TCP receive zerocopy does not successfully map the entire
requested space, it outputs a 'hint' that the caller should recvmsg().
Augment zerocopy to accept a user buffer that it tries to copy this
hint into - if it is possible to copy the entire hint, it will do so.
This eli
From: Arjun Roy
This patchset contains several optimizations for TCP Recv. Zerocopy.
v3: Fixes 32-bit compilation, stylistic issues and re-adds signoffs.
Summarized:
1. It is possible that a read payload is not exactly page aligned -
that there may exist "straggler" bytes that we cannot map int
From: Arjun Roy
Set zerocopy hint, event when falling back to copy, so that the
pending data can be efficiently received using zerocopy when
possible.
Signed-off-by: Arjun Roy
Signed-off-by: Eric Dumazet
Signed-off-by: Soheil Hassas Yeganeh
---
net/ipv4/tcp.c | 45 ++
From: Arjun Roy
Refactor tcp_recvmsg() by splitting it into locked and unlocked
portions. Callers already holding the socket lock and not using
ERRQUEUE/cmsg/busy polling can simply call tcp_recvmsg_locked().
This is in preparation for a short-circuit copy performed by
TCP receive zerocopy for sm
From: Arjun Roy
Refactor skb frag fast-forwarding for tcp receive zerocopy. This is
part of a patch set that introduces short-circuited hybrid copies
for small receive operations, which results in roughly 33% fewer
syscalls for small RPC scenarios.
skb_advance_to_frag(), given a skb and an offse
From: Arjun Roy
Refactor frag-is-remappable test for tcp receive zerocopy. This is
part of a patch set that introduces short-circuited hybrid copies
for small receive operations, which results in roughly 33% fewer
syscalls for small RPC scenarios.
Signed-off-by: Arjun Roy
Signed-off-by: Eric Du
From: Arjun Roy
Sometimes, we may call tcp receive zerocopy when inq is 0,
or inq < PAGE_SIZE, in which case we cannot remap pages. In this case,
simply return the appropriate hint for regular copying without taking
mmap_sem.
Signed-off-by: Arjun Roy
Signed-off-by: Eric Dumazet
Signed-off-by:
From: Arjun Roy
Sometimes, we may call tcp receive zerocopy when inq is 0,
or inq < PAGE_SIZE, or inq is generally small enough that
it is cheaper to copy rather than remap pages.
In these cases, we may want to either return early (inq=0) or
attempt to use the provided copy buffer to simply copy
From: Arjun Roy
Zapping pages is required only if we are calling vm_insert_page into a
region where pages had previously been mapped. Receive zerocopy allows
reusing such regions, and hitherto called zap_page_range() before
calling vm_insert_page() in that range.
zap_page_range() can also be tri
On Wed, Dec 2, 2020 at 2:39 AM wrote:
>
> From: Mariusz Dudek
>
> This patch series adds support for separation of eBPF program
> load and xsk socket creation. In for example a Kubernetes
> environment you can have an AF_XDP CNI or daemonset that is
> responsible for launching pods that execute a
Hello:
This series was applied to bpf/bpf-next.git (refs/heads/master):
On Wed, 2 Dec 2020 11:39:21 +0100 you wrote:
> From: Mariusz Dudek
>
> This patch series adds support for separation of eBPF program
> load and xsk socket creation. In for example a Kubernetes
> environment you can have an
On Wed, Dec 2, 2020 at 2:43 PM Andrii Nakryiko
wrote:
>
> On Wed, Dec 2, 2020 at 12:58 PM Alexei Starovoitov
> wrote:
> >
> > On Tue, Dec 01, 2020 at 04:16:12PM -0800, Andrii Nakryiko wrote:
> > > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
> > > index c3458ec1f30a..60b95b51c
On Wed, Dec 2, 2020 at 3:12 PM Alexei Starovoitov
wrote:
>
> On Wed, Dec 2, 2020 at 2:43 PM Andrii Nakryiko
> wrote:
> >
> > On Wed, Dec 2, 2020 at 12:58 PM Alexei Starovoitov
> > wrote:
> > >
> > > On Tue, Dec 01, 2020 at 04:16:12PM -0800, Andrii Nakryiko wrote:
> > > > diff --git a/include/uap
On 11/27/20 7:06 PM, Jesper Dangaard Brouer wrote:
[...]
+static struct net_device *__dev_via_ifindex(struct net_device *dev_curr,
+ u32 ifindex)
+{
+ struct net *netns = dev_net(dev_curr);
+
+ /* Non-redirect use-cases can use ifindex=0 and s
On 11/27/20 7:06 PM, Jesper Dangaard Brouer wrote:
The use-case for dropping the MTU check when TC-BPF does redirect to
ingress, is described by Eyal Birger in email[0]. The summary is the
ability to increase packet size (e.g. with IPv6 headers for NAT64) and
ingress redirect packet and let norma
On 2020-12-02 12:02, drt wrote:
On 2020-11-30 10:19, drt wrote:
On 2020-11-25 15:55, drt wrote:
On 2020-11-25 13:08, Jakub Kicinski wrote:
On Mon, 23 Nov 2020 18:58:41 -0500 Dany Madden wrote:
Currently ibmvnic does not support the "Disable vNIC" command from
the Hardware Management Console.
On 11/27/20 7:06 PM, Jesper Dangaard Brouer wrote:
This change makes it possible to identify SKBs that have been redirected
by TC-BPF (cls_act). This is needed for a number of cases.
(1) For collaborating with driver ifb net_devices.
(2) For avoiding starting generic-XDP prog on TC ingress redir
On 12/2/20 4:31 AM, Preethi Ramachandra wrote:
> Hi David Ahren,
>
> In TCP egress path for ipv6 the device passed to NF_INET_LOCAL_OUT hook
> should be skb_dst(skb)->dev instead of dst->dev.
>
> https://elixir.bootlin.com/linux/latest/source/net/ipv6/ip6_output.c#L202
> struct dst_entry *dst =
On Wed, 2 Dec 2020 14:09:38 -0800
Arjun Roy wrote:
> diff --git a/include/uapi/linux/tcp.h b/include/uapi/linux/tcp.h
> index cfcb10b75483..62db78b9c1a0 100644
> --- a/include/uapi/linux/tcp.h
> +++ b/include/uapi/linux/tcp.h
> @@ -349,5 +349,7 @@ struct tcp_zerocopy_receive {
> __u32 recv
Hello:
This series was applied to bpf/bpf.git (refs/heads/master):
On Tue, 1 Dec 2020 21:56:56 +0800 you wrote:
> V2:
>#2 patch made some changes following magnus' opinions.
>
> V3:
>Regarding the function xskq_cons_present_entries, I think daniel are right,
>I have modified it.
>
201 - 300 of 396 matches
Mail list logo