-Original Message-
From: Giuseppe Cantavenera [mailto:giuseppe.cantaven...@azcom.it]
Sent: Tuesday, July 7, 2015 3:43 PM
To: netdev@vger.kernel.org
Cc: Giuseppe Cantavenera; Steffen Klassert; David S. Miller; Du, Fan; Alexander
Sverdlin; Matija Glavinic Pecotic; Giuseppe Cantavenera;
Hello David
thx to have looked at this. I'll check the code and eventually fix it,
unless you already have a patch to propose.
Kind Regards
Peppe
On 7/13/2015 11:48 AM, David Binderman wrote:
Hello there,
[linux-4.2-rc2/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c:1993]: (style)
From: Eric Dumazet eduma...@google.com
ip6_datagram_connect() is doing a lot of socket changes without
socket being locked.
This looks wrong, at least for udp_lib_rehash() which could corrupt
lists because of concurrent udp_sk(sk)-udp_portaddr_hash accesses.
Signed-off-by: Eric Dumazet
On Wed, Jul 8, 2015 at 9:25 PM, Simon Horman simon.hor...@netronome.com wrote:
This change allows the CPU to see all packets seen by a port when the
netdev associated with the port is in promiscuous mode.
This change was previously posted as part of a larger patch and in turn
patchset which
On Mon, 2015-07-13 at 20:01 +0800, Herbert Xu wrote:
---8---
When we calculate the checksum on the recv path, we store the
result in the skb as an optimisation in case we need the checksum
again down the line.
This is in fact bogus for the MSG_PEEK case as this is done without
any
Eric Dumazet eric.duma...@gmail.com wrote:
From: Eric Dumazet eduma...@google.com
ip6_datagram_connect() is doing a lot of socket changes without
socket being locked.
This looks wrong, at least for udp_lib_rehash() which could corrupt
lists because of concurrent
On Mon, 2015-07-13 at 12:30 -0700, Cong Wang wrote:
Fixes: 25331d6ce42b (net: sched: implement qstat helper routines)
Cc: John Fastabend john.fastab...@gmail.com
Signed-off-by: Cong Wang xiyou.wangc...@gmail.com
Signed-off-by: Cong Wang cw...@twopensource.com
---
net/sched/sch_fq_codel.c |
With the 2 APIs supplied by the VMBus driver, the coming net/hvsock driver
can register 2 callbacks and can know when a new hvsock connection is
offered by the host, and when a hvsock connection is being closed by the
host.
Signed-off-by: Dexuan Cui de...@microsoft.com
---
drivers/hv/Makefile
This will be used by the coming net/hvsock driver.
Signed-off-by: Dexuan Cui de...@microsoft.com
---
drivers/hv/channel.c | 131 ++
drivers/hv/hyperv_vmbus.h | 4 ++
drivers/hv/ring_buffer.c | 14 +
include/linux/hyperv.h| 33
Hyper-V VM sockets (hvsock) supplies a byte-stream based communication
mechanism between the host and a guest. It's kind of TCP over VMBus, but
the transportation layer (VMBus) is much simpler than IP. With Hyper-V VM
Sockets, applications between the host and a guest can talk with each
other
On 07/13/15 at 10:11pm, Cong Wang wrote:
Caused by:
commit 21e4902aea80ef35afc00ee8d2abdea4f519b7f7
Author: Thomas Graf tg...@suug.ch
Date: Fri Jan 2 23:00:22 2015 +0100
netlink: Lockless lookup with RCU grace period in socket release
Defers the release of the socket
On 07/13/15 at 05:39pm, Tom Herbert wrote:
Added rhashtable_lookup_fast_cmpfn which does a lookup in an rhash table
with the compare function being taken from an argument. This allows
different compare functions to be used on the same table.
Signed-off-by: Tom Herbert t...@herbertland.com
On 07/14/2015 12:26 AM, Alexei Starovoitov wrote:
On 7/13/15 1:55 PM, Daniel Borkmann wrote:
On 07/13/2015 10:17 PM, Alexei Starovoitov wrote:
...
We cannot check tc actions from pktgen, since they can be added
dynamically.
So I see three options:
1 get rid of burst hack for both RX and TX in
On 07/14/2015 03:46 AM, Stephen Rothwell wrote:
Hi all,
Today's linux-next merge of the net-next tree got a conflict in:
net/bridge/br_mdb.c
between commit:
f1158b74e54f (bridge: mdb: zero out the local br_ip variable before use)
from Linus' tree and commit:
74fe61f17e99
This will be used by the coming net/hvsock driver.
Signed-off-by: Dexuan Cui de...@microsoft.com
---
include/linux/hyperv.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/include/linux/hyperv.h b/include/linux/hyperv.h
index 307910b3..c52f4cb 100644
--- a/include/linux/hyperv.h
+++
A function to send the type of message is also added.
The coming net/hvsock driver will use this function to proactively request
the host to offer a VMBus channel for a new hvsock connection.
Signed-off-by: Dexuan Cui de...@microsoft.com
---
drivers/hv/channel.c | 15 +++
On 13/07/2015 21:06, Jason Gunthorpe wrote:
On Mon, Jun 22, 2015 at 03:42:40PM +0300, Haggai Eran wrote:
Use ib_cm_id_create_and_listen to create listening IB CM IDs or share
^^^
Is that the wrong name? ib_cm_insert_listen perhaps?
Yes, I missed that. Thanks.
--
On 07/14/2015 07:21 AM, Fengguang Wu wrote:
Sorry please ignore -- this no longer happen in linux-next, so should be fine.
Seen this before, this fixed it back then:
On 07/13/15 at 03:55pm, Joe Stringer wrote:
It doesn't look like flow_free() is using this new function to
properly free the actions. Also, some of the error cases that hit this
code have sf_acts=NULL.
Good catch. Will fix in next iteration.
--
To unsubscribe from this list: send the line
Here is panic message from netconsole. Please let me know if any
additional information required.
Jul 14 13:49:16 10.0.252.10 [76078.867822] BUG: unable to handle kernel
Jul 14 13:49:16 10.0.252.10 NULL pointer dereference
Jul 14 13:49:16 10.0.252.10 at 03f0
Jul 14 13:49:16
Changes since v1:
- updated [V2 6/7] hvsock: introduce Hyper-V VM Sockets feature
- added __init and __exit for the module init/exit functions
- net/hv_sock/Kconfig: default m - default m if HYPERV
- MODULE_LICENSE: Dual MIT/GPL - Dual BSD/GPL
Hyper-V VM Sockets (hvsock)
A helper function is also added.
Signed-off-by: Dexuan Cui de...@microsoft.com
---
include/linux/hyperv.h | 7 +++
1 file changed, 7 insertions(+)
diff --git a/include/linux/hyperv.h b/include/linux/hyperv.h
index 30d3a1f..aa21814 100644
--- a/include/linux/hyperv.h
+++
On 13/07/2015 20:48, Jason Gunthorpe wrote:
On Mon, Jun 22, 2015 at 03:42:34PM +0300, Haggai Eran wrote:
spin_lock_irq(cm.lock);
+if (--cm_id_priv-listen_sharecount 0) {
+/* The id is still shared. */
+
Thomas Graf tg...@suug.ch wrote:
On 07/13/15 at 10:11pm, Cong Wang wrote:
Caused by:
commit 21e4902aea80ef35afc00ee8d2abdea4f519b7f7
Author: Thomas Graf tg...@suug.ch
Date: Fri Jan 2 23:00:22 2015 +0100
netlink: Lockless lookup with RCU grace period in socket release
Rename all references to axattach to kissattach.
Axattach has been renamed early to kissattach early in the history of
the ax25-utils package which itself has been superseeded by libax25,
ax25-tools and ax25-apps but stale references have remained.
Signed-off-by: Ralf Baechle r...@linux-mips.org
-Original Message-
From: Christophe JAILLET [mailto:christophe.jail...@wanadoo.fr]
Sent: Tuesday, July 14, 2015 1:22 AM
To: Shahed Shaikh; Dept-GE Linux NIC Dev
Cc: netdev; linux-kernel; kernel-janit...@vger.kernel.org; Christophe JAILLET
Subject: [PATCH] net: qlcnic: Deletion of
From e945737ef2e3a5b7198b9795d6375de85b2fac08 Mon Sep 17 00:00:00 2001
From: Rahul Jain rahul.j...@samsung.com
Date: Tue, 14 Jul 2015 14:04:09 +0530
Subject: [PATCH] cfg80211-wext: deleting dead code
In func cfg80211_wext_siwretry(), the value of changed is getting
modified to non-zero value
The problem I'm trying to solve is that when packets being sent from one
bridged interface to the other are brouted they get dropped by the IP layer.
The reason is that the packet being raised has pkt_type of type
PACKET_OTHERHOST.
The semantics of brouting a packet is that it is sent up to
Yigal Reiss (yreiss) yre...@cisco.com wrote:
The problem I'm trying to solve is that when packets being sent from one
bridged interface to the other are brouted they get dropped by the IP
layer. The reason is that the packet being raised has pkt_type of type
PACKET_OTHERHOST.
No, thats not
In the SMP guest case, when the per-channel callback hvsock_events() is
running on virtual CPU A, if the guest tries to close the connection on
virtual CPU B: we invoke vmbus_close() - vmbus_close_internal(),
then we can have trouble: on B, vmbus_close_internal() will send IPI
reset_channel_cb()
Tom Herbert t...@herbertland.com wrote:
The obj_orderfn function may be specified in the parameters for a
rhashtable. When inserting an element this function is used to order
objects in a bucket list (greatest to least ordering value).This
allows entries to have wild card fields, where entries
Kernel generates a lot of warnings when dst entry reference counter
overflows and becomes negative. This patch prints address of dst entry,
its refcount and then resets reference counter to INT_MAX/2.
That bug was seen several times at machines with outdated 3.10.y kernels.
Most like it's already
Yigal Reiss (yreiss) yre...@cisco.com wrote:
Florian Westphal [mailto:f...@strlen.de] wrote:
Maybe, but if you broute everything you might as well just remove the
bridge...
I want to be selective. My setup is a home router. So I can have ebtables
rules for
which traffic to (b)route and
Hello.
On 7/14/2015 3:22 PM, Denys Vlasenko wrote:
With CONFIG_IWLWIFI_DEVICE_TRACING=y, these functions are rather large,
too big for inlining.
With this .config: http://busybox.net/~vda/kernel_config,
after uninlining these functions have sizes and callsite counts
as follows:
On Tue, Jul 14, 2015 at 2:38 PM, Sergei Shtylyov
sergei.shtyl...@cogentembedded.com wrote:
+#define IWL_READ_WRITE(static_inline) \
+static_inline void iwl_write8(struct iwl_trans *trans, u32 ofs, u8 val) \
+{ \
+ trace_iwlwifi_dev_iowrite8(trans-dev, ofs, val); \
+
Florian Westphal [mailto:f...@strlen.de] wrote:
Maybe, but if you broute everything you might as well just remove the
bridge...
I want to be selective. My setup is a home router. So I can have ebtables rules
for
which traffic to (b)route and which to bridge, based on security/performance
On Tue, 2015-07-14 at 14:43 +0300, Konstantin Khlebnikov wrote:
Kernel generates a lot of warnings when dst entry reference counter
overflows and becomes negative. This patch prints address of dst entry,
its refcount and then resets reference counter to INT_MAX/2.
That bug was seen several
On 07/14/2015 01:57 PM, Jamal Hadi Salim wrote:
On 07/14/15 06:29, Daniel Borkmann wrote:
On 07/14/2015 12:26 AM, Alexei Starovoitov wrote:
On 7/13/15 1:55 PM, Daniel Borkmann wrote:
On 07/13/2015 10:17 PM, Alexei Starovoitov wrote:
...
We cannot check tc actions from pktgen, since they can
With CONFIG_IWLWIFI_DEVICE_TRACING=y, these functions are rather large,
too big for inlining.
With this .config: http://busybox.net/~vda/kernel_config,
after uninlining these functions have sizes and callsite counts
as follows:
iwl_read32 475 bytes, 51 callsites
iwl_write32 477 bytes, 90
Currently nf_conntrack_proto_sctp module handles only packets between
primary addresses used to establish the connection. Any packets between
secondary addresses are classified as invalid so that usual firewall
configurations drop them. Allowing HEARTBEAT and HEARTBEAT-ACK chunks to
establish a
From: Ursula Braun ursula.br...@de.ibm.com
Eric,
this is V2 of my SMC-R patches, containing especially a new version of the
required tcp changes. As you suggested, SMC-specific hooks in the TCP-code
are built only for CONFIG_AFSMC. And I come up with helpers in include files
to avoid spreading
From: Ursula Braun ursula.br...@de.ibm.com
The SMC-R protocol defines dynamic discovery of peers. This is done by
implementing experimental TCP options as defined in RFC6994. The TCP code
needs to be extended to support RFC6994.
Setting the TCP experimental option for SMC-R [2] will be triggered
From: Ursula Braun ursula.br...@de.ibm.com
The new socket family is assigned the next available address / protocol
family constant 41.
Implementing SO_KEEPALIVE for SMC-R requires an extra hook in net/core/sock.c.
Signed-off-by: Ursula Braun ursula.br...@de.ibm.com
---
include/linux/socket.h |
Hello.
On 7/14/2015 1:37 AM, Tilman Schmidt wrote:
Commit 79901317ce80 (n_tty: Don't flush buffer when closing ldisc),
first merged in kernel release 3.10, caused the following regression
in the Gigaset M101 driver:
Before that commit, when closing the N_TTY line discipline in
preparation
On Tue, 2015-07-14 at 08:20 -0500, Larry Finger wrote:
On 07/13/2015 05:11 PM, Bastien Nocera wrote:
http://thread.gmane.org/gmane.linux.kernel.wireless.general/127706/
focu
s=127896
Signed-off-by: Bastien Nocera had...@hadess.net
Bastien,
The subject of this patch needs a bit
Florian Westphal f...@strlen.de wrote:
Yigal Reiss (yreiss) yre...@cisco.com wrote:
The problem I'm trying to solve is that when packets being sent from
one bridged interface to the other are brouted they get dropped by the
IP layer. The reason is that the packet being raised has pkt_type of
Yigal Reiss (yreiss) yre...@cisco.com wrote:
No, thats not the problem you're trying to solve.
If you want to move OTHERHOST skbs, don't (b)route them?
Whats the real issue that you're trying to solve?
I want to (b)route them because I want to be able to inspect the packets in
On 07/14/15 06:29, Daniel Borkmann wrote:
On 07/14/2015 12:26 AM, Alexei Starovoitov wrote:
On 7/13/15 1:55 PM, Daniel Borkmann wrote:
On 07/13/2015 10:17 PM, Alexei Starovoitov wrote:
...
We cannot check tc actions from pktgen, since they can be added
dynamically.
So I see three options:
1
Hi,
Tom Herbert wrote:
I am testing this patch which may be a little simpler. Also idev needs
to be checked after __in6_dev_get
We have to select source address on *given* interface for link-local/
multicast destinations.
Tom
diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c
index
On 14.07.2015 15:04, Eric Dumazet wrote:
On Tue, 2015-07-14 at 14:43 +0300, Konstantin Khlebnikov wrote:
Kernel generates a lot of warnings when dst entry reference counter
overflows and becomes negative. This patch prints address of dst entry,
its refcount and then resets reference counter to
On Tue, 2015-07-14 at 15:15 +0300, Konstantin Khlebnikov wrote:
Simple warn-once will hide a lot of information which could be useful.
Also dst entry leak is better than freeing actually active entry.
Then BUG_ON() .
Really, we need to fix leaks, not brown paper them.
--
To unsubscribe
On 07/13/2015 05:11 PM, Bastien Nocera wrote:
http://thread.gmane.org/gmane.linux.kernel.wireless.general/127706/focu
s=127896
Signed-off-by: Bastien Nocera had...@hadess.net
Bastien,
The subject of this patch needs a bit more detail. I know that you mean the
RTL8723B versions of the
On 09/07/2015 00:34, Jason Gunthorpe wrote:
On Wed, Jul 08, 2015 at 02:29:10PM -0600, Jason Gunthorpe wrote:
On Mon, Jun 22, 2015 at 03:42:30PM +0300, Haggai Eran wrote:
An ib_client callback that is called with the lists_rwsem locked only for
read is protected from changes to the IB client
Hi Bastien,
http://thread.gmane.org/gmane.linux.kernel.wireless.general/127706/focu
s=127896
Signed-off-by: Bastien Nocera had...@hadess.net
---
net/rfkill/rfkill-gpio.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/net/rfkill/rfkill-gpio.c b/net/rfkill/rfkill-gpio.c
index
2015-07-13 15:03 GMT+02:00 Austin S Hemmelgarn ahferro...@gmail.com:
How about FIN/ACK and FIN/PSH/URG?
Silent:
root@debian64:~# hping3 192.168.0.2 -p 32 -FA
HPING 192.168.0.2 (eth0 192.168.0.2): AF set, 40 headers + 0 data bytes
^C
--- 192.168.0.2 hping statistic ---
3 packets transmitted, 0
On Tue, Jul 14, 2015 at 5:44 AM, YOSHIFUJI Hideaki/吉藤英明
hideaki.yoshif...@miraclelinux.com wrote:
Hi,
Tom Herbert wrote:
I am testing this patch which may be a little simpler. Also idev needs
to be checked after __in6_dev_get
We have to select source address on *given* interface for
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
This patch introduces the proto_down flag that can be used by user space
applications to notify switch drivers that errors have been detected on the
device.
The switch driver can react to protodown notification by doing a phys down
on the
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
User space daemons can detect errors in the network that need to be
notified to the switch device drivers.
Drivers can react to this error state by doing a phy-down on the
switch-port which would result in a carrier-off locally and on the
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
Signed-off-by: Anuradha Karuppiah anurad...@cumulusnetworks.com
Signed-off-by: Andy Gospodarek go...@cumulusnetworks.com
Signed-off-by: Roopa Prabhu ro...@cumulusnetworks.com
Signed-off-by: Wilson Kok w...@cumulusnetworks.com
---
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
This patch adds support to set and display protodown on a switch port. The
switch driver can handle this error state by doing a phys down on the port.
One example user space application setting this flag is a multi-chassis
LAG application to
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
protodown can be set by user space applications like MLAG on detecting
errors on a switch port. This patch provides sample switch driver changes
for handling protodown. Rocker PHYS disables the port in response to
protodown.
Signed-off-by:
This patch adds support for a new method of signalling the firmware
that TSO packets are being sent. The new method removes the need to
alter the ip and tcp checksums and allows TSO6 support.
Signed-off-by: Thomas Falcon tlfal...@linux.vnet.ibm.com
---
drivers/net/ethernet/ibm/ibmveth.c | 145
On Tue, Jul 14, 2015 at 02:23:11PM +0200, Michal Kubecek wrote:
@@ -658,6 +696,18 @@ static struct ctl_table sctp_sysctl_table[] = {
.mode = 0644,
.proc_handler = proc_dointvec_jiffies,
},
+ {
+ .procname =
On Tue, Jul 14, 2015 at 2:44 AM, Thomas Graf tg...@suug.ch wrote:
On 07/13/15 at 05:39pm, Tom Herbert wrote:
Added rhashtable_lookup_fast_cmpfn which does a lookup in an rhash table
with the compare function being taken from an argument. This allows
different compare functions to be used on
On 7/14/15 3:29 AM, Daniel Borkmann wrote:
One other thing that comes to mind, not sure if it's worth it though,
would be to split the skb-tc_verd's TC_NCLS itself into TC_NCLS/TC_NACT,
so that you can go into the classifier, but skip the action part.
Since in tcf_action_exec(), we already test
Inet6addr notifier is atomic and runs in bh context without RTNL when
ipv6 receives router advertisement packet and performs autoconfiguration.
Proper fix still in discussion. Let's at least plug the bug.
v1: http://lkml.kernel.org/r/20150514135618.14062.1969.stgit@buzz
v2:
From: WANG Cong xiyou.wangc...@gmail.com
In tx path rcu_read_lock_bh() is held, so we need rcu_deference_bh().
This fixes the following warning:
===
[ INFO: suspicious RCU usage. ]
4.1.0-rc1+ #1007 Not tainted
---
v1: http://comments.gmane.org/gmane.linux.network/363346
v2: http://comments.gmane.org/gmane.linux.network/369086
v3 has reduced set of patches from ipvlan: fix ipv6 autoconfiguration.
Here just cleanups and patch which ignores ipv6 notifications from RA.
---
Konstantin Khlebnikov (4):
Add missing kfree_rcu(addr, rcu);
Signed-off-by: Konstantin Khlebnikov khlebni...@yandex-team.ru
---
drivers/net/ipvlan/ipvlan_main.c |1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/net/ipvlan/ipvlan_main.c b/drivers/net/ipvlan/ipvlan_main.c
index 048ecf0c76fb..7d81e37c3f76 100644
They are unused after commit f631c44bbe15 (ipvlan: Always set broadcast bit in
multicast filter).
Signed-off-by: Konstantin Khlebnikov khlebni...@yandex-team.ru
---
drivers/net/ipvlan/ipvlan.h |2 --
drivers/net/ipvlan/ipvlan_main.c | 33 -
2 files
All structures used in traffic forwarding are rcu-protected:
ipvl_addr, ipvl_dev and ipvl_port. Thus we can unhash addresses
without synchronization. We'll anyway hash it back into the same
bucket: in worst case lockless lookup will scan hash once again.
Signed-off-by: Konstantin Khlebnikov
On 7/12/15, 3:06 PM, Daniel Borkmann wrote:
Similarly as in commit 4f7d2cdfdde7 (rtnetlink: verify IFLA_VF_INFO
attributes before passing them to driver), we have a double nesting
of netlink attributes, i.e. IFLA_VF_PORTS only contains IFLA_VF_PORT
that is nested itself. While IFLA_VF_PORTS is a
On 13.07.2015 06:57, Eric Dumazet wrote:
On Sun, 2015-07-12 at 21:15 +0200, Oliver Hartkopp wrote:
E.g. with
skb_set_hash(skb, dev-ifindex, PKT_HASH_TYPE_L2);
and
echo f /sys/class/net/can0/queues/rx-0/rps_cpus
I get properly ordered CAN frames - even with netif_rx()
Hello.
Currently the link status auto-negotiation is enabled
for any SGMII link with fixed-link DT binding.
The regression was reported:
https://lkml.org/lkml/2015/7/8/865
Apparently not all HW that implements SGMII protocol, generates the
inband status for the auto-negotiation to work.
More
SCTP has this operation to peel off associations from a given socket and
create a new socket using this association. We currently have two ways
to use this operation:
- via getsockopt(), on which it will also create and return a file
descriptor for this new socket
- via sctp_do_peeloff(), which
This patch reverts 2f2d76cc3e93 (dlm: Do not allocate a fd for
peeloff) but also makes use of a new sockopt:
SCTP_SOCKOPT_PEELOFF_KERNEL, which avoids allocating file descriptors
while doing this operation.
By this we avoid creating a direct dependency from dlm to sctp module,
which can then be
Hello.
On 07/14/2015 06:32 PM, anurad...@cumulusnetworks.com wrote:
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
protodown can be set by user space applications like MLAG on detecting
errors on a switch port. This patch provides sample switch driver changes
for handling protodown.
On Tue, Jul 14, 2015 at 2:57 AM, Herbert Xu herb...@gondor.apana.org.au wrote:
Tom Herbert t...@herbertland.com wrote:
The obj_orderfn function may be specified in the parameters for a
rhashtable. When inserting an element this function is used to order
objects in a bucket list (greatest to
Currently fixed_phy driver recognizes only the link-up state.
This simple patch adds an implementation of link-down state.
It fixes the status registers when link is down, and also allows
to register the fixed-phy with link down without specifying the speed.
Signed-off-by: Stas Sergeev
The commit 898b2970e2c9 (mvneta: implement SGMII-based in-band link state
signaling) implemented the link parameters auto-negotiation unconditionally.
Unfortunately it appears that some HW that implements SGMII protocol,
doesn't generate the inband status, so it is not possible to auto-negotiate
On Tue, Jul 14, 2015 at 05:38:47PM +0200, Pablo Neira Ayuso wrote:
On Tue, Jul 14, 2015 at 02:23:11PM +0200, Michal Kubecek wrote:
@@ -658,6 +696,18 @@ static struct ctl_table sctp_sysctl_table[] = {
.mode = 0644,
.proc_handler = proc_dointvec_jiffies,
On Tue, Jul 14, 2015 at 03:42:03PM +0200, Florian Westphal wrote:
Michal Kubecek mkube...@suse.cz wrote:
+ case SCTP_CID_HEARTBEAT:
+ pr_debug(SCTP_CID_HEARTBEAT);
+ i = 9;
+ break;
+ case SCTP_CID_HEARTBEAT_ACK:
+
Currently the PHY management type is selected by the MAC driver arbitrary.
The decision is based on the presence of the fixed-link node and on a
will of the driver's authors.
This caused a regression recently, when mvneta driver suddenly started
to use the in-band status for auto-negotiation on
Hi,
I'm trying to remove a direct dependency of dlm module on sctp one.
Currently dlm code is calling sctp_do_peeloff() directly and this call
only is causing the load of sctp module together with dlm. For that, we
have basically 3 options:
- Doing a module split on dlm
- which I'm avoiding
The -drop() is supposed to return the number of bytes it dropped,
however fq_codel_drop() returns the index of the flow where it drops
a packet from.
Fix this by introducing a helper to wrap fq_codel_drop().
Cc: Eric Dumazet eduma...@google.com
Signed-off-by: Cong Wang xiyou.wangc...@gmail.com
Fixes: 25331d6ce42b (net: sched: implement qstat helper routines)
Cc: John Fastabend john.fastab...@gmail.com
Signed-off-by: Cong Wang xiyou.wangc...@gmail.com
Signed-off-by: Cong Wang cw...@twopensource.com
---
net/sched/sch_sfq.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
On 14/07/15 10:11, Stas Sergeev wrote:
Currently fixed_phy driver recognizes only the link-up state.
This simple patch adds an implementation of link-down state.
It fixes the status registers when link is down, and also allows
to register the fixed-phy with link down without specifying the
First, dma_sync_single_for_cpu() shouldn't have been called in the first place
(it's a streaming DMA API). dma_unmap_single() should have been called instead.
Second, dma_unmap_single() call after handing the buffer to napi_gro_receive()
makes little sense.
Signed-off-by: Sergei Shtylyov
On 07/15/15 at 12:35am, mr...@linux.ee wrote:
Yes, this fixes the error, thank you.
The new problem with the test - soft lockup - CPU#0 stuck for 22s! is
still there on 360 MHz UltraSparc IIi. I understand it is harmless but
is there some easy way to make the test avoid NMI watchdog?
[
This is a multi-part message in MIME format.
--mine-boundary-string
Content-Type: text/plain; charset=UTF-8; format=fixed
Content-Transfer-Encoding: 8bit
Serialize some operations from open close function especial when write
read from main structure(struct rtl8169_private).Ensure
14.07.2015 20:51, Florian Fainelli пишет:
On 14/07/15 10:13, Stas Sergeev wrote:
Currently the PHY management type is selected by the MAC driver arbitrary.
The decision is based on the presence of the fixed-link node and on a
will of the driver's authors.
This caused a regression recently, when
On Tue, Jul 14, 2015 at 9:42 AM, Sergei Shtylyov
sergei.shtyl...@cogentembedded.com wrote:
Hello.
On 07/14/2015 06:32 PM, anurad...@cumulusnetworks.com wrote:
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
protodown can be set by user space applications like MLAG on detecting
On Thu, Jun 11, 2015 at 06:02:56PM -0700, Luis R. Rodriguez wrote:
On Thu, May 28, 2015 at 5:48 PM, Luis R. Rodriguez mcg...@suse.com wrote:
On Tue, May 19, 2015 at 1:22 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
This v2 just changes licence to license as requested by Arend.
We are currently issuing multiple PHY resets during a suspend/resume,
first during bcmgenet_power_up() which does a hardware reset, then a
software reset by calling bcmgenet_mii_reset(). This is both unnecessary
and can take as long as 10ms per MDIO transactions while we re-apply
workarounds
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
protodown can be set by user space applications like MLAG on detecting
errors on a switch port. This patch provides sample switch driver changes
for handling protodown. Rocker PHYS disables the port in response to
protodown.
Signed-off-by:
From: Anuradha Karuppiah anurad...@cumulusnetworks.com
This patch introduces the proto_down flag that can be used by user space
applications to notify switch drivers that errors have been detected on the
device.
The switch driver can react to protodown notification by doing a phys down
on the
On Mon, Jul 13, 2015 at 10:17:24AM +, Yuval Mintz wrote:
The new FW will allow us to utilize some new features in our driver,
mainly adding vlan filtering offload and vxlan offload support.
In addition, this fixes several issues:
1. Packets from a VF with pvid configured
If rhashtable_walk_next detects a resize operation in progress, it jumps
to the new table and continues walking that one. But it misses to drop
the reference to it's current item, leading it to continue traversing
the new table's bucket in which the current item is sorted into, and
after
prog-bpf_ops is populated when act_bpf is used with classic BPF and
prog-bpf_name is optionally used with extended BPF.
Fix memory leak when act_bpf is released.
Fixes: d23b8ad8ab23 (tc: add BPF based action)
Fixes: a8cb5f556b56 (act_bpf: add initial eBPF support for actions)
Acked-by: Daniel
Please do not post patches as attachments.
Instead, inline them as unmolested ASCII text in the main message
body along with your commit message.
From Documentation/email-clients.txt:
General Preferences
1 - 100 of 154 matches
Mail list logo