On Tue, Apr 25, 2017 at 10:48:22AM -0400, David Miller wrote:
> From: Florian Westphal
> Date: Tue, 25 Apr 2017 16:17:49 +0200
>
> > I'd have less of an issue with this if we'd be talking about
> > something computationally expensive, but this is about storing
> > an extra value
(Cc'ing netdev and IPSec maintainers)
On Tue, Apr 25, 2017 at 6:08 PM, Don Bowman wrote:
> I'm not sure how to describe this.
>
> 4.11rc2 worked, after that, no.
>
> My ipsec tunnel comes up ok. ICMP works. UDP works. But TCP, the
> sender [which is the ipsec client] does not
On Wed, Apr 26, 2017 at 5:06 PM, Florian Fainelli wrote:
> On 04/26/2017 04:38 PM, Iyappan Subramanian wrote:
>> From: Quan Nguyen
>>
>> This patch adds lock to protect indirect mac access sequence.
>>
>> Signed-off-by: Quan Nguyen
>>
From: Eric Dumazet
I wrongly assumed tp->tcp_mstamp was up to date at the time
tcp_rack_reo_timeout() was called.
It is not true, since we only update tcp->tcp_mstamp when receiving
a packet (as initially done in commit 69e996c58a35 ("tcp: add
tp->tcp_mstamp field")
Hi Miroslav,
[auto build test ERROR on net-next/master]
url:
https://github.com/0day-ci/linux/commits/Miroslav-Lichvar/Extend-socket-timestamping-API/20170427-093243
config: xtensa-allmodconfig (attached as .config)
compiler: xtensa-linux-gcc (GCC) 4.9.0
reproduce:
wget
On Tue, Apr 25, 2017 at 12:20:54PM -0600, Logan Gunthorpe wrote:
> Very straightforward conversion to the new function in the caam driver
> and shash library.
>
> Signed-off-by: Logan Gunthorpe
> Cc: Herbert Xu
> Cc: "David S. Miller"
On Wed, 2017-04-26 at 07:58 -0700, David Ahern wrote:
> Moving the loopback into a VRF breaks networking for the default VRF.
> Since the VRF device is the loopback for VRF domains, there is no
> reason to move the loopback. Given the repercussions, block attempts
> to set lo into a VRF.
>
>
From: lipeng
There is KASAN warning which turn out it's a skb used after free:
BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940...
[17659.112635] alloc_debug_processing+0x18c/0x1a0
[17659.117208] __slab_alloc+0x52c/0x560
From: lipeng
The first two patches [1/3] [2/3] of this serie add support defered
dsaf probe when mdio and mbigen module is not insmod. The third
patch [3/3] fixes a bug that skb still be used after freed, which will
cuase panic.
For more details, please refer to individual
From: lipeng
In the hip06 and hip07 SoCs, phy connect to mdio bus.The mdio
module is probed with module_init, and, as such,
is not guaranteed to probe before the HNS driver. So we need
to support deferred probe.
We check for probe deferral in the mac init, so we not init
From: lipeng
In the hip06 and hip07 SoCs, the interrupt lines from the
DSAF controllers are connected to mbigen hw module.
The mbigen module is probed with module_init, and, as such,
is not guaranteed to probe before the HNS driver. So we need
to support deferred probe.
From: Alexei Starovoitov
Date: Wed, 26 Apr 2017 16:49:35 -0700
> It's only needed for test_pkt_access.c test,
> since it's being fancy and doing iph->ihl * 4.
It is going to be a common idiom in anything looking at
transport headers, no?
> Also such tcp->urg_ptr access into packed
On 2017/4/26 22:03, Matthias Brugger wrote:
On 26/04/17 09:00, Yankejian wrote:
From: lipeng
In the hip06 and hip07 SoCs, the interrupt lines from the
DSAF controllers are connected to mbigen hw module.
The mbigen module is probed with module_init, and, as such,
is
On Wed, Apr 26, 2017 at 4:53 PM, Alexei Starovoitov
wrote:
> On Wed, Apr 26, 2017 at 09:09:23AM -0700, Eric Dumazet wrote:
>> From: Eric Dumazet
>>
>> While testing a fix [1] in ___pskb_trim(), addressing the WARN_ON_ONCE()
>> in
From: Eric Dumazet
Andrey found a way to trigger the WARN_ON_ONCE(delta < len) in
skb_try_coalesce() using syzkaller and a filter attached to a TCP
socket over loopback interface.
I believe one issue with looped skbs is that tcp_trim_head() can end up
producing skb with
On 04/26/2017 04:38 PM, Iyappan Subramanian wrote:
> From: Quan Nguyen
>
> This patch adds lock to protect indirect mac access sequence.
>
> Signed-off-by: Quan Nguyen
> Signed-off-by: Iyappan Subramanian
> ---
>
> diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
> index 81ef53f..42bff22 100644
> --- a/include/linux/skbuff.h
> +++ b/include/linux/skbuff.h
> @@ -3300,8 +3300,7 @@ void skb_tstamp_tx(struct sk_buff *orig_skb,
>
> static inline void sw_tx_timestamp(struct sk_buff *skb)
> {
> -
This fixes a race where vmbus callback for new packet arriving
could occur before NAPI is initialized. Happens more on WS2008
which takes longer to setup channel.
Signed-off-by: Stephen Hemminger
---
drivers/net/hyperv/netvsc.c | 8 +---
On 4/26/17 7:55 AM, David Miller wrote:
From: Daniel Borkmann
Date: Wed, 26 Apr 2017 10:14:42 +0200
On 04/26/2017 05:42 AM, Alexei Starovoitov wrote:
That sucks for sparc, of course. I don't have good suggestions for
workaround other than marking tcphdr as packed :(
Hi Donatas,
[auto build test ERROR on net-next/master]
url:
https://github.com/0day-ci/linux/commits/Donatas-Abraitis/net-ipv6-make-sure-multicast-packets-are-not-forwarded-beyond-the-different-scopes/20170426-180846
config: x86_64-rhel (attached as .config)
compiler: gcc-6 (Debian 6.2.0-3
From: Chenbo Feng
The description inside uapi/linux/bpf.h about bpf_get_socket_uid
helper function is no longer valid. It returns overflowuid rather
than 0 when failed.
Signed-off-by: Chenbo Feng
---
include/uapi/linux/bpf.h | 3 +--
1 file changed, 1
To overcome bugs as described and fixed in 89087c456fb5 ("bpf: Fix
values type used in test_maps"), provide a generic BPF_DECLARE_PERCPU()
and bpf_percpu() accessor macro for all percpu map values used in
tests.
Declaring variables works as follows (also works for structs):
For both cases, the verifier is already rejecting such invalid
formed instructions. Thus, remove these artifacts from old times
and align it with ppc64, sparc64 and s390x JITs that don't have
them in the first place.
Signed-off-by: Daniel Borkmann
Acked-by: Alexei
From: Hannes Frederic Sowa
Hannes rightfully spotted that the bpf_lock doesn't need to be
irqsave variant. We never perform any such updates where this
would be necessary (neither right now nor in future), therefore
relax this further.
Signed-off-by: Hannes Frederic
Dave reported that on sparc test_progs generates buggy swapped
eth->h_proto protocol comparisons:
10: (15) if r3 == 0xdd86 goto pc+9
R0=imm2,min_value=2,max_value=2 R1=pkt(id=0,off=0,r=14) R2=pkt_end R3=inv
R4=pkt(id=0,off=14,r=14) R5=inv56 R10=fp
This is due to the unconditional ...
Add several test cases around ldimm64, fp arithmetic and direct
packet access.
Signed-off-by: Daniel Borkmann
Acked-by: Alexei Starovoitov
---
tools/testing/selftests/bpf/test_verifier.c | 137
1 file changed, 137
This set cleans up ldimm64 leftovers from early eBPF days and
adds couple of test cases related to this to the verifier test
suite. It also cleans up the kallsyms spinlock (had same patch
also in queue) by relaxing it through switching to _bh variant.
It fixes up test_progs in relation to
From: Quan Nguyen
This patch adds workaround for HW errata 10GE_4:
"XGENET_ICM_ECM_DROP_COUNT_REG_0 reg not clear on read".
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
drivers/net/ethernet/apm/xgene/xgene_enet_hw.c
From: Quan Nguyen
This patch adds workaround for HW errata 10GE_10 and ENET_15:
"HW statistic counters value are duplicated".
- RFCS duplicates RALN counter
- RFLR duplicates RUND counter
- TFCS duplicates TFRG counter
- RALN should be intepreted as 0 in 10G mode
From: Quan Nguyen
This patch adds rx_overrun and tx_underrun ethtool statistic counters.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c | 16 +---
From: Quan Nguyen
This patch adds extended ethtool statistics support.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
.../net/ethernet/apm/xgene/xgene_enet_ethtool.c| 90 +-
From: Quan Nguyen
This patch adds statistic counter for frames recovered from HW errata
10GE_8 and ENET_11:
"HW reports Length error for valid 64 byte frames with len <46 bytes".
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
From: Quan Nguyen
This patch fixes the tx error counters and adds more rx error counters.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
drivers/net/ethernet/apm/xgene/xgene_enet_hw.c | 6 --
From: Quan Nguyen
This patch adds lock to protect indirect mac access sequence.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
drivers/net/ethernet/apm/xgene/xgene_enet_hw.c| 2 ++
From: Quan Nguyen
Commit 5944701df90d ("net: remove useless memset's in drivers get_stats64")
makes the pdata->stats redundant. This patch removes pdata->stats and
updates get_stats64() callback accordingly.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan
From: Quan Nguyen
This patch cleans up unused macros to improve readability.
Signed-off-by: Quan Nguyen
Signed-off-by: Iyappan Subramanian
---
drivers/net/ethernet/apm/xgene/xgene_enet_hw.h | 6 --
1 file changed, 6 deletions(-)
This patch set,
- adds ethtool extended statistics support
- addresses errata workarounds
- fixes bugs related to statistics
Signed-off-by: Iyappan Subramanian
Signed-off-by: Quan Nguyen
---
Quan Nguyen (9):
drivers: net: xgene: Protect indirect MAC
> diff --git a/net/core/dev.c b/net/core/dev.c
> index 1b3317c..0a78f7f 100644
> --- a/net/core/dev.c
> +++ b/net/core/dev.c
> @@ -160,6 +160,7 @@ static int netif_rx_internal(struct sk_buff *skb);
> static int call_netdevice_notifiers_info(unsigned long val,
>
On 26/04/17 02:59 AM, wrote:
> Good to know that somebody is working on this. Those problems troubled
> us as well.
Thanks Christian. It's a daunting problem and a there's a lot of work to
do before we will ever be where we need to be so any help, even an ack,
is greatly appreciated.
Logan
On Tue, 2017-04-25 at 10:15 -0700, Eric Dumazet wrote:
> We can use tp->tcp_mstamp as it contains a recent timestamp.
>
> @@ -165,12 +164,10 @@ void tcp_rack_advance(struct tcp_sock *tp, u8 sacked,
> u32 end_seq,
> void tcp_rack_reo_timeout(struct sock *sk)
> {
> struct tcp_sock *tp =
Hi Johan,
On Thu, Mar 30, 2017 at 12:15:34PM +0200, Johan Hovold wrote:
> This started out with the observation that the nfcmrvl_uart driver
> unconditionally dereferenced the tty class device despite the fact that
> not every tty has an associated struct device (Unix98 ptys). Some
> further
On Tue, 2017-04-25 at 14:39 -0500, Bjorn Helgaas wrote:
> On Mon, Apr 24, 2017 at 04:35:07PM +0200, Christoph Hellwig wrote:
> > On Mon, Apr 24, 2017 at 02:16:31PM +, Byczkowski, Jakub wrote:
> > > Tested-by: Jakub Byczkowski
> >
> > Are you (and Doug) ok with
On Thu, 2017-04-13 at 16:53 +0200, Christoph Hellwig wrote:
> Signed-off-by: Christoph Hellwig
> ---
> drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 16 ++--
> 1 file changed, 2 insertions(+), 14 deletions(-)
Acked-by: Jeff Kirsher
Sorry
The TX status trigger of the wlan interface is named phy0tx, so this
updates the default-trigger for the WLAN LED to use that instead.
Signed-off-by: Bjorn Andersson
---
Note that without patch 1/2 this trigger does not fire - but there's also no
harm in picking the
As the tx skbs are collected they should be passed to
ieee80211_tx_status() rather than ieee80211_free_txskb(), as the prior
will take care of monitoring and LED triggers while the latter will
consider the skb dropped.
Signed-off-by: Bjorn Andersson
---
On 04/26/2017 08:24 PM, Hannes Frederic Sowa wrote:
Signed-off-by: Hannes Frederic Sowa
---
include/uapi/linux/bpf.h | 32 +++-
kernel/bpf/core.c| 30 +-
2 files changed, 48 insertions(+), 14
On Wed, Apr 26, 2017 at 08:24:19PM +0200, Hannes Frederic Sowa wrote:
>
> +static const char *bpf_type_string(enum bpf_prog_type type)
> +{
> + static const char *bpf_type_names[] = {
> +#define X(type) #type
> + BPF_PROG_TYPES
> +#undef X
> + };
> +
> + if (type >=
On Wed, Apr 26, 2017 at 08:24:17PM +0200, Hannes Frederic Sowa wrote:
> Signed-off-by: Hannes Frederic Sowa
> ---
> include/linux/filter.h | 6 --
> kernel/bpf/core.c | 4 +++-
> kernel/bpf/syscall.c | 7 ---
> kernel/bpf/verifier.c | 4 ++--
>
On 04/26/2017 08:24 PM, Hannes Frederic Sowa wrote:
Signed-off-by: Hannes Frederic Sowa
Ahh, looks this got swapped with 3/6.
---
include/linux/filter.h | 6 --
kernel/bpf/core.c | 4 +++-
kernel/bpf/syscall.c | 7 ---
kernel/bpf/verifier.c |
On Wed, Apr 26, 2017 at 10:58:45AM -0700, Alexei Starovoitov wrote:
> On 4/26/17 9:35 AM, John Fastabend wrote:
> >
> > > As Alexei also mentioned before, ifindex vs port makes no real
> > > difference seen from the bpf program side. It is userspace's
> > > responsibility to add ifindex/port's
After commit 1215e51edad1 ("ipv4: fix a deadlock in ip_ra_control")
we always take RTNL lock for ip_ra_control() which is the only place
we update the list ip_ra_chain, so the ip_ra_lock is no longer needed,
we just need to disable BH there.
Signed-off-by: Cong Wang
---
On Wed, Apr 26, 2017 at 09:09:23AM -0700, Eric Dumazet wrote:
> From: Eric Dumazet
>
> While testing a fix [1] in ___pskb_trim(), addressing the WARN_ON_ONCE()
> in skb_try_coalesce() reported by Andrey, I found that we had an skb
> with skb->sk set but no skb->destructor.
>
[ -dan...@iogearbox.com (wrong address) ]
On 04/26/2017 08:24 PM, Hannes Frederic Sowa wrote:
We later want to give users a quick dump of what is possible with procfs,
so store a list of all currently loaded bpf programs. Later this list
will be printed in procfs.
Signed-off-by: Hannes
On 26/04/17 01:44 AM, Christoph Hellwig wrote:
> I think we'll at least need a draft of those to make sense of these
> patches. Otherwise they just look very clumsy.
Ok, I'll work up a draft proposal and send it in a couple days. But
without a lot of cleanup such as this series it's not going
On 17-04-26 09:56 AM, Jiri Pirko wrote:
Wed, Apr 26, 2017 at 03:14:38PM CEST, j...@mojatatu.com wrote:
On 17-04-26 08:08 AM, Jiri Pirko wrote:
[..]
Jiri, what are you arguing about if you have done the math? ;->
I can do 3*2*64. What I cannot do is to figure out the real performance
Started MPLS on the branch - Everything was fine. When I tried to run MPLS on a
real network of virtual machines, there were problems with the speed:
root@containers:~# iperf3 -c 10.194.10.2 -B 10.194.10.1 -Z
Connecting to host 10.194.10.2, port 5201
[ 4] local 10.194.10.1 port 49533
1) MLX5 bug fixes from Saeed Mahameed et al.
a) Release wrong resources when firmware timeout happens
b) Wrong check for encapsulation size limits
c) UAR memory leak
d) ETHTOOL_GRXCLSRLALL fails to fill in info->data
2) Don't cache l3mdev on mis-matches local route, causes
net
From: Jamie Bainbridge
Date: Wed, 26 Apr 2017 10:43:27 +1000
> In situations where an skb is paged, the transport header pointer and
> tail pointer can be the same because the skb contents are in frags.
>
> This results in ioctl(SIOCINQ/FIONREAD) incorrectly returning a
>
From: Wei Wang
Date: Tue, 25 Apr 2017 17:38:02 -0700
> From: Wei Wang
>
> Always zero out ca_priv data in tcp_assign_congestion_control() so that
> ca_priv data is cleared out during socket creation.
> Also always zero out ca_priv data in
From: Cong Wang
Date: Tue, 25 Apr 2017 14:37:15 -0700
> Andrey reported a out-of-bound access in ip6_tnl_xmit(), this
> is because we use an ipv4 dst in ip6_tnl_xmit() and cast an IPv4
> neigh key as an IPv6 address:
>
> neigh = dst_neigh_lookup(skb_dst(skb),
>
From: Willem de Bruijn
Date: Tue, 25 Apr 2017 15:59:17 -0400
> From: Willem de Bruijn
>
> As of tx napi, device down (`ip link set dev $dev down`) hangs unless
> tx napi is enabled. Else napi_enable is not called, so napi_disable
> will spin
From: Nathan Fontenot
Date: Tue, 25 Apr 2017 15:00:58 -0400
> The sub crqs are currently intialized in interrupt context when
> handling a crq response fromn the vios server. There is no reason
> they must be initialized there.
>
> Moving the initialization of the sub
From: Myungho Jung
Date: Tue, 25 Apr 2017 11:58:15 -0700
> Added NULL check to make __dev_kfree_skb_irq consistent with kfree
> family of functions.
>
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=195289
>
> Signed-off-by: Myungho Jung
Applied,
From: Florian Fainelli
Date: Tue, 25 Apr 2017 11:33:03 -0700
> The described GPIO reset property is applicable to *all* child PHYs. If
> we have one reset line per PHY present on the MDIO bus, these
> automatically become properties of the child PHY nodes.
>
> Finally,
From: Eric Dumazet
Date: Tue, 25 Apr 2017 10:15:31 -0700
> Some devices or linux distributions use HZ=100 or HZ=250
>
> TCP receive buffer autotuning has poor behavior caused by this choice.
> Since autotuning happens after 4 ms or 10 ms, short distance flows
> get their
On Wed, Apr 26, 2017 at 10:44:16AM -0400, David Miller wrote:
> From: Simon Horman
> Date: Wed, 26 Apr 2017 13:13:16 +0200
>
> > On Tue, Apr 25, 2017 at 10:20:22AM -0400, David Miller wrote:
> >> From: Jamal Hadi Salim
> >> Date: Tue, 25 Apr 2017
From: "Jason A. Donenfeld"
Date: Tue, 25 Apr 2017 19:08:18 +0200
> We call skb_cow_data, which is good anyway to ensure we can actually
> modify the skb as such (another error from prior). Now that we have the
> number of fragments required, we can safely allocate exactly that
From: Florian Westphal
Date: Tue, 25 Apr 2017 11:41:34 +0200
> no users in the tree, insecure_max_entries is always set to
> ht->p.max_size * 2 in rhtashtable_init().
>
> Replace only spot that uses it with a ht->p.max_size check.
>
> Signed-off-by: Florian Westphal
From: "Jerome Marchand"
Date: Tue, 25 Apr 2017 09:42:29 +0200
> The serial_num string in netxen_check_options() is not always properly
> null-terminated. I couldn't find the documention on the serial number
> format and I suspect a proper integer to string conversion is in
>
From: Craig Gallek
The IPv6 tunneling code tries to insert IPV6_TLV_TNL_ENCAP_LIMIT and
IPV6_TLV_PADN options when an encapsulation limit is defined (the
default is a limit of 4). An MTU adjustment is done to account for
these options as well. However, the options are never
From: Alexander Kochetkov
Date: Thu, 20 Apr 2017 14:00:04 +0300
> The Ethernet link on an interrupt driven PHY was not coming up if the Ethernet
> cable was plugged before the Ethernet interface was brought up.
>
> The patch trigger PHY state machine to update link state if
Hi!
I'm seeing crashes with GSO on when changing the number of TX rings. I
initially thought it was a nfp driver problem but I managed to
reproduce it with i40e now.
What I run on the nfp was iperf sending two dozen streams. Then I run
this little script while 40Gbps is being sent:
bl() {
On Tue, Apr 25, 2017 at 3:15 PM, Jan Kiszka wrote:
> On 2017-04-25 13:42, Andy Shevchenko wrote:
>> On Tue, Apr 25, 2017 at 1:09 PM, Jan Kiszka wrote:
>>> On 2017-04-25 12:07, Jan Kiszka wrote:
On 2017-04-25 11:46, Andy Shevchenko wrote:
>
We later want to give users a quick dump of what is possible with procfs,
so store a list of all currently loaded bpf programs. Later this list
will be printed in procfs.
Signed-off-by: Hannes Frederic Sowa
---
include/linux/filter.h | 4 ++--
kernel/bpf/core.c
Signed-off-by: Hannes Frederic Sowa
---
kernel/bpf/core.c | 90 +++
1 file changed, 90 insertions(+)
diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c
index 048e2d79718a16..3ba175a24e971a 100644
---
We never modify bpf programs from hardirqs ever.
Signed-off-by: Hannes Frederic Sowa
---
kernel/bpf/core.c | 12
1 file changed, 4 insertions(+), 8 deletions(-)
diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c
index b4f1cb0c5ac710..6f81e0f5a0faa2
Signed-off-by: Hannes Frederic Sowa
---
include/uapi/linux/bpf.h | 32 +++-
kernel/bpf/core.c| 30 +-
2 files changed, 48 insertions(+), 14 deletions(-)
diff --git a/include/uapi/linux/bpf.h
Right now it seems difficult to list all active ebpf programs in a
system. This new /proc/bpf/programs node should help and print
basically essential information about loaded ebpf programs.
This should help an admin to get a quick look of what is going on in
his system.
Feedback welcome!
Hannes
Signed-off-by: Hannes Frederic Sowa
---
include/linux/filter.h | 6 --
kernel/bpf/core.c | 4 +++-
kernel/bpf/syscall.c | 7 ---
kernel/bpf/verifier.c | 4 ++--
net/core/filter.c | 6 +++---
5 files changed, 16 insertions(+), 11 deletions(-)
diff
We will soon put all bpf programs on this list, thus use apropriate names.
Signed-off-by: Hannes Frederic Sowa
---
include/linux/bpf.h | 2 +-
kernel/bpf/core.c | 18 +-
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git
Hi Randy,
thanks for the report!
Some fallout of my namespace support integration %-)
I posted a patch for it:
http://marc.info/?l=linux-can=149323049630039=2
Many thanks & best regards,
Oliver
On 04/26/2017 04:53 PM, Randy Dunlap wrote:
On 04/26/17 01:03, Stephen Rothwell wrote:
Hi all,
On 4/26/17 6:40 AM, Алексей Болдырев wrote:
>
>
> 26.04.2017, 05:23, "David Ahern" :
>> On 4/25/17 11:28 AM, Алексей Болдырев wrote:
>>> 226 sysctl -w net.mpls.conf.lo.input=1
>>> 227 sysctl -w net.mpls.platform_labels=1048575
>>> 228 ip link add veth0 type veth peer name
The introduced namespace support moved the BCM variables for procfs into a
per-net data structure. This leads to a build failure with disabled procfs:
on x86_64:
when CONFIG_PROC_FS is not enabled:
../net/can/bcm.c:1541:14: error: 'struct netns_can' has no member named
'bcmproc_dir'
On Wed, Apr 26, 2017 at 1:07 PM, Craig Gallek wrote:
> From: Craig Gallek
>
> The IPv6 tunneling code tries to insert IPV6_TLV_TNL_ENCAP_LIMIT and
> IPV6_TLV_PADN options when an encapsulation limit is defined (the
> default is a limit of 4). An MTU
On 4/26/17 9:35 AM, John Fastabend wrote:
As Alexei also mentioned before, ifindex vs port makes no real
difference seen from the bpf program side. It is userspace's
responsibility to add ifindex/port's to the bpf-maps, according to how
the bpf program "policy" want to "connect" these ports.
On 2017-04-26 1:28 PM, Cong Wang wrote:
On Wed, Apr 26, 2017 at 9:46 AM, Jarod Wilson wrote:
On 2017-04-26 12:11 PM, Cong Wang wrote:
On Wed, Apr 26, 2017 at 8:55 AM, Jarod Wilson wrote:
We already have struct sockaddr_storage that could be used
Jiri, Florian, Jakub,
Thanks all for you suggestions.
Some answers to questions posted: The signal tracing in our device can be used
for tracing things like load/store/program_counter from our fastpath processors
(which handle every packet) which can then be re-run in a simulative environment
On Tue, Apr 25, 2017 at 9:42 PM, Michael Ma wrote:
> 2017-04-18 21:46 GMT-07:00 Michael Ma :
>> 2017-04-18 16:12 GMT-07:00 Cong Wang :
>>> On Mon, Apr 17, 2017 at 5:39 PM, Michael Ma wrote:
Hi -
On Wed, Apr 26, 2017 at 9:46 AM, Jarod Wilson wrote:
> On 2017-04-26 12:11 PM, Cong Wang wrote:
>>
>> On Wed, Apr 26, 2017 at 8:55 AM, Jarod Wilson wrote:
>>>
>>>
>>> We already have struct sockaddr_storage that could be used throughout
>>> this
>>> set as
Florian Fainelli writes:
> On 04/25/2017 04:53 PM, Eric Anholt wrote:
>> Cygnus has a single AMAC controller connected to the B53 switch with 2
>> PHYs. On the BCM911360_EP platform, those two PHYs are connected to
>> the external ethernet jacks.
>>
>> Signed-off-by: Eric
If the netdev is accessed before the urbs are initialized,
there will be NULL pointer dereferences. That is avoided by
registering it when it is fully initialized.
This case occurs e.g. if dhcpcd is running in the background
and the device is probed, either after insmod hso or
when the device
Florian Fainelli writes:
> On 04/25/2017 04:53 PM, Eric Anholt wrote:
>> Cygnus has a single AMAC controller connected to the B53 switch with 2
>> PHYs. On the BCM911360_EP platform, those two PHYs are connected to
>> the external ethernet jacks.
>>
>> Signed-off-by: Eric
Andrew Lunn writes:
>> +eth0: ethernet@18042000 {
>> +compatible = "brcm,amac";
>> +reg = <0x18042000 0x1000>,
>> + <0x1811 0x1000>;
>> +reg-names = "amac_base", "idm_base";
>> +
From: Alexei Starovoitov
Date: Tue, 25 Apr 2017 22:31:06 -0700
> On 4/25/17 8:38 PM, David Miller wrote:
> jgt/jge/jsgt/sge was a stumbling block for me as well,
> since it still takes me longer than necessary to disambiguate
> into > vs >= and signed/unsigned
I had this problem
On Wed, Apr 26, 2017 at 10:07 AM, Davide Caratti wrote:
> avoid direct access to sk->sk_state when tcp_poll() is called on a socket
> using active TCP fastopen with deferred connect. Use local variable
> 'state', which stores the result of sk_state_load(), like it was done in
Hi,
On Fri, Apr 21, 2017 at 1:14 AM, Michal Kubecek wrote:
> I tried to think about a solution but there doesn't seem to be an easy
> way to fix this in vmw_stream_sendmsg() as moving prepare_to_wait()
> inside the loop would result in missed wake-ups (that was the problem
>
On Wed, Apr 26, 2017 at 6:07 PM, Eric Dumazet wrote:
> From: Eric Dumazet
>
> Andrey found a way to trigger the WARN_ON_ONCE(delta < len) in
> skb_try_coalesce() using syzkaller and a filter attached to a TCP
> socket.
>
> As we did recently in commit
avoid direct access to sk->sk_state when tcp_poll() is called on a socket
using active TCP fastopen with deferred connect. Use local variable
'state', which stores the result of sk_state_load(), like it was done in
commit 00fd38d938db ("tcp: ensure proper barriers in lockless contexts").
Fixes:
From: Craig Gallek
The IPv6 tunneling code tries to insert IPV6_TLV_TNL_ENCAP_LIMIT and
IPV6_TLV_PADN options when an encapsulation limit is defined (the
default is a limit of 4). An MTU adjustment is done to account for
these options as well. However, the options are never
On Wed, Apr 26, 2017 at 04:50:29PM +0200, Miroslav Lichvar wrote:
> This patchset adds new options to the timestamping API that will be
> useful for NTP implementations and possibly other applications.
Are there any userland ntp patches floating around to exercise the new
HW time stamping option?
1 - 100 of 245 matches
Mail list logo