Re: [PATCH net-next,v4 01/12] flow_offload: add flow_rule and flow_match structures and use them (fwd)

2018-11-30 Thread Julia Lawall
[auto build test WARNING on net-next/master] [also build test WARNING on next-20181130] [cannot apply to v4.20-rc4] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Pablo-Neira-Ayuso/add-flow_rule-in

Re: [PATCH bpf-next v2 0/2] sample: xdp1 improvements

2018-11-30 Thread Alexei Starovoitov
On Sat, Dec 01, 2018 at 01:23:04AM +0100, Matteo Croce wrote: > Small improvements to improve the readability and easiness > to use of the xdp1 sample. Applied to bpf-next. I think that sample code could be more useful if it's wrapped with bash script like selftests/test_xdp* tests do. At that

VIEW THE ATTACHED FILE YOUR CERTIFIED BANK DRAFT FOR CONFIRMATION

2018-11-30 Thread REV,DR.JOHN H.WILLIAMS
DEAR BENEFICIARY, I AM REV,DR.JOHN H.WILLIAMS,THE AUDITOR GENERAL OF THE FEDERAL REPUBLIC OF NIGERIA AND I WISH TO KNOW IF YOU HAVE RECEIVED THE SCAN COPY OF YOUR CERTIFIED BANK DRAFT IN THE AMOUNT OF $10,5MUSD WHICH I SENT TO YOUR EMAIL ADDRESS YESTERDAY AND THIS APPROVED DRAFT INCLUDES YOUR

Re: [PATCH v2 bpf-next 0/4] bpf: Improve verifier test coverage on sparc64 et al.

2018-11-30 Thread Alexei Starovoitov
On Fri, Nov 30, 2018 at 09:07:54PM -0800, David Miller wrote: > > On sparc64 a ton of test cases in test_verifier.c fail because > the memory accesses in the test case are unaligned (or cannot > be proven to be aligned by the verifier). > > Perhaps we can eventually try to (carefully) modify

Re: [PATCH v2 bpf-next 0/4] bpf: Improve verifier test coverage on sparc64 et al.

2018-11-30 Thread David Miller
From: Alexei Starovoitov Date: Fri, 30 Nov 2018 21:55:02 -0800 > The patch 2 didn't apply as-is to bpf-next, since I applied your > earlier fix "bpf: Fix verifier log string check for bad alignment" > to bpf tree. So I applied that fix to bpf-next as well and then > pushed your series on top.

Re: [PATCH bpf-next 1/4] bpf: Add BPF_F_ANY_ALIGNMENT.

2018-11-30 Thread Alexei Starovoitov
On Fri, Nov 30, 2018 at 08:44:20PM -0800, David Miller wrote: > From: Alexei Starovoitov > Date: Fri, 30 Nov 2018 13:58:20 -0800 > > > On Thu, Nov 29, 2018 at 07:32:41PM -0800, David Miller wrote: > >> diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > >> index 426b5c8..c9647ea

[PATCH v2 bpf-next 4/4] bpf: Apply F_NEEDS_EFFICIENT_UNALIGNED_ACCESS to more ACCEPT test cases.

2018-11-30 Thread David Miller
If a testcase has alignment problems but is expected to be ACCEPT, verify it using F_NEEDS_EFFICIENT_UNALIGNED_ACCESS too. Maybe in the future if we add some architecture specific code to elide the unaligned memory access warnings during the test, we can execute these as well. Signed-off-by:

[PATCH v2 bpf-next 3/4] bpf: Make more use of 'any' alignment in test_verifier.c

2018-11-30 Thread David Miller
Use F_NEEDS_EFFICIENT_UNALIGNED_ACCESS in more tests where the expected result is REJECT. Signed-off-by: David S. Miller --- tools/testing/selftests/bpf/test_verifier.c | 44 + 1 file changed, 44 insertions(+) diff --git

[PATCH v2 bpf-next 2/4] bpf: Adjust F_NEEDS_EFFICIENT_UNALIGNED_ACCESS handling in test_verifier.c

2018-11-30 Thread David Miller
Make it set the flag argument to bpf_verify_program() which will relax the alignment restrictions. Now all such test cases will go properly through the verifier even on inefficient unaligned access architectures. On inefficient unaligned access architectures do not try to run such programs,

[PATCH v2 bpf-next 0/4] bpf: Improve verifier test coverage on sparc64 et al.

2018-11-30 Thread David Miller
On sparc64 a ton of test cases in test_verifier.c fail because the memory accesses in the test case are unaligned (or cannot be proven to be aligned by the verifier). Perhaps we can eventually try to (carefully) modify each test case which has this problem to not use unaligned accesses but: 1)

[PATCH v2 bpf-next 1/4] bpf: Add BPF_F_ANY_ALIGNMENT.

2018-11-30 Thread David Miller
Often we want to write tests cases that check things like bad context offset accesses. And one way to do this is to use an odd offset on, for example, a 32-bit load. This unfortunately triggers the alignment checks first on platforms that do not set CONFIG_EFFICIENT_UNALIGNED_ACCESS. So the

Re: [PATCH bpf-next 1/4] bpf: Add BPF_F_ANY_ALIGNMENT.

2018-11-30 Thread David Miller
From: Alexei Starovoitov Date: Fri, 30 Nov 2018 13:58:20 -0800 > On Thu, Nov 29, 2018 at 07:32:41PM -0800, David Miller wrote: >> diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h >> index 426b5c8..c9647ea 100644 >> --- a/include/uapi/linux/bpf.h >> +++ b/include/uapi/linux/bpf.h

Re: consistency for statistics with XDP mode

2018-11-30 Thread Jakub Kicinski
On Fri, 30 Nov 2018 13:35:53 -0700, David Ahern wrote: > On 11/30/18 1:30 PM, Michael S. Tsirkin wrote: > I would like to see basic packets, bytes, and dropped counters > tracked > for Rx and Tx via the standard netdev counters for all devices. > >> > >> The problem of reporting

Re: [PATCHv3 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Alexei Starovoitov
On Fri, Nov 30, 2018 at 03:32:20PM -0800, Joe Stringer wrote: > David Ahern and Nicolas Dichtel report that the handling of the netns id > 0 is incorrect for the BPF socket lookup helpers: rather than finding > the netns with id 0, it is resolving to the current netns. This renders > the netns_id

Re: [PATCH net] tun: forbid iface creation with rtnl ops

2018-11-30 Thread David Miller
From: Nicolas Dichtel Date: Thu, 29 Nov 2018 14:45:39 +0100 > It's not supported right now (the goal of the initial patch was to support > 'ip link del' only). > > Before the patch: > $ ip link add foo type tun > [ 239.632660] BUG: unable to handle kernel NULL pointer dereference at >

Re: [PATCH net-next] net: qualcomm: rmnet: Remove set but not used variable 'cmd'

2018-11-30 Thread David Miller
From: YueHaibing Date: Thu, 29 Nov 2018 02:36:32 + > Fixes gcc '-Wunused-but-set-variable' warning: > > drivers/net/ethernet/qualcomm/rmnet/rmnet_map_command.c: In function > 'rmnet_map_do_flow_control': > drivers/net/ethernet/qualcomm/rmnet/rmnet_map_command.c:23:36: warning: > variable

Re: [PATCH net 0/3] fixes in timeout and retransmission accounting

2018-11-30 Thread David Miller
From: Yuchung Cheng Date: Wed, 28 Nov 2018 16:06:42 -0800 > This patch set has assorted fixes of minor accounting issues in > timeout, window probe, and retransmission stats. Looks good, series applied.

Re: [PATCHv3 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Joey Pabalinas
On Fri, Nov 30, 2018 at 02:36:57PM -1000, Joey Pabalinas wrote: > On Fri, Nov 30, 2018 at 03:32:20PM -0800, Joe Stringer wrote: > > + * the netns associated with the *ctx*. *netns* values beyond the > > + * range of 32-bit integers are reserved for future use. > > Would adding a

Re: [Patch net] mlx5: fix get_ip_proto()

2018-11-30 Thread David Miller
From: Cong Wang Date: Wed, 28 Nov 2018 15:04:05 -0800 > IP header is not necessarily located right after struct ethhdr, > there could be multiple 802.1Q headers in between, this is why > we call __vlan_get_protocol(). > > Fixes: fe1dc069990c ("net/mlx5e: don't set CHECKSUM_COMPLETE on SCTP

Re: [PATCH net-next] tun: implement carrier change

2018-11-30 Thread David Miller
From: Nicolas Dichtel Date: Wed, 28 Nov 2018 19:12:56 +0100 > The userspace may need to control the carrier state. > > Signed-off-by: Nicolas Dichtel > Signed-off-by: Didier Pallard Applied.

Re: [PATCH bpf] bpf: fix pointer offsets in context for 32 bit

2018-11-30 Thread Alexei Starovoitov
On Sat, Dec 01, 2018 at 01:18:53AM +0100, Daniel Borkmann wrote: > Currently, pointer offsets in three BPF context structures are > broken in two scenarios: i) 32 bit compiled applications running > on 64 bit kernels, and ii) LLVM compiled BPF programs running > on 32 bit kernels. The latter is

Re: [PATCH net] net/sched: act_police: fix memory leak in case of invalid control action

2018-11-30 Thread David Miller
From: Davide Caratti Date: Wed, 28 Nov 2018 18:43:42 +0100 > when users set an invalid control action, kmemleak complains as follows: > > # echo clear >/sys/kernel/debug/kmemleak > # ./tdc.py -e b48b > Test b48b: Add police action with exceed goto chain control action > All test results: >

Re: [PATCH net-next] net: reorder flowi_common fields to avoid holes

2018-11-30 Thread David Miller
From: Paolo Abeni Date: Wed, 28 Nov 2018 17:37:53 +0100 > the flowi* structures are used and memsetted by server functions > in critical path. Currently flowi_common has a couple of holes that > we can eliminate reordering the struct fields. As a side effect, > both flowi4 and flowi6 shrink by 8

Re: BPF uapi structures and 32-bit

2018-11-30 Thread David Miller
From: Alexei Starovoitov Date: Fri, 30 Nov 2018 15:33:08 -0800 > On Wed, Nov 28, 2018 at 11:02:00AM -0800, David Miller wrote: >> From: Daniel Borkmann >> Date: Wed, 28 Nov 2018 11:34:55 +0100 >> >> > Yeah fully agree. Thinking diff below should address it, do you >> > have a chance to give

Re: [PATCH bpf-next] bpf: allow BPF read access to qdisc pkt_len

2018-11-30 Thread Daniel Borkmann
On 12/01/2018 12:42 AM, Willem de Bruijn wrote: > On Fri, Nov 30, 2018 at 5:48 PM Song Liu wrote: >> >> On Fri, Nov 30, 2018 at 12:09 PM Willem de Bruijn >> wrote: >>> >>> From: Petar Penkov >>> >>> The pkt_len field in qdisc_skb_cb stores the skb length as it will >>> appear on the wire after

Re: [PATCHv3 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Joey Pabalinas
On Fri, Nov 30, 2018 at 03:32:20PM -0800, Joe Stringer wrote: > + * the netns associated with the *ctx*. *netns* values beyond the > + * range of 32-bit integers are reserved for future use. Would adding a word or two before "*netns*" here be helpful to placate the english

Re: [PATCH net-next v2 2/3] vxlan: extack support for some changelink cases

2018-11-30 Thread kbuild test robot
Hi Roopa, I love your patch! Yet something to improve: [auto build test ERROR on net-next/master] url: https://github.com/0day-ci/linux/commits/Roopa-Prabhu/vxlan-a-few-minor-cleanups/20181130-184658 config: i386-allmodconfig (attached as .config) compiler: gcc-7 (Debian 7.3.0-1) 7.3.0

[PATCH bpf-next v2 0/2] sample: xdp1 improvements

2018-11-30 Thread Matteo Croce
Small improvements to improve the readability and easiness to use of the xdp1 sample. Matteo Croce (2): samples: bpf: improve xdp1 example samples: bpf: get ifindex from ifname samples/bpf/xdp1_user.c | 27 +++ 1 file changed, 15 insertions(+), 12 deletions(-) --

[PATCH bpf-next v2 1/2] samples: bpf: improve xdp1 example

2018-11-30 Thread Matteo Croce
Store only the total packet count for every protocol, instead of the whole per-cpu array. Use bpf_map_get_next_key() to iterate the map, instead of looking up all the protocols. Signed-off-by: Matteo Croce --- samples/bpf/xdp1_user.c | 18 -- 1 file changed, 8 insertions(+), 10

[PATCH bpf-next v2 2/2] samples: bpf: get ifindex from ifname

2018-11-30 Thread Matteo Croce
Find the ifindex with if_nametoindex() instead of requiring the numeric ifindex. Signed-off-by: Matteo Croce --- v2: use if_nametoindex() instead of ioctl() samples/bpf/xdp1_user.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/samples/bpf/xdp1_user.c

[PATCH bpf] bpf: fix pointer offsets in context for 32 bit

2018-11-30 Thread Daniel Borkmann
Currently, pointer offsets in three BPF context structures are broken in two scenarios: i) 32 bit compiled applications running on 64 bit kernels, and ii) LLVM compiled BPF programs running on 32 bit kernels. The latter is due to BPF target machine being strictly 64 bit. So in each of the cases

Re: [PATCH bpf-next 1/2] bpf: add BPF_LWT_ENCAP_IP option to bpf_lwt_push_encap

2018-11-30 Thread Peter Oskolkov
On Fri, Nov 30, 2018 at 3:52 PM David Ahern wrote: > > On 11/30/18 4:35 PM, Peter Oskolkov wrote: > > Thanks, David! This is for egress only, so I'll add an appropriate > > check. I'll also address your other comments/concerns in a v2 version > > of this patchset. > > Why are you limiting this to

Re: consistency for statistics with XDP mode

2018-11-30 Thread Saeed Mahameed
On Fri, 2018-11-30 at 15:30 -0500, Michael S. Tsirkin wrote: > On Fri, Nov 30, 2018 at 08:10:58PM +, Saeed Mahameed wrote: > > On Thu, 2018-11-22 at 18:00 +0100, Toke Høiland-Jørgensen wrote: > > > David Ahern writes: > > > > > > > On 11/22/18 1:26 AM, Toke Høiland-Jørgensen wrote: > > > > >

Re: BPF uapi structures and 32-bit

2018-11-30 Thread Daniel Borkmann
On 12/01/2018 12:33 AM, Alexei Starovoitov wrote: > On Wed, Nov 28, 2018 at 11:02:00AM -0800, David Miller wrote: >> From: Daniel Borkmann >> Date: Wed, 28 Nov 2018 11:34:55 +0100 >> >>> Yeah fully agree. Thinking diff below should address it, do you >>> have a chance to give this a spin for

Re: [PATCH bpf-next 1/2] bpf: add BPF_LWT_ENCAP_IP option to bpf_lwt_push_encap

2018-11-30 Thread David Ahern
On 11/30/18 4:35 PM, Peter Oskolkov wrote: > Thanks, David! This is for egress only, so I'll add an appropriate > check. I'll also address your other comments/concerns in a v2 version > of this patchset. Why are you limiting this to egress only?

Re: [PATCH bpf-next] bpf: allow BPF read access to qdisc pkt_len

2018-11-30 Thread Willem de Bruijn
On Fri, Nov 30, 2018 at 5:48 PM Song Liu wrote: > > On Fri, Nov 30, 2018 at 12:09 PM Willem de Bruijn > wrote: > > > > From: Petar Penkov > > > > The pkt_len field in qdisc_skb_cb stores the skb length as it will > > appear on the wire after segmentation. For byte accounting, this value > > is

Re: [PATCH bpf-next 1/2] bpf: add BPF_LWT_ENCAP_IP option to bpf_lwt_push_encap

2018-11-30 Thread Peter Oskolkov
Thanks, David! This is for egress only, so I'll add an appropriate check. I'll also address your other comments/concerns in a v2 version of this patchset. On Fri, Nov 30, 2018 at 12:08 PM David Ahern wrote: > > On 11/28/18 6:34 PM, Peter Oskolkov wrote: > > On Wed, Nov 28, 2018 at 4:47 PM David

Re: No address after suspend/resume with 4.18

2018-11-30 Thread Jeff Kirsher
On Fri, 2018-11-30 at 15:26 -0800, Stephen Hemminger wrote: > On my box with Debian testing, I see a new problem with > suspend/resume of wired network device. > Using stock Debian kernel 4.18.0-2-amd64 > > After suspend/resume cycle, IP address is lost. > > Device Info: > $ /sbin/ethtool -i

Re: BPF uapi structures and 32-bit

2018-11-30 Thread Alexei Starovoitov
On Wed, Nov 28, 2018 at 11:02:00AM -0800, David Miller wrote: > From: Daniel Borkmann > Date: Wed, 28 Nov 2018 11:34:55 +0100 > > > Yeah fully agree. Thinking diff below should address it, do you > > have a chance to give this a spin for sparc / 32 bit to check if > > test_verifier still

[PATCHv3 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Joe Stringer
David Ahern and Nicolas Dichtel report that the handling of the netns id 0 is incorrect for the BPF socket lookup helpers: rather than finding the netns with id 0, it is resolving to the current netns. This renders the netns_id 0 inaccessible. To fix this, adjust the API for the netns to treat

[PATCHv3 bpf 2/2] bpf: Improve socket lookup reuseport documentation

2018-11-30 Thread Joe Stringer
Improve the wording around socket lookup for reuseport sockets, and ensure that both bpf.h headers are in sync. Signed-off-by: Joe Stringer --- include/uapi/linux/bpf.h | 4 tools/include/uapi/linux/bpf.h | 8 2 files changed, 8 insertions(+), 4 deletions(-) diff --git

Re: [PATCHv2 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Joe Stringer
On Fri, 30 Nov 2018 at 15:27, Alexei Starovoitov wrote: > > On Fri, Nov 30, 2018 at 03:18:25PM -0800, Joe Stringer wrote: > > On Fri, 30 Nov 2018 at 14:42, Alexei Starovoitov > > wrote: > > > > > > On Thu, Nov 29, 2018 at 04:29:33PM -0800, Joe Stringer wrote: > > > > David Ahern and Nicolas

Re: [PATCHv2 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Alexei Starovoitov
On Fri, Nov 30, 2018 at 03:18:25PM -0800, Joe Stringer wrote: > On Fri, 30 Nov 2018 at 14:42, Alexei Starovoitov > wrote: > > > > On Thu, Nov 29, 2018 at 04:29:33PM -0800, Joe Stringer wrote: > > > David Ahern and Nicolas Dichtel report that the handling of the netns id > > > 0 is incorrect for

[PATCH net] macvlan: return correct error value

2018-11-30 Thread Matteo Croce
A MAC address must be unique among all the macvlan devices with the same lower device. The only exception is the passthru [sic] mode, which shares the lower device address. When duplicate addresses are detected, EBUSY is returned when bringing the interface up: # ip link add macvlan0 link

No address after suspend/resume with 4.18

2018-11-30 Thread Stephen Hemminger
On my box with Debian testing, I see a new problem with suspend/resume of wired network device. Using stock Debian kernel 4.18.0-2-amd64 After suspend/resume cycle, IP address is lost. Device Info: $ /sbin/ethtool -i enp12s0 driver: igb version: 5.4.0-k firmware-version: 0. 6-1

Re: [PATCHv2 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Joe Stringer
On Fri, 30 Nov 2018 at 14:42, Alexei Starovoitov wrote: > > On Thu, Nov 29, 2018 at 04:29:33PM -0800, Joe Stringer wrote: > > David Ahern and Nicolas Dichtel report that the handling of the netns id > > 0 is incorrect for the BPF socket lookup helpers: rather than finding > > the netns with id 0,

Re: [PATCH net] bpf: uninitialized variables in test code

2018-11-30 Thread Alexei Starovoitov
On Thu, Nov 29, 2018 at 01:27:03PM +0300, Dan Carpenter wrote: > Smatch complains that if bpf_test_run() fails with -ENOMEM at the > begining then the "duration" is uninitialized. We then copy the > unintialized variables to the user inside the bpf_test_finish() > function. The functions require

Re: [PATCH net] bpf: uninitialized variables in test code

2018-11-30 Thread Song Liu
On Thu, Nov 29, 2018 at 2:28 AM Dan Carpenter wrote: > > Smatch complains that if bpf_test_run() fails with -ENOMEM at the > begining then the "duration" is uninitialized. We then copy the > unintialized variables to the user inside the bpf_test_finish() > function. The functions require

Re: [PATCH bpf-next] bpf: allow BPF read access to qdisc pkt_len

2018-11-30 Thread Song Liu
On Fri, Nov 30, 2018 at 12:09 PM Willem de Bruijn wrote: > > From: Petar Penkov > > The pkt_len field in qdisc_skb_cb stores the skb length as it will > appear on the wire after segmentation. For byte accounting, this value > is more accurate than skb->len. It is computed on entry to the TC >

Re: [PATCH bpf] bpf: Fix verifier log string check for bad alignment.

2018-11-30 Thread Alexei Starovoitov
On Wed, Nov 28, 2018 at 10:33:53PM -0800, David Miller wrote: > > The message got changed a lot time ago. > > This was responsible for 36 test case failures on sparc64. > > Fixes: f1174f77b50c ("bpf/verifier: rework value tracking") > Signed-off-by: David S. Miller Applied to bpf tree.

Re: [PATCHv2 bpf 1/2] bpf: Support sk lookup in netns with id 0

2018-11-30 Thread Alexei Starovoitov
On Thu, Nov 29, 2018 at 04:29:33PM -0800, Joe Stringer wrote: > David Ahern and Nicolas Dichtel report that the handling of the netns id > 0 is incorrect for the BPF socket lookup helpers: rather than finding > the netns with id 0, it is resolving to the current netns. This renders > the netns_id

Re: [PATCH bpf-next 1/4] bpf: Add BPF_F_ANY_ALIGNMENT.

2018-11-30 Thread David Miller
From: Alexei Starovoitov Date: Fri, 30 Nov 2018 13:58:20 -0800 > On Thu, Nov 29, 2018 at 07:32:41PM -0800, David Miller wrote: >> +/* If BPF_F_ANY_ALIGNMENT is used in BPF_PROF_LOAD command, the >> + * verifier will allow any alignment whatsoever. This bypasses >> + * what

Re: [PATCH 2/2] net: phy: ensure autoneg is configured when resuming a phydev

2018-11-30 Thread Heiner Kallweit
On 30.11.2018 19:45, Anssi Hannula wrote: > When a PHY_HALTED phydev is resumed by phy_start(), it is set to > PHY_RESUMING to wait for the link to come up. > > However, if the phydev was put to PHY_HALTED (by e.g. phy_stop()) before > autonegotiation was ever started by phy_state_machine(),

Re: [PATCH bpf-next 0/5] tools: bpftool: fixes and small improvements

2018-11-30 Thread Alexei Starovoitov
On Fri, Nov 30, 2018 at 04:25:43PM +, Quentin Monnet wrote: > Hi, > Several items for bpftool are included in this set: the first three patches > are fixes for bpftool itself and bash completion, while the last two > slightly improve the information obtained when dumping programs or maps, on >

Re: [PATCH bpf-next 1/4] bpf: Add BPF_F_ANY_ALIGNMENT.

2018-11-30 Thread Alexei Starovoitov
On Thu, Nov 29, 2018 at 07:32:41PM -0800, David Miller wrote: > > Often we want to write tests cases that check things like bad context > offset accesses. And one way to do this is to use an odd offset on, > for example, a 32-bit load. > > This unfortunately triggers the alignment checks first

Re: [PATCH net-next 0/6 v3] qed*: Doorbell overflow recovery

2018-11-30 Thread David Miller
From: Ariel Elior Date: Wed, 28 Nov 2018 18:16:01 +0200 > Doorbell Overflow > If sufficient CPU cores will send doorbells at a sufficiently high rate, they > can cause an overflow in the doorbell queue block message fifo. When fill > level > reaches maximum, the device stops accepting all

Re: [PATCH net-next 0/2] rtnetlink: avoid a warning in rtnl_newlink()

2018-11-30 Thread David Miller
From: Jakub Kicinski Date: Tue, 27 Nov 2018 22:32:29 -0800 > I've been hoping for some time that someone more competent would fix > the stack frame size warning in rtnl_newlink(), but looks like I'll > have to take a stab at it myself :) That's the only warning I see > in most of my builds. >

Re: [next] bonding: pass link-local packets to bonding master also.

2018-11-30 Thread Vincent Bernat
❦ 15 juillet 2018 19:12 -0700, Mahesh Bandewar : > Commit b89f04c61efe ("bonding: deliver link-local packets with > skb->dev set to link that packets arrived on") changed the behavior > of how link-local-multicast packets are processed. The change in > the behavior broke some legacy use cases

Re: [PATCH net-next 00/11] nfp: update TX path to enable repr offloads

2018-11-30 Thread David Miller
From: Jakub Kicinski Date: Tue, 27 Nov 2018 22:24:47 -0800 > This set starts with three micro optimizations to the TX path. > The improvement is measurable, but below 1% of CPU utilization. > > Patches 4 - 9 add basic TX offloads to representor devices, like > checksum offload or TSO, and

Re: [PATCH net-next] net: phy: Also request modules for C45 IDs

2018-11-30 Thread Andrew Lunn
> @@ -606,6 +606,18 @@ struct phy_device *phy_device_create(struct mii_bus > *bus, int addr, int phy_id, >* there's no driver _already_ loaded. >*/ > request_module(MDIO_MODULE_PREFIX MDIO_ID_FMT, MDIO_ID_ARGS(phy_id)); This line above is for C22. If you look at

Re: [PATCH net-next] tcp: md5: add tcp_md5_needed jump label

2018-11-30 Thread David Miller
From: Eric Dumazet Date: Tue, 27 Nov 2018 15:03:21 -0800 > Most linux hosts never setup TCP MD5 keys. We can avoid a > cache line miss (accessing tp->md5ig_info) on RX and TX > using a jump label. > > Signed-off-by: Eric Dumazet Also applied, thanks.

Re: [PATCH v3 net-next 0/4] tcp: take a bit more care of backlog stress

2018-11-30 Thread David Miller
From: Eric Dumazet Date: Tue, 27 Nov 2018 14:41:59 -0800 > While working on the SACK compression issue Jean-Louis Dupond > reported, we found that his linux box was suffering very hard > from tail drops on the socket backlog queue. > > First patch hints the compiler about sack flows being the

Re: [PATCH net 2/2] nfp: flower: prevent offload if rhashtable insert fails

2018-11-30 Thread David Miller
From: Jakub Kicinski Date: Tue, 27 Nov 2018 14:04:12 -0800 > From: John Hurley > > For flow offload adds, if the rhash insert code fails, the flow will still > have been offloaded but the reference to it in the driver freed. > > Re-order the offload setup calls to ensure that a flow will only

Re: [PATCH net 1/2] nfp: flower: release metadata on offload failure

2018-11-30 Thread David Miller
From: Jakub Kicinski Date: Tue, 27 Nov 2018 14:04:11 -0800 > From: John Hurley > > Calling nfp_compile_flow_metadata both assigns a stats context and > increments a ref counter on (or allocates) a mask id table entry. These > are released by the nfp_modify_flow_metadata call on flow deletion,

Re: [PATCH v4] net: Add trace events for all receive exit points

2018-11-30 Thread David Miller
From: Geneviève Bastien Date: Tue, 27 Nov 2018 12:52:39 -0500 > Trace events are already present for the receive entry points, to indicate > how the reception entered the stack. > > This patch adds the corresponding exit trace events that will bound the > reception such that all events

Re: [PATCH net-next] net/flow_dissector: correct comments on enum flow_dissector_key_id

2018-11-30 Thread David Miller
From: Edward Cree Date: Tue, 27 Nov 2018 15:40:59 + > There are no such structs flow_dissector_key_flow_vlan or > flow_dissector_key_flow_tags, the actual structs used are struct > flow_dissector_key_vlan and struct flow_dissector_key_tags. So correct the > comments against

Re: [PATCH v2 net] bonding: fix 802.3ad state sent to partner when unbinding slave

2018-11-30 Thread David Miller
From: Toni Peltonen Date: Tue, 27 Nov 2018 16:56:57 +0200 > Previously when unbinding a slave the 802.3ad implementation only told > partner that the port is not suitable for aggregation by setting the port > aggregation state from aggregatable to individual. This is not enough. If the >

Re: [PATCH v4 3/4] libbpf: add bpf_prog_test_run_xattr

2018-11-30 Thread Alexei Starovoitov
On Wed, Nov 28, 2018 at 04:53:11PM +, Lorenz Bauer wrote: > Add a new function, which encourages safe usage of the test interface. > bpf_prog_test_run continues to work as before, but should be considered > unsafe. > > Signed-off-by: Lorenz Bauer .. > + > +LIBBPF_API int

Re: [PATCH net] net: aquantia: fix rx checksum offload bits

2018-11-30 Thread David Miller
From: Igor Russkikh Date: Tue, 27 Nov 2018 14:51:17 + > From: Dmitry Bogdanov > > The last set of csum offload fixes had a leak: > > Checksum enabled status bits from rx descriptor were incorrectly > interpreted. Consequently all the other valid logic worked on zero bits. > That caused rx

Re: [PATCH v6 1/4] udp_tunnel: add config option to bind to a device

2018-11-30 Thread David Miller
From: Alexis Bauvin Date: Tue, 27 Nov 2018 14:05:42 +0100 > UDP tunnel sockets are always opened unbound to a specific device. This > patch allow the socket to be bound on a custom device, which > incidentally makes UDP tunnels VRF-aware if binding to an l3mdev. > > Signed-off-by: Alexis Bauvin

Re: [PATCHv2 net] sctp: update frag_point when stream_interleave is set

2018-11-30 Thread David Miller
From: Xin Long Date: Tue, 27 Nov 2018 19:11:50 +0800 > sctp_assoc_update_frag_point() should be called whenever asoc->pathmtu > changes, but we missed one place in sctp_association_init(). It would > cause frag_point is zero when sending data. > > As says in Jakub's reproducer, if sp->pathmtu

Re: [PATCH v3] ipv4: make DSCP values works with ip rules

2018-11-30 Thread David Miller
From: Pavel Balaev Date: Tue, 27 Nov 2018 13:07:10 +0300 > -#define IPTOS_RT_MASK(IPTOS_TOS_MASK & ~3) > +#define IPTOS_RT_MASK(IPTOS_DSCP_MASK & ~3) I was hoping my original feedback would have you actually go investigate why IPTOS_RT_MASK is defined the way that it is. I will

Re: [PATCH v2 net-next] cxgb4: number of VFs supported is not always 16

2018-11-30 Thread David Miller
From: Ganesh Goudar Date: Tue, 27 Nov 2018 14:59:06 +0530 > Total number of VFs supported by PF is used to determine the last > byte of VF's mac address. Number of VFs supported is not always > 16, use the variable nvfs to get the number of VFs supported > rather than hard coding it to 16. > >

Re: consistency for statistics with XDP mode

2018-11-30 Thread David Ahern
On 11/30/18 1:30 PM, Michael S. Tsirkin wrote: I would like to see basic packets, bytes, and dropped counters tracked for Rx and Tx via the standard netdev counters for all devices. >> >> The problem of reporting XDP_DROP in the netedev drop counter is that >> they don't fit this

[PATCH net-next v4 2/3] udp: elide zerocopy operation in hot path

2018-11-30 Thread Willem de Bruijn
From: Willem de Bruijn With MSG_ZEROCOPY, each skb holds a reference to a struct ubuf_info. Release of its last reference triggers a completion notification. The TCP stack in tcp_sendmsg_locked holds an extra ref independent of the skbs, because it can build, send and free skbs within its loop,

[PATCH net-next v4 0/3] udp msg_zerocopy

2018-11-30 Thread Willem de Bruijn
From: Willem de Bruijn Enable MSG_ZEROCOPY for udp sockets Patch 1/3 is the main patch, a rework of RFC patch http://patchwork.ozlabs.org/patch/899630/ more details in the patch commit message Patch 2/3 is an optimization to remove a branch from the UDP hot path and

[PATCH net-next v4 1/3] udp: msg_zerocopy

2018-11-30 Thread Willem de Bruijn
From: Willem de Bruijn Extend zerocopy to udp sockets. Allow setting sockopt SO_ZEROCOPY and interpret flag MSG_ZEROCOPY. This patch was previously part of the zerocopy RFC patchsets. Zerocopy is not effective at small MTU. With segmentation offload building larger datagrams, the benefit of

[PATCH net-next v4 3/3] selftests: extend zerocopy tests to udp

2018-11-30 Thread Willem de Bruijn
From: Willem de Bruijn Both msg_zerocopy and udpgso_bench have udp zerocopy variants. Exercise these as part of the standard kselftest run. With udp, msg_zerocopy has no control channel. Ensure that the receiver exits after the sender by accounting for the initial delay in starting them (in

Re: consistency for statistics with XDP mode

2018-11-30 Thread Michael S. Tsirkin
On Fri, Nov 30, 2018 at 08:10:58PM +, Saeed Mahameed wrote: > On Thu, 2018-11-22 at 18:00 +0100, Toke Høiland-Jørgensen wrote: > > David Ahern writes: > > > > > On 11/22/18 1:26 AM, Toke Høiland-Jørgensen wrote: > > > > Saeed Mahameed writes: > > > > > > > > > > > I'd say it sounds

Re: [Patch net-next 2/2] net: dump whole skb data in netdev_rx_csum_fault()

2018-11-30 Thread Saeed Mahameed
On Thu, 2018-11-22 at 17:45 -0800, Cong Wang wrote: > On Wed, Nov 21, 2018 at 11:33 AM Saeed Mahameed > wrote: > > On Wed, 2018-11-21 at 10:26 -0800, Eric Dumazet wrote: > > > On Wed, Nov 21, 2018 at 10:17 AM Cong Wang < > > > xiyou.wangc...@gmail.com> > > > wrote: > > > > On Wed, Nov 21, 2018 at

Re: consistency for statistics with XDP mode

2018-11-30 Thread Saeed Mahameed
On Thu, 2018-11-22 at 18:00 +0100, Toke Høiland-Jørgensen wrote: > David Ahern writes: > > > On 11/22/18 1:26 AM, Toke Høiland-Jørgensen wrote: > > > Saeed Mahameed writes: > > > > > > > > > I'd say it sounds reasonable to include XDP in the normal > > > > > > traffic > > > > > > counters, but

[PATCH bpf-next] bpf: allow BPF read access to qdisc pkt_len

2018-11-30 Thread Willem de Bruijn
From: Petar Penkov The pkt_len field in qdisc_skb_cb stores the skb length as it will appear on the wire after segmentation. For byte accounting, this value is more accurate than skb->len. It is computed on entry to the TC layer, so only valid there. Allow read access to this field from BPF tc

Re: [PATCH bpf-next 1/2] bpf: add BPF_LWT_ENCAP_IP option to bpf_lwt_push_encap

2018-11-30 Thread David Ahern
On 11/28/18 6:34 PM, Peter Oskolkov wrote: > On Wed, Nov 28, 2018 at 4:47 PM David Ahern wrote: >> >> On 11/28/18 5:22 PM, Peter Oskolkov wrote: >>> diff --git a/net/core/filter.c b/net/core/filter.c >>> index bd0df75dc7b6..17f3c37218e5 100644 >>> --- a/net/core/filter.c >>> +++

Re: [PATCH iproute2] stats output

2018-11-30 Thread Stephen Hemminger
On Fri, 30 Nov 2018 20:22:35 +0100 Alexis Vachette wrote: > Hi Stephen, > > Thanks for your kind reply. > > It's sad to hear that, I am aware of your concern too. > > But it's not the best behavior for a network engineer. > > Is it possible to add a new option or everything is stone graved ?

Re: [PATCHv2 net] sctp: check and update stream->out_curr when allocating stream_out

2018-11-30 Thread Neil Horman
On Sat, Dec 01, 2018 at 03:53:26AM +0900, Xin Long wrote: > On Sat, Dec 1, 2018 at 12:23 AM Neil Horman wrote: > > > > On Fri, Nov 30, 2018 at 10:48:10PM +0900, Xin Long wrote: > > > On Fri, Nov 30, 2018 at 9:21 PM Neil Horman wrote: > > > > > > > > On Fri, Nov 30, 2018 at 03:22:39PM +0900, Xin

Re: [PATCH iproute2] ss: add support for bytes_sent, bytes_retrans, dsack_dups and reord_seen

2018-11-30 Thread Stefano Brivio
Hi David, On Thu, 29 Nov 2018 11:51:48 -0700 David Ahern wrote: > On 11/29/18 11:50 AM, Stephen Hemminger wrote: > > PS: ss still doesn't support JSON output, given the volume of output it > > would be good. > > I thought Stefano was investigating it as an alternative to the 'display >

Re: [PATCHv2 net] sctp: check and update stream->out_curr when allocating stream_out

2018-11-30 Thread Neil Horman
On Sat, Dec 01, 2018 at 03:53:26AM +0900, Xin Long wrote: > On Sat, Dec 1, 2018 at 12:23 AM Neil Horman wrote: > > > > On Fri, Nov 30, 2018 at 10:48:10PM +0900, Xin Long wrote: > > > On Fri, Nov 30, 2018 at 9:21 PM Neil Horman wrote: > > > > > > > > On Fri, Nov 30, 2018 at 03:22:39PM +0900, Xin

Re: [PATCH iproute2] stats output

2018-11-30 Thread Alexis Vachette
Hi Stephen, Thanks for your kind reply. It's sad to hear that, I am aware of your concern too. But it's not the best behavior for a network engineer. Is it possible to add a new option or everything is stone graved ? If yes I will fix my e-mail client to submit a correct PR. On Fri, 30 Nov

Re: [PATCH net-next 1/2] ixgbe: register a mdiobus

2018-11-30 Thread Andrew Lunn
> 'cards_found' doesn't exist for the ixgbe driver. Agh, sorry, i was looking at ixgb, not ixgbe. Andrew

Re: [PATCHv2 net] sctp: check and update stream->out_curr when allocating stream_out

2018-11-30 Thread Xin Long
On Sat, Dec 1, 2018 at 12:23 AM Neil Horman wrote: > > On Fri, Nov 30, 2018 at 10:48:10PM +0900, Xin Long wrote: > > On Fri, Nov 30, 2018 at 9:21 PM Neil Horman wrote: > > > > > > On Fri, Nov 30, 2018 at 03:22:39PM +0900, Xin Long wrote: > > > > On Thu, Nov 29, 2018 at 11:39 PM Neil Horman > >

[PATCH 2/2] net: phy: ensure autoneg is configured when resuming a phydev

2018-11-30 Thread Anssi Hannula
When a PHY_HALTED phydev is resumed by phy_start(), it is set to PHY_RESUMING to wait for the link to come up. However, if the phydev was put to PHY_HALTED (by e.g. phy_stop()) before autonegotiation was ever started by phy_state_machine(), autonegotiation remains unconfigured, i.e.

[PATCH 1/2] net: phy: suspend phydev on PHY_HALTED even if there is no link

2018-11-30 Thread Anssi Hannula
When the phydev is put to PHY_HALTED (by e.g. phy_stop()) the state machine suspends the phydev to save power. However, this is wrongly inside a phydev->link check, causing the phydev not to be suspended if there was no link at the time of stopping it. Fix that by setting do_suspend regardless

[PATCH 0/2] net: phy: fixes to PHY_HALTED handling

2018-11-30 Thread Anssi Hannula
Hi all, Here are a couple of fixes for PHY_HALTED/PHY_RESUMING handling. On a related note, it feels a bit strange that AFAICS phydevs will only be put to powerdown state (via PHY_HALTED) after the network interface has been brought up and down once. If the ethernet interface is never brought

Re: [PATCH net-next 1/2] ixgbe: register a mdiobus

2018-11-30 Thread Steve Douthit
On 11/30/18 12:43 PM, Florian Fainelli wrote: > > > On 11/30/2018 9:34 AM, Steve Douthit wrote: >> On 11/30/18 11:34 AM, Andrew Lunn wrote: Yep, registering multiple interfaces is wrong. The first board I tested against only had a single MAC enabled (they can be disabled/hidden via

Re: [PATCH] net: tcp: add correct check for tcp_retransmit_skb()

2018-11-30 Thread Yuchung Cheng
On Fri, Nov 30, 2018 at 10:28 AM Sharath Chandra Vurukala wrote: > > when the tcp_retranmission_timer expires and tcp_retranmsit_skb is > called if the retranmsission fails due to local congestion, > backoff should not incremented. > > tcp_retransmit_skb() returns non-zero negative value in some

Re: [PATCH] net: tcp: add correct check for tcp_retransmit_skb()

2018-11-30 Thread Eric Dumazet
On 11/30/2018 10:28 AM, Sharath Chandra Vurukala wrote: > when the tcp_retranmission_timer expires and tcp_retranmsit_skb is > called if the retranmsission fails due to local congestion, > backoff should not incremented. > > tcp_retransmit_skb() returns non-zero negative value in some cases of

Re: [PATCH iproute2] stats output

2018-11-30 Thread David Ahern
On 11/30/18 11:12 AM, Stephen Hemminger wrote: > I can understand why you would want this, but it is changing the > behavior of an existing command that might be used in scripts. +1

[PATCH] net: tcp: add correct check for tcp_retransmit_skb()

2018-11-30 Thread Sharath Chandra Vurukala
when the tcp_retranmission_timer expires and tcp_retranmsit_skb is called if the retranmsission fails due to local congestion, backoff should not incremented. tcp_retransmit_skb() returns non-zero negative value in some cases of failure but the caller tcp_retransmission_timer() has a check for

Re: [PATCH iproute2] stats output

2018-11-30 Thread Roopa Prabhu
On Fri, Nov 30, 2018 at 10:12 AM Stephen Hemminger wrote: > > On Fri, 30 Nov 2018 14:33:49 +0100 > Alexis Vachette wrote: > > > When using: > > > > - ip -s link > > > > I think it should be better to print errors stats without adding -s > > option twice. > > > > This option print stats for each

Re: [iproute PATCH] ssfilter: Fix for inverted last expression

2018-11-30 Thread Eric Dumazet
On 11/29/2018 04:20 AM, Phil Sutter wrote: > When fixing for shift/reduce conflicts, possibility to invert the last > expression by prefixing with '!' or 'not' was accidentally removed. > > Fix this by allowing for expr to be an inverted expr so that any > reference to it in exprlist accepts

  1   2   >