On Fri, 2015-05-22 at 04:58 -0500, Eric W. Biederman wrote:
ip_error does not check if in_dev is NULL before dereferencing it.
Therefore handle this weird case by just dropping the packet if
!in_dev. It will result in dropping the packet sooner, and will not
result in an actual change of
ip_error does not check if in_dev is NULL before dereferencing it.
IThe following sequence of calls is possible:
CPU A CPU B
ip_rcv_finish
ip_route_input_noref()
ip_route_input_slow()
inetdev_destroy()
dst_input()
With the
From: Dave Jones da...@codemonkey.org.uk
After improving setsockopt() coverage in trinity, I started triggering
vmalloc failures pretty reliably from this code path:
warn_alloc_failed+0xe9/0x140
__vmalloc_node_range+0x1be/0x270
vzalloc+0x4b/0x50
__do_replace+0x52/0x260 [ip_tables]
From: Florian Westphal f...@strlen.de
This reverts commit c055d5b03bb4cb69d349d787c9787c0383abd8b2.
There are two issues:
'dnat_took_place' made me think that this is related to
-j DNAT/MASQUERADE.
But thats only one part of the story. This is also relevant for SNAT
when we undo snat
From: Francesco Ruggeri frugg...@aristanetworks.com
nfnetlink_{log,queue}_init() register the netlink callback nf*_rcv_nl_event
before registering the pernet_subsys, but the callback relies on data
structures allocated by pernet init functions.
When nfnetlink_{log,queue} is loaded, if a netlink
Hi David,
The following patchset contain Netfilter fixes for your net tree, they are:
1) Fix a race in nfnetlink_log and nfnetlink_queue that can lead to a crash.
This problem is due to wrong order in the per-net registration and netlink
socket events. Patch from Francesco Ruggeri.
2)
On Thu, 2015-05-21 at 22:46 +0200, Arend van Spriel wrote:
On 05/21/15 19:32, Takashi Iwai wrote:
Well, if the probe requires the access to a user-space file, it can't
be done during resume. That's the very problem we're seeing now.
The firmware loader can't help much alone if it's a new
On 21 May 2015 at 15:39, Kalle Valo kv...@codeaurora.org wrote:
Hi Dave,
here's a wireless-drivers pull request for 4.2. This time please pay
extra attention to this pull as there are two problems:
First of all as you can see the diffstat from git-pull-request in the
end is just weird. I
The tx_curr_frame_payload field is u32. When we try to calculate a
small negative delta based on it, we end up with a positive integer
close to 2^32 instead. So the tx_bytes pointer increases by about
2^32 for every transmitted frame.
Fix by calculating the delta as a signed long.
Cc: Ben
Add support for flashing 10GBaseT adapter with BCM 84834 PHY and
Aquantia AQ1202 PHY.
Updating of the PHY firmware must happen before the INITIALIZE_CMD.
Signed-off-by: Hariprasad Shenai haripra...@chelsio.com
---
drivers/net/ethernet/chelsio/cxgb4/cxgb4.h | 39 -
Hi all,
I'm experiencing xen-netfront crash when doing xl network-detach while
some network activity is going on at the same time. It happens only when
domU has more than one vcpu. Not sure if this matters, but the backend
is in another domU (not dom0). I'm using Xen 4.2.2. It happens on kernel
On 05/21/15 14:58, Uwe Kleine-König wrote:
Hello,
My picture of the network stack might be wrong, but if the ethernet
driver queues say 5 packets to the network stack and the fourth is a MRP
packet than a priorization that makes the fourth packet processed first
would be nice.
If there is
On 22 May 2015 at 14:27, Kalle Valo kv...@codeaurora.org wrote:
Michal Kazior michal.kaz...@tieto.com writes:
On 21 May 2015 at 15:39, Kalle Valo kv...@codeaurora.org wrote:
[...]
+ static int ath10k_vdev_start_restart(struct ath10k_vif *arvif,
+const struct
Michal Kazior michal.kaz...@tieto.com writes:
On 21 May 2015 at 15:39, Kalle Valo kv...@codeaurora.org wrote:
Secondly there's a non-trivial conflict in
drivers/net/wireless/ath/ath10k/mac.c which is due to removal of
FIF_PROMISC_IN_BSS in commit df1404650c. You need to remove more code
Network managers like netifd (used in OpenWRT for instance) try to
configure interface options after creation but before setting the
interface up.
Unfortunately the sysfs / bridge currently only allows to configure the
hash_max and multicast_router options when the bridge interface is up.
But
Use the new zynq binding for macb ethernet, since it will disable half
duplex gigabit like the Zynq TRM says to do.
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
---
arch/arm/boot/dts/zynq-7000.dtsi |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
---
Documentation/devicetree/bindings/net/cdns-emac.txt |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Documentation/devicetree/bindings/net/cdns-emac.txt
b/Documentation/devicetree/bindings/net/cdns-emac.txt
index
According to the Zynq TRM, gigabit half duplex is not supported. Add a
new cap and compatible string so Zynq can avoid advertising that mode.
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
---
drivers/net/ethernet/cadence/macb.c | 12
drivers/net/ethernet/cadence/macb.h |
output path tests:
if (skb-len mtu) ip_fragment()
This breaks connectivity in one corner case:
If the skb was reassembled, but has the DF bit set and ..
.. its reassembled size is = outdev mtu ..
.. we will forward a DF packet larger than what the sender
transmitted on wire.
If a
We currently always send fragments without DF bit set.
Thus, given following setup:
mtu1500 - mtu1500:1400 - mtu1400:1280 - mtu1280
A R1 R2 B
Where R1 and R2 run linux with netfilter defragmentation/conntrack
enabled, then if Host A sent a fragmented packet
ip_skb_dst_mtu is small inline helper, but its called in several places.
before: 17061 44 0 1710542d1 net/ipv4/ip_output.o
after: 16805 44 0 1684941d1 net/ipv4/ip_output.o
Signed-off-by: Florian Westphal f...@strlen.de
---
net/ipv4/ip_output.c | 19
On 05/22/2015 02:50 AM, Hannes Frederic Sowa wrote:
On Do, 2015-05-21 at 09:25 -0700, Mark Salyzyn wrote:
got a rare NULL pointer dereference in clear_bit
Signed-off-by: Mark Salyzyn saly...@android.com
---
net/unix/af_unix.c | 5 +
1 file changed, 5 insertions(+)
diff --git
got a rare NULL pointer dereference in clear_bit
Signed-off-by: Mark Salyzyn saly...@android.com
v2: switch to sock_flag(sk, SOCK_DEAD) and added net/caif/caif_socket.c
net/caif/caif_socket.c | 4
net/unix/af_unix.c | 4
2 files changed, 8 insertions(+)
diff --git
Il 22.05.2015 14:08 Eric Dumazet ha scritto:
On Fri, 2015-05-22 at 04:58 -0500, Eric W. Biederman wrote:
ip_error does not check if in_dev is NULL before dereferencing it.
Therefore handle this weird case by just dropping the packet if
!in_dev. It will result in dropping the packet sooner,
On Fri, May 22, 2015 at 1:14 AM, Jiri Pirko j...@resnulli.us wrote:
Fri, May 22, 2015 at 02:11:44AM CEST, t...@herbertland.com wrote:
In flow_dissector set the flow label in flow_keys for IPv6. This also
removes the shortcircuiting of flow dissection when a non-zero label
is present, the flow
On Fri, May 22, 2015 at 12:57 AM, Jiri Pirko j...@resnulli.us wrote:
Fri, May 22, 2015 at 02:11:40AM CEST, t...@herbertland.com wrote:
This patch adds full IPv6 addresses into flow_keys and uses them as
input to the flow hash function. The implementation supports either
IPv4 or IPv6 addresses in
Fri, May 22, 2015 at 05:14:21PM CEST, t...@herbertland.com wrote:
On Fri, May 22, 2015 at 1:14 AM, Jiri Pirko j...@resnulli.us wrote:
Fri, May 22, 2015 at 02:11:44AM CEST, t...@herbertland.com wrote:
In flow_dissector set the flow label in flow_keys for IPv6. This also
removes the shortcircuiting
On Fr, 2015-05-22 at 16:32 +0200, Florian Westphal wrote:
We currently always send fragments without DF bit set.
Thus, given following setup:
mtu1500 - mtu1500:1400 - mtu1400:1280 - mtu1280
A R1 R2 B
Where R1 and R2 run linux with netfilter
-Original Message-
From: Intel-wired-lan [mailto:intel-wired-lan-boun...@lists.osuosl.org] On
Behalf Of Hiroshi Shimamoto
Sent: Thursday, May 21, 2015 7:31 PM
To: Skidmore, Donald C; Kirsher, Jeffrey T; intel-wired-
l...@lists.osuosl.org
Cc: nhor...@redhat.com; jogre...@redhat.com;
From: Michael Holzheu holz...@linux.vnet.ibm.com
Currently the testsuite does not have a test case with a backward jump.
The s390x JIT (kernel 4.0) had a bug in that area.
So add one new test case for this now.
Signed-off-by: Michael Holzheu holz...@linux.vnet.ibm.com
Signed-off-by: Alexei
When more than a multicast address is present in a MLDv2 report, all but
the first address is ignored, because the code breaks out of the loop if
there has not been an error adding that address.
This has caused failures when two guests connected through the bridge
tried to communicate using IPv6.
On Fr, 2015-05-22 at 16:32 +0200, Florian Westphal wrote:
ip_skb_dst_mtu is small inline helper, but its called in several places.
before: 17061 44 0 1710542d1 net/ipv4/ip_output.o
after: 16805 44 0 1684941d1 net/ipv4/ip_output.o
Signed-off-by: Florian
Le 22/05/2015 16:22, Nathan Sullivan a écrit :
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
Acked-by: Nicolas Ferre nicolas.fe...@atmel.com
---
Documentation/devicetree/bindings/net/cdns-emac.txt |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
On 21/05/15 23:52, David Miller wrote:
All of this work to allocate the buffer, add messages to it, and dump it
to some user obtainable location duplicates existing infrastructure in
the kernel.
Please do not do this, and instead use the kernel's existing tracing
infrastructure to implement
Le 22/05/2015 16:22, Nathan Sullivan a écrit :
According to the Zynq TRM, gigabit half duplex is not supported. Add a
new cap and compatible string so Zynq can avoid advertising that mode.
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
Acked-by: Nicolas Ferre nicolas.fe...@atmel.com
-Original Message-
From: Intel-wired-lan [mailto:intel-wired-lan-boun...@lists.osuosl.org] On
Behalf Of Hiroshi Shimamoto
Sent: Tuesday, May 19, 2015 5:04 PM
To: Kirsher, Jeffrey T; intel-wired-...@lists.osuosl.org
Cc: nhor...@redhat.com; jogre...@redhat.com; Choi, Sy Jong; Rony
On Fr, 2015-05-22 at 07:51 -0700, Mark Salyzyn wrote:
On 05/22/2015 02:50 AM, Hannes Frederic Sowa wrote:
On Do, 2015-05-21 at 09:25 -0700, Mark Salyzyn wrote:
got a rare NULL pointer dereference in clear_bit
Signed-off-by: Mark Salyzyn saly...@android.com
---
net/unix/af_unix.c | 5
On 05/22/2015 05:36 PM, Alexei Starovoitov wrote:
From: Michael Holzheu holz...@linux.vnet.ibm.com
Currently the testsuite does not have a test case with a backward jump.
The s390x JIT (kernel 4.0) had a bug in that area.
So add one new test case for this now.
Signed-off-by: Michael Holzheu
On 22/05/15 12:49, Marek Marczykowski-Górecki wrote:
Hi all,
I'm experiencing xen-netfront crash when doing xl network-detach while
some network activity is going on at the same time. It happens only when
domU has more than one vcpu. Not sure if this matters, but the backend
is in another
On Fri, May 22, 2015 at 8:18 AM, Thadeu Lima de Souza Cascardo
casca...@redhat.com wrote:
When more than a multicast address is present in a MLDv2 report, all but
the first address is ignored, because the code breaks out of the loop if
there has not been an error adding that address.
This has
| From: David Miller [da...@davemloft.net]
| Sent: Thursday, May 21, 2015 12:30 PM
|
| The prevailing assumption is that it's OK to have configuration
| settings that can't be undone.
|
| And that's bogus from the beginning.
Oh I definitely understand that and agree. Unfortunately I've
On 05/21/2015 06:10 AM, Hiroshi Shimamoto wrote:
From: Hiroshi Shimamoto h-shimam...@ct.jp.nec.com
Introduce module parameter disable_hw_vlan_filter to disable HW VLAN
filter on ixgbe module load.
From the hardware limitation, there are only 64 VLAN entries for HW VLAN
filter, and it leads
On 05/22/2015 08:35 AM, Hannes Frederic Sowa wrote:
I still wonder if we need to actually recheck the condition and not
simply break out of unix_stream_data_wait:
We return to the unix_stream_recvmsg loop and recheck the
sk_receive_queue. At this point sk_receive_queue is not really protected
On Fri, May 22, 2015 at 6:32 AM, Linus Lüssing linus.luess...@c0d3.blue wrote:
Changelog v2:
* remove another now unnecessary -ENOENT initialization
* consistently initialize to -EINVAL, allowing to shorten two switch-cases
Looks perfect now. :)
Thanks for update.
--
To unsubscribe from this
On 05/22/2015 04:40 AM, Michal Kubecek wrote:
When replacing an IPv4 route, tb_id member of the new fib_alias
structure is not set in the replace code path so that the new route is
ignored.
Fixes: 0ddcf43d5d4a (ipv4: FIB Local/MAIN table collapse)
Signed-off-by: Michal Kubecek mkube...@suse.cz
On Fri, May 22, 2015 at 05:25:44PM +0100, David Vrabel wrote:
On 22/05/15 12:49, Marek Marczykowski-Górecki wrote:
Hi all,
I'm experiencing xen-netfront crash when doing xl network-detach while
some network activity is going on at the same time. It happens only when
domU has more than
On 22/05/15 17:42, Marek Marczykowski-Górecki wrote:
On Fri, May 22, 2015 at 05:25:44PM +0100, David Vrabel wrote:
On 22/05/15 12:49, Marek Marczykowski-Górecki wrote:
Hi all,
I'm experiencing xen-netfront crash when doing xl network-detach while
some network activity is going on at the same
Signed-off-by: John W. Linville linvi...@tuxdriver.com
---
man/man8/ip-link.8.in | 26 +-
1 file changed, 25 insertions(+), 1 deletion(-)
diff --git a/man/man8/ip-link.8.in b/man/man8/ip-link.8.in
index 714aab488d4a..8cac246d7296 100644
--- a/man/man8/ip-link.8.in
+++
On Thu, May 21, 2015 at 03:19:01PM -0700, Stephen Hemminger wrote:
On Wed, 13 May 2015 13:02:28 -0400
John W. Linville linvi...@tuxdriver.com wrote:
Signed-off-by: John W. Linville linvi...@tuxdriver.com
Applied.
Please send update to man pages as well.
Sorry for that oversight...coming
On 22 May 2015 19:22:47 CEST, Ben Hutchings ben.hutchi...@codethink.co.uk
wrote:
On Fri, 2015-05-22 at 13:15 +0200, Bjørn Mork wrote:
The tx_curr_frame_payload field is u32. When we try to calculate a
small negative delta based on it, we end up with a positive integer
close to 2^32 instead.
Il 22.05.2015 20:24 David Miller ha scritto:
Looks good, applied and queued up for -stable, thanks!
That's great!
I think this should also be backported up to Linux mainline 3.10, since
the original commit that introduced the bug first appeared in 3.6.
--
To unsubscribe from this list: send
From: Linus Lüssing linus.luess...@c0d3.blue
Date: Fri, 22 May 2015 15:32:37 +0200
@@ -1786,14 +1784,8 @@ int br_multicast_set_router(struct net_bridge *br,
unsigned long val)
case 1:
br-multicast_router = val;
err = 0;
- break;
-
-
From: Nathan Sullivan nathan.sulli...@ni.com
Date: Fri, 22 May 2015 09:22:10 -0500
According to the Zynq TRM, gigabit half duplex is not supported. Add a
new cap and compatible string so Zynq can avoid advertising that mode.
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
Applied.
--
From: Nathan Sullivan nathan.sulli...@ni.com
Date: Fri, 22 May 2015 09:22:09 -0500
Signed-off-by: Nathan Sullivan nathan.sulli...@ni.com
Applied.
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at
From: Florian Westphal f...@strlen.de
Date: Fri, 22 May 2015 16:32:49 +0200
IP (ttl 64, id 12345, offset 0, flags [+, DF], proto UDP (17), length 1204)
192.168.7.1.42 10.23.42.2.42: UDP, length 1400
IP (ttl 64, id 12345, offset 1184, flags [DF], proto UDP (17), length 244)
From: Edward Cree ec...@solarflare.com
Date: Fri, 22 May 2015 15:49:46 +0100
On 21/05/15 23:52, David Miller wrote:
All of this work to allocate the buffer, add messages to it, and dump it
to some user obtainable location duplicates existing infrastructure in
the kernel.
Please do not do
From: Vittorio G (VittGam) linuxb...@vittgam.net
Date: Fri, 22 May 2015 20:48:38 +0200
Il 22.05.2015 20:24 David Miller ha scritto:
Looks good, applied and queued up for -stable, thanks!
That's great!
I think this should also be backported up to Linux mainline 3.10,
since
the original
From: Thadeu Lima de Souza Cascardo casca...@redhat.com
Date: Fri, 22 May 2015 12:18:59 -0300
When more than a multicast address is present in a MLDv2 report, all but
the first address is ignored, because the code breaks out of the loop if
there has not been an error adding that address.
From: Alexei Starovoitov a...@plumgrid.com
Date: Fri, 22 May 2015 08:36:40 -0700
From: Michael Holzheu holz...@linux.vnet.ibm.com
Currently the testsuite does not have a test case with a backward jump.
The s390x JIT (kernel 4.0) had a bug in that area.
So add one new test case for this now.
On Fri, May 22, 2015 at 05:58:41PM +0100, David Vrabel wrote:
On 22/05/15 17:42, Marek Marczykowski-Górecki wrote:
On Fri, May 22, 2015 at 05:25:44PM +0100, David Vrabel wrote:
On 22/05/15 12:49, Marek Marczykowski-Górecki wrote:
Hi all,
I'm experiencing xen-netfront crash when doing xl
From: Eric Dumazet eric.duma...@gmail.com
Date: Thu, 21 May 2015 21:51:19 -0700
From: Eric Dumazet eduma...@google.com
Taking socket spinlock in tcp_get_info() can deadlock, as
inet_diag_dump_icsk() holds the hashinfo-ehash_locks[i],
while packet processing can use the reverse locking
On Fri, 2015-05-22 at 10:56 -0700, Eric Dumazet wrote:
On Fri, 2015-05-22 at 13:50 -0400, David Miller wrote:
This bug exists in 'net' so I've applied it there.
Thanks Eric.
Oh thats right, sorry for this, as you'll probably have a conflict when
merging net into net-next.
Also I am
From: Jiri Pirko j...@resnulli.us
Date: Fri, 22 May 2015 11:05:58 +0200
This restored previous behaviour. If caller does not want ports to be
filled, we should not break.
Fixes: 06635a35d13d (flow_dissect: use programable dissector in
skb_flow_dissect and friends)
Signed-off-by: Jiri
From: Michal Kubecek mkube...@suse.cz
Date: Fri, 22 May 2015 13:40:09 +0200 (CEST)
When replacing an IPv4 route, tb_id member of the new fib_alias
structure is not set in the replace code path so that the new route is
ignored.
Fixes: 0ddcf43d5d4a (ipv4: FIB Local/MAIN table collapse)
From: Bjørn Mork bj...@mork.no
Date: Fri, 22 May 2015 13:15:22 +0200
The tx_curr_frame_payload field is u32. When we try to calculate a
small negative delta based on it, we end up with a positive integer
close to 2^32 instead. So the tx_bytes pointer increases by about
2^32 for every
On Fri, May 22, 2015, at 18:24, Mark Salyzyn wrote:
On 05/22/2015 08:35 AM, Hannes Frederic Sowa wrote:
I still wonder if we need to actually recheck the condition and not
simply break out of unix_stream_data_wait:
We return to the unix_stream_recvmsg loop and recheck the
From: Eric Dumazet eric.duma...@gmail.com
Date: Fri, 22 May 2015 11:08:39 -0700
On Fri, 2015-05-22 at 11:03 -0700, Eric Dumazet wrote:
Also I am wondering if not explicitly include linux/u64_stats_sync.h
could break one arch...
Sorry for the false alarm, we should be good because of
From: ebied...@xmission.com (Eric W. Biederman)
Date: Fri, 22 May 2015 04:58:12 -0500
ip_error does not check if in_dev is NULL before dereferencing it.
IThe following sequence of calls is possible:
CPU A CPU B
ip_rcv_finish
ip_route_input_noref()
From: Pablo Neira Ayuso pa...@netfilter.org
Date: Fri, 22 May 2015 12:34:03 +0200
The following patchset contain Netfilter fixes for your net tree, they are:
1) Fix a race in nfnetlink_log and nfnetlink_queue that can lead to a crash.
This problem is due to wrong order in the per-net
Il 22.05.2015 21:05 David Miller ha scritto:
From: Vittorio G (VittGam) linuxb...@vittgam.net
Date: Fri, 22 May 2015 20:48:38 +0200
I think this should also be backported up to Linux mainline 3.10,
since
the original commit that introduced the bug first appeared in 3.6.
Ummm, that's what
MCDI tracing is enabled per-function with a sysfs file
/sys/class/net/NET_DEV/device/mcdi_logging
Signed-off-by: Edward Cree ec...@solarflare.com
---
drivers/net/ethernet/sfc/Kconfig | 3 ++-
drivers/net/ethernet/sfc/efx.c | 49 ++--
MCDI tracing is conditional on CONFIG_SFC_MCDI_LOGGING, which is enabled
by default.
Each MCDI command will produce a console line like
sfc dom:bus:dev:fn ifname: MCDI RPC REQ: [...]
where etc. are the raw MCDI payload in 32-bit hex chunks.
The response will then
This patchset adds support for logging MCDI (Management-Controller-to-
Driver Interface) interactions between the sfc driver and a bound device,
to aid in debugging.
Solarflare has a tool to decode the resulting traces and will look to
open-source this if there is any external interest, but the
From: Jon Cooper jcoo...@solarflare.com
Prevents possible kernel memory disclosure from MCDI logging if some fields
of an MCDI request were not initialised, or if a response length is not a
multiple of 32 bits.
Signed-off-by: Edward Cree ec...@solarflare.com
---
As many issues are encountered at probe time, where MCDI logging can't be
enabled through the sysfs node, this change adds a module parameter
'mcdi_logging_default', which defaults to false. When set to true, newly-
probed functions will have MCDI logging enabled. The setting can
David Miller da...@davemloft.net wrote:
[ cc'd Maxime Bizon ]
From: Florian Westphal f...@strlen.de
Date: Fri, 22 May 2015 16:32:49 +0200
IP (ttl 64, id 12345, offset 0, flags [+, DF], proto UDP (17), length 1204)
192.168.7.1.42 10.23.42.2.42: UDP, length 1400
IP (ttl 64, id
On 19 May 2015, at 17:36, Wei Liu wei.l...@citrix.com wrote:
On Tue, May 12, 2015 at 07:18:32PM +0200, Joao Martins wrote:
On xenvif_start_xmit() we have an additional queue to the netback RX
kthread that will sends the packet. When using burst1 pktgen sets
skb-xmit_more to tell the driver
On Fri, 2015-05-22 at 11:03 -0700, Eric Dumazet wrote:
Also I am wondering if not explicitly include linux/u64_stats_sync.h
could break one arch...
Sorry for the false alarm, we should be good because of snmp.h
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of
From: Eric Dumazet eric.duma...@gmail.com
Date: Fri, 22 May 2015 10:56:36 -0700
On Fri, 2015-05-22 at 13:50 -0400, David Miller wrote:
This bug exists in 'net' so I've applied it there.
Thanks Eric.
Oh thats right, sorry for this, as you'll probably have a conflict when
merging net
On Fri, 2015-05-22 at 13:15 +0200, Bjørn Mork wrote:
The tx_curr_frame_payload field is u32. When we try to calculate a
small negative delta based on it, we end up with a positive integer
close to 2^32 instead. So the tx_bytes pointer increases by about
2^32 for every transmitted frame.
-Original Message-
From: Rose, Gregory V
Sent: Friday, May 22, 2015 8:08 AM
To: Hiroshi Shimamoto; Skidmore, Donald C; Kirsher, Jeffrey T; intel-wired-
l...@lists.osuosl.org
Cc: nhor...@redhat.com; jogre...@redhat.com; Linux Netdev List; Choi,
Sy Jong; Rony Efraim; David Miller;
On Wed, May 20, 2015 at 12:32 PM, Neil McKee neil.mc...@inmon.com wrote:
Directly associate a sampled packet with the path it takes through the
virtual switch.
Path information currently includes mangling, encapsulation and decapsulation
actions
for tunneling protocols GRE, VXLAN, Geneve,
On Fri, 2015-05-22 at 13:50 -0400, David Miller wrote:
This bug exists in 'net' so I've applied it there.
Thanks Eric.
Oh thats right, sorry for this, as you'll probably have a conflict when
merging net into net-next.
Thanks.
--
To unsubscribe from this list: send the line unsubscribe
From: Casey Leedom lee...@chelsio.com
Date: Fri, 22 May 2015 16:49:03 +
Oh I definitely understand that and agree. Unfortunately I've
inherited a driver architecture that makes that ... difficult
for many operations ... And I have an internal bug filed
against me to fix those
101 - 184 of 184 matches
Mail list logo