From: Eric Dumazet
Date: Sat, 24 Oct 2015 05:47:44 -0700
> From: Eric Dumazet
>
> gre_gso_segment() chokes if SIT frames were aggregated by GRO engine.
>
> Fixes: 61c1db7fae21e ("ipv6: sit: add GSO/TSO support")
> Signed-off-by: Eric Dumazet
From: Masashi Honma
Date: Sun, 25 Oct 2015 11:44:27 +0900
> The fib6_get_table() is called twice to show the warning.
> This patch reduces calling the function.
>
> Signed-off-by: Masashi Honma
I think the added cost of passing a reference to
On 10/26/2015 04:30 PM, Michael S. Tsirkin wrote:
> On Mon, Oct 26, 2015 at 02:53:38PM +0800, Jason Wang wrote:
>>
>> On 10/26/2015 02:09 PM, Michael S. Tsirkin wrote:
>>> On Mon, Oct 26, 2015 at 11:15:57AM +0800, Jason Wang wrote:
On 10/23/2015 09:37 PM, Michael S. Tsirkin wrote:
> On
On Mon, Oct 26, 2015 at 05:02:19PM -0700, Yang Shi wrote:
> Define aarch64 specific registers for building bpf samples correctly.
>
> Signed-off-by: Yang Shi
looks good to me.
Acked-by: Alexei Starovoitov
--
To unsubscribe from this list: send the line
From: Alexei Starovoitov
Date: Fri, 23 Oct 2015 14:58:19 -0700
> exported perf symbols are GPL only, mark eBPF helper functions
> used in tracing as GPL only as well.
>
> Suggested-by: Peter Zijlstra
> Signed-off-by: Alexei Starovoitov
From: Michael Grzeschik
Date: Mon, 26 Oct 2015 09:23:14 +0100
> This series includes code simplifaction. The main changes are the correct
> xceiver handling (enable/disable) of the com20020 cards. The driver now
> handles
> link status change detection. The EAE
On Tue, Oct 27, 2015 at 09:23:59AM +0900, Tycho Andersen wrote:
> This patch adds support for dumping a process' (classic BPF) seccomp
> filters via ptrace.
>
> PTRACE_SECCOMP_GET_FILTER allows the tracer to dump the user's classic BPF
> seccomp filters. addr should be an integer which represents
Hi Roopa,
[auto build test ERROR on net-next/master -- if it's inappropriate base, please
suggest rules for selecting the more suitable base]
url:
From: Bjørn Mork
Date: Sat, 24 Oct 2015 14:00:20 +0200
> Messages like "icmp6_send: no reply to icmp error" are close
> to useless. Adding source and destination addresses to provide
> some more clue.
>
> Signed-off-by: Bjørn Mork
This is fine, applied, thanks.
On Mon, Oct 26, 2015, at 15:19, Tom Herbert wrote:
> > We already concluded that drivers do have this problem and not the stack
> > above ip6_fragment. The places I am aware of I fixed in this patch. Also
> > IPv4 to me seems unaffected, albeit one can certainly clean up the logic
> > in
netfilter: nf_conntrack: fix RCU race in nf_conntrack_find_get
Lets look at destroy_conntrack:
hlist_nulls_del_rcu(>tuplehash[IP_CT_DIR_ORIGINAL].hnnode);
...
nf_conntrack_free(ct)
kmem_cache_free(net->ct.nf_conntrack_cachep, ct);
net->ct.nf_conntrack_cachep is created with
2015-10-25 22:11 GMT-02:00 Thomas F Herbert :
> Signed-off-by: Thomas F Herbert
> ---
> include/linux/if_vlan.h | 16
> 1 file changed, 16 insertions(+)
>
> diff --git a/include/linux/if_vlan.h b/include/linux/if_vlan.h
> index
We are upgrading our email system to Microsoft Outlook Webaccess 2015.
This service creates more space and easy access to email. Please update
your account by clicking on the link below and fill information for
activation.
CLICK HERE https://formcrafts.com/a/systadmin
Inability to complete the
On 2015/10/26 20:32, Peter Zijlstra wrote:
On Sun, Oct 25, 2015 at 09:23:36AM -0700, Alexei Starovoitov wrote:
bpf_perf_event_read() muxes of -EINVAL into return value, but it's non
ambiguous to the program whether it got an error or real counter value.
How can that be, the (u64)-EINVAL
On Fri, Oct 23, 2015 at 4:50 PM, Bendik Rønning Opstad
wrote:
>@@ -2409,6 +2412,15 @@ static int do_tcp_setsockopt(struct sock *sk, int level,
...
> + case TCP_RDB:
> + if (val < 0 || val > 1) {
> + err = -EINVAL;
> + }
On Fri, Oct 23, 2015 at 05:44:44PM +0800, Joe Jin wrote:
> Should not allocate xen vif queues number more than online cpus.
I think it's absolutely fine for administrators to override the value
should they choose to.
Wei.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
> We already concluded that drivers do have this problem and not the stack
> above ip6_fragment. The places I am aware of I fixed in this patch. Also
> IPv4 to me seems unaffected, albeit one can certainly clean up the logic
> in net-next.
>
I don't understand why checksum for IP fragments is a
From: Bert Kenward
This patch reduces the overhead of locking for busy poll.
Previously the state was protected by a lock, whereas now
it's manipulated solely with atomic operations.
Signed-off-by: Shradha Shah
---
drivers/net/ethernet/sfc/efx.c
Take into consideration that the interface might be disabled for IPv6,
thus switch event type.
Signed-off-by: Hannes Frederic Sowa
---
net/ipv6/addrconf.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/net/ipv6/addrconf.c
On 10/25/2015 10:36 PM, Lan Tianyu wrote:
On 2015年10月24日 02:36, Alexander Duyck wrote:
I was thinking about it and I am pretty sure the dummy write approach is
problematic at best. Specifically the issue is that while you are
performing a dummy write you risk pulling in descriptors for data
We are upgrading our email system to Microsoft Outlook Webaccess 2015.
This service creates more space and easy access to email. Please update
your account by clicking on the link below and fill information for
activation.
CLICK HERE https://formcrafts.com/a/systadmin
Inability to complete the
netstamp_needed is toggled for all socket families if they request
timestamping. But some protocols don't need the lower-layer timestamping
code at all. This patch starts disabling it for af-unix.
E.g. systemd enables timestamping during boot-up on the journald af-unix
sockets, thus causing the
On Mon, Oct 26, 2015 at 01:51:37PM +0100, Hannes Frederic Sowa wrote:
> netstamp_needed is toggled for all socket families if they request
> timestamping. But some protocols don't need the lower-layer timestamping
> code at all. This patch starts disabling it for af-unix.
What problem is this
Hello,
On Mon, Oct 26, 2015, at 14:19, Richard Cochran wrote:
> On Mon, Oct 26, 2015 at 01:51:37PM +0100, Hannes Frederic Sowa wrote:
> > netstamp_needed is toggled for all socket families if they request
> > timestamping. But some protocols don't need the lower-layer timestamping
> > code at
Signed-off-by: Robert Dolca
---
include/net/nfc/nci_core.h | 8
net/nfc/nci/core.c | 16
2 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/include/net/nfc/nci_core.h b/include/net/nfc/nci_core.h
index 530df66..1e3db2b
On Sun, Oct 25, 2015 at 09:23:36AM -0700, Alexei Starovoitov wrote:
> bpf_perf_event_read() muxes of -EINVAL into return value, but it's non
> ambiguous to the program whether it got an error or real counter value.
How can that be, the (u64)-EINVAL value is a valid counter value..
unlikely maybe,
We are upgrading our email system to Microsoft Outlook Webaccess 2015.
This service creates more space and easy access to email. Please update
your account by clicking on the link below and fill information for
activation.
CLICK HERE https://formcrafts.com/a/systadmin
Inability to complete the
Hi Alex,
On Mon, Oct 26, 2015, at 16:52, Alexander Duyck wrote:
> On 10/26/2015 07:36 AM, Hannes Frederic Sowa wrote:
> > Take into consideration that the interface might be disabled for IPv6,
> > thus switch event type.
> >
> > Signed-off-by: Hannes Frederic Sowa
> >
On 10/26/2015 07:36 AM, Hannes Frederic Sowa wrote:
Take into consideration that the interface might be disabled for IPv6,
thus switch event type.
Signed-off-by: Hannes Frederic Sowa
---
net/ipv6/addrconf.c | 7 +--
1 file changed, 5 insertions(+), 2
On 10/24/2015 06:32 AM, Brian Rak wrote:
On 10/23/2015 6:32 PM, Alexander Duyck wrote:
On 10/23/2015 02:34 PM, Brian Rak wrote:
I've got a weird situation here. I have a route that the kernel knows
about, but won't display via the general RTM_GETROUTE call, but will
display if I query for
From: Carol L Soto
If the caps.eqe_size is bigger than the struct mlx4_eqe then there
is a potential for corrupting data at the master context. We can see
the message "Master failed to generate an EQE for slave: X" when the
event_eqe array wraps and we can see
Ported earlier patch from Jason Wang (dated 12/26/2014).
This patch tries to reduce the number of MSIX irqs required for
virtio-net by sharing a MSIX irq for each TX/RX queue pair through
channels. If transport support channel, about half of the MSIX irqs
were reduced.
Signed-off-by: Ravi Kerur
Port earlier patch from Jason Wang (dated 12/26/2014).
This patch lets vp_find_vqs function accept channel parameters.
For the transports that do not support channel currently, all
the parameters are ignored. For the device that does not use channel,
it can simply pass NULL to transport.
Port earlier patch from Jason Wang (dated 12/26/2014).
This patch introduces virtio pci channel which are virtqueue groups
that sharing a single MSIX irq. This can be used to reduce the irqs
needed by virtio device.
The channel are in fact a list of virtqueues, and vp_channel_interrupt()
was
On Fri, Oct 23, 2015 at 06:59:57AM -0700, David Miller wrote:
> From: Michal Hocko
> Date: Fri, 23 Oct 2015 15:19:56 +0200
>
> > On Thu 22-10-15 00:21:33, Johannes Weiner wrote:
> >> Socket memory can be a significant share of overall memory consumed by
> >> common workloads.
On 10/26/2015 11:28 AM, Alexander Duyck wrote:
On 10/24/2015 06:32 AM, Brian Rak wrote:
On 10/23/2015 6:32 PM, Alexander Duyck wrote:
On 10/23/2015 02:34 PM, Brian Rak wrote:
I've got a weird situation here. I have a route that the kernel knows
about, but won't display via the general
On 10/26/2015 9:46 AM, Sowmini Varadhan wrote:
Either of pskb_pull() or pskb_trim() may fail under low memory conditions.
If rds_tcp_data_recv() ignores such failures, the application will
receive corrupted data because the skb has not been correctly
carved to the RDS datagram size.
Avoid this
On Wed, Oct 21, 2015 at 11:36:23AM +0100, Paul Durrant wrote:
> If the frontend indicates it's capable (see netif.h for details) and an
> skb has an L4 or L3 hash value then pass the value to the frontend in
> a xen_netif_extra_info segment.
>
> Signed-off-by: Paul Durrant
On Wed, Oct 21, 2015 at 11:36:25AM +0100, Paul Durrant wrote:
> This patch adds all the necessary infrastructure to allow a frontend to
> specify toeplitz hashing of network packets on its receive side. (See
> netif.h for details of the xenbus protocol).
>
> The toeplitz hash algorithm itself was
On Wed, Oct 21, 2015 at 11:36:18AM +0100, Paul Durrant wrote:
> The canonical netif header (in the Xen source repo) and the Linux variant
> have diverged significantly. Recently much documentation has been added to
> the canonical header and new definitions and types to support packet hash
>
On Wed, Oct 21, 2015 at 11:36:19AM +0100, Paul Durrant wrote:
> The code in net_rx_action() that builds rx responses has direct access
> to the skb so there is no need to copy this information into the meta
> structure.
>
> This patch removes the extraneous fields, saves space in the array and
>
On Wed, Oct 21, 2015 at 11:36:20AM +0100, Paul Durrant wrote:
> The code does not currently allow a frontend to pass multiple extra info
> segments to the backend in a tx request. A subsequent patch in this series
> needs this functionality so it is added here, without any other
> modification,
Hi Alex,
On Mon, Oct 26, 2015, at 18:07, Alexander Duyck wrote:
> >> Seems like this code isn't quite correct. You are calling ipv6_add_dev
> >> for slave devices, and if I understand things correctly I don't believe
> >> that was happening before and may be an unintended side effect.
> > Hmm,
On Thu, Oct 22, 2015 at 09:45:10PM +0300, Vladimir Davydov wrote:
> Hi Johannes,
>
> On Thu, Oct 22, 2015 at 12:21:28AM -0400, Johannes Weiner wrote:
> ...
> > Patch #5 adds accounting and tracking of socket memory to the unified
> > hierarchy memory controller, as described above. It uses the
Hello Alex,
On Mon, Oct 26, 2015, at 16:52, Alexander Duyck wrote:
> Seems like this code isn't quite correct. You are calling ipv6_add_dev
> for slave devices, and if I understand things correctly I don't believe
> that was happening before and may be an unintended side effect.
Ah, btw.,
Either of pskb_pull() or pskb_trim() may fail under low memory conditions.
If rds_tcp_data_recv() ignores such failures, the application will
receive corrupted data because the skb has not been correctly
carved to the RDS datagram size.
Avoid this by handling pskb_pull/pskb_trim failure in the
On Mon, Oct 26, 2015 at 5:15 PM, wrote:
> From: Carol L Soto
>
> If the caps.eqe_size is bigger than the struct mlx4_eqe then there
> is a potential for corrupting data at the master context. We can see
> the message "Master failed to
On Wed, Oct 21, 2015 at 11:36:21AM +0100, Paul Durrant wrote:
> This patch adds an indication that netback is capable of handling hash
> values passed from the frontend (see netif.h for details), and the code
> necessary to process the additional xen_netif_extra_info segment and
> set a hash on
On Wed, Oct 21, 2015 at 11:36:24AM +0100, Paul Durrant wrote:
> Advertise the capability to handle a hash mapping specified by the
> frontend (see netif.h for details).
>
> Add an ndo_select() entry point so that, of the frontend does specify a
"if the frontend ..."
> hash mapping, the skb hash
Forcedeth currently uses disable_irq_lockdep and enable_irq_lockdep, which in
some configurations simply calls local_irq_disable. This causes errant warnings
in the netpoll path as in netpoll_send_skb_on_dev, where we disable irqs using
local_irq_save, leading to the following warning:
WARNING:
On 10/26/2015 09:05 AM, Hannes Frederic Sowa wrote:
Hi Alex,
On Mon, Oct 26, 2015, at 16:52, Alexander Duyck wrote:
On 10/26/2015 07:36 AM, Hannes Frederic Sowa wrote:
Take into consideration that the interface might be disabled for IPv6,
thus switch event type.
Signed-off-by: Hannes
On 10/26/2015 12:02 PM, Or Gerlitz wrote:
On Mon, Oct 26, 2015 at 5:15 PM, wrote:
From: Carol L Soto
If the caps.eqe_size is bigger than the struct mlx4_eqe then there
is a potential for corrupting data at the master context. We can
This change makes it so that we reinitialize the interface if the MTU is
increased back above IPV6_MIN_MTU and the interface is up.
Cc: Hannes Frederic Sowa
Signed-off-by: Alexander Duyck
---
net/ipv6/addrconf.c | 46
Hi Ravi,
[auto build test ERROR on char-misc/char-misc-next -- if it's inappropriate
base, please suggest rules for selecting the more suitable base]
url:
https://github.com/0day-ci/linux/commits/Ravi-Kerur/virtio-net-Using-single-MSIX-IRQ-for-TX-RX-Q-pair/20151027-015503
config:
Hi Ravi,
[auto build test WARNING on char-misc/char-misc-next -- if it's inappropriate
base, please suggest rules for selecting the more suitable base]
url:
https://github.com/0day-ci/linux/commits/Ravi-Kerur/virtio-net-Using-single-MSIX-IRQ-for-TX-RX-Q-pair/20151027-015503
config:
Hi Eric,
>
> When the op_mode sends an skb whose payload is bigger than
> MSS, PCIe will create an A-MSDU out of it. PCIe assumes
> that the skb that is coming from the op_mode can fit in one
> A-MSDU. It is the op_mode's responsibility to make sure
> that this guarantee holds.
>
> Additional
101 - 156 of 156 matches
Mail list logo