When not associated with an AP, wifi device drivers should respond to the
SIOCGIWESSID ioctl with a zero-length string for the SSID, which is the
behavior expected by dhcpcd.
Currently, this driver returns an error code (-1) from the ioctl call,
which causes dhcpcd to assume that the device is
Use timer_setup function instead of initializing timer with the
function and data fields.
net/nfc/core.c:1097:2-12: Use setup_timer function for function on line 1098
net/nfc/hci/core.c:1007:1-11: Use setup_timer function for function on line 1008
net/nfc/hci/llc_shdlc.c:766:1-11: Use setup_timer
Quoting Mahesh Bandewar (mah...@bandewar.net):
> From: Mahesh Bandewar
>
> Add a sysctl variable kernel.controlled_userns_caps_whitelist. This
> takes input as capability mask expressed as two comma separated hex
> u32 words. The mask, however, is stored in kernel as
Quoting Mahesh Bandewar (mah...@bandewar.net):
> From: Mahesh Bandewar
>
> With this new notion of "controlled" user-namespaces, the controlled
> user-namespaces are marked at the time of their creation while the
> capabilities of processes that belong to them are controlled
On Thu, Nov 23, 2017 at 06:36:07PM -0800, Jakub Kicinski wrote:
> Hi!
>
> The purpose of this series is to add a software model of BPF offloads
> to make it easier for everyone to test them and make some of the more
> arcane rules and assumptions more clear.
>
> The series starts with 3 patches
On 11/24/17 12:28 AM, Peter Zijlstra wrote:
On Thu, Nov 23, 2017 at 10:31:29PM -0800, Alexei Starovoitov wrote:
unfortunately 32-bit is more screwed than it seems:
$ cat align.c
#include
struct S {
unsigned long long a;
} s;
struct U {
unsigned long long a;
} u;
int main()
{
Hello My Dear Friend, with due respect to your person and much sincerity of
purpose, It’s my pleasure to write you today, I am Mr. Paul Harry, I work in a
bank. and I get your contact from internet search I hope that you will not
expose or betray this trust and confident that am about to repose
Sun, Nov 26, 2017 at 02:43:04AM CET, jakub.kicin...@netronome.com wrote:
>On Sat, 25 Nov 2017 17:02:09 -0800, Alexei Starovoitov wrote:
>> On Thu, Nov 23, 2017 at 06:36:07PM -0800, Jakub Kicinski wrote:
>> > Hi!
>> >
>> > The purpose of this series is to add a software model of BPF offloads
>> >
On Sat, 25 Nov 2017 17:02:09 -0800, Alexei Starovoitov wrote:
> On Thu, Nov 23, 2017 at 06:36:07PM -0800, Jakub Kicinski wrote:
> > Hi!
> >
> > The purpose of this series is to add a software model of BPF offloads
> > to make it easier for everyone to test them and make some of the more
> >
From: Jorgen Hansen
Date: Fri, 24 Nov 2017 06:25:28 -0800
> When using the host personality, VMCI will grab a mutex for any
> queue pair access. In the detach callback for the vmci vsock
> transport, we call vsock_stream_has_data while holding a spinlock,
> and
On Sat, Nov 25, 2017 at 2:14 PM, Gustavo A. R. Silva
wrote:
> gso_type is being used in binary AND operations together with SKB_GSO_UDP.
> The issue is that variable gso_type is of type unsigned short and
> SKB_GSO_UDP expands to more than 16 bits:
>
> SKB_GSO_UDP = 1 <<
From: Stephen Hemminger
Date: Fri, 24 Nov 2017 12:08:40 -0800
> New file seems to have missed the SPDX license scan and update.
>
> Signed-off-by: Stephen Hemminger
Applied, thanks Stephen.
From: Vivien Didelot
Date: Fri, 24 Nov 2017 11:36:06 -0500
> Setting the refcount to 0 when allocating a tree to match the number of
> switch devices it holds may cause an 'increment on 0; use-after-free',
> if CONFIG_REFCOUNT_FULL is enabled.
>
> To fix
gso_type is being used in binary AND operations together with SKB_GSO_UDP.
The issue is that variable gso_type is of type unsigned short and
SKB_GSO_UDP expands to more than 16 bits:
SKB_GSO_UDP = 1 << 16
this makes any binary AND operation between gso_type and SKB_GSO_UDP to
be always zero,
When not associated with an AP, wifi device drivers should respond to the
SIOCGIWESSID ioctl with a zero-length string for the SSID, which is the
behavior expected by dhcpcd.
Currently, this driver returns an error code (-1) from the ioctl call,
which causes dhcpcd to assume that the device is
GSO buffer size supported by underlying devices is not propagated to
veth. In high-speed connections with hw TSO enabled, veth sends buffers
bigger than lower device's maximum GSO, forcing sw TSO and increasing
system CPU usage.
Signed-off-by: Solio Sarabia
---
Exposing
On 11/25/2017 06:54 AM, David Miller wrote:
>
> Please repost this without the huge kernel config :-/
This does not appear to be necessary, this commit
96c623e51f1c40bf524decc48c6fac7ce5dd41f7 ("of: add
of_property_read_variable_* dummy helpers") fixes this already.
--
Florian
From: Jiri Pirko
Add json output to htb qdisc.
Signed-off-by: Jiri Pirko
---
tc/q_htb.c | 20 +---
1 file changed, 13 insertions(+), 7 deletions(-)
diff --git a/tc/q_htb.c b/tc/q_htb.c
index ffb43aa..3fc2acb 100644
--- a/tc/q_htb.c
+++
From: Jiri Pirko
Add json output to mirred action.
Signed-off-by: Jiri Pirko
---
tc/m_mirred.c | 46 --
1 file changed, 40 insertions(+), 6 deletions(-)
diff --git a/tc/m_mirred.c b/tc/m_mirred.c
index
From: Jiri Pirko
Add json output to stats2.
Signed-off-by: Jiri Pirko
---
tc/tc_util.c | 32 +++-
1 file changed, 23 insertions(+), 9 deletions(-)
diff --git a/tc/tc_util.c b/tc/tc_util.c
index 5532d40..d276987 100644
---
From: Jiri Pirko
Add json output to matchall filter.
Signed-off-by: Jiri Pirko
---
tc/f_matchall.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/tc/f_matchall.c b/tc/f_matchall.c
index 183f261..5ebd041 100644
---
From: Jiri Pirko
An example json output:
$ tc -s -j filter show dev ens8 egress
[{
"protocol": "ip",
"pref": 6001,
"kind": "flower",
"chain": 0
},{
"protocol": "ip",
"pref": 6001,
"kind": "flower",
"chain":
From: Jiri Pirko
Add json output to flower filter.
Signed-off-by: Jiri Pirko
---
tc/f_flower.c | 287 ++
1 file changed, 169 insertions(+), 118 deletions(-)
diff --git a/tc/f_flower.c
From: Jiri Pirko
Add json output to filter core.
Signed-off-by: Jiri Pirko
---
tc/tc_filter.c | 47 ++-
1 file changed, 30 insertions(+), 17 deletions(-)
diff --git a/tc/tc_filter.c b/tc/tc_filter.c
index
From: Jiri Pirko
Add json output to qdisc core.
Signed-off-by: Jiri Pirko
---
tc/tc.c | 5 -
tc/tc_qdisc.c | 52
tc/tc_util.h | 1 +
3 files changed, 37 insertions(+), 21 deletions(-)
diff
From: Jiri Pirko
Add json output to vlan action.
Signed-off-by: Jiri Pirko
---
tc/m_vlan.c | 26 --
1 file changed, 12 insertions(+), 14 deletions(-)
diff --git a/tc/m_vlan.c b/tc/m_vlan.c
index cccb499..44254b6 100644
---
From: Jiri Pirko
Add json output to actions core.
Signed-off-by: Jiri Pirko
---
tc/m_action.c | 22 +++---
tc/tc_util.c | 34 --
2 files changed, 39 insertions(+), 17 deletions(-)
diff --git
From: Jiri Pirko
Add json output to fq_codel qdisc.
Signed-off-by: Jiri Pirko
---
tc/q_fq_codel.c | 25 -
1 file changed, 16 insertions(+), 9 deletions(-)
diff --git a/tc/q_fq_codel.c b/tc/q_fq_codel.c
index 86c6fb2..fd1f59c
From: Jiri Pirko
Add json output to gact action.
Signed-off-by: Jiri Pirko
---
tc/m_gact.c | 18 +++---
1 file changed, 11 insertions(+), 7 deletions(-)
diff --git a/tc/m_gact.c b/tc/m_gact.c
index efe992f..905aa51 100644
--- a/tc/m_gact.c
From: Tonghao Zhang
Date: Wed, 22 Nov 2017 17:51:25 -0800
> This patch add a member in struct netns_core. And this is
> a counter for socket_inuse in the _net_ namespace. The patch
> will add/sub counter in the sk_alloc or sk_free. Because socket and
> sock is in pair.
Please repost this without the huge kernel config :-/
From: Aleksey Makarov
Date: Thu, 23 Nov 2017 22:34:31 +0300
> From: Sunil Goutham
>
> Don't offload IP header checksum to NIC.
>
> This fixes a previous patch which enabled checksum offloading
> for both IPv4 and IPv6 packets. So L3 checksum
From: Mika Westerberg
Date: Fri, 24 Nov 2017 14:05:36 +0300
> Commit 86dabda426ac ("net: thunderbolt: Clear finished Tx frame bus
> address in tbnet_tx_callback()") fixed a DMA-API violation where the
> driver called dma_unmap_page() in tbnet_free_buffers() for a
Fri, Nov 24, 2017 at 06:11:42PM CET, step...@networkplumber.org wrote:
>On Fri, 24 Nov 2017 09:28:21 +0100
>Jiri Pirko wrote:
>
>> From: Jiri Pirko
>>
>> Cookie print was made dependent on show_stats for no good reason. Fix
>> this bu pushing cookie print ot
From: Jiri Pirko
Jiri Pirko (2):
tc: move action cookie print out of the stats if
tc: remove action cookie len from printout
tc/m_action.c | 17 -
1 file changed, 8 insertions(+), 9 deletions(-)
--
2.9.5
From: Jiri Pirko
Make the output same as input and avoid printout of unnecessary len.
Suggested-by: Stephen Hemminger
Fixes: fd8b3d2c1b9b ("actions: Add support for user cookies")
Signed-off-by: Jiri Pirko
---
tc/m_action.c |
From: Jiri Pirko
Cookie print was made dependent on show_stats for no good reason. Fix
this bu pushing cookie print ot of the stats if.
Fixes: fd8b3d2c1b9b ("actions: Add support for user cookies")
Signed-off-by: Jiri Pirko
---
tc/m_action.c | 17
No need to reinvent the wheel, we have bus_find_device_by_name().
Cc: Grygorii Strashko
Signed-off-by: Lukas Wunner
---
drivers/net/ethernet/ti/davinci_emac.c | 9 ++---
1 file changed, 2 insertions(+), 7 deletions(-)
diff --git
Now when doing asoc reset, it cleans up sacked and abandoned queues
by calling sctp_outq_free where it also cleans up unsent, retransmit
and transmitted queues.
It's safe for the sender of response, as these 3 queues are empty at
that time. But when the receiver of response is doing the reset,
When doing asoc reset, if the sender of the response has already sent some
chunk and increased asoc->next_tsn before the duplicate request comes, the
response will use the old result with an incorrect sender next_tsn.
Better than asoc->next_tsn, asoc->ctsn_ack_point can't be changed after
the
This patchset is to make stream reset and asoc reset work more correctly
for stream reconfig.
Thank to Marcelo making them very clear.
Xin Long (5):
sctp: use sizeof(__u16) for each stream number length instead of magic
number
sctp: only allow the out stream reset when the stream outq is
Now in stream reconf part there are still some places using magic
number 2 for each stream number length. To make it more readable,
this patch is to replace them with sizeof(__u16).
Reported-by: Marcelo Ricardo Leitner
Signed-off-by: Xin Long
---
As it says in rfc6525#section5.1.4, before sending the request,
C2: The sender has either no outstanding TSNs or considers all
outstanding TSNs abandoned.
Prior to this patch, it tried to consider all outstanding TSNs abandoned
by dropping all chunks in all outqs with sctp_outq_free
Now the out stream reset in sctp stream reconf could be done even if
the stream outq is not empty. It means that users can not be sure
since which msg the new ssn will be used.
To make this more synchronous, it shouldn't allow to do out stream
reset until these chunks in unsent outq all are sent
Now for the abandoned chunks in unsent outq, it would just free the chunks.
Because no tsn is assigned to them yet, there's no need to send fwd tsn to
peer, unlike for the abandoned chunks in sent outq.
The problem is when parts of the msg have been sent and the other frags
are still in unsent
Now outstanding_bytes is only increased when appending chunks into one
packet and sending it at 1st time, while decreased when it is about to
move into retransmit queue. It means outstanding_bytes value is already
decreased for all chunks in retransmit queue.
However sctp_prsctp_prune_sent is a
As rfc3758#section-3.1 demands:
A3) When a TSN is "abandoned", if it is part of a fragmented message,
all other TSN's within that fragmented message MUST be abandoned
at the same time.
Besides, if it couldn't handle this, the rest frags would never get
assembled in peer side.
Now when abandoning chunks in prsctp, it doesn't consider for frags in
one msg, which would cause peer can never receive the whole frags for
one msg to get them reassembled, these pieces of this msg will stay in
the reasm queue forever and block the following chunks' receiving.
This patchset is
From: zhangliping
If we want to add a datapath flow, which has more than 500 vxlan outputs'
action, we will get the following error reports:
openvswitch: netlink: Flow action size 32832 bytes exceeds max
openvswitch: netlink: Flow action size 32832 bytes exceeds max
49 matches
Mail list logo