Re: [PATCH, net-next] perf, bpf: fix conditional call to bpf_overflow_handler

2016-09-07 Thread Peter Zijlstra
On Thu, Sep 08, 2016 at 08:30:52AM +0200, Ingo Molnar wrote: > > Thanks for the fix. Just saw build bot complaining last night and > > by the morning your fix is already here. Thanks! > > Guys, this is the first time I saw this patch (and presumably there's some > other > patch as well?) - could

[PATCH 13/17] xfrm: policy: only use rcu in xfrm_sk_policy_lookup

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Don't acquire the readlock anymore and rely on rcu alone. In case writer on other CPU changed policy at the wrong moment (after we obtained sk policy pointer but before we could obtain the reference) just repeat the lookup. Signed-off-by: Florian Westphal Signed-off-by:

[PATCH 08/17] xfrm: policy: use rcu versions for iteration and list add/del

2016-09-07 Thread Steffen Klassert
From: Florian Westphal This is required once we allow lockless readers. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- net/xfrm/xfrm_policy.c | 14 +++--- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c

[PATCH 11/17] xfrm: policy: use atomic_inc_not_zero in rcu section

2016-09-07 Thread Steffen Klassert
From: Florian Westphal If we don't hold the policy lock anymore the refcnt might already be 0, i.e. policy struct is about to be free'd. Switch to atomic_inc_not_zero to avoid this. On removal policies are already unlinked from the tables (lists) before the last _put occurs so we are not suppos

[PATCH 15/17] xfrm: policy: convert policy_lock to spinlock

2016-09-07 Thread Steffen Klassert
From: Florian Westphal After earlier patches conversions all spots acquire the writer lock and we can now convert this to a normal spinlock. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- include/net/netns/xfrm.h | 2 +- net/xfrm/xfrm_policy.c | 68

Re: [PATCH net-next] net: xfrm: Change u32 sysctl entries to use proc_douintvec

2016-09-07 Thread Steffen Klassert
On Wed, Sep 07, 2016 at 05:25:18PM -0700, David Miller wrote: > From: Subash Abhinov Kasiviswanathan > Date: Tue, 6 Sep 2016 18:09:31 -0600 > > > proc_dointvec limits the values to INT_MAX in u32 sysctl entries. > > proc_douintvec allows to write upto UINT_MAX. > > > > Signed-off-by: Subash Abh

pull request (net-next): ipsec-next 2016-09-08

2016-09-07 Thread Steffen Klassert
1) Constify the xfrm_replay structures. From Julia Lawall 2) Protect xfrm state hash tables with rcu, lookups can be done now without acquiring xfrm_state_lock. From Florian Westphal. 3) Protect xfrm policy hash tables with rcu, lookups can be done now without acquiring xfrm_policy_lock.

[PATCH 01/17] xfrm: constify xfrm_replay structures

2016-09-07 Thread Steffen Klassert
From: Julia Lawall The xfrm_replay structures are never modified, so declare them as const. Done with the help of Coccinelle. Signed-off-by: Julia Lawall Signed-off-by: Steffen Klassert --- include/net/xfrm.h | 2 +- net/xfrm/xfrm_replay.c | 6 +++--- 2 files changed, 4 insertions(+), 4

[PATCH 07/17] xfrm: state: don't use lock anymore unless acquire operation is needed

2016-09-07 Thread Steffen Klassert
From: Florian Westphal push the lock down, after earlier patches we can rely on rcu to make sure state struct won't go away. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- include/net/netns/xfrm.h | 6 +++--- net/xfrm/xfrm_state.c| 6 -- 2 files changed, 7 inserti

Re: [PATCH net-next V2 0/6] Mellanox 100G mlx5 DCBX CEE and firmware support

2016-09-07 Thread Or Gerlitz
On Thu, Sep 8, 2016 at 1:36 AM, David Miller wrote: > From: Or Gerlitz > Date: Wed, 7 Sep 2016 23:51:56 +0300 > >> On Wed, Sep 7, 2016 at 11:27 PM, David Miller wrote: >>> From: Saeed Mahameed >>> Date: Wed, 7 Sep 2016 23:16:13 +0300 >>> Hi Dave, Sorry to bother, but i would like to drop t

[PATCH 16/17] xfrm: Fix xfrm_policy_lock imbalance

2016-09-07 Thread Steffen Klassert
An earlier patch accidentally replaced a write_lock_bh with a spin_unlock_bh. Fix this by using spin_lock_bh instead. Fixes: 9d0380df6217 ("xfrm: policy: convert policy_lock to spinlock") Signed-off-by: Steffen Klassert --- net/xfrm/xfrm_policy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletio

[PATCH 09/17] xfrm: policy: prepare policy_bydst hash for rcu lookups

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Since commit 56f047305dd4b6b617 ("xfrm: add rcu grace period in xfrm_policy_destroy()") xfrm policy objects are already free'd via rcu. In order to make more places lockless (i.e. use rcu_read_lock instead of grabbing read-side of policy rwlock) we only need to: - use rcu

[PATCH 12/17] xfrm: policy: make xfrm_policy_lookup_bytype lockless

2016-09-07 Thread Steffen Klassert
From: Florian Westphal side effect: no longer disables BH (should be fine). Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- include/net/netns/xfrm.h | 2 +- net/xfrm/xfrm_policy.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/include/net/netns/

[PATCH 02/17] xfrm: state: use hlist_for_each_entry_rcu helper

2016-09-07 Thread Steffen Klassert
From: Florian Westphal This is required once we allow lockless access of bydst/bysrc hash tables. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- net/xfrm/xfrm_state.c | 38 +++--- 1 file changed, 19 insertions(+), 19 deletions(-) diff --gi

[PATCH 17/17] xfrm: state: remove per-netns gc task

2016-09-07 Thread Steffen Klassert
From: Florian Westphal After commit 5b8ef3415a21f173 ("xfrm: Remove ancient sleeping when the SA is in acquire state") gc does not need any per-netns data anymore. As far as gc is concerned all state structs are the same, so we can use a global work struct for it. Signed-off-by: Florian Westpha

[PATCH 14/17] xfrm: policy: don't acquire policy lock in xfrm_spd_getinfo

2016-09-07 Thread Steffen Klassert
From: Florian Westphal It doesn't seem that important. We now get inconsistent view of the counters, but those are stale anyway right after we drop the lock. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- net/xfrm/xfrm_policy.c | 2 -- 1 file changed, 2 deletions(-) dif

[PATCH 03/17] xfrm: state: use atomic_inc_not_zero to increment refcount

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Once xfrm_state_lookup_byaddr no longer acquires the state lock another cpu might be freeing the state entry at the same time. To detect this we use atomic_inc_not_zero, we then signal -EAGAIN to caller in case our result was stale. Signed-off-by: Florian Westphal Signed

[PATCH 04/17] xfrm: state: delay freeing until rcu grace period has elapsed

2016-09-07 Thread Steffen Klassert
From: Florian Westphal The hash table backend memory and the state structs are free'd via kfree/vfree. Once we only rely on rcu during lookups we have to make sure no other cpu is currently accessing this before doing the free. Free operations already happen from worker so we can use synchroniz

[PATCH 10/17] xfrm: policy: add sequence count to sync with hash resize

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Once xfrm_policy_lookup_bytype doesn't grab xfrm_policy_lock anymore its possible for a hash resize to occur in parallel. Use sequence counter to block lookup in case a resize is in progress and to also re-lookup in case hash table was altered in the mean time (might cause

[PATCH 05/17] xfrm: state: add sequence count to detect hash resizes

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Once xfrm_state_find is lockless we have to cope with a concurrent resize opertion. We use a sequence counter to block in case a resize is in progress and to detect if we might have missed a state that got moved to a new hash table. Signed-off-by: Florian Westphal Signed

[PATCH 06/17] xfrm: state: use rcu_deref and assign_pointer helpers

2016-09-07 Thread Steffen Klassert
From: Florian Westphal Before xfrm_state_find() can use rcu_read_lock instead of xfrm_state_lock we need to switch users of the hash table to assign/obtain the pointers with the appropriate rcu helpers. Signed-off-by: Florian Westphal Signed-off-by: Steffen Klassert --- net/xfrm/xfrm_state.c

Re: [patch net 1/2] mlxsw: spectrum_router: Fix error path in mlxsw_sp_router_init

2016-09-07 Thread Ido Schimmel
On Thu, Sep 08, 2016 at 08:16:01AM +0200, Jiri Pirko wrote: > From: Jiri Pirko > > When neigh_init fails, we have to do proper cleanup including > router_fini call. > > Fixes: 6cf3c971dc84cb ("mlxsw: spectrum_router: Add private neigh table") > Signed-off-by: Jiri Pirko Acked-by: Ido Schimmel

Re: [PATCH net-next V6 0/4] net/sched: ip tunnel metadata set/release/classify by using TC

2016-09-07 Thread Hadar Hen Zion
On Thu, Sep 8, 2016 at 3:32 AM, David Miller wrote: > From: Hadar Hen Zion > Date: Wed, 7 Sep 2016 11:08:02 +0300 > >> This patchset introduces ip tunnel manipulation support using the TC >> subsystem. > > Please address the feedback given by Eric Dumazet for patch #4, > thank you. Sure, I'll

[patch net-next v8 2/3] net: core: Add offload stats to if_stats_msg

2016-09-07 Thread Jiri Pirko
From: Nogah Frankel Add a nested attribute of offload stats to if_stats_msg named IFLA_STATS_LINK_OFFLOAD_XSTATS. Under it, add SW stats, meaning stats only per packets that went via slowpath to the cpu, named IFLA_OFFLOAD_XSTATS_CPU_HIT. Signed-off-by: Nogah Frankel Signed-off-by: Jiri Pirko

[patch net-next v8 0/3] return offloaded stats as default and expose original sw stats

2016-09-07 Thread Jiri Pirko
From: Jiri Pirko The problem we try to handle is about offloaded forwarded packets which are not seen by kernel. Let me try to draw it: port1 port2 (HW stats are counted here) \ / \/ \

[patch net-next v8 3/3] mlxsw: spectrum: Implement offload stats ndo and expose HW stats by default

2016-09-07 Thread Jiri Pirko
From: Nogah Frankel Change the default statistics ndo to return HW statistics (like the one returned by ethtool_ops). The HW stats are collected to a cache by delayed work every 1 sec. Implement the offload stat ndo. Add a function to get SW statistics, to be called from this function. Signed-of

[patch net-next v8 1/3] netdevice: Add offload statistics ndo

2016-09-07 Thread Jiri Pirko
From: Nogah Frankel Add a new ndo to return statistics for offloaded operation. Since there can be many different offloaded operation with many stats types, the ndo gets an attribute id by which it knows which stats are wanted. The ndo also gets a void pointer to be cast according to the attribut

Re: [PATCH, net-next] perf, bpf: fix conditional call to bpf_overflow_handler

2016-09-07 Thread Ingo Molnar
* Alexei Starovoitov wrote: > On Tue, Sep 06, 2016 at 03:10:22PM +0200, Arnd Bergmann wrote: > > The newly added bpf_overflow_handler function is only built of both > > CONFIG_EVENT_TRACING and CONFIG_BPF_SYSCALL are enabled, but the caller > > only checks the latter: > > > > kernel/events/core

[PATCH 5/6] net/xfrm_input: fix possible NULL deref of tunnel.ip6->parms.i_key

2016-09-07 Thread Steffen Klassert
From: Alexey Kodanev Running LTP 'icmp-uni-basic.sh -6 -p ipcomp -m tunnel' test over openvswitch + veth can trigger kernel panic: BUG: unable to handle kernel NULL pointer dereference at 00e0 IP: [] xfrm_input+0x82/0x750 ... [] xfrm6_rcv_spi+0x1e/0x20 [] xfrm6_tunnel_rcv+0

[PATCH 3/6] xfrm: get rid of another incorrect WARN

2016-09-07 Thread Steffen Klassert
From: Vegard Nossum During fuzzing I regularly run into this WARN(). According to Herbert Xu, this "certainly shouldn't be a WARN, it probably shouldn't print anything either". Cc: Stephen Hemminger Cc: Steffen Klassert Cc: Herbert Xu Signed-off-by: Vegard Nossum Signed-off-by: Steffen Klass

[PATCH 2/6] xfrm: get rid of incorrect WARN

2016-09-07 Thread Steffen Klassert
From: Vegard Nossum AFAICT this message is just printed whenever input validation fails. This is a normal failure and we shouldn't be dumping the stack over it. Looks like it was originally a printk that was maybe incorrectly upgraded to a WARN: commit 62db5cfd70b1ef53aa21f144a806fe3b78c84fab A

[PATCH 6/6] xfrm: Only add l3mdev oif to dst lookups

2016-09-07 Thread Steffen Klassert
From: David Ahern Subash reported that commit 42a7b32b73d6 ("xfrm: Add oif to dst lookups") broke a wifi use case that uses fib rules and xfrms. The intent of 42a7b32b73d6 was driven by VRFs with IPsec. As a compromise relax the use of oif in xfrm lookups to L3 master devices only (ie., oif is ei

[PATCH 1/6] xfrm: fix crash in XFRM_MSG_GETSA netlink handler

2016-09-07 Thread Steffen Klassert
From: Vegard Nossum If we hit any of the error conditions inside xfrm_dump_sa(), then xfrm_state_walk_init() never gets called. However, we still call xfrm_state_walk_done() from xfrm_dump_sa_done(), which will crash because the state walk was never initialized properly. We can fix this by setti

pull request (net): ipsec 2016-09-08

2016-09-07 Thread Steffen Klassert
1) Fix a crash when xfrm_dump_sa returns an error. From Vegard Nossum. 2) Remove some incorrect WARN() on normal error handling. From Vegard Nossum. 3) Ignore socket policies when rebuilding hash tables, socket policies are not inserted into the hash tables. From Tobias Brunner. 4) I

[PATCH 4/6] xfrm: Ignore socket policies when rebuilding hash tables

2016-09-07 Thread Steffen Klassert
From: Tobias Brunner Whenever thresholds are changed the hash tables are rebuilt. This is done by enumerating all policies and hashing and inserting them into the right table according to the thresholds and direction. Because socket policies are also contained in net->xfrm.policy_all but no has

Re: [PATCH net-next] net: xfrm: Change u32 sysctl entries to use proc_douintvec

2016-09-07 Thread David Miller
From: Steffen Klassert Date: Thu, 8 Sep 2016 07:51:17 +0200 > On Wed, Sep 07, 2016 at 05:25:18PM -0700, David Miller wrote: >> From: Subash Abhinov Kasiviswanathan >> Date: Tue, 6 Sep 2016 18:09:31 -0600 >> >> > proc_dointvec limits the values to INT_MAX in u32 sysctl entries. >> > proc_douint

Re: [PATCH net-next 0/6] be2net: patch-set

2016-09-07 Thread David Miller
From: Sriharsha Basavapatna Date: Wed, 7 Sep 2016 19:57:48 +0530 > The following patch set contains an error recovery feature and a few > bug fixes. Please consider applying this to the net-next tree. Thanks. > > Patch-1 Supports HW error recovery in Skyhawk/BEx adapters > Patch-2 Fixes driver

Re: [RFC Patch net-next 5/6] net_sched: use rcu in fast path

2016-09-07 Thread John Fastabend
On 16-09-06 07:52 AM, Eric Dumazet wrote: > On Thu, 2016-09-01 at 22:57 -0700, Cong Wang wrote: > > > > Missing changelog ? > Yeah this stuff is a bit tricky more notes to walk us through this would be helpful. (btw you can disregard my comment from earlier this morning I've tracked most of th

[patch net 0/2] mlxsw: couple of fixes

2016-09-07 Thread Jiri Pirko
From: Jiri Pirko Couple of fixes from Ido and myself. Ido Schimmel (1): mlxsw: spectrum: Set port type before setting its address Jiri Pirko (1): mlxsw: spectrum_router: Fix error path in mlxsw_sp_router_init drivers/net/ethernet/mellanox/mlxsw/spectrum.c| 18 +- d

[patch net 1/2] mlxsw: spectrum_router: Fix error path in mlxsw_sp_router_init

2016-09-07 Thread Jiri Pirko
From: Jiri Pirko When neigh_init fails, we have to do proper cleanup including router_fini call. Fixes: 6cf3c971dc84cb ("mlxsw: spectrum_router: Add private neigh table") Signed-off-by: Jiri Pirko --- drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c | 9 - 1 file changed, 8 insert

[patch net 2/2] mlxsw: spectrum: Set port type before setting its address

2016-09-07 Thread Jiri Pirko
From: Ido Schimmel During port init, we currently set the port's type to Ethernet after setting its MAC address. However, the hardware documentation states this should be the other way around. Align the driver with the hardware documentation and set the port's MAC address after setting its type.

Re: [PATCH RFC 11/11] net/mlx5e: XDP TX xmit more

2016-09-07 Thread Jesper Dangaard Brouer
On Wed, 7 Sep 2016 20:21:24 -0700 Tom Herbert wrote: > On Wed, Sep 7, 2016 at 7:58 PM, John Fastabend > wrote: > > On 16-09-07 11:22 AM, Jesper Dangaard Brouer wrote: > >> > >> On Wed, 7 Sep 2016 19:57:19 +0300 Saeed Mahameed > >> wrote: > >>> On Wed, Sep 7, 2016 at 6:32 PM, Eric Dumazet

[PATCH net-next] ipv4: accept u8 in IP_TOS ancillary data

2016-09-07 Thread Eric Dumazet
From: Eric Dumazet In commit f02db315b8d8 ("ipv4: IP_TOS and IP_TTL can be specified as ancillary data") Francesco added IP_TOS values specified as integer. However, kernel sends to userspace (at recvmsg() time) an IP_TOS value in a single byte, when IP_RECVTOS is set on the socket. It can be v

Re: [RFC PATCH 1/2] macb: Add 1588 support in Cadence GEM.

2016-09-07 Thread Harini Katakam
Hi, On Tue, Sep 6, 2016 at 9:18 PM, Richard Cochran wrote: > >> +#define GEM_TISUBN 0x01bc /* 1588 Timer Increment Sub-ns */ > > This regsiter does not exist. Looking at > >Zynq-7000 AP SoC Technical Reference Manual >UG585 (v1.10) February 23, 2015 > > starting on page 1273 w

[PATCH] Bluetooth: fix kzalloc-simple.cocci warnings

2016-09-07 Thread kbuild test robot
net/bluetooth/mgmt.c:905:6-13: WARNING: kzalloc should be used for rp, instead of kmalloc/memset Use kzalloc rather than kmalloc followed by memset with 0 This considers some simple cases that are common and easy to validate Note in particular that there are no ...s in the rule, so all of th

Re: [PATCH 2/2 v3] net: smsc911x: request and deassert optional RESET GPIO

2016-09-07 Thread David Miller
From: Linus Walleij Date: Wed, 7 Sep 2016 15:53:42 +0200 > On some systems (such as the Qualcomm APQ8060 Dragonboard) the > RESET signal of the SMSC911x is not pulled up by a resistor (or > the internal pull-up that will pull it up if the pin is not > even connected) but instead connected to a G

Re: [PATCH 1/2 v3] net: smsc911x: augment device tree bindings

2016-09-07 Thread David Miller
From: Linus Walleij Date: Wed, 7 Sep 2016 15:53:31 +0200 > This adds device tree bindings for: > > - An optional GPIO line for releasing the RESET signal to the > SMSC911x devices > > - An optional PME (power management event) interrupt line that > can be utilized to wake up the system on

Re: [PATCH RFC 11/11] net/mlx5e: XDP TX xmit more

2016-09-07 Thread Tom Herbert
On Wed, Sep 7, 2016 at 7:58 PM, John Fastabend wrote: > On 16-09-07 11:22 AM, Jesper Dangaard Brouer wrote: >> >> On Wed, 7 Sep 2016 19:57:19 +0300 Saeed Mahameed >> wrote: >>> On Wed, Sep 7, 2016 at 6:32 PM, Eric Dumazet wrote: On Wed, 2016-09-07 at 18:08 +0300, Saeed Mahameed wrote:

RE: [PATCH net-next 0/3] r8152: configuration setting

2016-09-07 Thread Hayes Wang
David Miller [mailto:da...@davemloft.net] > Sent: Thursday, September 08, 2016 8:38 AM [...] > By forcing a certain mode via a Kconfig value, you are basically making it > impossible for distributions to do something reasonable here. The request is always from some manufacturers, not end users. Th

Re: [PATCH RFC 11/11] net/mlx5e: XDP TX xmit more

2016-09-07 Thread John Fastabend
On 16-09-07 11:22 AM, Jesper Dangaard Brouer wrote: > > On Wed, 7 Sep 2016 19:57:19 +0300 Saeed Mahameed > wrote: >> On Wed, Sep 7, 2016 at 6:32 PM, Eric Dumazet wrote: >>> On Wed, 2016-09-07 at 18:08 +0300, Saeed Mahameed wrote: On Wed, Sep 7, 2016 at 5:41 PM, Eric Dumazet wrote:

RE: [PATCH net-next 0/3] r8152: configuration setting

2016-09-07 Thread Hayes Wang
Bjørn Mork [mailto:bj...@mork.no] > Sent: Wednesday, September 07, 2016 9:51 PM [...] > So this adds a lot of code to work around the issues you introduced by > unnecessarily blacklisting the CDC ECM configuration earlier, and still > makes the r8152 driver handle the device even in ECM mode. I su

[PATCHv2 iproute2] ip route: check ftell, fseek return value

2016-09-07 Thread Hangbin Liu
ftell() may return -1 in error case, which is not handled and therefore pass a negative offset to fseek(). The return code of fseek() is also not checked. Reported-by: Phil Sutter Signed-off-by: Hangbin Liu --- ip/iproute.c | 10 +- 1 file changed, 9 insertions(+), 1 deletion(-) diff -

Re: vlan aware bridge doesn't propagate mac changes to vlans on top of it

2016-09-07 Thread Toshiaki Makita
On 2016/09/08 3:22, Michal Soltys wrote: ... > 4.7.2 > git describe on that commit suggests it's been available since 4.6.x > > What I did in details: > > ip li add name port1b type veth peer name port1e > ip li add br0 type bridge > ip li set dev br0 type bridge vlan_default_pvid 0 > ip li set d

[PATCH] net_namespace: fixed net_device reference leak

2016-09-07 Thread Jojy Varghese
During namespace cleanup, if ‘dst’ subsystem is holding a reference to the loopback interface in the namespace, it does not get released. This is because in the case where the net_device held by 'dst' is same as the namespace's loopback net_device, current code first does a ’dev_hold’ on the same d

Re: Minimum MTU Mess

2016-09-07 Thread Andrew Lunn
> This is definitely going to require a few passes... (Working my way > through every driver with an ndo_change_mtu wired up right now to > see just how crazy this might get). It might be something Coccinelle can help you with. Try describing the transformation you want to do, to their mailing lis

Re: [PATCH net-next v22 3/3] openvswitch: 802.1AD Flow handling, actions, vlan parsing, netlink attributes

2016-09-07 Thread pravin shelar
On Wed, Sep 7, 2016 at 9:56 AM, Eric Garver wrote: > Add support for 802.1ad including the ability to push and pop double > tagged vlans. Add support for 802.1ad to netlink parsing and flow > conversion. Uses double nested encap attributes to represent double > tagged vlan. Inner TPID encoded alon

Re: [ovs-dev] [PATCH net-next v22 1/3] openvswitch: 802.1ad uapi changes.

2016-09-07 Thread pravin shelar
On Wed, Sep 7, 2016 at 9:56 AM, Eric Garver wrote: > From: Thomas F Herbert > > openvswitch: Add support for 8021.AD > > Change the description of the VLAN tpid field. > > Signed-off-by: Thomas F Herbert Acked-by: Pravin B Shelar

Re: [ovs-dev] [PATCH net-next v22 2/3] vlan: Check for vlan ethernet types for 8021.q or 802.1ad

2016-09-07 Thread pravin shelar
On Wed, Sep 7, 2016 at 9:56 AM, Eric Garver wrote: > This is to simplify using double tagged vlans. This function allows all > valid vlan ethertypes to be checked in a single function call. > Also replace some instances that check for both ETH_P_8021Q and > ETH_P_8021AD. > > Patch based on one ori

Re: [PATCH v2 net-next 0/2] qed*: Debug data collection

2016-09-07 Thread David Miller
From: Tomer Tayar Date: Wed, 7 Sep 2016 16:36:23 +0300 > This patch series adds the support of debug data collection in the qed driver, > and the means to extract it in the qede driver via the get_regs operation. ... > Please consider applying this to 'net-next'. Series applied, thank you.

Re: [PATCH] kaweth: remove obsolete debugging statements

2016-09-07 Thread David Miller
From: Oliver Neukum Date: Wed, 7 Sep 2016 15:27:09 +0200 > SOme statements in the driver only served to inform > which functions were entered. Ftrace can do that just as good without > needing memory. Remove the statements. > > Signed-off-by: Oliver Neukum Applied to net-next, thanks Oliver.

Re: [PATCH] qed: mark symbols static where possible

2016-09-07 Thread David Miller
From: Yuval Mintz Date: Wed, 7 Sep 2016 11:55:34 + >> We get a few warnings when building kernel with W=1: >> drivers/net/ethernet/qlogic/qed/qed_l2.c:112:5: warning: no previous >> prototype for 'qed_sp_vport_start' [-Wmissing-prototypes] >> >> >> In fact, these functions are only used

Re: [PATCH] qed: add missing header dependencies

2016-09-07 Thread David Miller
From: Baoyou Xie Date: Wed, 7 Sep 2016 19:07:00 +0800 > We get 4 warnings when building kernel with W=1: > drivers/net/ethernet/qlogic/qed/qed_selftest.c:6:5: warning: no previous > prototype for 'qed_selftest_memory' [-Wmissing-prototypes] > drivers/net/ethernet/qlogic/qed/qed_selftest.c:19:5:

Re: [PATCH net-next 0/3] r8152: configuration setting

2016-09-07 Thread David Miller
From: Hayes Wang Date: Wed, 7 Sep 2016 16:12:19 +0800 > Some people prefer to use ECM mode rather than vendor mode. Therefore, I add > CONFIG_RTL8152_CONFIG_VALUE in Kconfig. Then, the users could choose the USB > configuration value which they want. The default is to support vendor mode > only.

Re: [PATCH net-next V6 0/4] net/sched: ip tunnel metadata set/release/classify by using TC

2016-09-07 Thread David Miller
From: Hadar Hen Zion Date: Wed, 7 Sep 2016 11:08:02 +0300 > This patchset introduces ip tunnel manipulation support using the TC > subsystem. Please address the feedback given by Eric Dumazet for patch #4, thank you.

Re: [PATCH net-next v2] netlink: don't forget to release a rhashtable_iter structure

2016-09-07 Thread David Miller
From: Andrei Vagin Date: Tue, 6 Sep 2016 21:31:17 -0700 > This bug was detected by kmemleak: > unreferenced object 0x8804269cc3c0 (size 64): > comm "criu", pid 1042, jiffies 4294907360 (age 13.713s) > hex dump (first 32 bytes): > a0 32 cc 2c 04 88 ff ff 00 00 00 00 00 00 00 00 .2.,.

Re: [PATCH net-next] MAINTAINERS: Update CPMAC email address

2016-09-07 Thread David Miller
From: Florian Fainelli Date: Tue, 6 Sep 2016 20:22:21 -0700 > Signed-off-by: Florian Fainelli Since MAINTAINERS entry accuracy is very important for bug reporting and patch CC:'ing, I tend to apply these kind of patches always to 'net'. And I have done so in this case too. Thanks.

Re: [PATCH net-next 1/2] tcp: measure rwnd-limited time

2016-09-07 Thread David Miller
From: "Francis Y. Yan" Date: Tue, 6 Sep 2016 18:32:40 -0700 > diff --git a/include/linux/tcp.h b/include/linux/tcp.h > index 7be9b12..f5b588e 100644 > --- a/include/linux/tcp.h > +++ b/include/linux/tcp.h > @@ -176,6 +176,7 @@ struct tcp_sock { >* were acked. >

Re: [PATCH net-next] net: xfrm: Change u32 sysctl entries to use proc_douintvec

2016-09-07 Thread David Miller
From: Subash Abhinov Kasiviswanathan Date: Tue, 6 Sep 2016 18:09:31 -0600 > proc_dointvec limits the values to INT_MAX in u32 sysctl entries. > proc_douintvec allows to write upto UINT_MAX. > > Signed-off-by: Subash Abhinov Kasiviswanathan I am assuming Steffen will pick this up.

Re: [PATCH net-next 0/1] rxrpc: Local abort tracepoint

2016-09-07 Thread David Miller
From: David Howells Date: Wed, 07 Sep 2016 16:25:50 +0100 > > Here's a patch that adds a tracepoint that allows local aborts to be > debugged. This needs to be applied on top of the just-posted call refcount > overhaul patch. > > The patches can be found here also: > > > http://git.ker

Re: [PATCH net-next 0/8] rxrpc: Overhaul call refcounting

2016-09-07 Thread David Miller
ged thusly: > > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git > rxrpc-rewrite-20160907-1 Pulled.

Re: XPS configuration question (on tg3)

2016-09-07 Thread Eric Dumazet
On Thu, 2016-09-08 at 01:45 +0200, Michal Soltys wrote: > > Keep in mind that TCP stack can send packets, responding to incoming > > ACK. > > > > So you might check that incoming ACK are handled by the 'right' cpu. > > > > Without RFS, there is no such guarantee. > Did some more testing today, i

Re: XPS configuration question (on tg3)

2016-09-07 Thread Michal Soltys
On 2016-09-07 02:19, Eric Dumazet wrote: > On Tue, 2016-09-06 at 23:00 +0200, Michal Soltys wrote: >> On 2016-09-06 22:21, Alexander Duyck wrote: >> > On Tue, Sep 6, 2016 at 11:46 AM, Michal Soltys wrote: >> >> Hi, >> >> >> >> I've been testing different configurations and I didn't manage to get X

Re: Minimum MTU Mess

2016-09-07 Thread Jarod Wilson
On Wed, Sep 07, 2016 at 01:35:35PM -0700, Stephen Hemminger wrote: > On Wed, 7 Sep 2016 15:53:56 -0400 > Jarod Wilson wrote: > > > --- a/net/core/dev.c > > +++ b/net/core/dev.c > > @@ -6466,9 +6466,17 @@ int dev_set_mtu(struct net_device *dev, int new_mtu) > > if (new_mtu == dev->mtu) > >

Re: Minimum MTU Mess

2016-09-07 Thread Jarod Wilson
On Wed, Sep 07, 2016 at 10:31:12PM +0200, Andrew Lunn wrote: > Hi Jarod > > > - /* MTU must be positive.*/ > > - if (new_mtu < 0) > > + if (new_mtu < dev->min_mtu) { > > + netdev_err(dev, "Invalid MTU %d requested, hw min %d\n", > > + new_mtu, dev->min

Re: [PATCH 2/2 v3] net: smsc911x: request and deassert optional RESET GPIO

2016-09-07 Thread Jeremy Linton
Hi, On 09/07/2016 08:53 AM, Linus Walleij wrote: On some systems (such as the Qualcomm APQ8060 Dragonboard) the RESET signal of the SMSC911x is not pulled up by a resistor (or the internal pull-up that will pull it up if the pin is not even connected) but instead connected to a GPIO line, so tha

Re: [Patch v6] net: ethernet: xilinx: Enable emaclite for MIPS

2016-09-07 Thread David Miller
From: Zubair Lutfullah Kakakhel Date: Mon, 5 Sep 2016 13:07:54 +0100 > The MIPS based xilfpga platform uses this driver. > Enable it for MIPS > > Signed-off-by: Zubair Lutfullah Kakakhel > > --- > V1 -> V6 are from a series that has gotten too big. > So I have split this patch and am sending i

[PATCH net-next] bpf: fix range propagation on direct packet access

2016-09-07 Thread Daniel Borkmann
LLVM can generate code that tests for direct packet access via skb->data/data_end in a way that currently gets rejected by the verifier, example: [...] 7: (61) r3 = *(u32 *)(r6 +80) 8: (61) r9 = *(u32 *)(r6 +76) 9: (bf) r2 = r9 10: (07) r2 += 54 11: (3d) if r3 >= r2 goto pc+12 R1

Re: [PATCH net-next V2 0/6] Mellanox 100G mlx5 DCBX CEE and firmware support

2016-09-07 Thread David Miller
From: Or Gerlitz Date: Wed, 7 Sep 2016 23:51:56 +0300 > On Wed, Sep 7, 2016 at 11:27 PM, David Miller wrote: >> From: Saeed Mahameed >> Date: Wed, 7 Sep 2016 23:16:13 +0300 >> >>> Hi Dave, Sorry to bother, but i would like to drop this series for now >>> Huy is working to define and come up wit

Re: [PATCH net-next] tcp: use an RB tree for ooo receive queue

2016-09-07 Thread Eric Dumazet
On Wed, 2016-09-07 at 15:26 -0700, Stephen Hemminger wrote: > How much does this grow the size of tcp socket structure? This actually shrinks it by 8 bytes, or more on debug kernels where sizeof(spinlock_t) > 4 Before : struct sk_buff_head out_of_order_queue; // At least 24 bytes on 64bit A

Re: [PATCH net-next] tcp: use an RB tree for ooo receive queue

2016-09-07 Thread Stephen Hemminger
On Wed, 07 Sep 2016 14:49:28 -0700 Eric Dumazet wrote: > From: Yaogong Wang > > Over the years, TCP BDP has increased by several orders of magnitude, > and some people are considering to reach the 2 Gbytes limit. > > Even with current window scale limit of 14, ~1 Gbytes maps to ~740,000 > MSS.

Re: [iovisor-dev] [PATCH RFC 08/11] net/mlx5e: XDP fast RX drop bpf programs support

2016-09-07 Thread Saeed Mahameed
On Wed, Sep 7, 2016 at 11:55 PM, Or Gerlitz via iovisor-dev wrote: > On Wed, Sep 7, 2016 at 3:42 PM, Saeed Mahameed wrote: >> From: Rana Shahout >> >> Add support for the BPF_PROG_TYPE_PHYS_DEV hook in mlx5e driver. >> >> When XDP is on we make sure to change channels RQs type to >> MLX5_WQ_TYPE

[PATCH net-next] tcp: use an RB tree for ooo receive queue

2016-09-07 Thread Eric Dumazet
From: Yaogong Wang Over the years, TCP BDP has increased by several orders of magnitude, and some people are considering to reach the 2 Gbytes limit. Even with current window scale limit of 14, ~1 Gbytes maps to ~740,000 MSS. In presence of packet losses (or reorders), TCP stores incoming p

Re: [PATCH v5 2/6] clk: gxbb: expose MPLL2 clock for use by DT

2016-09-07 Thread Stephen Boyd
On 09/06, Martin Blumenstingl wrote: > This exposes the MPLL2 clock as this is one of the input clocks of the > ethernet controller's internal mux. > > Signed-off-by: Martin Blumenstingl > --- Acked-by: Stephen Boyd -- Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, a Linux

Re: ptp

2016-09-07 Thread Richard Cochran
On Wed, Sep 07, 2016 at 01:55:19PM -0700, Daniel Walker wrote: > So the code only allows second granularity negative updates, No. > or the seconds > component is the only part which needs to actually be negative ? Yes. See the function, clockadj_step, in linuxptp/clockadj.c for a working user s

[PATCH net-next] macsec: set network devtype

2016-09-07 Thread Stephen Hemminger
The netdevice type structure for macsec was being defined but never used. To set the network device type the macro SET_NETDEV_DEVTYPE must be called. Compile tested only, I don't use macsec. Signed-off-by: Stephen Hemminger --- a/drivers/net/macsec.c 2016-08-25 17:20:20.671031972 -0700 +++

Re: ptp

2016-09-07 Thread Daniel Walker
On 09/07/2016 01:48 PM, Richard Cochran wrote: On Wed, Sep 07, 2016 at 01:40:59PM -0700, Daniel Walker wrote: There is a test (below) , which prevents negative nanosecond updates. The code below would force a negative update to always return more than NSEC_PER_SEC. It should be using abs() inste

[PATCH net-next] rtnetlink: remove unused ifla_stats_policy

2016-09-07 Thread Stephen Hemminger
This structure is defined but never used. Flagged with W=1 Signed-off-by: Stephen Hemminger --- a/net/core/rtnetlink.c 2016-09-07 13:55:17.030107744 -0700 +++ b/net/core/rtnetlink.c 2016-09-07 13:55:45.190236855 -0700 @@ -3669,10 +3669,6 @@ nla_put_failure: return -EMSGSIZE; }

Re: [PATCH RFC 08/11] net/mlx5e: XDP fast RX drop bpf programs support

2016-09-07 Thread Or Gerlitz
On Wed, Sep 7, 2016 at 3:42 PM, Saeed Mahameed wrote: > From: Rana Shahout > > Add support for the BPF_PROG_TYPE_PHYS_DEV hook in mlx5e driver. > > When XDP is on we make sure to change channels RQs type to > MLX5_WQ_TYPE_LINKED_LIST rather than "striding RQ" type to > ensure "page per packet". >

Re: [PATCH net-next V2 0/6] Mellanox 100G mlx5 DCBX CEE and firmware support

2016-09-07 Thread Or Gerlitz
On Wed, Sep 7, 2016 at 11:27 PM, David Miller wrote: > From: Saeed Mahameed > Date: Wed, 7 Sep 2016 23:16:13 +0300 > >> Hi Dave, Sorry to bother, but i would like to drop this series for now >> Huy is working to define and come up with a better mechanism to >> enable/disable the new DCBX hybrid m

Re: ptp

2016-09-07 Thread Richard Cochran
On Wed, Sep 07, 2016 at 01:40:59PM -0700, Daniel Walker wrote: > There is a test (below) , which prevents negative nanosecond updates. The > code below would force a negative update to always return more than > NSEC_PER_SEC. It should be using abs() instead which would return the value > desired.

Re: Minimum MTU Mess

2016-09-07 Thread Stephen Hemminger
On Wed, 7 Sep 2016 15:53:56 -0400 Jarod Wilson wrote: > --- a/net/core/dev.c > +++ b/net/core/dev.c > @@ -6466,9 +6466,17 @@ int dev_set_mtu(struct net_device *dev, int new_mtu) > if (new_mtu == dev->mtu) > return 0; > > - /* MTU must be positive.*/ > - if (

Re: [PATCH net-next V2 0/6] Mellanox 100G mlx5 DCBX CEE and firmware support

2016-09-07 Thread David Miller
From: Saeed Mahameed Date: Wed, 7 Sep 2016 23:16:13 +0300 > Hi Dave, Sorry to bother, but i would like to drop this series for now > Huy is working to define and come up with a better mechanism to > enable/disable the new DCBX hybrid mode he is adding. I can't "just drop" any change that's in my

Re: Minimum MTU Mess

2016-09-07 Thread Andrew Lunn
Hi Jarod > - /* MTU must be positive.*/ > - if (new_mtu < 0) > + if (new_mtu < dev->min_mtu) { > + netdev_err(dev, "Invalid MTU %d requested, hw min %d\n", > +new_mtu, dev->min_mtu); > return -EINVAL; > + } > + > + if (

Re: [PATCH net-next V2 0/6] Mellanox 100G mlx5 DCBX CEE and firmware support

2016-09-07 Thread Saeed Mahameed
On Tue, Sep 6, 2016 at 7:04 PM, Saeed Mahameed wrote: > Hi Dave, > Hi Dave, Sorry to bother, but i would like to drop this series for now Huy is working to define and come up with a better mechanism to enable/disable the new DCBX hybrid mode he is adding. Thanks for understanding, Saeed. > This

Re: [PATCH RFC 11/11] net/mlx5e: XDP TX xmit more

2016-09-07 Thread Saeed Mahameed
On Wed, Sep 7, 2016 at 9:19 PM, Eric Dumazet wrote: > On Wed, 2016-09-07 at 19:57 +0300, Saeed Mahameed wrote: > >> Jesper has a similar Idea to make the qdisc think it is under >> pressure, when the device >> TX ring is idle most of the time, i think his idea can come in handy here. >> I am not f

Re: [PATCH net] tcp: fastopen: avoid negative sk_forward_alloc

2016-09-07 Thread Josh Hunt
On 09/07/2016 10:34 AM, Eric Dumazet wrote: From: Eric Dumazet When DATA and/or FIN are carried in a SYN/ACK message or SYN message, we append an skb in socket receive queue, but we forget to call sk_forced_mem_schedule(). Effect is that the socket has a negative sk->sk_forward_alloc as long a

Re: Minimum MTU Mess

2016-09-07 Thread Jarod Wilson
On Tue, Sep 06, 2016 at 04:55:29PM -0700, David Miller wrote: > From: Jarod Wilson > Date: Fri, 2 Sep 2016 13:07:42 -0400 > > > In any case, the number of "mtu < 68" and "#define FOO_MIN_MTU 68", or > > variations thereof, under drivers/net/ is kind of crazy. > > Agreed, we can have a default an

Re: [PATCH RFC 04/11] net/mlx5e: Build RX SKB on demand

2016-09-07 Thread Jesper Dangaard Brouer
On Wed, 7 Sep 2016 15:42:25 +0300 Saeed Mahameed wrote: > For non-striding RQ configuration before this patch we had a ring > with pre-allocated SKBs and mapped the SKB->data buffers for > device. > > For robustness and better RX data buffers management, we allocate a > page per packet and bui

Re: [PATCH RFC 01/11] net/mlx5e: Single flow order-0 pages for Striding RQ

2016-09-07 Thread Jesper Dangaard Brouer
On Wed, 7 Sep 2016 15:42:22 +0300 Saeed Mahameed wrote: > From: Tariq Toukan > > To improve the memory consumption scheme, we omit the flow that > demands and splits high-order pages in Striding RQ, and stay > with a single Striding RQ flow that uses order-0 pages. Thanks you for doing this!

[PATCH v2] net: ethernet: renesas: sh_eth: add POST registers for rz

2016-09-07 Thread Chris Brandt
Due to a mistake in the hardware manual, the FWSLC and POST1-4 registers were not documented and left out of the driver for RZ/A making the CAM feature non-operational. Additionally, when the offset values for POST1-4 are left blank, the driver attempts to set them using an offset of 0x which c

  1   2   3   >