Use to_net_dev() instead of open-coding it.
Signed-off-by: Geliang Tang
---
net/core/net-sysfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c
index bca8c35..b6c8a66 100644
--- a/net/core/net-sysfs.c
+++
Hello.
On 12/20/2015 12:15 PM, Yoshihiro Kaneko wrote:
From: Kazuya Mizuguchi
This patch supports the following interrupts.
- One interrupt for multiple (descriptor, error, management)
- One interrupt for emac
- Four interrupts for dma queue (best effort
On 12.12.2015 20:58, Marc Haber wrote:
> Any hints would be appreciated.
This sysctl should help:
accept_ra_from_local - BOOLEAN
Accept RA with source-address that is found on local machine
if the RA is otherwise proper and able to be accepted.
Default is to NOT accept
From: Steffen Klassert
Date: Tue, 22 Dec 2015 10:35:18 +0100
> Just one patch to fix dst_entries_init with multiple namespaces.
> From Dan Streetman.
>
> Please pull or let me know if there are problems.
Pulled, thanks Steffen.
--
To unsubscribe from this list:
Hi Hannes,
thanks for your mail.
On Tue, Dec 22, 2015 at 04:15:14PM +0100, Hannes Frederic Sowa wrote:
> On 12.12.2015 20:58, Marc Haber wrote:
> > Any hints would be appreciated.
>
> This sysctl should help:
>
> accept_ra_from_local - BOOLEAN
> Accept RA with source-address that is
From: Pablo Neira Ayuso
Date: Tue, 22 Dec 2015 18:53:15 +0100
> The following patchset contains two netfilter fixes:
>
> 1) Oneliner from Florian to dump missing NFT_CT_L3PROTOCOL netlink
>attribute, from Florian Westphal.
>
> 2) Another oneliner for nf_tables to use
From: Craig Gallek
This program will build classic and extended BPF programs and
validate the socket selection logic when used with
SO_ATTACH_REUSEPORT_CBPF and SO_ATTACH_REUSEPORT_EBPF.
It also validates the re-programing flow and several edge cases.
Signed-off-by: Craig
From: Craig Gallek
struct sock_reuseport is an optional shared structure referenced by each
socket belonging to a reuseport group. When a socket is bound to an
address/port not yet in use and the reuseport flag has been set, the
structure will be allocated and attached to the
From: Craig Gallek
Expose socket options for setting a classic or extended BPF program
for use when selecting sockets in an SO_REUSEPORT group. These options
can be used on the first socket to belong to a group before bind or
on any socket in the group after bind.
This change
From: Craig Gallek
Include a struct sock_reuseport instance when a UDP socket binds to
a specific address for the first time with the reuseport flag set.
When selecting a socket for an incoming UDP packet, use the information
available in sock_reuseport if present.
This
From: Craig Gallek
This series contains two optimizations for the SO_REUSEPORT feature:
Faster lookup when selecting a socket for an incoming packet and
the ability to select the socket from the group using a BPF program.
This series only includes the UDP path. I plan to
From: Jiri Pirko
Date: Mon, 21 Dec 2015 09:56:01 +0100
> From: Ido Schimmel
>
> The bridge's ageing time is offloaded to hardware when:
> 1) A port joins a bridge
> 2) The ageing time of the bridge is changed
>
> In the first case the ageing
From: Andrey Ryabinin
Date: Mon, 21 Dec 2015 12:54:45 +0300
> ip6addrlbl_get() has never worked. If ip6addrlbl_hold() succeeded,
> ip6addrlbl_get() will exit with '-ESRCH'. If ip6addrlbl_hold() failed,
> ip6addrlbl_get() will use about to be free ip6addrlbl_entry
From: Jiri Pirko
Date: Tue, 22 Dec 2015 09:43:07 +0100
> From: Jiri Pirko
>
> KASan reported use-after-free for the hwmon structure. So fix this by
> using devm_kzalloc and let the core take care about freeing the memory
> during device dettach.
>
>
Hello,
The following program triggers WARNING in kmalloc:
// autogenerated by syzkaller (http://github.com/google/syzkaller)
#include
#include
#include
#include
int main()
{
long r0 = syscall(SYS_mmap, 0x2000ul, 0x4000ul, 0x3ul,
0x32ul, 0xul, 0x0ul);
long
On Tue, Dec 22, 2015 at 3:45 PM, Dave Jones wrote:
> ===
> [ INFO: suspicious RCU usage. ]
> 4.4.0-rc6-think+ #1 Not tainted
> ---
> lib/rhashtable.c:522 suspicious rcu_dereference_protected() usage!
>
> other info
On Mon, 2015-12-21 at 21:29 +0100, Florian Westphal wrote:
> Hannes points out that when we generate tcp reset for timewait sockets we
> pretend we found no socket and pass NULL sk to tcp_vX_send_reset().
>
> Make it cope with inet tw sockets and then provide tw sk.
>
> This makes RSTs appear on
From: Lorenzo Colitti
Date: Tue, 22 Dec 2015 00:03:44 +0900
> When closing a listen socket, tcp_abort currently calls
> tcp_done without clearing the request queue. If the socket has a
> child socket that is established but not yet accepted, the child
> socket is then left
From: Jeff Kirsher
Date: Tue, 22 Dec 2015 06:02:02 -0800
> This series contains updates to fm10k only.
Pulled, thanks a lot Jeff.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majord...@vger.kernel.org
More
From: Bert Kenward
Date: Fri, 18 Dec 2015 17:09:04 +
> +#ifdef DEBUG
> + WARN_ON(1);
> +#endif
Don't do stuff like this. Either the assertion is valid and belongs
here, or it doesn't.
--
To unsubscribe from this list: send the line "unsubscribe netdev"
From: Jiri Pirko
Date: Mon, 21 Dec 2015 11:14:21 +0100
> From: Jiri Pirko
>
> Add another sysfs hwmon attribute to expose possibility to reset
> temperature sensors history.
>
> Signed-off-by: Jiri Pirko
Applied, thanks Jiri.
--
To
Hi,
On Tue, Dec 22, 2015 at 09:13:54PM +0100, Dmitry Vyukov wrote:
> Hello,
...
>
> [] __sctp_setsockopt_connectx+0xc6/0x150
> net/sctp/socket.c:1318
> [< inline >] sctp_getsockopt_connectx3 net/sctp/socket.c:1410
> [] sctp_getsockopt+0x25ee/0x3e00 net/sctp/socket.c:6007
> []
From: Craig Gallek
Date: Tue, 22 Dec 2015 15:51:19 -0500
> I was actually just looking at this as well (though a slightly
> different stack). The issue is with: c6ff5268293e rhashtable: Fix
> walker list corruption
>
> It changed the lock acquired in rhashtable_walk_init
On Tue, Dec 22, 2015 at 04:50:20PM -0500, David Miller wrote:
> > > > Simple fix is below. Though, I don't understand the history of the
> > > > multiple locks in this structure to be sure it's correct. I'll send
> > > > it as a formal patch. Please reject if it's not the right
From: Cong Wang
Date: Mon, 21 Dec 2015 10:55:45 -0800
> When sysctl performs restrict writes, it allows to write from
> a middle position of a sysctl file, which requires us to initialize
> the table data before calling proc_dostring() for the write case.
>
> Fixes:
From: Craig Gallek
Date: Tue, 22 Dec 2015 16:58:11 -0500
> On Tue, Dec 22, 2015 at 4:40 PM, David Miller wrote:
>> From: Craig Gallek
>> Date: Tue, 22 Dec 2015 15:05:07 -0500
>>
>>> + for (i = 0; i < reuse->num_socks; i++)
From: Florian Westphal
Date: Mon, 21 Dec 2015 21:29:23 +0100
> This is V2, this time as a small series since I followed Erics advice
> to split this into smaller chunks, I hope this makes it easier to
> review.
>
> First patch adds inet_sk_transparent helper.
> Second patch
Hi Craig,
[auto build test ERROR on net-next/master]
url:
https://github.com/0day-ci/linux/commits/Craig-Gallek/Faster-SO_REUSEPORT/20151223-040911
config: arm-mvebu_v7_defconfig (attached as .config)
reproduce:
wget
From: Andrew Lunn
Date: Tue, 22 Dec 2015 12:06:34 +0100
> On Tue, Dec 22, 2015 at 11:58:40AM +0100, Henri Roosen wrote:
>> Commit 651df2183543 ("phy: micrel: Fix finding PHY properties in MAC
>> node.") only fixes finding PHY properties in MAC node for KSZ9021. This
>> commit
From: David Rivshin
If a fixed-link DT subnode is used, the phy_device was looked up so
that a PHY ID string could be constructed and passed to phy_connect().
This is not necessary, as the device_node can be passed directly to
of_phy_connect() instead. This reuses the same
From: David Rivshin
This series is based on the tip of the net tree.
The first patch fixes a bug that makes dual_emac mode break if
either slave uses the phy-handle property in the devicetree.
The second patch fixes some cosmetic problems with error messages,
and also
From: David Rivshin
The phy-handle, phy_id, and fixed-link properties are mutually exclusive,
and only one need be specified. However if phy-handle was specified, an
error message would complain about the lack of phy_id or fixed-link.
Also, if phy-handle was specified and
From: David Rivshin
Commit 9e42f715264ff158478fa30eaed847f6e131366b ("drivers: net: cpsw: add
phy-handle parsing") saved the "phy-handle" phandle into a new cpsw_priv
field. However, phy connections are per-slave, so the phy_node field should
be in cpsw_slave_data rather
On Mon, 2015-12-21 at 21:29 +0100, Florian Westphal wrote:
> tcp_md5_do_lookup requires a full socket, so once we extend
> _send_reset() to also accept timewait socket we would have to change
>
Acked-by: Eric Dumazet
--
To unsubscribe from this list: send the line
On Mon, 2015-12-21 at 21:29 +0100, Florian Westphal wrote:
> Avoids cluttering tcp_v4_send_reset when followup patch extends
> it to deal with timewait sockets.
>
> Suggested-by: Eric Dumazet
> Signed-off-by: Florian Westphal
> ---
Acked-by: Eric Dumazet
From: Geliang Tang
Date: Tue, 22 Dec 2015 23:11:49 +0800
> Use to_net_dev() instead of open-coding it.
>
> Signed-off-by: Geliang Tang
Applied to net-next, thanks.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a
From: Vegard Nossum
Date: Sun, 20 Dec 2015 21:53:27 +0100
> @@ -115,6 +115,10 @@ struct sock *dccp_create_openreq_child(const struct sock
> *sk,
> newdp->dccps_isr = dreq->dreq_isr;
> newdp->dccps_gsr = dreq->dreq_gsr;
>
> +
On Tue, Dec 22, 2015 at 10:47:43PM +0100, Hannes Frederic Sowa wrote:
> On 22.12.2015 17:59, Huw Davies wrote:
> > I'm confused about this one. AFAICS, this will drop packets that we
> > can't process. We don't send the icmp error, but I can certainly add
> > that. Is that what you mean?
>
>
From: Craig Gallek
Date: Tue, 22 Dec 2015 15:05:07 -0500
> + for (i = 0; i < reuse->num_socks; i++) {
> + if (reuse->socks[i] == sk) {
> + reuse->socks[i] = reuse->socks[reuse->num_socks - 1];
> + reuse->num_socks--;
On 21.12.2015 21:29, Florian Westphal wrote:
> Hannes points out that when we generate tcp reset for timewait sockets we
> pretend we found no socket and pass NULL sk to tcp_vX_send_reset().
>
> Make it cope with inet tw sockets and then provide tw sk.
>
> This makes RSTs appear on correct
On Tue, Dec 22, 2015 at 4:42 PM, David Miller wrote:
> From: Craig Gallek
> Date: Tue, 22 Dec 2015 16:38:32 -0500
>
>> On Tue, Dec 22, 2015 at 4:28 PM, David Miller wrote:
>>> From: Craig Gallek
>>> Date:
On Tue, Dec 22, 2015 at 04:42:25PM -0500, David Miller wrote:
> From: Craig Gallek
> Date: Tue, 22 Dec 2015 16:38:32 -0500
>
> > On Tue, Dec 22, 2015 at 4:28 PM, David Miller wrote:
> >> From: Craig Gallek
> >> Date: Tue,
On 22.12.2015 17:59, Huw Davies wrote:
> On Tue, Dec 22, 2015 at 02:50:20PM +0100, Hannes Frederic Sowa wrote:
>> On 22.12.2015 12:46, Huw Davies wrote:
>>>
>>> +/* CALIPSO RFC 5570 */
>>> +
>>> +static bool ipv6_hop_calipso(struct sk_buff *skb, int optoff)
>>> +{
>>> + const unsigned char *nh
On 21.12.2015 21:29, Florian Westphal wrote:
> tcp_md5_do_lookup requires a full socket, so once we extend
> _send_reset() to also accept timewait socket we would have to change
>
> if (!sk && hash_location)
>
> to something like
>
> if ((!sk || !sk_fullsock(sk)) && hash_location) {
> ...
> }
On 21.12.2015 21:29, Florian Westphal wrote:
> Avoids cluttering tcp_v4_send_reset when followup patch extends
> it to deal with timewait sockets.
>
> Suggested-by: Eric Dumazet
> Signed-off-by: Florian Westphal
Acked-by: Hannes Frederic Sowa
This patch implements support for setting/matching the skb->tc_index
field from Xtables, as well as allowing it to be saved/restored using
connection tracking.
This provides 16 extra bits of mark space that can be saved/restored from
the connection (for performance benefits) when the marking is
Sorry for the resend. I forgot to include relevant netfilter maintainers
in CC list
Changes from v1 are to add dependency on NF_CONNTRACK to Kconfig to resolve
the build issue and some style fixups from checkpatch.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body
On Tue, Dec 22, 2015 at 4:28 PM, David Miller wrote:
> From: Craig Gallek
> Date: Tue, 22 Dec 2015 15:51:19 -0500
>
>> I was actually just looking at this as well (though a slightly
>> different stack). The issue is with: c6ff5268293e rhashtable: Fix
From: Dave Jones
Date: Tue, 22 Dec 2015 16:47:34 -0500
> On Tue, Dec 22, 2015 at 04:42:25PM -0500, David Miller wrote:
> > From: Craig Gallek
> > Date: Tue, 22 Dec 2015 16:38:32 -0500
> >
> > > On Tue, Dec 22, 2015 at 4:28 PM, David Miller
Hi Marc,
On 22.12.2015 22:28, Marc Haber wrote:
> Hi Hannes,
>
> thanks for your mail.
>
> On Tue, Dec 22, 2015 at 04:15:14PM +0100, Hannes Frederic Sowa wrote:
>> On 12.12.2015 20:58, Marc Haber wrote:
>>> Any hints would be appreciated.
>>
>> This sysctl should help:
>>
>>
On Tue, Dec 22, 2015 at 4:40 PM, David Miller wrote:
> From: Craig Gallek
> Date: Tue, 22 Dec 2015 15:05:07 -0500
>
>> + for (i = 0; i < reuse->num_socks; i++) {
>> + if (reuse->socks[i] == sk) {
>> + reuse->socks[i]
On Tue, Dec 22, 2015 at 5:11 PM, kbuild test robot wrote:
> Hi Craig,
>
> [auto build test ERROR on net-next/master]
>
> url:
> https://github.com/0day-ci/linux/commits/Craig-Gallek/Faster-SO_REUSEPORT/20151223-040911
> config: arm-mvebu_v7_defconfig (attached as .config)
>
On 12/21/2015 06:13 PM, Faisal Latif wrote:
> This (V1) series contains the addition of the i40iw.ko driver after
> incorporating the feedback from Christoph Hellwig and Joe Perches for
> initial series.
>
> This driver provides iWARP RDMA functionality for the Intel(R) X722 Ethernet
> controller
From: Vijay Pandurangan
Date: Fri, 18 Dec 2015 14:34:59 -0500
> Packets that arrive from real hardware devices have ip_summed ==
> CHECKSUM_UNNECESSARY if the hardware verified the checksums, or
> CHECKSUM_NONE if the packet is bad or it was unable to verify it. The
> current
From: Sergei Shtylyov
Date: Sun, 20 Dec 2015 01:48:04 +0300
> Commit 1299653affa4 ("sh_eth: fix descriptor access endianness") only
> addressed the 32-bit buffer address field byte-swapping but the driver
> still accesses 16-bit frame/buffer length descriptor
From: Santosh Shilimkar
Date: Sat, 19 Dec 2015 12:55:43 -0800
> From: Sebastian Andrzej Siewior
>
> It looks like an attempt to use CPU notifier here which was never
> completed. Nobody tried to wire it up completely since 2k9. So I unwind
>
From: Dave Jones
Date: Tue, 22 Dec 2015 15:45:39 -0500
> ===
> [ INFO: suspicious RCU usage. ]
> 4.4.0-rc6-think+ #1 Not tainted
> ---
> lib/rhashtable.c:522 suspicious rcu_dereference_protected() usage!
>
> other
Otherwise we may end up with incorrect network and transport header for
other protocols.
Signed-off-by: Pablo Neira Ayuso
---
net/netfilter/nf_tables_netdev.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/netfilter/nf_tables_netdev.c
From: Florian Westphal
one nft userspace test case fails with
'ct l3proto original ipv4' mismatches 'ct l3proto ipv4'
... because NFTA_CT_DIRECTION attr is missing.
Signed-off-by: Florian Westphal
Signed-off-by: Pablo Neira Ayuso
---
Hi David,
The following patchset contains two netfilter fixes:
1) Oneliner from Florian to dump missing NFT_CT_L3PROTOCOL netlink
attribute, from Florian Westphal.
2) Another oneliner for nf_tables to use skb->protocol from the new
netdev family, we can't assume ethernet there.
You can
Hello, Serge.
On Mon, Dec 21, 2015 at 06:22:41PM -0600, Serge E. Hallyn wrote:
> I'm trying to figure out how to handle this in the cgroup ns patchset.
> Is this going to be purely used internally? From the user i see in
> this patchset it looks like I should leave it be (and have @path always
>
From: Craig Gallek
Date: Tue, 22 Dec 2015 16:38:32 -0500
> On Tue, Dec 22, 2015 at 4:28 PM, David Miller wrote:
>> From: Craig Gallek
>> Date: Tue, 22 Dec 2015 15:51:19 -0500
>>
>>> I was actually just looking at this as well
Oliver Neukum [mailto:oneu...@suse.com]
[...]
> It is clear to me that you cannot get away with using the same operation
> for resume() and reset_resume() in your driver. It is fundamentally
> impossible. Firmware cannot fix it.
I would think how to fix it.
> Sorry for the length of the
Hi
This series adds a debug message if adapter isn't inserted in right PCI
slot. Changes naming conventions for iSCSI rx queues, use node info while
allocating rx queue and use napi_complete_done() api in napi handler.
This patch series has been created against net-next tree and includes
patches
All the upper level protocols like rdma, iscsi have their own offload rx
queues, so instead of using the generic naming convention be specific
while naming them. Improves code readability
Signed-off-by: Hariprasad Shenai
---
drivers/net/ethernet/chelsio/cxgb4/cxgb4.h
Check if the device get enough bandwidth from the entire PCI chain to
satisfy its capabilities. This patch determines the PCIe device's
bandwidth capabilities by reading its PCIe Link Capabilities registers
and then call the pcie_get_minimum_link function to ensure that the
adapter is hooked into
On Tue, Dec 22, 2015 at 15:45:52 -0500, David Miller wrote:
> From: Or Gerlitz
> Date: Mon, 21 Dec 2015 09:33:22 +0200
>
> > On Mon, Dec 21, 2015 at 9:16 AM, Hariprasad Shenai
> > wrote:
> >> Add new /sys/kernel/debug/cxgb4/*/dcb_info node to dump
> -Ursprüngliche Nachricht-
> Von: Florian Fainelli [mailto:f.faine...@gmail.com]
> Gesendet: Montag, 21. Dezember 2015 20:51
> An: Roosen Henri; david.da...@cavium.com
> Cc: buyt...@wantstofly.org; grant.lik...@secretlab.ca;
> da...@davemloft.net; netdev@vger.kernel.org; Andrew Lunn
>
On Tue, 2015-12-22 at 09:48 +, Hayes Wang wrote:
> Peter Wu [mailto:pe...@lekensteyn.nl]
> > Sent: Tuesday, December 08, 2015 10:33 PM
> [...]
> > I found another problem with runtime PM. When a device is suspended via
> > autosuspend and a system suspend takes place, there is no network I/O
Hi all,
On latest linus/master I'm able to trigger the following KASAN warnings:
==
BUG: KASAN: out-of-bounds in filter_rcv+0xc3/0xa10 at addr 880014b4d680
Read of size 4 by task a.out/992
From: Asias He
VM sockets vhost transport implementation. This driver runs on the
host.
Signed-off-by: Asias He
Signed-off-by: Stefan Hajnoczi
---
v4:
* Add MAINTAINERS file entry
* virtqueue used len is now sizeof(pkt->hdr) +
From: Asias He
This module contains the common code and header files for the following
virtio_transporto and vhost_vsock kernel modules.
Signed-off-by: Asias He
Signed-off-by: Stefan Hajnoczi
---
v4:
* Add MAINTAINERS file entry
*
From: Asias He
Enable virtio-vsock and vhost-vsock.
Signed-off-by: Asias He
Signed-off-by: Stefan Hajnoczi
---
v4:
* Make checkpatch.pl happy with longer option description
* Clarify dependency on virtio rather than QEMU as suggested
Commit 651df2183543 ("phy: micrel: Fix finding PHY properties in MAC
node.") only fixes finding PHY properties in MAC node for KSZ9021. This
commit applies the same fix for KSZ9031.
Signed-off-by: Henri Roosen
---
drivers/net/phy/micrel.c | 13 +++--
1 file
Just one patch to fix dst_entries_init with multiple namespaces.
>From Dan Streetman.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit 5f6c99e0ab805d8ec9eda105822912d49aa1d409:
net: phy: fix a bug in get_phy_c45_ids (2015-11-02 23:45:20 -0500)
are
Peter Wu [mailto:pe...@lekensteyn.nl]
> Sent: Tuesday, December 08, 2015 10:33 PM
[...]
> I found another problem with runtime PM. When a device is suspended via
> autosuspend and a system suspend takes place, there is no network I/O
> after resume. Triggering a renegotiation (ethtool -r eth1)
> Unfortunately the patch is incomplete: it only fixes the issue for
> the KSZ9021. Please have a look at the funcion ksz9031_config_init()
> which has the the same (broken) search for the parent node.
Ah, sorry missed that. I was a bit blinkered, the issue was report for
KSZ9021 and i did not
On Tue, Dec 22, 2015 at 11:58:40AM +0100, Henri Roosen wrote:
> Commit 651df2183543 ("phy: micrel: Fix finding PHY properties in MAC
> node.") only fixes finding PHY properties in MAC node for KSZ9021. This
> commit applies the same fix for KSZ9031.
>
> Signed-off-by: Henri Roosen
On Mon, Dec 21, 2015 at 8:35 PM, Richard Cochran
wrote:
> On Mon, Dec 21, 2015 at 04:35:23PM +0200, Saeed Mahameed wrote:
>> think of a case where:
>> CPU1: is just about to call
>> "schedule_delayed_work(>overflow_work,
>> tstamp->overflow_period);"
>> CPU2:
On Mon, Dec 21, 2015 at 11:15 AM, Richard Cochran
wrote:
> On Sun, Dec 20, 2015 at 11:46:30PM +0200, Saeed Mahameed wrote:
>> +/* Should run once every mlx5e_tstamp->overflow_period */
>> +static void mlx5e_timestamp_overflow(struct work_struct *work)
>> +{
>> +
> I did missed the device tree binding documentation.
> This driver expected a property "lane-instance" in mdio bus node, and
> "lane-handle" and "lane-range" properties in phy node.
>
> The "lane-instance" indicates what the phy should be probed as,
> 1000BASE-KX or 10GBASE-KR, seems phy node is
Cong Wang wrote:
> On Mon, Dec 21, 2015 at 1:54 AM, Andrey Ryabinin
> wrote:
>> ip6addrlbl_get() has never worked. If ip6addrlbl_hold() succeeded,
>> ip6addrlbl_get() will exit with '-ESRCH'. If ip6addrlbl_hold() failed,
>> ip6addrlbl_get() will use about to be free
Hi Brent,
On Tue, Dec 22, 2015 at 3:23 AM, Brent Taylor wrote:
> On Mon, Dec 21, 2015 at 1:23 PM, Souptick Joarder
> wrote:
>> Hi Brent,
>>
>> On Tue, Dec 1, 2015 at 11:11 AM, Brent Taylor wrote:
>>> Since commit
Souptick Joarder writes:
> Hi Brent,
>
> On Tue, Dec 22, 2015 at 3:23 AM, Brent Taylor wrote:
>> On Mon, Dec 21, 2015 at 1:23 PM, Souptick Joarder
>> wrote:
>>> Hi Brent,
>>>
>>> On Tue, Dec 1, 2015 at 11:11 AM, Brent Taylor
Mon, Dec 21, 2015 at 04:12:06PM CET, j...@resnulli.us wrote:
>From: Jiri Pirko
>
>KASan reported use-after-free for the hwmon structure. So fix this by
>using devm_kzalloc and let the core take care about freeing the memory
>during device dettach.
We found one small change is
On Tue, Dec 22, 2015 at 5:31 PM, Lorenzo Colitti wrote:
> I've just uploaded a new version. The changes from v2 are as
> follows:
> [...]
Also: as requested, kill is now a boolean instead of a bitfield inside a struct.
--
To unsubscribe from this list: send the line
Move constants to the right of binary operators.
Generated by: scripts/coccinelle/misc/compare_const_fl.cocci
CC: Faisal Latif
Signed-off-by: Fengguang Wu
Signed-off-by: Julia Lawall
---
It's a minor point, but when I
This patch adds a -K / --kill option to ss that attempts to
forcibly close matching sockets using SOCK_DESTROY.
Because ss typically prints sockets instead of acting on them,
and because the kernel only supports forcibly closing some types
of sockets, the output of -K is as follows:
- If closing
I've just uploaded a new version. The changes from v2 are as
follows:
- Removed the superfluous inline keyword.
- The code now ignores ENOENT from kill_inet_sock. This can
happen if something else closed the socket during the scan, or
if the user requests killing a socket that is not in the
The new variant is identical to rtnl_send_check, except it also
consumes the kernel response instead of using MSG_PEEK. This is
useful for callers that send simple commands that never cause a
response but only ACKs, and that expect to receive and deal
with errors without printing them to stderr
From: Jiri Pirko
KASan reported use-after-free for the hwmon structure. So fix this by
using devm_kzalloc and let the core take care about freeing the memory
during device dettach.
Reported-by: Ido Schimmel
Fixes: 89309da39 ("mlxsw: core: Implement
From: Asias He
VM sockets virtio transport implementation. This driver runs in the
guest.
Signed-off-by: Asias He
Signed-off-by: Stefan Hajnoczi
---
v4:
* Add MAINTAINERS file entry
* Drop short/long rx packets
* checkpatch.pl
This series is based on v4.4-rc2 and the "virtio: make find_vqs()
checkpatch.pl-friendly" patch I recently submitted.
v4:
* Addressed code review comments from Alex Bennee
* MAINTAINERS file entries for new files
* Trace events instead of pr_debug()
* RST packet is sent when there is no
struct vsock_transport contains function pointers called by AF_VSOCK
core code. The transport may want its own transport-specific function
pointers and they can be added after struct vsock_transport.
Allow the transport to fetch vsock_transport. It can downcast it to
access transport-specific
kernel BUG at include/linux/skbuff.h:1219!
invalid opcode: [#1] SMP
RIP: 0010:[] ovs_flow_extract+0x8ed/0xa40 [openvswitch]
Call Trace:
ovs_dp_process_received_packet+0x44/0x80 [openvswitch]
ovs_vport_receive+0x2e/0x30 [openvswitch]
gre_rcv+0xac/0xd0 [openvswitch]
gre_cisco_rcv+0x1c2/0x310
From: Dan Streetman
Remove the dst_entries_init/destroy calls for xfrm4 and xfrm6 dst_ops
templates; their dst_entries counters will never be used. Move the
xfrm dst_ops initialization from the common xfrm/xfrm_policy.c to
xfrm4/xfrm4_policy.c and
On Mon, Dec 21, 2015 at 09:33:22 +0200, Or Gerlitz wrote:
> On Mon, Dec 21, 2015 at 9:16 AM, Hariprasad Shenai
> wrote:
> > Add new /sys/kernel/debug/cxgb4/*/dcb_info node to dump out
> > various Data Center Bridging information.
>
> why? what's wrong with using the lldp
This works in exactly the same way as the CIPSO label cache.
The idea is to allow the lsm to cache the result of a secattr
lookup so that it doesn't need to perform the lookup for
every skbuff.
It introduces two sysctl controls:
calipso_cache_enable - enables/disables the cache.
CALIPSO is a packet labelling protocol for IPv6 which is very similar
to CIPSO. It is specified in RFC 5570. Much of the code is based on
the current CIPSO code.
This adds support for adding passthrough-type CALIPSO DOIs through the
NLBL_CALIPSO_C_ADD command. It requires attributes:
This extends the NLBL_MGMT_C_ADD and NLBL_MGMT_C_ADDDEF commands
to accept CALIPSO protocol DOIs.
Signed-off-by: Huw Davies
---
net/netlabel/netlabel_domainhash.c | 40 +--
net/netlabel/netlabel_domainhash.h | 1 +
net/netlabel/netlabel_mgmt.c
1 - 100 of 141 matches
Mail list logo