David Miller wrote:
> I'll pull, but this is not how I want you to operate.
Anyway, thanks for pulling it.
David
Hello,
I was playing with quite simple bridged setup on different boards with
very recent kernels (4.6.3 as of this writing) and found one interesting
behavior that I cannot yet understand and googling din't help here as well.
My setup is pretty simple:
- --
Vegard Nossum is reporting for a crash in fib_dump_info (fib_nhs==1)
when nh_dev = NULL. Problem happens when RTNH_F_LINKDOWN is
provided from user space for routes that do not use the flag,
catched with netlink fuzzer.
RTNH_F_LINKDOWN should be used only for link routes, not for
local routes or
Shmulik Ladkani wrote:
[ CC
> On Tue, 5 Jul 2016 15:03:27 +0200, f...@strlen.de wrote:
> > > The expected behavior in such a setup would be segmenting the skb first,
> > > and then fragmenting each segment according to dst mtu, and finally
> > > passing the
David Miller wrote:
> From: Shmulik Ladkani
> Date: Tue, 5 Jul 2016 17:05:41 +0300
>
> > On Tue, 5 Jul 2016 15:03:27 +0200, f...@strlen.de wrote:
> >> (Or did I misunderstand this setup...?)
> >
> > tap0 bridged with vxlan0.
> > route to
On Fri, 8 Jul 2016 18:51:07 +0100
Jakub Kicinski wrote:
> On Fri, 8 Jul 2016 09:45:25 -0700, John Fastabend wrote:
> > The only distinction between VFs and queue groupings on my side is VFs
> > provide RSS where as queue groupings have to be selected explicitly.
> >
On Sat, Jul 9, 2016 at 7:47 PM, Xin Long wrote:
> This patchset implements "Additional Policies for the Partially Reliable
> Stream Control Transmission Protocol Extension" described on RFC7496.
>
> The Partially Reliable SCTP (PR-SCTP) extension defined in [RFC3758]
>
Hi Aaron,
On Sat, 2016-07-09 at 07:47 -0400, Aaron Z wrote:
> On Sat, Jul 9, 2016 at 4:37 AM, Alexey Brodkin
> wrote:
> >
> > Hello,
> >
> > I was playing with quite simple bridged setup on different boards with
> > very recent kernels (4.6.3 as of this writing)
On Sat, 9 Jul 2016 11:00:20 +0200 Florian Westphal wrote:
> Shmulik Ladkani wrote:
> > > How does work if e.g. 1460-sized udp packet arrives on tap0?
> > > Do we fragment (possibly ignoring DF?)
> >
> > A *non* gso udp packet arriving on
On Thu, 7 Jul 2016 19:15:13 -0700
Brenden Blanco wrote:
> Add a new bpf prog type that is intended to run in early stages of the
> packet rx path. Only minimal packet metadata will be available, hence a
> new context type, struct xdp_md, is exposed to userspace. So far
On Fri, 2016-07-08 at 17:27 -0700, Yue Cao wrote:
> Hi Eric,
>
>
> Thank you for the email. After rethinking the suggested patch, our
> side-channel attack might still work.
>
>
> The main idea behind the patch is to change challenge_count lifetime
> from 1s to a random value in the range
On 07/09/2016 02:20 AM, Alexei Starovoitov wrote:
On Sat, Jul 09, 2016 at 01:31:40AM +0200, Eric Dumazet wrote:
On Fri, 2016-07-08 at 17:52 +0200, Michal Kubecek wrote:
If socket filter truncates an udp packet below the length of UDP header
in udpv6_queue_rcv_skb() or udp_queue_rcv_skb(), it
David Miller wrote:
> > Can you pull this into net-next please?
>
> I'll pull, but this is not how I want you to operate.
>
> If you change stuff, you must repost the entire series. And this is
> one of many reasons I want people to keep patch sets small, so that
> this
Signed-off-by: Phil Sutter
---
man/man8/ip-link.8.in | 92 ++-
1 file changed, 47 insertions(+), 45 deletions(-)
diff --git a/man/man8/ip-link.8.in b/man/man8/ip-link.8.in
index ada20fe210793..1644af0ef9f9f 100644
---
Signed-off-by: Phil Sutter
---
ip/iplink.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/ip/iplink.c b/ip/iplink.c
index f2a2e13cf0c5b..0e3cee6af8b6f 100644
--- a/ip/iplink.c
+++ b/ip/iplink.c
@@ -55,7 +55,9 @@ void iplink_usage(void)
Signed-off-by: Phil Sutter
---
man/man8/ip-link.8.in | 129 ++
1 file changed, 129 insertions(+)
diff --git a/man/man8/ip-link.8.in b/man/man8/ip-link.8.in
index 2678d37df7478..ada20fe210793 100644
--- a/man/man8/ip-link.8.in
+++
This series improves documentation around the feature of 'ip link set'
to configure device type specific parameters. While doing so, I reviewed
used fonts in ip-link.8 and fixed a few bugs/inconsistencies.
Phil Sutter (6):
iplink: List valid 'type' argument in ip link help text
iplink:
This moves the warning to the beginning of the section about 'ip link
set' which makes it still stand out after adding more text to it's end.
Signed-off-by: Phil Sutter
---
man/man8/ip-link.8.in | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff
'ip link set' supports passing a type to set type-specific parameters.
Add this missing piece of information to the synopsis section.
Signed-off-by: Phil Sutter
---
man/man8/ip-link.8.in | 71 +--
1 file changed, 40 insertions(+), 31
Signed-off-by: Phil Sutter
---
ip/iplink_bond_slave.c | 24
1 file changed, 24 insertions(+)
diff --git a/ip/iplink_bond_slave.c b/ip/iplink_bond_slave.c
index d67793237edfc..9c60dea8a2757 100644
--- a/ip/iplink_bond_slave.c
+++ b/ip/iplink_bond_slave.c
@@
Description copied from related kernel support commit message with a
little tailoring to fit.
While at it, fix font of non-terminal CONFFLAG-LIST in synopsis.
Signed-off-by: Phil Sutter
---
man/man8/ip-address.8.in | 21 +++--
1 file changed, 19 insertions(+), 2
On Sat, Jul 09, 2016 at 11:48:49AM +0200, Daniel Borkmann wrote:
> On 07/09/2016 02:20 AM, Alexei Starovoitov wrote:
> >On Sat, Jul 09, 2016 at 01:31:40AM +0200, Eric Dumazet wrote:
> >>On Fri, 2016-07-08 at 17:52 +0200, Michal Kubecek wrote:
> >>>If socket filter truncates an udp packet below the
This patch adds SCTP_DEFAULT_PRINFO to sctp sockopt. It is used
to set/get sctp Partially Reliable Policies' default params,
which includes 3 policies (ttl, rtx, prio) and their values.
Still, if we set policy params in sndinfo, we will use the params
of sndinfo against chunks, instead of the
prsctp PRIO policy is a policy to abandon lower priority chunks when
asoc doesn't have enough snd buffer, so that the current chunk with
higher priority can be queued successfully.
Similar to TTL/RTX policy, we will set the priority of the chunk to
prsctp_param with sinfo->sinfo_timetolive in
This patch adds SCTP_PR_ASSOC_STATUS to sctp sockopt, which is used
to dump the prsctp statistics info from the asoc. The prsctp statistics
includes abandoned_sent/unsent from the asoc. abandoned_sent is the
count of the packets we drop packets from retransmit/transmited queue,
and
prsctp RTX policy is a policy to abandon chunks when they are
retransmitted beyond the max count.
This patch uses sent_count to count how many times one chunk has
been sent, and prsctp_param is the max rtx count, which is from
sinfo->sinfo_timetolive in sctp_set_prsctp_policy(). So similar
to TTL
prsctp TTL policy is a policy to abandon chunks when they expire
at the specific time in local stack. It's similar with expires_at
in struct sctp_datamsg.
This patch uses sinfo->sinfo_timetolive to set the specific time for
TTL policy. sinfo->sinfo_timetolive is also used for msg->expires_at.
So
On Sat, Jul 9, 2016 at 4:37 AM, Alexey Brodkin
wrote:
> Hello,
>
> I was playing with quite simple bridged setup on different boards with
> very recent kernels (4.6.3 as of this writing) and found one interesting
> behavior that I cannot yet understand and googling
This patchset implements "Additional Policies for the Partially Reliable
Stream Control Transmission Protocol Extension" described on RFC7496.
The Partially Reliable SCTP (PR-SCTP) extension defined in [RFC3758]
provides a generic method for senders to abandon user messages. The
decision to
According to section 4.5 of rfc7496, prsctp_enable should be per asoc.
We will add prsctp_enable to both asoc and ep, and replace the places
where it used net.sctp->prsctp_enable with asoc->prsctp_enable.
ep->prsctp_enable will be initialized with net.sctp->prsctp_enable, and
asoc->prsctp_enable
Hi Dear,
I'm Amal Isabelle; I am a National of France and I live in Abidjan, Cote
d’Ivoire. I’m contacting because I want to be your friend and confide in you
because I have in my possession now 186.13 Kilograms of Gold Dust, Quality: 23
carat, purity 92% that I inherited from my late mother
On 07/09/2016 07:23 PM, Andy Gospodarek wrote:
On Sat, Jul 09, 2016 at 12:00:15PM +0300, Julian Anastasov wrote:
Vegard Nossum is reporting for a crash in fib_dump_info (fib_nhs==1)
when nh_dev = NULL. Problem happens when RTNH_F_LINKDOWN is
provided from user space for routes that do not use
On Sat, Jul 09, 2016 at 12:00:15PM +0300, Julian Anastasov wrote:
> Vegard Nossum is reporting for a crash in fib_dump_info (fib_nhs==1)
> when nh_dev = NULL. Problem happens when RTNH_F_LINKDOWN is
> provided from user space for routes that do not use the flag,
> catched with netlink fuzzer.
Can
On Fri, Jul 8, 2016 at 5:15 AM, Brenden Blanco wrote:
> Add a sample program that only drops packets at the BPF_PROG_TYPE_XDP_RX
> hook of a link. With the drop-only program, observed single core rate is
> ~20Mpps.
>
> Other tests were run, for instance without the dropcnt
Hello,
On Sat, 9 Jul 2016, Andy Gospodarek wrote:
> On Sat, Jul 09, 2016 at 12:00:15PM +0300, Julian Anastasov wrote:
> > Vegard Nossum is reporting for a crash in fib_dump_info (fib_nhs==1)
> > when nh_dev = NULL. Problem happens when RTNH_F_LINKDOWN is
> > provided from user space for
On Fri, Jul 8, 2016 at 5:15 AM, Brenden Blanco wrote:
> Add support for the BPF_PROG_TYPE_XDP hook in mlx4 driver.
>
> In tc/socket bpf programs, helpers linearize skb fragments as needed
> when the program touchs the packet data. However, in the pursuit of
> speed, XDP
Shmulik Ladkani wrote:
> I'd appreciate any suggestion how to determine traffic is local OTHER
> THAN testing IPSKB_FORWARDED; If we have such a way, there wouldn't be an
> impact on local traffic.
>
> > What about setting IPCB FORWARD flag in iptunnel_xmit if
On Sat, Jul 9, 2016 at 3:14 AM, Jesper Dangaard Brouer
wrote:
> On Thu, 7 Jul 2016 19:15:13 -0700
> Brenden Blanco wrote:
>
>> Add a new bpf prog type that is intended to run in early stages of the
>> packet rx path. Only minimal packet metadata will be
On Fri, 8 Jul 2016 19:04:27 -0400 Hannes Frederic Sowa
wrote:
> >> I really do wonder if GRO on top of fragmentation does have any effect.
> >> Would be great if someone has data for that already?
> >
> > I think that logic is kind of backwards. It is already
On 09.07.2016 05:00, Florian Westphal wrote:
> I am worried about this patch, skb_gso_validate_mtu is more costly than
> the ->flags & FORWARD check; everyone pays this extra cost.
>
> What about setting IPCB FORWARD flag in iptunnel_xmit if
> skb->skb_iif != 0... instead?
That came to my mind
On 09.07.2016 11:18, Shmulik Ladkani wrote:
> On Fri, 8 Jul 2016 19:04:27 -0400 Hannes Frederic Sowa
> wrote:
I really do wonder if GRO on top of fragmentation does have any effect.
Would be great if someone has data for that already?
>>>
>>> I think that
On Sat, Jul 9, 2016 at 6:43 AM, Michal Kubecek wrote:
> On Sat, Jul 09, 2016 at 11:48:49AM +0200, Daniel Borkmann wrote:
>> On 07/09/2016 02:20 AM, Alexei Starovoitov wrote:
>> >On Sat, Jul 09, 2016 at 01:31:40AM +0200, Eric Dumazet wrote:
>> >>On Fri, 2016-07-08 at 17:52 +0200,
On Fri, Jul 8, 2016 at 5:15 AM, Brenden Blanco wrote:
> Add support for the BPF_PROG_TYPE_XDP hook in mlx4 driver.
>
> In tc/socket bpf programs, helpers linearize skb fragments as needed
> when the program touchs the packet data. However, in the pursuit of
nit, for the
On Sat, 9 Jul 2016 11:35:03 -0400 Hannes Frederic Sowa
wrote:
> On 09.07.2016 11:18, Shmulik Ladkani wrote:
> > On Fri, 8 Jul 2016 19:04:27 -0400 Hannes Frederic Sowa
> > wrote:
> I really do wonder if GRO on top of fragmentation
The Juniper SSL VPN client use a "tun" interface and seems to
be picky about visible changes.to it. Commit cc9da6cc4f56
("ipv6: addrconf: use stable address generator for ARPHRD_NONE")
made such interfaces get an auto-generated IPv6 link local address
by default, similar to most other interface
From: Simon Horman
Date: Thu, 7 Jul 2016 07:56:11 +0200
> This short series provides support for MPLS in IPv4 (RFC4023), and by
> virtue of FOU, MPLS in UDP (RFC7510).
Series applied, thanks Simon.
From: Jon Mason
Date: Thu, 7 Jul 2016 19:08:52 -0400
> David Miller, Please consider including patches 1-5 in net-next
Done.
From: Eric Dumazet
Date: Fri, 08 Jul 2016 05:46:04 +0200
> From: Eric Dumazet
>
> All inet6_netconf_notify_devconf() callers are in process context,
> so we can use GFP_KERNEL allocations if we take care of not holding
> a rwlock while not needed in
From: Eric Dumazet
Date: Fri, 08 Jul 2016 11:03:57 +0200
> From: Eric Dumazet
>
> In the prep work I did before enabling BH while handling socket backlog,
> I missed two points in DCCP :
>
> 1) dccp_v4_ctl_send_reset() uses bh_lock_sock(), assuming
tree: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git
master
head: 927265bc6cd6374c9bafc43408ece4e92311b149
commit: 8afe97e5d4165c9d181d42504af3f96c8427659a [1099/1116] tunnels: support
MPLS over IPv4 tunnels
config: m32r-usrv_defconfig (attached as .config)
compiler:
On Sun, Jul 10, 2016 at 09:20:54AM +0900, Simon Horman wrote:
> * If MPLS is not enabled then err_mpls is not needed
> * If IPV6 is not enabled then unregistering IPPROTO_IPV6 is not
> needed in the error path and err_ipv6 is not needed
> * When unregistering IPPROTO_IPV6 the tunnel64_protocol
From: Arvind Yadav
Date: Fri, 8 Jul 2016 00:07:54 +0530
> -Return type of 'qe_muram_alloc' is 'unsigned long', That Was trying to
> assigned in ucc_fast_tx_virtual_fifo_base_offset and
> ucc_fast_rx_virtual_fifo_base_offset. These variable are 'unsigned int'.
> So
From: Hayes Wang
Date: Thu, 7 Jul 2016 15:09:17 +0800
> Remove the unnacessary code.
Series applied.
From: Eric Dumazet
Date: Fri, 08 Jul 2016 05:18:24 +0200
> From: Eric Dumazet
>
> inet_forward_change() runs with RTNL held.
> We are allowed to sleep if required.
>
> If we use __in_dev_get_rtnl() instead of __in_dev_get_rcu(),
> we no longer have
Hi Bjorn,
On Sat, Jul 9, 2016, at 23:13, Bjørn Mork wrote:
> The Juniper SSL VPN client use a "tun" interface and seems to
> be picky about visible changes.to it. Commit cc9da6cc4f56
> ("ipv6: addrconf: use stable address generator for ARPHRD_NONE")
> made such interfaces get an auto-generated
Using a combination if #if conditionals and goto labels to unwind
tunnel4_init seems unwieldy. This patch takes a simpler approach of
directly unregistering previously registered protocols when an error
occurs.
This fixes a number of problems with the current implementation
including the
On Sat, Jul 9, 2016 at 10:58 PM, Saeed Mahameed
wrote:
> On Fri, Jul 8, 2016 at 5:15 AM, Brenden Blanco wrote:
>> Add support for the BPF_PROG_TYPE_XDP hook in mlx4 driver.
>>
>> In tc/socket bpf programs, helpers linearize skb fragments as needed
From: Thomas Falcon
Date: Fri, 8 Jul 2016 02:09:02 -0500
> Miscellaneous fixes and improvements on the ibmvnic driver.
Series applied.
From: Jesper Dangaard Brouer
Date: Thu, 07 Jul 2016 18:01:32 +0200
> An important information for the napi_poll tracepoint is knowing
> the work done (packets processed) by the napi_poll() call. Add
> both the work done and budget, as they are related.
>
> Handle
tree: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git
master
head: 927265bc6cd6374c9bafc43408ece4e92311b149
commit: 8afe97e5d4165c9d181d42504af3f96c8427659a [1099/1116] tunnels: support
MPLS over IPv4 tunnels
config: arm-at91_dt_defconfig (attached as .config)
compiler:
Hannes Frederic Sowa writes:
> On Sat, Jul 9, 2016, at 23:13, Bjørn Mork wrote:
>> The Juniper SSL VPN client use a "tun" interface and seems to
>> be picky about visible changes.to it. Commit cc9da6cc4f56
>> ("ipv6: addrconf: use stable address generator for
On Sat, Jul 09, 2016 at 05:47:32PM -0400, David Miller wrote:
> From: Simon Horman
> Date: Thu, 7 Jul 2016 07:56:11 +0200
>
> > This short series provides support for MPLS in IPv4 (RFC4023), and by
> > virtue of FOU, MPLS in UDP (RFC7510).
>
> Series applied, thanks
* If MPLS is not enabled then err_mpls is not needed
* If IPV6 is not enabled then unregistering IPPROTO_IPV6 is not
needed in the error path and err_ipv6 is not needed
* When unregistering IPPROTO_IPV6 the tunnel64_protocol structure
rather than the tunnel4_protocol structure should be used.
tree: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git
master
head: 927265bc6cd6374c9bafc43408ece4e92311b149
commit: 8afe97e5d4165c9d181d42504af3f96c8427659a [1099/1116] tunnels: support
MPLS over IPv4 tunnels
config: x86_64-randconfig-s4-07101153 (attached as .config)
64 matches
Mail list logo