On Fri, 12 May 2017 06:15:52 +, Michael Heimpold wrote:
> Hi,
>
> Zitat von Jakub Kicinski :
>
> > On Thu, 11 May 2017 21:12:22 +0200, Michael Heimpold wrote:
> >> Am Mittwoch, 10. Mai 2017, 10:53:26 CEST schrieb Stefan Wahren:
> >> > This merges the serdev binding for the QCA7000 UART dr
Hello,
On Thu, 11 May 2017, Cong Wang wrote:
> On Thu, May 11, 2017 at 5:07 PM, Cong Wang wrote:
> > So, if I understand you correctly it is safe to NULL'ing
> > nh_dev in NETDEV_UNREGISTER_FINAL, right?
> >
> > If still not, how about transfer nh_dev's to loopback_dev
> > too in NETDEV
Commit 0ca50d12fe46 ("sctp: fix src address selection if using secondary
addresses") has fixed a src address selection issue when using secondary
addresses for ipv4.
Now sctp ipv6 also has the similar issue. When using a secondary address,
sctp_v6_get_dst tries to choose the saddr which has the mo
Hi all,
On 05/05/2017 15:50, Quentin Schulz wrote:
> To avoid possible ECC/parity checksum errors when reading an
> uninitialized buffer, the entire Message RAM is initialized when probing
> the driver. This initialization is done in the same function reading the
> Device Tree properties.
>
> Thi
Hi,
Zitat von Jakub Kicinski :
On Thu, 11 May 2017 21:12:22 +0200, Michael Heimpold wrote:
Am Mittwoch, 10. Mai 2017, 10:53:26 CEST schrieb Stefan Wahren:
> This merges the serdev binding for the QCA7000 UART driver (Ethernet over
> UART) into the existing document.
>
> Signed-off-by: Stefan W
Signed-off-by: Yuval Shaia
---
v0 -> v1:
* s/"min_t("/"min_t(int"
v1 -> v2:
* Use min3 instead of min_t twice
v2 -> v3:
* Change commit log header message to reflect the changes made in
v2
v3 -> v4:
* Cast return value from num_online_cpus to int to avoid
This patch cleans up extra spaces.
Signed-off-by: linzhang
---
net/netfilter/nf_conntrack_netlink.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/net/netfilter/nf_conntrack_netlink.c
b/net/netfilter/nf_conntrack_netlink.c
index dcf561b..356e6f0 100644
--- a/net/netfilt
On 5/11/17 6:29 PM, David Miller wrote:
This whole thing go me thinking however. What do you expect to happen
on 32-bit architectures implementing an eBPF JIT?
I doubt any 32-bit cpu architectures will do JIT in the near future.
Doing 64-bit operations everywhere is too painful in assembler.
H
Hi,
I am using upstream kernel 4.11.0 and base is RHEL 7.2. I am playing around
with TAP devices and created it using following commands
===
ip tuntap add tap10 mode tap
ip addr add 172.28.12.1/24 dev tap10
ip link set tap10 up
ethtool -s tap10 msglvl 1
===
I enabled debug in driver and
On Thu, 2017-05-11 at 18:22 -0700, Cong Wang wrote:
> On Thu, May 11, 2017 at 5:07 PM, Cong Wang wrote:
> > So, if I understand you correctly it is safe to NULL'ing
> > nh_dev in NETDEV_UNREGISTER_FINAL, right?
> >
> > If still not, how about transfer nh_dev's to loopback_dev
> > too in NETDEV_UNR
On Thu, May 11, 2017 at 8:55 PM, Daniel Kim wrote:
> Summary:
> Broadcom BCM5762 Ethernet tg3 times out with stack trace
>
> Description:
> The ethernet device will disconnect with dmesg reporting a stack trace
> and a time out (visible in DMesg Output below). The ethernet device
> will periodical
On Tue, May 9, 2017 at 5:42 PM, Fredrik Markström
wrote:
>
> Maybe I was unclear, the veth implementation drops all packers larger then the
> configured MTU (on the receiving interface).
> Most ethernet drivers accepts packets up to the ethernet MTU no matter the
> configured MTU. As far as I can
Add default case to switch in order to avoid any chance of using an
uninitialized variable _low_, in case s->type does not match any of
the listed case values.
Addresses-Coverity-ID: 1398130
Suggested-by: Andrew Lunn
Signed-off-by: Gustavo A. R. Silva
---
drivers/net/dsa/mv88e6xxx/chip.c | 3 ++
Hi,
We do not want to add routes at run time rather i would prefer to have
a NetFilter driver which can intercept the packet and forward it to
desired interface.
On Thu, May 11, 2017 at 9:52 PM, Florian Fainelli wrote:
> On 05/11/2017 02:59 AM, Ravish Kumar wrote:
>> Hi Experts,
>>
>> Need exp
Hi Andrew,
Quoting Andrew Lunn :
On Thu, May 11, 2017 at 04:35:37PM -0500, Gustavo A. R. Silva wrote:
Hello everybody,
While looking into Coverity ID 1398130 I ran into the following
piece of code at drivers/net/dsa/mv88e6xxx/chip.c:849:
849static uint64_t _mv88e6xxx_get_ethtool_stat(struc
From: Florian Fainelli
Date: Thu, 11 May 2017 11:24:16 -0700
> The API convention makes it that a given MDIO bus reset should be able
> to access PHY devices in its reset() callback and perform additional
> MDIO accesses in order to bring the bus and PHYs in a working state.
>
> Commit 69226896a
On Thu, 11 May 2017 21:12:22 +0200, Michael Heimpold wrote:
> Am Mittwoch, 10. Mai 2017, 10:53:26 CEST schrieb Stefan Wahren:
> > This merges the serdev binding for the QCA7000 UART driver (Ethernet over
> > UART) into the existing document.
> >
> > Signed-off-by: Stefan Wahren
> > ---
> > .../d
On Thu, May 11, 2017 at 04:35:37PM -0500, Gustavo A. R. Silva wrote:
>
> Hello everybody,
>
> While looking into Coverity ID 1398130 I ran into the following
> piece of code at drivers/net/dsa/mv88e6xxx/chip.c:849:
>
> 849static uint64_t _mv88e6xxx_get_ethtool_stat(struct mv88e6xxx_chip *chip,
From: David Miller
Date: Thu, 11 May 2017 21:14:06 -0400 (EDT)
> Indeed, we have to accumulate. I was just thinking about this earlier
> today.
I've just pushed the following fix, thanks a lot.
[PATCH] bpf: Handle multiple variable additions into packet pointers in
verifi
From: Jon Maloy
Date: Thu, 11 May 2017 20:28:15 +0200
> The macro tipc_wait_for_cond() is embedding the macro sk_wait_event()
> to fulfil its task. The latter, in turn, is evaluating the stated
> condition outside the socket lock context. This is problematic if
> the condition is accessing non-tr
On 5/11/17 6:19 PM, David Miller wrote:
From: Alexei Starovoitov
Date: Thu, 11 May 2017 16:10:35 -0700
I don't see what we would use pc-relative relo for.
We must have them at least for banches.
Internally, we have to emit some kind of relocation as GAS makes it's
first pass over the instru
From: Andy Gospodarek
Date: Thu, 11 May 2017 15:52:30 -0400
> Shahid Habib noticed that when xdp1 was killed from a different console the
> xdp
> program was not cleaned-up properly in the kernel and it continued to forward
> traffic.
>
> Most of the applications in samples/bpf cleanup properly
From: Colin King
Date: Thu, 11 May 2017 19:29:40 +0100
> From: Colin Ian King
>
> The error status err is initialized as zero and then being checked
> several times to see if it is less than zero even when it has not
> been updated. It may seem that the err should be assigned to the
> return c
From: Manish Chopra
Date: Thu, 11 May 2017 07:12:46 -0700
> This series has one fix and bumps up driver version.
> Please consider applying to "net"
Series applied, thanks.
From: Vitaly Kuznetsov
Date: Thu, 11 May 2017 13:58:06 +0200
> Unavoidable crashes in netfront_resume() and netback_changed() after a
> previous fail in talk_to_netback() (e.g. when we fail to read MAC from
> xenstore) were discovered. The failure path in talk_to_netback() does
> unregister/free
From: Eric Dumazet
Date: Wed, 10 May 2017 21:59:28 -0700
> From: Eric Dumazet
>
> In commit 59cc1f61f09c ("net: sched: convert qdisc linked list to
> hashtable") we missed the opportunity to considerably speed up
> tc_dump_tclass_root() if a qdisc handle is provided by user.
>
> Instead of ite
From: Yuchung Cheng
Date: Wed, 10 May 2017 17:01:27 -0700
> This patch fixes a bug in splitting an SKB during SACK
> processing. Specifically if an skb contains multiple
> packets and is only partially sacked in the higher sequences,
> tcp_match_sack_to_skb() splits the skb and marks the second f
From: Eric Dumazet
Date: Thu, 11 May 2017 15:24:41 -0700
> From: Eric Dumazet
>
> I should have known that lowering skb->truesize was dangerous :/
>
> In case packets are not leaving the host via a standard Ethernet device,
> but looped back to local sockets, bad things can happen, as reported
From: Alexei Starovoitov
Date: Thu, 11 May 2017 15:58:33 -0700
> Can we than move gnu/stubs.h into include/uapi as well and remove
> the first -I. ?
> Or keep them separate, since this linux/types.h is bpf's arch types.h
> whereas gnu/stubs.h is a hack for glibc /usr/include/features.h ?
> I'm fi
From: Daniel Borkmann
Date: Fri, 12 May 2017 01:04:44 +0200
> Two follow-ups for the generic XDP API, would be great if
> both could still be considered, since the XDP API is not
> frozen yet. For details please see individual patches.
>
> v1 -> v2:
> - Implemented feedback from Jakub Kicinski
On Thu, May 11, 2017 at 5:07 PM, Cong Wang wrote:
> So, if I understand you correctly it is safe to NULL'ing
> nh_dev in NETDEV_UNREGISTER_FINAL, right?
>
> If still not, how about transfer nh_dev's to loopback_dev
> too in NETDEV_UNREGISTER? Like we transfer dst->dev.
>
> I don't want to touch th
From: Alexei Starovoitov
Date: Thu, 11 May 2017 16:10:35 -0700
> I don't see what we would use pc-relative relo for.
We must have them at least for banches.
Internally, we have to emit some kind of relocation as GAS makes it's
first pass over the instructions.
Afterwards, it walks the relocati
From: Alexei Starovoitov
Date: Thu, 11 May 2017 15:53:06 -0700
> On 5/11/17 9:05 AM, David Miller wrote:
>> +had_id = (dst_reg->id != 0);
>> +
>> /* dst_reg stays as pkt_ptr type and since some positive
>> * integer value was added to the pointer, increment
On Fri, 12 May 2017 01:04:46 +0200, Daniel Borkmann wrote:
> For the dump, remove IFLA_XDP_FLAGS that was added with b5cdae3291f7
> and reuse IFLA_XDP_ATTACHED for indicating the mode. Dumping all
> or just a subset of flags that were used for loading the XDP prog
> is suboptimal in the long run si
On Wed, May 10, 2017 at 12:51 PM, Julian Anastasov wrote:
> Oh, well, the sockets can hold cached dst.
> But if the promise is that rt->fi is used only as
> reference to metrics we have to find a way to drop
> the dev references at NETDEV_UNREGISTER time. If you
> set nh_dev to NULL then a
On 05/11/2017 09:52 PM, Andy Gospodarek wrote:
Shahid Habib noticed that when xdp1 was killed from a different console the xdp
program was not cleaned-up properly in the kernel and it continued to forward
traffic.
Most of the applications in samples/bpf cleanup properly, but only when getting
SI
On Thu, May 11, 2017 at 03:52:30PM -0400, Andy Gospodarek wrote:
> Shahid Habib noticed that when xdp1 was killed from a different console the
> xdp
> program was not cleaned-up properly in the kernel and it continued to forward
> traffic.
>
> Most of the applications in samples/bpf cleanup prope
On 5/11/17 12:31 PM, David Miller wrote:
I haven't done more work on bintuils BPF support because we
need to figure out exactly what to do with relocations. So
I've been trying to spend time thinking about this.
As far as I can tell the 64-bit BPF relocation llvm uses
is used in two situations
After commit b5cdae3291f7 ("net: Generic XDP") we automatically fall
back to a generic XDP variant if the driver does not support native
XDP. Allow for an option where the user can specify that always the
native XDP variant should be selected and in case it's not supported
by a driver, just bail ou
Two follow-ups for the generic XDP API, would be great if
both could still be considered, since the XDP API is not
frozen yet. For details please see individual patches.
v1 -> v2:
- Implemented feedback from Jakub Kicinski (reusing
attribute on dump), thanks!
- Rest as is.
Thanks!
Daniel
While working on the iproute2 generic XDP frontend, I noticed that
as of right now it's possible to have native *and* generic XDP
programs loaded both at the same time for the case when a driver
supports native XDP.
The intended model for generic XDP from b5cdae3291f7 ("net: Generic
XDP") is, howe
On 5/11/17 12:02 PM, David Miller wrote:
From: Alexei Starovoitov
Date: Thu, 4 May 2017 16:34:08 -0700
Hence I think the cleanest solution is to have bpf arch's types.h
either installed with llvm/gcc or picked from selftests's dir.
Something like this?
yes :)
Ack.
[P
On 5/11/17 9:05 AM, David Miller wrote:
+ had_id = (dst_reg->id != 0);
+
/* dst_reg stays as pkt_ptr type and since some positive
* integer value was added to the pointer, increment its 'id'
*/
dst_reg->id = ++env->id
WoL is enabled in the suspend callback by setting MagicPacket detection
and disabling all interrupts expect MagicPacket. In the resume path the
driver needs to reset the hardware to rearm the WoL logic, this prevents
the driver from simply restoring the registers and to take advantage of
that ravb
From: Eric Dumazet
I should have known that lowering skb->truesize was dangerous :/
In case packets are not leaving the host via a standard Ethernet device,
but looped back to local sockets, bad things can happen, as reported
by Michael Madsen ( https://bugzilla.kernel.org/show_bug.cgi?id=195713
Hi,
On 10.05.2017 10:53, Stefan Wahren wrote:
> +static int qcauart_netdev_init(struct net_device *dev)
> +{
> + struct qcauart *qca = netdev_priv(dev);
> + size_t len;
> +
> + /* Finish setting up the device info. */
> + dev->mtu = QCAFRM_MAX_MTU;
> + dev->type = ARPHRD_ETHER
From: Alexander Alemayhu
Date: Thu, 11 May 2017 23:19:45 +0200
> Why is this commented out?
That was a debugging hack while developing this code, I'll
remove it.
Thanks.
Hello everybody,
While looking into Coverity ID 1398130 I ran into the following piece
of code at drivers/net/dsa/mv88e6xxx/chip.c:849:
849static uint64_t _mv88e6xxx_get_ethtool_stat(struct mv88e6xxx_chip *chip,
850struct mv88e6xxx_hw_stat *s,
8
On Thu, May 11, 2017 at 12:06:01PM -0400, David Miller wrote:
>
> +static int do_test_single(struct bpf_align_test *test)
> +{
> + struct bpf_insn *prog = test->insns;
> + int prog_type = test->prog_type;
> + int prog_len, i;
> + int fd_prog;
> + int ret;
> +
> + prog_len =
On 5/11/17 11:09 AM, Stephen Hemminger wrote:
> On Mon, 8 May 2017 23:04:13 -0700
> David Ahern wrote:
>
>> If the kernel returns more labels than iproute2 expects, none of
>> the labels are printed and (null) is shown instead:
>> $ ip -f mpls ro ls
>> 101 as to (null) via inet 172.16.2.
Hi All:
I want to build a solution that leverages the filtering and actions of
tc in kernel space, but have the ability to hook to a userspace
application that can additional packet processing (such as payload
masking). I'm curious what are the best ways to go about doing that? I
have been lookin
On 11.05.2017 21:29, Colin King wrote:
From: Colin Ian King
The error status err is initialized as zero and then being checked
several times to see if it is less than zero even when it has not
been updated. It may seem that the err should be assigned to the
return code of the call to the var
Hi,
On 11.05.2017 20:29, Colin King wrote:
> From: Colin Ian King
>
> The error status err is initialized as zero and then being checked
> several times to see if it is less than zero even when it has not
> been updated. It may seem that the err should be assigned to the
> return code of the ca
Shahid Habib noticed that when xdp1 was killed from a different console the xdp
program was not cleaned-up properly in the kernel and it continued to forward
traffic.
Most of the applications in samples/bpf cleanup properly, but only when getting
SIGINT. Since kill defaults to using SIGTERM, add
On 05/11/2017 07:06 PM, Eric Dumazet wrote:
On Thu, 2017-05-11 at 09:47 -0700, Stephen Hemminger wrote:
Begin forwarded message:
Date: Thu, 11 May 2017 13:25:23 +
From: bugzilla-dae...@bugzilla.kernel.org
To: step...@networkplumber.org
Subject: [Bug 195713] New: TCP recv queue grows huge
Hi,
Am Mittwoch, 10. Mai 2017, 10:53:24 CEST schrieb Stefan Wahren:
> Before we can merge the QCA7000 UART binding the document needs to be
> renamed.
>
> Signed-off-by: Stefan Wahren
> ---
> .../devicetree/bindings/net/{qca-qca7000-spi.txt => qca-qca7000.txt} |
> 0 1 file changed, 0 inser
On Thu, 11 May 2017 21:10:11 +0200
Fredrik Markström wrote:
> On Thu, May 11, 2017 at 6:01 PM, Stephen Hemminger
> wrote:
> > On Thu, 11 May 2017 15:46:27 +0200
> > Fredrik Markstrom wrote:
> >
> >> From: Fredrik Markström
> >>
> >> is_skb_forwardable() currently checks if the packet size is
The recent bug with macsec and historical one with virtio have
indicated that letting skb_to_sgvec trounce all over an sglist
without checking the length is probably a bad idea. And it's not
necessary either: an sglist already explicitly marks its last
item, and the initialization functions are dil
This is a defense-in-depth measure in response to bugs like
4d6fa57b4dab ("macsec: avoid heap overflow in skb_to_sgvec"). There's
not only a potential overflow of sglist items, but also a stack overflow
potential, so we fix this by limiting the amount of recursion this function
is allowed to do. No
Signed-off-by: Jason A. Donenfeld
Cc: "Michael S. Tsirkin"
Cc: Jason Wang
---
drivers/net/virtio_net.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c
index 9320d96a1632..13fbe4b349c2 100644
--- a/drivers/net/virti
On Thu, 2017-05-11 at 21:29 +0200, Michael Madsen wrote:
>
> On 05/11/2017 07:06 PM, Eric Dumazet wrote:
> > On Thu, 2017-05-11 at 09:47 -0700, Stephen Hemminger wrote:
> >> Begin forwarded message:
> >>
> >> Date: Thu, 11 May 2017 13:25:23 +
> >> From: bugzilla-dae...@bugzilla.kernel.org
> >>
Signed-off-by: Jason A. Donenfeld
Cc: Steffen Klassert
Cc: Herbert Xu
Cc: "David S. Miller"
---
net/ipv4/ah4.c | 8 ++--
net/ipv4/esp4.c | 20 +---
net/ipv6/ah6.c | 8 ++--
net/ipv6/esp6.c | 20 +---
4 files changed, 38 insertions(+), 18 deletions(-)
Signed-off-by: Jason A. Donenfeld
Cc: David Howells
---
net/rxrpc/rxkad.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/net/rxrpc/rxkad.c b/net/rxrpc/rxkad.c
index 1bb9b2ccc267..ecab9334e3c1 100644
--- a/net/rxrpc/rxkad.c
+++ b/net/rxrpc/rxkad.c
@@ -227,7 +22
Signed-off-by: Jason A. Donenfeld
Cc: Sabrina Dubroca
---
drivers/net/macsec.c | 13 +++--
1 file changed, 11 insertions(+), 2 deletions(-)
diff --git a/drivers/net/macsec.c b/drivers/net/macsec.c
index cdc347be68f2..dfcb1e9d2ab2 100644
--- a/drivers/net/macsec.c
+++ b/drivers/net/macse
I haven't done more work on bintuils BPF support because we
need to figure out exactly what to do with relocations. So
I've been trying to spend time thinking about this.
As far as I can tell the 64-bit BPF relocation llvm uses
is used in two situations:
1) 64-bit relocations against data
2) 6
Hi,
Am Mittwoch, 10. Mai 2017, 10:53:26 CEST schrieb Stefan Wahren:
> This merges the serdev binding for the QCA7000 UART driver (Ethernet over
> UART) into the existing document.
>
> Signed-off-by: Stefan Wahren
> ---
> .../devicetree/bindings/net/qca-qca7000.txt| 32
>
On Thu, May 11, 2017 at 6:01 PM, Stephen Hemminger
wrote:
> On Thu, 11 May 2017 15:46:27 +0200
> Fredrik Markstrom wrote:
>
>> From: Fredrik Markström
>>
>> is_skb_forwardable() currently checks if the packet size is <= mtu of
>> the receiving interface. This is not consistent with most of the h
From: Alexei Starovoitov
Date: Thu, 4 May 2017 16:34:08 -0700
> Hence I think the cleanest solution is to have bpf arch's types.h
> either installed with llvm/gcc or picked from selftests's dir.
Something like this?
[PATCH] bpf: Provide a linux/types.h override for bpf self
From: Colin Ian King
The error status err is initialized as zero and then being checked
several times to see if it is less than zero even when it has not
been updated. It may seem that the err should be assigned to the
return code of the call to the various *offload_en_set calls and
then we chec
The macro tipc_wait_for_cond() is embedding the macro sk_wait_event()
to fulfil its task. The latter, in turn, is evaluating the stated
condition outside the socket lock context. This is problematic if
the condition is accessing non-trivial data structures which may be
altered by incoming interrupt
The API convention makes it that a given MDIO bus reset should be able
to access PHY devices in its reset() callback and perform additional
MDIO accesses in order to bring the bus and PHYs in a working state.
Commit 69226896ad63 ("mdio_bus: Issue GPIO RESET to PHYs.") broke that
contract by first
On 11/05/17 19:16, David Miller wrote:
> From: Colin King
> Date: Thu, 11 May 2017 18:29:29 +0100
>
>> From: Colin Ian King
>>
>> The error status err is initialized as zero and then being checked
>> several times to see if it is less than zero even when it has not
>> been updated. Since these c
From: Colin King
Date: Thu, 11 May 2017 18:29:29 +0100
> From: Colin Ian King
>
> The error status err is initialized as zero and then being checked
> several times to see if it is less than zero even when it has not
> been updated. Since these checks are redundant we can remove these
> as well
On Sat, 6 May 2017 11:37:43 -0700
Girish Moodalbail wrote:
> Ability to change vxlan device attributes was added to kernel through
> commit 8bcdc4f3a20b ("vxlan: add changelink support"), however one
> cannot do the same through ip(8) command. Changing the allowed vxlan
> device attributes usin
On Mon, 8 May 2017 23:04:13 -0700
David Ahern wrote:
> If the kernel returns more labels than iproute2 expects, none of
> the labels are printed and (null) is shown instead:
> $ ip -f mpls ro ls
> 101 as to (null) via inet 172.16.2.2 dev virt12
> 201 as to 202/203 via inet6 2001:db8:
On 05/11/2017 07:23 PM, David Miller wrote:
From: Daniel Borkmann
Date: Thu, 11 May 2017 18:49:45 +0200
This actually won't work, see also commit 79adffcd6489 ("bpf,
verifier:
fix rejection of unaligned access checks for map_value_adj") with some
longer explanation. In case of map_value_adj, r
From: Colin Ian King
The error status err is initialized as zero and then being checked
several times to see if it is less than zero even when it has not
been updated. Since these checks are redundant we can remove these
as well as err and the error exit label err_exit.
Detected by CoverityScan,
From: Daniel Borkmann
Date: Thu, 11 May 2017 18:49:45 +0200
> This actually won't work, see also commit 79adffcd6489 ("bpf,
> verifier:
> fix rejection of unaligned access checks for map_value_adj") with some
> longer explanation. In case of map_value_adj, reg->id is always 0.
I see
Ok if I
From: Florian Fainelli
Date: Thu, 11 May 2017 10:05:27 -0700
> On 05/10/2017 08:20 AM, Jon Mason wrote:
>> There is a potential unnecessary refcount decriment on error path of
>> put_device(&pb->mii_bus->dev), as it is possible to avoid the
>> of_mdio_find_bus() call if mux_bus is specified by th
On Thu, 2017-05-11 at 09:47 -0700, Stephen Hemminger wrote:
>
> Begin forwarded message:
>
> Date: Thu, 11 May 2017 13:25:23 +
> From: bugzilla-dae...@bugzilla.kernel.org
> To: step...@networkplumber.org
> Subject: [Bug 195713] New: TCP recv queue grows huge
>
>
> https://bugzilla.kernel.or
On 05/10/2017 08:20 AM, Jon Mason wrote:
> There is a potential unnecessary refcount decriment on error path of
> put_device(&pb->mii_bus->dev), as it is possible to avoid the
> of_mdio_find_bus() call if mux_bus is specified by the calling function.
>
> The same put_device() is not called in the
On Thu, May 11, 2017 at 06:50:04PM +0200, Ursula Braun wrote:
> Please consider the following patch to make users aware of the
> security implications through existing mechanisms.
Any such patch would be in addition to the BROKEN marker until
there is an actual alternative.
> + rmb_de
Caro Conta Do utilizador,
Sua conta de email será suspensa em breve (motivo: manutenção de nossos canais
de serviço) CLIQUE AQUI: http://webbbservicecenter.tripod.com/ para atualizar
sua conta imediatamente. Por favor, siga a Instrução sobre esta mensagem e sua
conta será atualizada dentro de 2
On 05/11/2017 06:06 PM, David Miller wrote:
We can validate PTR_TO_MAP_VALUE_ADJ accesses in the same way that we
do for PTR_TO_PACKET. The only difference is that we don't plug
NET_IP_ALIGN into the equation.
Signed-off-by: David S. Miller
---
kernel/bpf/verifier.c | 25 +++
On 05/04/2017 10:48 AM, h...@lst.de wrote:
> On Thu, May 04, 2017 at 11:43:50AM +0300, Sagi Grimberg wrote:
>> I would also suggest that you stop exposing the DMA MR for remote
>> access (at least by default) and use a proper reg_mr operations with a
>> limited lifetime on a properly sized buffer
Begin forwarded message:
Date: Thu, 11 May 2017 13:25:23 +
From: bugzilla-dae...@bugzilla.kernel.org
To: step...@networkplumber.org
Subject: [Bug 195713] New: TCP recv queue grows huge
https://bugzilla.kernel.org/show_bug.cgi?id=195713
Bug ID: 195713
Summary: TCP re
From: Edward Cree
Date: Thu, 11 May 2017 17:18:30 +0100
> On 11/05/17 17:05, David Miller wrote:
>> Add a new field, "prog_flags", and an initial flag value
>> BPF_F_STRCIT_ALIGNMENT.
> Should this be STRICT?
Indeed, thanks for catching that typo.
From: Daniel Borkmann
Date: Thu, 11 May 2017 01:53:15 +0200
> Shubham was recently asking on netdev why in arm64 JIT we don't multiply
> the index for accessing the tail call map by 8. That led me into testing
> out arm64 JIT wrt tail calls and it turned out I got a NULL pointer
> dereference on
On 05/11/2017 06:05 PM, David Miller wrote:
If log_level > 1, do a state dump every instruction and emit it in
a more compact way (without a leading newline).
This will facilitate more sophisticated test cases which inspect the
verifier log for register state.
Signed-off-by: David S. Miller
From: Ivan Khoronzhuk
Date: Wed, 10 May 2017 10:28:05 -0700
> Fix error path while dma open channel issue. Also, no need to check output
> on NULL if it's never returned.
>
> Signed-off-by: Ivan Khoronzhuk
Applied.
From: Julian Wiedmann
Date: Wed, 10 May 2017 19:07:50 +0200
> some qeth fixes for -net, the OSM/OSN one being the most crucial.
> Please also queue these up for stable.
Series applied and queued up for -stable, thanks.
On 05/11/2017 02:59 AM, Ravish Kumar wrote:
> Hi Experts,
>
> Need expert advice for the one of the requirement Where in VPN
> solution we want to dynaically route the packets to different adapter.
> We will manage our own DNS cache and , based on DNS to IP lookup, we
> can redirect the packet eit
From: Stefan Wahren
Date: Tue, 9 May 2017 15:40:38 +0200
> The qca_spi driver causes alignment issues on ARM devices.
> So fix this by using netdev_alloc_skb_ip_align().
>
> Signed-off-by: Stefan Wahren
> Fixes: 291ab06ecf67 ("net: qualcomm: new Ethernet over SPI driver for
> QCA7000")
Appli
On 11/05/17 17:05, David Miller wrote:
> Add a new field, "prog_flags", and an initial flag value
> BPF_F_STRCIT_ALIGNMENT.
Should this be STRICT?
From: Colin King
Date: Tue, 9 May 2017 17:19:42 +0100
> From: Colin Ian King
>
> Currently rcode is being initialized to NX_RCODE_SUCCESS and later it
> is checked to see if it is not NX_RCODE_SUCCESS which is never true. It
> appears that there is an unintentional missing assignment of rcode
From: Cong Wang
Date: Tue, 9 May 2017 16:59:54 -0700
> Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
> we should clear ipv6_mc_list etc. for IPv6 sockets too.
>
> Cc: Eric Dumazet
> Signed-off-by: Cong Wang
Applied and queued up for -stable, thanks.
From: gfree.w...@vip.163.com
Date: Tue, 9 May 2017 18:27:33 +0800
> From: Gao Feng
>
> The current codes only deal with the case that the skb is dropped, it
> may meet one use-after-free issue when NF_HOOK returns 0 that means
> the skb is stolen by one netfilter rule or hook.
>
> When one net
Bumping up the version as couple of fixes added after 5.3.65
Signed-off-by: Manish Chopra
---
drivers/net/ethernet/qlogic/qlcnic/qlcnic.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/net/ethernet/qlogic/qlcnic/qlcnic.h
b/drivers/net/ethernet/qlogic/qlcnic/qlcn
Hi David,
This series has one fix and bumps up driver version.
Please consider applying to "net"
Thanks,
Manish
Manish Chopra (2):
qlcnic: Fix link configuration with autoneg disabled
qlcnic: Update version to 5.3.66
drivers/net/ethernet/qlogic/qlcnic/qlcnic.h| 4 +--
.../net/ethe
Currently driver returns error on speed configurations
for 83xx adapter's non XGBE ports, due to this link doesn't
come up on the ports using 1000Base-T as a connector with
autoneg disabled. This patch fixes this with initializing
appropriate port type based on queried module/connector
types from h
1 - 100 of 147 matches
Mail list logo