Re: [PATCH v2 net] net: dsa: microchip: initialize mutex before use

2018-11-02 Thread David Miller
From: Date: Fri, 2 Nov 2018 19:23:41 -0700 > From: Tristram Ha > > Initialize mutex before use. Avoid kernel complaint when > CONFIG_DEBUG_LOCK_ALLOC is enabled. > > Fixes: b987e98e50ab90e5 ("dsa: add DSA switch driver for Microchip KSZ9477") > Signed-off-by: Tristram Ha > Reviewed-by: Pavel

Re: [PATCH net v7] net/ipv6: Add anycast addresses to a global hashtable

2018-11-02 Thread David Miller
From: Jeff Barnhill <0xeff...@gmail.com> Date: Fri, 2 Nov 2018 20:23:57 + > icmp6_send() function is expensive on systems with a large number of > interfaces. Every time it’s called, it has to verify that the source > address does not correspond to an existing anycast address by looping > thr

[PATCH net] sctp: define SCTP_SS_DEFAULT for Stream schedulers

2018-11-02 Thread Xin Long
According to rfc8260#section-4.3.2, SCTP_SS_DEFAULT is required to defined as SCTP_SS_FCFS or SCTP_SS_RR. SCTP_SS_FCFS is used for SCTP_SS_DEFAULT's value in this patch. Fixes: 5e32a431 ("sctp: introduce stream scheduler foundations") Reported-by: Jianwen Ji Signed-off-by: Xin Long --- inc

[PATCH net] sctp: fix strchange_flags name for Stream Change Event

2018-11-02 Thread Xin Long
As defined in rfc6525#section-6.1.3, SCTP_STREAM_CHANGE_DENIED and SCTP_STREAM_CHANGE_FAILED should be used instead of SCTP_ASSOC_CHANGE_DENIED and SCTP_ASSOC_CHANGE_FAILED. To keep the compatibility, fix it by adding two macros. Fixes: b444153fb5a6 ("sctp: add support for generating add stream c

[PATCH v2 net] net: dsa: microchip: initialize mutex before use

2018-11-02 Thread Tristram.Ha
From: Tristram Ha Initialize mutex before use. Avoid kernel complaint when CONFIG_DEBUG_LOCK_ALLOC is enabled. Fixes: b987e98e50ab90e5 ("dsa: add DSA switch driver for Microchip KSZ9477") Signed-off-by: Tristram Ha Reviewed-by: Pavel Machek Reviewed-by: Andrew Lunn Reviewed-by: Florian Faine

[RFC PATCH] net/mlx5e: Temp software stats variable is not required

2018-11-02 Thread Saeed Mahameed
mlx5e_grp_sw_update_stats can be called from two threads, 1) ndo_get_stats64 2) get_ethtool_stats For this reason and to minimize concurrency issue impact on 64bit machines mlx5e_grp_sw_update_stats folds the software stats into a temporary sw stats variable and at the end memcopy it to the global

RE: [Intel-wired-lan] [PATCH v2 net] igb: shorten maximum PHC timecounter update interval

2018-11-02 Thread Brown, Aaron F
> From: Intel-wired-lan [mailto:intel-wired-lan-boun...@osuosl.org] On > Behalf Of Miroslav Lichvar > Sent: Friday, October 26, 2018 10:13 AM > To: netdev@vger.kernel.org > Cc: intel-wired-...@lists.osuosl.org; Richard Cochran > ; Thomas Gleixner > Subject: [Intel-wired-lan] [PATCH v2 net] igb: sh

pull-request: bpf 2018-11-03

2018-11-02 Thread Daniel Borkmann
Hi David, The following pull-request contains BPF updates for your *net* tree. The main changes are: 1) Fix BPF prog kallsyms and bpf_prog_get_info_by_fd() jited address export to not use page start but actual start instead to work correctly with profiling e.g. finding hot instructions fro

Re: Kernel 4.19 network performance - forwarding/routing normal users traffic

2018-11-02 Thread Paweł Staszewski
W dniu 01.11.2018 o 21:37, Saeed Mahameed pisze: On Thu, 2018-11-01 at 12:09 +0100, Paweł Staszewski wrote: W dniu 01.11.2018 o 10:50, Saeed Mahameed pisze: On Wed, 2018-10-31 at 22:57 +0100, Paweł Staszewski wrote: Hi So maybee someone will be interested how linux kernel handles normal tr

Re: Kernel 4.19 network performance - forwarding/routing normal users traffic

2018-11-02 Thread Paweł Staszewski
W dniu 02.11.2018 o 20:02, Paweł Staszewski pisze: W dniu 02.11.2018 o 15:20, Aaron Lu pisze: On Fri, Nov 02, 2018 at 12:40:37PM +0100, Jesper Dangaard Brouer wrote: On Fri, 2 Nov 2018 13:23:56 +0800 Aaron Lu wrote: On Thu, Nov 01, 2018 at 08:23:19PM +, Saeed Mahameed wrote: On Thu

[PATCH RFC net-next] net: vlan: add support for tunnel offload

2018-11-02 Thread Davide Caratti
GSO tunneled packets are always segmented in software before they are transmitted by a VLAN, even when the lower device can offload tunnel encapsulation and VLAN together (i.e., some bits in NETIF_F_GSO_ENCAP_ALL mask are set in the lower device 'vlan_features'). If we let VLANs have the same tunne

Re: Help with the BPF verifier

2018-11-02 Thread Yonghong Song
On 11/2/18 8:42 AM, Edward Cree wrote: > On 02/11/18 15:02, Arnaldo Carvalho de Melo wrote: >> Yeah, didn't work as well: > >> And the -vv in 'perf trace' didn't seem to map to further details in the >> output of the verifier debug: > Yeah for log_level 2 you probably need to make source-level c

Re: [PATCH bpf] bpf: fix bpf_prog_get_info_by_fd to return 0 func_lens for unpriv

2018-11-02 Thread Alexei Starovoitov
On Fri, Nov 02, 2018 at 11:35:46AM +0100, Daniel Borkmann wrote: > While dbecd7388476 ("bpf: get kernel symbol addresses via syscall") > zeroed info.nr_jited_ksyms in bpf_prog_get_info_by_fd() for queries > from unprivileged users, commit 815581c11cc2 ("bpf: get JITed image > lengths of functions v

Re: [PATCH v2 bpf 0/3] show more accurrate bpf program address

2018-11-02 Thread Daniel Borkmann
On 11/02/2018 06:16 PM, Song Liu wrote: > Changes v1 -> v2: > 1. Added main program length to bpf_prog_info->jited_fun_lens (3/3). > 2. Updated commit message of 1/3 and 2/3 with more background about the >address masking, and why it is still save after the changes. > 3. Replace "ulong" with "u

[PATCH net v7] net/ipv6: Add anycast addresses to a global hashtable

2018-11-02 Thread Jeff Barnhill
icmp6_send() function is expensive on systems with a large number of interfaces. Every time it’s called, it has to verify that the source address does not correspond to an existing anycast address by looping through every device and every anycast address on the device. This can result in significa

[PATCH net] mlxsw: spectrum: Fix IP2ME CPU policer configuration

2018-11-02 Thread Ido Schimmel
From: Shalom Toledo The CPU policer used to police packets being trapped via a local route (IP2ME) was incorrectly configured to police based on bytes per second instead of packets per second. Change the policer to police based on packets per second and avoid packet loss under certain circumstan

[PATCH net-next v4 2/9] net: ensure unbound stream socket to be chosen when not in a VRF

2018-11-02 Thread Mike Manning
The commit a04a480d4392 ("net: Require exact match for TCP socket lookups if dif is l3mdev") only ensures that the correct socket is selected for packets in a VRF. However, there is no guarantee that the unbound socket will be selected for packets when not in a VRF. By checking for a device match i

[PATCH net-next v4 0/9] vrf: allow simultaneous service instances in default and other VRFs

2018-11-02 Thread Mike Manning
Services currently have to be VRF-aware if they are using an unbound socket. One cannot have multiple service instances running in the default and other VRFs for services that are not VRF-aware and listen on an unbound socket. This is because there is no easy way of isolating packets received in th

[PATCH net-next v4 6/9] vrf: mark skb for multicast or link-local as enslaved to VRF

2018-11-02 Thread Mike Manning
The skb for packets that are multicast or to a link-local address are not marked as being enslaved to a VRF, if they are received on a socket bound to the VRF. This is needed for ND and it is preferable for the kernel not to have to deal with the additional use-cases if ll or mcast packets are hand

[PATCH net-next v4 5/9] net: fix raw socket lookup device bind matching with VRFs

2018-11-02 Thread Mike Manning
From: Duncan Eastoe When there exist a pair of raw sockets one unbound and one bound to a VRF but equal in all other respects, when a packet is received in the VRF context, __raw_v4_lookup() matches on both sockets. This results in the packet being delivered over both sockets, instead of only th

[PATCH net-next v4 3/9] net: ensure unbound datagram socket to be chosen when not in a VRF

2018-11-02 Thread Mike Manning
Ensure an unbound datagram skt is chosen when not in a VRF. The check for a device match in compute_score() for UDP must be performed when there is no device match. For this, a failure is returned when there is no device match. This ensures that bound sockets are never selected, even if there is no

[PATCH net-next v4 7/9] ipv6: allow ping to link-local address in VRF

2018-11-02 Thread Mike Manning
If link-local packets are marked as enslaved to a VRF, then to allow ping to the link-local from a vrf, the error handling for IPV6_PKTINFO needs to be relaxed to also allow the pkt ipi6_ifindex to be that of a slave device to the vrf. Note that the real device also needs to be retrieved in icmp6_

[PATCH net-next v4 8/9] ipv6: handling of multicast packets received in VRF

2018-11-02 Thread Mike Manning
If the skb for multicast packets marked as enslaved to a VRF are received, then the secondary device index should be used to obtain the real device. And verify the multicast address against the enslaved rather than the l3mdev device. Signed-off-by: Dewi Morgan Signed-off-by: Mike Manning --- ne

[PATCH net-next v4 4/9] net: provide a sysctl raw_l3mdev_accept for raw socket lookup with VRFs

2018-11-02 Thread Mike Manning
Add a sysctl raw_l3mdev_accept to control raw socket lookup in a manner similar to use of tcp_l3mdev_accept for stream and of udp_l3mdev_accept for datagram sockets. Have this default to enabled for reasons of backwards compatibility. This is so as to specify the output device with cmsg and IP_PKTI

[PATCH net-next v4 9/9] ipv6: do not drop vrf udp multicast packets

2018-11-02 Thread Mike Manning
From: Dewi Morgan For bound udp sockets in a vrf, also check the sdif to get the index for ingress devices enslaved to an l3mdev. Signed-off-by: Dewi Morgan Signed-off-by: Mike Manning --- net/ipv6/udp.c | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/net/ipv6/udp.

[PATCH net-next v4 1/9] net: allow binding socket in a VRF when there's an unbound socket

2018-11-02 Thread Mike Manning
From: Robert Shearman Change the inet socket lookup to avoid packets arriving on a device enslaved to an l3mdev from matching unbound sockets by removing the wildcard for non sk_bound_dev_if and instead relying on check against the secondary device index, which will be 0 when the input device is

Re: Kernel 4.19 network performance - forwarding/routing normal users traffic

2018-11-02 Thread Paweł Staszewski
W dniu 02.11.2018 o 15:20, Aaron Lu pisze: On Fri, Nov 02, 2018 at 12:40:37PM +0100, Jesper Dangaard Brouer wrote: On Fri, 2 Nov 2018 13:23:56 +0800 Aaron Lu wrote: On Thu, Nov 01, 2018 at 08:23:19PM +, Saeed Mahameed wrote: On Thu, 2018-11-01 at 23:27 +0800, Aaron Lu wrote: On Thu,

[PATCH net] net-sysfs: fix formatting of tx_timeout attribute

2018-11-02 Thread Julian Wiedmann
Add a missing newline. Signed-off-by: Julian Wiedmann --- net/core/net-sysfs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c index bd67c4d0fcfd..ef06409d768e 100644 --- a/net/core/net-sysfs.c +++ b/net/core/net-sysfs.c @@ -1039,7

[PATCH net 4/6] s390/qeth: fix initial operstate

2018-11-02 Thread Julian Wiedmann
Setting the carrier 'on' for an unregistered netdevice doesn't update its operstate. Fix this by delaying the update until the netdevice has been registered. Fixes: 91cc98f51e3d ("s390/qeth: remove duplicated carrier state tracking") Signed-off-by: Julian Wiedmann --- drivers/s390/net/qeth_core.

[PATCH net 2/6] s390/qeth: fix HiperSockets sniffer

2018-11-02 Thread Julian Wiedmann
Sniffing mode for L3 HiperSockets requires that no IP addresses are registered with the HW. The preferred way to achieve this is for userspace to delete all the IPs on the interface. But qeth is expected to also tolerate a configuration where that is not the case, by skipping the IP registration wh

[PATCH net 1/6] s390/qeth: sanitize strings in debug messages

2018-11-02 Thread Julian Wiedmann
As Documentation/s390/s390dbf.txt states quite clearly, using any pointer in sprinf-formatted s390dbf debug entries is dangerous. The pointers are dereferenced whenever the trace file is read from. So if the referenced data has a shorter life-time than the trace file, any read operation can result

[PATCH net 3/6] s390/qeth: unregister netdevice only when registered

2018-11-02 Thread Julian Wiedmann
qeth only registers its netdevice when the qeth device is first set online. Thus a device that has never been set online will trigger a WARN ("network todo 'hsi%d' but state 0") in unregister_netdev() when removed. Fix this by protecting the unregister step, just like we already protect against re

[PATCH net 5/6] s390/qeth: sanitize ARP requests

2018-11-02 Thread Julian Wiedmann
The ARP_{ADD,REMOVE}_ENTRY cmd structs contain reserved fields. Introduce a common helper that doesn't raw-copy the user-provided data into the cmd, but only sets those fields that are strictly needed for the command. This also sets the correct command length for ARP_REMOVE_ENTRY. Signed-off-by:

[PATCH net 0/6] s390/qeth: fixes 2018-11-02

2018-11-02 Thread Julian Wiedmann
Hi Dave, please apply one round of qeth fixes for -net. Patch 1 is rather large and removes a use-after-free hazard from many of our debug trace entries. Patch 2 is yet another fix-up for the L3 subdriver's new IP address management code. Patch 3 and 4 resolve some fallout from the recent changes

[PATCH net 6/6] s390/qeth: report 25Gbit link speed

2018-11-02 Thread Julian Wiedmann
This adds the various identifiers for 25Gbit cards, and wires them up into sysfs and ethtool. Signed-off-by: Julian Wiedmann --- drivers/s390/net/qeth_core_main.c | 20 ++-- drivers/s390/net/qeth_core_mpc.h | 2 ++ 2 files changed, 20 insertions(+), 2 deletions(-) diff --git a

[PATCH v2 bpf 3/3] bpf: show main program address and length in bpf_prog_info

2018-11-02 Thread Song Liu
Currently, when there is no subprog (prog->aux->func_cnt == 0), bpf_prog_info does not return any jited_ksyms or jited_func_lens. This patch adds main program address (prog->bpf_func) and main program length (prog->jited_len) to bpf_prog_info. Signed-off-by: Song Liu --- kernel/bpf/syscall.c | 3

[PATCH v2 bpf 0/3] show more accurrate bpf program address

2018-11-02 Thread Song Liu
Changes v1 -> v2: 1. Added main program length to bpf_prog_info->jited_fun_lens (3/3). 2. Updated commit message of 1/3 and 2/3 with more background about the address masking, and why it is still save after the changes. 3. Replace "ulong" with "unsigned long". This set improves bpf program addr

[PATCH v2 bpf 1/3] bpf: show real jited prog address in /proc/kallsyms

2018-11-02 Thread Song Liu
Currently, /proc/kallsyms shows page address of jited bpf program. The main reason here is to not expose randomized start address. However, This is not ideal for detailed profiling (find hot instructions from stack traces). This patch replaces the page address with real prog start address. This ch

[PATCH v2 bpf 2/3] bpf: show real jited address in bpf_prog_info->jited_ksyms

2018-11-02 Thread Song Liu
Currently, jited_ksyms in bpf_prog_info shows page addresses of jited bpf program. The main reason here is to not expose randomized start address. However, this is not ideal for detailed profiling (find hot instructions from stack traces). This patch replaces the page address with real prog start a

Re: [PATCH iproute2-next v1 4/4] rdma: Document IB device renaming option

2018-11-02 Thread David Ahern
On 10/31/18 1:17 AM, Leon Romanovsky wrote: > diff --git a/man/man8/rdma-dev.8 b/man/man8/rdma-dev.8 > index 461681b6..b2f9964a 100644 > --- a/man/man8/rdma-dev.8 > +++ b/man/man8/rdma-dev.8 > @@ -22,6 +22,12 @@ rdmak-dev \- RDMA device configuration > .B rdma dev show > .RI "[ " DEV " ]" > > +

Re: [PATCH iproute2-next v1 3/4] rdma: Add an option to rename IB device interface

2018-11-02 Thread David Ahern
On 10/31/18 1:17 AM, Leon Romanovsky wrote: > From: Leon Romanovsky > > Enrich rdmatool with an option to rename IB devices, > the command interface follows Iproute2 convention: > "rdma dev set [OLD-DEVNAME] name NEW-DEVNAME" > > Signed-off-by: Leon Romanovsky > Reviewed-by: Steve Wise > --- >

Re: [PATCH iproute2-next v1 2/4] rdma: Introduce command execution helper with required device name

2018-11-02 Thread David Ahern
On 10/31/18 1:17 AM, Leon Romanovsky wrote: > From: Leon Romanovsky > > In contradiction to various show commands, the set command explicitly > requires to use device name as an argument. Provide new command > execution helper which enforces it. > > Signed-off-by: Leon Romanovsky > Reviewed-by:

Re: [PATCH iproute2-next v1 1/4] rdma: Update kernel include file to support IB device renaming

2018-11-02 Thread David Ahern
On 10/31/18 1:17 AM, Leon Romanovsky wrote: > From: Leon Romanovsky > > Bring kernel header file changes upto commit 05d940d3a3ec > ("RDMA/nldev: Allow IB device rename through RDMA netlink") > > Signed-off-by: Leon Romanovsky > Reviewed-by: Steve Wise > --- > rdma/include/uapi/rdma/rdma_netl

Re: [PATCH bpf 2/3] bpf: show real jited address in bpf_prog_info->jited_ksyms

2018-11-02 Thread Song Liu
> On Nov 2, 2018, at 3:19 AM, Daniel Borkmann wrote: > > On 11/02/2018 11:09 AM, Daniel Borkmann wrote: >> On 11/01/2018 08:00 AM, Song Liu wrote: >>> Currently, jited_ksyms in bpf_prog_info shows page addresses of jited >>> bpf program. This is not ideal for detailed profiling (find hot >>> i

[PATCH net v2 2/2] ipv6: properly check return value in inet6_dump_all()

2018-11-02 Thread Alexey Kodanev
Make sure we call fib6_dump_end() if it happens that skb->len is zero. rtnl_dump_all() can reset cb->args on the next loop iteration there. Fixes: 08e814c9e8eb ("net/ipv6: Bail early if user only wants cloned entries") Fixes: ae677bbb4441 ("net: Don't return invalid table id error when dumping all

[PATCH net v2 1/2] rtnetlink: restore handling of dumpit return value in rtnl_dump_all()

2018-11-02 Thread Alexey Kodanev
For non-zero return from dumpit() we should break the loop in rtnl_dump_all() and return the result. Otherwise, e.g., we could get the memory leak in inet6_dump_fib() [1]. The pointer to the allocated struct fib6_walker there (saved in cb->args) can be lost, reset on the next iteration. Fix it by

Re: Help with the BPF verifier

2018-11-02 Thread Edward Cree
On 02/11/18 15:02, Arnaldo Carvalho de Melo wrote: > Yeah, didn't work as well: > And the -vv in 'perf trace' didn't seem to map to further details in the > output of the verifier debug: Yeah for log_level 2 you probably need to make source-level changes to either  perf or libbpf (I think the lat

[PATCH iproute2 v2] Fix warning in tc-skbprio.8 manpage

2018-11-02 Thread Luca Boccassi
". If" gets interpreted as a macro, so move the period to the previous line: 33: warning: macro `If' not defined Fixes: 141b55f8544e ("Add SKB Priority qdisc support in tc(8)") Signed-off-by: Luca Boccassi --- v2: remove extra space to avoid making the full-stop bold. man/man8/tc-skbprio.8

Re: [PATCH iproute2] Fix warning in tc-skbprio.8 manpage

2018-11-02 Thread Luca Boccassi
On Fri, 2018-11-02 at 15:19 +, Edward Cree wrote: > On 02/11/18 10:57, Luca Boccassi wrote: > > ". If" gets interpreted as a macro, so move the period to the > > previous > > line: > > > >   33: warning: macro `If' not defined > > > > Fixes: 141b55f8544e ("Add SKB Priority qdisc support in tc

Re: [PATCH iproute2] Fix warning in tc-skbprio.8 manpage

2018-11-02 Thread Edward Cree
On 02/11/18 10:57, Luca Boccassi wrote: > ". If" gets interpreted as a macro, so move the period to the previous > line: > > 33: warning: macro `If' not defined > > Fixes: 141b55f8544e ("Add SKB Priority qdisc support in tc(8)") > > Signed-off-by: Luca Boccassi > --- > man/man8/tc-skbprio.8 | 4

ethtool 4.19 released

2018-11-02 Thread John W. Linville
ethtool version 4.19 has been released. Home page: https://www.kernel.org/pub/software/network/ethtool/ Download link: https://www.kernel.org/pub/software/network/ethtool/ethtool-4.19.tar.xz Release notes: * Feature: support combinations of FEC modes * Feature: better syntax for

Re: Help with the BPF verifier

2018-11-02 Thread Arnaldo Carvalho de Melo
Em Thu, Nov 01, 2018 at 08:05:07PM +, Edward Cree escreveu: > On 01/11/18 18:52, Arnaldo Carvalho de Melo wrote: > > R0=inv(id=0) R1=inv6 R2=inv6 R3=inv(id=0) R6=ctx(id=0,off=0,imm=0) > > R7=inv64 R10=fp0,call_-1 > > 15: (b7) r2 = 0 > > 16: (63) *(u32 *)(r10 -260) = r2 > > 17: (67) r1 <<= 32

Re: Kernel 4.19 network performance - forwarding/routing normal users traffic

2018-11-02 Thread Aaron Lu
On Fri, Nov 02, 2018 at 12:40:37PM +0100, Jesper Dangaard Brouer wrote: > On Fri, 2 Nov 2018 13:23:56 +0800 > Aaron Lu wrote: > > > On Thu, Nov 01, 2018 at 08:23:19PM +, Saeed Mahameed wrote: > > > On Thu, 2018-11-01 at 23:27 +0800, Aaron Lu wrote: > > > > On Thu, Nov 01, 2018 at 10:22:13AM

Re: [RFC PATCH v3 06/10] udp: cope with UDP GRO packet misdirection

2018-11-02 Thread Paolo Abeni
On Thu, 2018-11-01 at 17:01 -0400, Willem de Bruijn wrote: > On Wed, Oct 31, 2018 at 5:57 AM Paolo Abeni wrote: > > @@ -450,4 +457,32 @@ DECLARE_STATIC_KEY_FALSE(udpv6_encap_needed_key); > > > void udpv6_encap_enable(void); > > > #endif > > > > > > +static inline struct sk_buff *udp_rcv_segment

Re: [RFC PATCH v3 01/10] udp: implement complete book-keeping for encap_needed

2018-11-02 Thread Paolo Abeni
Hi, On Thu, 2018-11-01 at 16:59 -0400, Willem de Bruijn wrote: > On Tue, Oct 30, 2018 at 1:28 PM Paolo Abeni wrote: > > > > The *encap_needed static keys are enabled by UDP tunnels > > and several UDP encapsulations type, but they are never > > turned off. This can cause unneeded overall perform

Re: [RFC PATCH v3 04/10] ip: factor out protocol delivery helper

2018-11-02 Thread Paolo Abeni
On Thu, 2018-11-01 at 00:35 -0600, Subash Abhinov Kasiviswanathan wrote: > On 2018-10-30 11:24, Paolo Abeni wrote: > > So that we can re-use it at the UDP lavel in a later patch > > > > Hi Paolo > > Minor queries - > Should it be "level" instead of "lavel"? Similar comment for the ipv6 > patch a

[PATCH iproute2] man: ss.8: break and indent long line

2018-11-02 Thread Luca Boccassi
Fixes groff warning: ss.8 92: warning [p 2, 2.8i]: can't break line And makes the line also more readable. Signed-off-by: Luca Boccassi --- This line is the example of an output, so you might not want to break it. Let me know if you prefer a different solution. man/man8/ss.8 | 8 +++- 1

[PATCH iproute2 1/2] testsuite: build generate_nlmsg with QUIET_CC

2018-11-02 Thread Luca Boccassi
Follow the standard pattern, and respect user's verbosity setting. Signed-off-by: Luca Boccassi --- testsuite/tools/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/testsuite/tools/Makefile b/testsuite/tools/Makefile index e1d9bfef..85df69ec 100644 --- a/testsuite/too

[PATCH iproute2 2/2] Pass CPPFLAGS to the compiler

2018-11-02 Thread Luca Boccassi
When building Debian packages pre-processor flags are passed via CPPFLAGS, as the convention indicates. Specifically, the hardening -D_FORTIFY_SOURCE=2 flag is used. Pass CPPFLAGS to all calls of QUIET_CC together with CFLAGS. Signed-off-by: Luca Boccassi --- configure | 2 +- misc/Makefile

Re: Kernel 4.19 network performance - forwarding/routing normal users traffic

2018-11-02 Thread Jesper Dangaard Brouer
On Fri, 2 Nov 2018 13:23:56 +0800 Aaron Lu wrote: > On Thu, Nov 01, 2018 at 08:23:19PM +, Saeed Mahameed wrote: > > On Thu, 2018-11-01 at 23:27 +0800, Aaron Lu wrote: > > > On Thu, Nov 01, 2018 at 10:22:13AM +0100, Jesper Dangaard Brouer > > > wrote: > > > ... ... > > > > Section copied o

Re: [RFC bpf-next] libbpf: increase rlimit before trying to create BPF maps

2018-11-02 Thread Quentin Monnet
2018-11-02 10:08 UTC+0100 ~ Daniel Borkmann > On 11/01/2018 06:18 PM, Quentin Monnet wrote: >> 2018-10-30 15:23 UTC+ ~ Quentin Monnet >>> The limit for memory locked in the kernel by a process is usually set to >>> 64 bytes by default. This can be an issue when creating large BPF maps. >>> A

[PATCH iproute2] Fix warning in tc-skbprio.8 manpage

2018-11-02 Thread Luca Boccassi
". If" gets interpreted as a macro, so move the period to the previous line: 33: warning: macro `If' not defined Fixes: 141b55f8544e ("Add SKB Priority qdisc support in tc(8)") Signed-off-by: Luca Boccassi --- man/man8/tc-skbprio.8 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) d

Re: [PATCH bpf] bpf: fix bpf_prog_get_info_by_fd to return 0 func_lens for unpriv

2018-11-02 Thread Sandipan Das
On 02/11/18 4:05 PM, Daniel Borkmann wrote: > While dbecd7388476 ("bpf: get kernel symbol addresses via syscall") > zeroed info.nr_jited_ksyms in bpf_prog_get_info_by_fd() for queries > from unprivileged users, commit 815581c11cc2 ("bpf: get JITed image > lengths of functions via syscall") forgo

[PATCH bpf] bpf: fix bpf_prog_get_info_by_fd to return 0 func_lens for unpriv

2018-11-02 Thread Daniel Borkmann
While dbecd7388476 ("bpf: get kernel symbol addresses via syscall") zeroed info.nr_jited_ksyms in bpf_prog_get_info_by_fd() for queries from unprivileged users, commit 815581c11cc2 ("bpf: get JITed image lengths of functions via syscall") forgot about doing so and therefore returns the #elems of th

Re: [PATCH bpf 2/3] bpf: show real jited address in bpf_prog_info->jited_ksyms

2018-11-02 Thread Daniel Borkmann
On 11/02/2018 11:09 AM, Daniel Borkmann wrote: > On 11/01/2018 08:00 AM, Song Liu wrote: >> Currently, jited_ksyms in bpf_prog_info shows page addresses of jited >> bpf program. This is not ideal for detailed profiling (find hot >> instructions from stack traces). This patch replaces the page addre

Re: [PATCH bpf 2/3] bpf: show real jited address in bpf_prog_info->jited_ksyms

2018-11-02 Thread Daniel Borkmann
On 11/01/2018 08:00 AM, Song Liu wrote: > Currently, jited_ksyms in bpf_prog_info shows page addresses of jited > bpf program. This is not ideal for detailed profiling (find hot > instructions from stack traces). This patch replaces the page address > with real prog start address. > > Signed-off-b

Re: Ethernet on my CycloneV broke since 4.9.124

2018-11-02 Thread Clément Péron
Hi Dinh, On Wed, 31 Oct 2018 at 23:02, Dinh Nguyen wrote: > > Hi Clement, > > On 10/31/2018 10:36 AM, Clément Péron wrote: > > Hi Dinh, > > > > On Wed, 31 Oct 2018 at 15:42, Dinh Nguyen wrote: > >> > >> Hi Clement, > >> > >> On 10/31/2018 08:01 AM, Clément Péron wrote: > >>> Hi, > >>> > >>> The

Re: [PATCH iproute2 net-next 0/3] ss: Allow selection of columns to be displayed

2018-11-02 Thread Stefano Brivio
On Thu, 1 Nov 2018 14:06:23 -0700 Jakub Kicinski wrote: > JSONification would probably be quite an undertaking for ss :( Probably not too much, and we would skip buffering for JSON as we don't need to print columns, so we don't have to care about buffering and rendering performance too much. Al

Re: [PATCH iproute2 net-next 0/3] ss: Allow selection of columns to be displayed

2018-11-02 Thread Stefano Brivio
On Wed, 31 Oct 2018 20:48:05 -0600 David Ahern wrote: > On 10/30/18 11:34 AM, Stefano Brivio wrote: > > > > - the current column abstraction is rather lightweight, things are > > already buffered in the defined column order so we don't have to jump > > back and forth in the buffer while rend

Re: [PATCH bpf 3/3] bpf: show main program address in bpf_prog_info->jited_ksyms

2018-11-02 Thread Daniel Borkmann
On 11/01/2018 08:00 AM, Song Liu wrote: > Currently, when there is not subprog (prog->aux->func_cnt == 0), > bpf_prog_info does not return any jited_ksyms. This patch adds > main program address (prog->bpf_func) to jited_ksyms. > > Signed-off-by: Song Liu > --- > kernel/bpf/syscall.c | 16 ++

Re: [RFC bpf-next] libbpf: increase rlimit before trying to create BPF maps

2018-11-02 Thread Daniel Borkmann
On 11/01/2018 06:18 PM, Quentin Monnet wrote: > 2018-10-30 15:23 UTC+ ~ Quentin Monnet >> The limit for memory locked in the kernel by a process is usually set to >> 64 bytes by default. This can be an issue when creating large BPF maps. >> A workaround is to raise this limit for the current p