Re: [PATCH v15 0/4] Adding the Sparx5 Serdes driver

2021-03-16 Thread Vinod Koul
On 18-02-21, 17:14, Steen Hegelund wrote: > Adding the Sparx5 Serdes driver > > This series of patches provides the serdes driver for the Microchip Sparx5 > ethernet switch. > > The serdes driver supports the 10G and 25G serdes instances available in the > Sparx5. > > The Sparx5 serdes support s

Re: [net PATCH 4/9] octeontx2-af: Remove TOS field from MKEX TX

2021-03-16 Thread sundeep subbaraya
Hi Jakub, On Tue, Mar 16, 2021 at 10:53 PM Jakub Kicinski wrote: > > On Tue, 16 Mar 2021 14:57:08 +0530 Hariprasad Kelam wrote: > > From: Subbaraya Sundeep > > > > TOS overlaps with DMAC field in mcam search key and hence installing > > rules for TX side are failing. Hence remove TOS field from

[PATCH] mwifiex: Remove unneeded variable: "ret"

2021-03-16 Thread zuoqilin1
From: zuoqilin Remove unneeded variable: "ret" Signed-off-by: zuoqilin --- drivers/net/wireless/marvell/mwifiex/scan.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/net/wireless/marvell/mwifiex/scan.c b/drivers/net/wireless/marvell/mwifiex/scan.c index c2a685f.

RE: [EXT] Re: [PATCH net 1/2] qede: fix to disable start_xmit functionality during self adapter test

2021-03-16 Thread Bhaskar Upadhaya
> -Original Message- > From: Jakub Kicinski > Sent: Wednesday, March 17, 2021 3:30 AM > To: Bhaskar Upadhaya > Cc: netdev@vger.kernel.org; Ariel Elior ; Igor Russkikh > ; da...@davemloft.net > Subject: [EXT] Re: [PATCH net 1/2] qede: fix to disable start_xmit > functionality > during

[PATCH] mwifiex: Remove redundant assignment

2021-03-16 Thread zuoqilin1
From: zuoqilin There is no need to define the err variable, and then assign -EINVAL, we can directly return -EINVAL. Signed-off-by: zuoqilin --- drivers/net/wireless/marvell/mwifiex/ie.c | 7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/drivers/net/wireless/marvell/mwif

Re: [PATCH] Fix error message generated in routel script when have 'multicase' in routing list

2021-03-16 Thread Stephen Hemminger
On Mon, 15 Mar 2021 09:30:07 +0100 "B.Arenfeld" wrote: > Hello :-) > > I'm on an machine with Manjaro Linux.  > I get some error messages from shift command in the routel script: > /usr/bin/routel: Zeile 48: shift: shift count out of range > > Reason are lines from "ip route list table 0" start

[PATCH] virtio_net: replace if (cond) BUG() with BUG_ON()

2021-03-16 Thread Jiapeng Chong
Fix the following coccicheck warnings: ./drivers/net/virtio_net.c:1551:2-5: WARNING: Use BUG_ON instead of if condition followed by BUG. Reported-by: Abaci Robot Signed-off-by: Jiapeng Chong --- drivers/net/virtio_net.c | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/

Re: [PATCH] dt-bindings: Drop type references on common properties

2021-03-16 Thread Greg Kroah-Hartman
On Tue, Mar 16, 2021 at 01:48:58PM -0600, Rob Herring wrote: > Users of common properties shouldn't have a type definition as the > common schemas already have one. Drop all the unnecessary type > references in the tree. > > A meta-schema update to catch these is pending. > > Cc: Nicolas Saenz Ju

[syzbot] KMSAN: uninit-value in iptable_mangle_hook (5)

2021-03-16 Thread syzbot
Hello, syzbot found the following issue on: HEAD commit:29ad81a1 arch/x86: add missing include to sparsemem.h git tree: https://github.com/google/kmsan.git master console output: https://syzkaller.appspot.com/x/log.txt?x=179b38f6d0 kernel config: https://syzkaller.appspot.com/x/.co

Re: [net PATCH 3/9] octeontx2-af: Do not allocate memory for devlink private

2021-03-16 Thread sundeep subbaraya
On Wed, Mar 17, 2021 at 1:57 AM Jakub Kicinski wrote: > > On Tue, 16 Mar 2021 23:33:40 +0530 sundeep subbaraya wrote: > > On Tue, Mar 16, 2021 at 10:53 PM Jakub Kicinski wrote: > > > > > > On Tue, 16 Mar 2021 14:57:07 +0530 Hariprasad Kelam wrote: > > > > From: Subbaraya Sundeep > > > > > > > >

Re: [PATCH v2 bpf-next 10/11] selftests/bpf: pass all BPF .o's through BPF static linker

2021-03-16 Thread Alexei Starovoitov
On Sat, Mar 13, 2021 at 11:35:36AM -0800, Andrii Nakryiko wrote: > > -$(TRUNNER_BPF_SKELS): $(TRUNNER_OUTPUT)/%.skel.h:\ > - $(TRUNNER_OUTPUT)/%.o \ > - $(BPFTOOL)\ > -

Re: [PATCH v2 bpf-next 07/11] libbpf: add BPF static linker BTF and BTF.ext support

2021-03-16 Thread Alexei Starovoitov
On Sat, Mar 13, 2021 at 11:35:33AM -0800, Andrii Nakryiko wrote: > + for (j = 0; j < n; j++, src_var++) { > + void *sec_vars = dst_sec->sec_vars; > + > + sec_vars = libbpf_reallocarray(sec_vars, > +

Re: [PATCH] wireless: intel: iwlwifi: fw: api: Absolute rudimentary typo fixes in the file power.h

2021-03-16 Thread Randy Dunlap
On 3/16/21 9:25 PM, Bhaskar Chowdhury wrote: > > s/folowing/following/ > s/Celsuis/Celsius/ > s/temerature/temperature/ ...twice > > > Signed-off-by: Bhaskar Chowdhury Acked-by: Randy Dunlap > --- > drivers/net/wireless/intel/iwlwifi/fw/api/power.h | 8 > 1 file changed, 4 inserti

[PATCH] wireless: intel: iwlwifi: fw: api: Absolute rudimentary typo fixes in the file power.h

2021-03-16 Thread Bhaskar Chowdhury
s/folowing/following/ s/Celsuis/Celsius/ s/temerature/temperature/ ...twice Signed-off-by: Bhaskar Chowdhury --- drivers/net/wireless/intel/iwlwifi/fw/api/power.h | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/net/wireless/intel/iwlwifi/fw/api/power.h b/

Re: [PATCH v5 03/24] wfx: add Makefile/Kconfig

2021-03-16 Thread Leon Romanovsky
On Mon, Mar 15, 2021 at 05:21:35PM +0100, Jérôme Pouiller wrote: > Hi Leon, > > On Monday 15 March 2021 16:11:52 CET Leon Romanovsky wrote: > > On Mon, Mar 15, 2021 at 02:24:40PM +0100, Jerome Pouiller wrote: > > > From: Jérôme Pouiller > > > > > > Signed-off-by: Jérôme Pouiller > > > --- > > >

Re: [PATCH V4 7/7] vDPA/ifcvf: deduce VIRTIO device ID from pdev ids

2021-03-16 Thread Jason Wang
在 2021/3/15 下午3:45, Zhu Lingshan 写道: static u32 ifcvf_vdpa_get_device_id(struct vdpa_device *vdpa_dev) { - return VIRTIO_ID_NET; + struct ifcvf_hw *vf = vdpa_to_vf(vdpa_dev); + u32 ret = -EOPNOTSUPP; + + if (ifcvf_probed_virtio_net(vf)) + ret = VIRTIO_I

[PATCH net-next 1/1] net: stmmac: add timestamp correction to rid CDC sync error

2021-03-16 Thread Wong Vee Khee
From: Voon Weifeng According to Synopsis DesignWare EQoS Databook, the Clock Domain Cross synchronization error is introduced tue to the clock(GMII Tx/Rx clock) being different at the capture as compared to the PTP clock(clk_ptp_ref_i) that is used to generate the time. The CDC synchronization e

[PATCH net v2] net/sched: cls_flower: fix only mask bit check in the validate_ct_state

2021-03-16 Thread wenxu
From: wenxu The ct_state validate should not only check the mask bit and also check mask_bit & key_bit.. For the +new+est case example, The 'new' and 'est' bits should be set in both state_mask and state flags. Or the -new-est case also will be reject by kernel. When Openvswitch with two flows ct

Re: [PATCH V4 6/7] vDPA/ifcvf: verify mandatory feature bits for vDPA

2021-03-16 Thread Jason Wang
在 2021/3/15 下午3:45, Zhu Lingshan 写道: vDPA requres VIRTIO_F_ACCESS_PLATFORM as a must, this commit examines this when set features. Signed-off-by: Zhu Lingshan --- drivers/vdpa/ifcvf/ifcvf_base.c | 12 drivers/vdpa/ifcvf/ifcvf_base.h | 1 + drivers/vdpa/ifcvf/ifcvf_main.c |

Re: [PATCH V4 5/7] vDPA/ifcvf: fetch device feature bits when probe

2021-03-16 Thread Jason Wang
在 2021/3/15 下午3:44, Zhu Lingshan 写道: This commit would read and store device feature bits when probe. rename ifcvf_get_features() to ifcvf_get_hw_features(), it reads and stores features of the probed device. new ifcvf_get_features() simply returns stored feature bits. Signed-off-by: Zhu Lin

[PATCH] rxrpc: rxkad: replace if (cond) BUG() with BUG_ON()

2021-03-16 Thread Jiapeng Chong
Fix the following coccicheck warnings: ./net/rxrpc/rxkad.c:1140:2-5: WARNING: Use BUG_ON instead of if condition followed by BUG. Reported-by: Abaci Robot Signed-off-by: Jiapeng Chong --- net/rxrpc/rxkad.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/net/rxrpc/rxkad

[PATCH v2 bpf-next 2/4] selftests/bpf: drop custom NULL #define in skb_pkt_end selftest

2021-03-16 Thread Andrii Nakryiko
Now that bpftool generates NULL definition as part of vmlinux.h, drop custom NULL definition in skb_pkt_end.c. Signed-off-by: Andrii Nakryiko --- tools/testing/selftests/bpf/progs/skb_pkt_end.c | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/testing/selftests/bpf/progs/skb_pkt_end.c b/

[PATCH v2 bpf-next 4/4] bpftool: treat compilation warnings as errors

2021-03-16 Thread Andrii Nakryiko
Make bpftool compilation stricter and treat all compilation warnings as errors. Depending on libbfd version on the system, jit_disasm.c might trigger the following compilation warning-turned-error: jit_disasm.c: In function ‘disasm_print_insn’: jit_disasm.c:121:29: error: assignment discards ‘con

[PATCH v2 bpf-next 1/4] bpftool: generate NULL definition in vmlinux.h

2021-03-16 Thread Andrii Nakryiko
Given that vmlinux.h is not compatible with headers like stdint.h, NULL poses an annoying problem: it is defined as #define, so is not captured in BTF, so is not emitted into vmlinux.h. This leads to users either sticking to explicit 0, or defining their own NULL (as progs/skb_pkt_end.c does). It'

[PATCH v2 bpf-next 3/4] selftests/bpf: treat compilation warnings as errors

2021-03-16 Thread Andrii Nakryiko
Make selftests/bpf compilation more strict by treating warnings as errors. We are generally pretty good at keeping compilation clean, but it's easy to miss minor warnings. So let's not trust people and just employ stricter compiler enforcement. Signed-off-by: Andrii Nakryiko --- tools/testing/se

[PATCH v2 bpf-next 0/4] Generate NULL in vmlinux.h

2021-03-16 Thread Andrii Nakryiko
Generate NULL definition as part of vmlinux.h. This is a pretty common and unfortunate annoyance that most users of vmlinux.h have to deal with. Patch #2 drops such custom NULL definition in one of the selftests. Patches #3 and #4 make bpftool and selftests compilations stricter by treating warning

[PATCH v3] bpf: Fix memory leak in copy_process()

2021-03-16 Thread qiang . zhang
From: Zqiang The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101b41d00 (size 120): comm "kworker/u4:0", pid 8, jiffies 4294944270 (age 12.780s) backtrace: [] alloc_pid+0x66/0x560 [] copy_process+0x1465/0x25e0 [] kernel_clone+0xf3/0x670 [] kern

Re: [PATCH bpf-next 1/4] bpftool: generate NULL definition in vmlinux.h

2021-03-16 Thread Andrii Nakryiko
On Tue, Mar 16, 2021 at 8:03 PM Andrii Nakryiko wrote: > > Given that vmlinux.h is not compatible with headers like stdint.h, NULL poses > an annoying problem: it is defined as #define, so is not captured in BTF, so > is not emitted into vmlinux.h. This leads to users either sticking to explicit >

[PATCH bpf-next 2/4] selftests/bpf: drop custom NULL #define in skb_pkt_end selftest

2021-03-16 Thread Andrii Nakryiko
Now that bpftool generates NULL definition as part of vmlinux.h, drop custom NULL definition in skb_pkt_end.c. Signed-off-by: Andrii Nakryiko --- tools/testing/selftests/bpf/progs/skb_pkt_end.c | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/testing/selftests/bpf/progs/skb_pkt_end.c b/

[PATCH bpf-next 3/4] selftests/bpf: treat compilation warnings as errors

2021-03-16 Thread Andrii Nakryiko
Make selftests/bpf compilation more strict by treating warnings as errors. We are generally pretty good at keeping compilation clean, but it's easy to miss minor warnings. So let's not trust people and just employ stricter compiler enforcement. Signed-off-by: Andrii Nakryiko --- tools/testing/se

[PATCH bpf-next 1/4] bpftool: generate NULL definition in vmlinux.h

2021-03-16 Thread Andrii Nakryiko
Given that vmlinux.h is not compatible with headers like stdint.h, NULL poses an annoying problem: it is defined as #define, so is not captured in BTF, so is not emitted into vmlinux.h. This leads to users either sticking to explicit 0, or defining their own NULL (as progs/skb_pkt_end.c does). It'

[PATCH bpf-next 4/4] bpftool: treat compilation warnings as errors

2021-03-16 Thread Andrii Nakryiko
Make bpftool compilation stricter and treat all compilation warnigs as errors. Depending on libbfd version on the system, jit_disasm.c might trigger the following compilation warning-turned-error: jit_disasm.c: In function ‘disasm_print_insn’: jit_disasm.c:121:29: error: assignment discards ‘cons

[PATCH bpf-next 0/4] Generate NULL in vmlinux.h

2021-03-16 Thread Andrii Nakryiko
Generate NULL definition as part of vmlinux.h. This is a pretty common and unfortunate annoyance that most users of vmlinux.h have to deal with. Patch #2 drops such custom NULL definition in one of the selftests. Patches #3 and #4 make bpftool and selftests compilations stricter by treating warning

[Patch bpf-next v5 09/11] udp: implement udp_bpf_recvmsg() for sockmap

2021-03-16 Thread Cong Wang
From: Cong Wang We have to implement udp_bpf_recvmsg() to replace the ->recvmsg() to retrieve skmsg from ingress_msg. Cc: John Fastabend Cc: Daniel Borkmann Cc: Jakub Sitnicki Cc: Lorenz Bauer Signed-off-by: Cong Wang --- net/ipv4/udp_bpf.c | 64

[Patch bpf-next v5 08/11] skmsg: extract __tcp_bpf_recvmsg() and tcp_bpf_wait_data()

2021-03-16 Thread Cong Wang
From: Cong Wang Although these two functions are only used by TCP, they are not specific to TCP at all, both operate on skmsg and ingress_msg, so fit in net/core/skmsg.c very well. And we will need them for non-TCP, so rename and move them to skmsg.c and export them to modules. Cc: John Fastabe

[Patch bpf-next v5 11/11] selftests/bpf: add a test case for udp sockmap

2021-03-16 Thread Cong Wang
From: Cong Wang Add a test case to ensure redirection between two UDP sockets work. Cc: John Fastabend Cc: Daniel Borkmann Cc: Jakub Sitnicki Cc: Lorenz Bauer Signed-off-by: Cong Wang --- .../selftests/bpf/prog_tests/sockmap_listen.c | 140 ++ .../selftests/bpf/progs/test_s

[Patch bpf-next v5 05/11] sock_map: introduce BPF_SK_SKB_VERDICT

2021-03-16 Thread Cong Wang
From: Cong Wang Reusing BPF_SK_SKB_STREAM_VERDICT is possible but its name is confusing and more importantly we still want to distinguish them from user-space. So we can just reuse the stream verdict code but introduce a new type of eBPF program, skb_verdict. Users are not allowed to set stream_v

[Patch bpf-next v5 07/11] udp: implement ->read_sock() for sockmap

2021-03-16 Thread Cong Wang
From: Cong Wang This is similar to tcp_read_sock(), except we do not need to worry about connections, we just need to retrieve skb from UDP receive queue. Cc: John Fastabend Cc: Daniel Borkmann Cc: Jakub Sitnicki Cc: Lorenz Bauer Signed-off-by: Cong Wang --- include/net/udp.h | 2 ++ ne

[Patch bpf-next v5 01/11] skmsg: lock ingress_skb when purging

2021-03-16 Thread Cong Wang
From: Cong Wang Currently we purge the ingress_skb queue only when psock refcnt goes down to 0, so locking the queue is not necessary, but in order to be called during ->close, we have to lock it here. Cc: John Fastabend Cc: Daniel Borkmann Cc: Lorenz Bauer Acked-by: Jakub Sitnicki Signed-of

[Patch bpf-next v5 10/11] sock_map: update sock type checks for UDP

2021-03-16 Thread Cong Wang
From: Cong Wang Now UDP supports sockmap and redirection, we can safely update the sock type checks for it accordingly. Cc: John Fastabend Cc: Daniel Borkmann Cc: Jakub Sitnicki Cc: Lorenz Bauer Signed-off-by: Cong Wang --- net/core/sock_map.c | 5 - 1 file changed, 4 insertions(+), 1

[Patch bpf-next v5 06/11] sock: introduce sk->sk_prot->psock_update_sk_prot()

2021-03-16 Thread Cong Wang
From: Cong Wang Currently sockmap calls into each protocol to update the struct proto and replace it. This certainly won't work when the protocol is implemented as a module, for example, AF_UNIX. Introduce a new ops sk->sk_prot->psock_update_sk_prot(), so each protocol can implement its own way

[Patch bpf-next v5 04/11] skmsg: avoid lock_sock() in sk_psock_backlog()

2021-03-16 Thread Cong Wang
From: Cong Wang We do not have to lock the sock to avoid losing sk_socket, instead we can purge all the ingress queues when we close the socket. Sending or receiving packets after orphaning socket makes no sense. We do purge these queues when psock refcnt reaches zero but here we want to purge t

[Patch bpf-next v5 03/11] skmsg: introduce skb_send_sock() for sock_map

2021-03-16 Thread Cong Wang
From: Cong Wang We only have skb_send_sock_locked() which requires callers to use lock_sock(). Introduce a variant skb_send_sock() which locks on its own, callers do not need to lock it any more. This will save us from adding a ->sendmsg_locked for each protocol. To reuse the code, pass function

[Patch bpf-next v5 02/11] skmsg: introduce a spinlock to protect ingress_msg

2021-03-16 Thread Cong Wang
From: Cong Wang Currently we rely on lock_sock to protect ingress_msg, it is too big for this, we can actually just use a spinlock to protect this list like protecting other skb queues. __tcp_bpf_recvmsg() is still special because of peeking, it still has to use lock_sock. Cc: John Fastabend C

[Patch bpf-next v5 00/11] sockmap: introduce BPF_SK_SKB_VERDICT and support UDP

2021-03-16 Thread Cong Wang
From: Cong Wang We have thousands of services connected to a daemon on every host via AF_UNIX dgram sockets, after they are moved into VM, we have to add a proxy to forward these communications from VM to host, because rewriting thousands of them is not practical. This proxy uses an AF_UNIX socke

[net-next 16/16] tipc: remove some unnecessary warnings

2021-03-16 Thread jmaloy
From: Jon Maloy We move some warning printouts to more strategic locations to avoid duplicates and yield more detailed information about the reported problem. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net/tipc/name_distr.c |

[net-next 15/16] tipc: add host-endian copy of user subscription to struct tipc_subscription

2021-03-16 Thread jmaloy
From: Jon Maloy We reduce and localize the usage of the tipc_sub_xx() macros by adding a corresponding member, with fields set in host-endian format, to struct tipc_subscription. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net

[net-next 14/16] tipc: simplify api between binding table and topology server

2021-03-16 Thread jmaloy
From: Jon Maloy The function tipc_report_overlap() is called from the binding table with numerous parameters taken from an instance of struct publication. A closer look reveals that it always is safe to send along a pointer to the instance itself, and hence reduce the call signature. We do that i

[net-next 13/16] tipc: simplify signature of tipc_find_service()

2021-03-16 Thread jmaloy
From: Jon Maloy We reduce the signature of tipc_find_service() and tipc_create_service(). The reason for doing this might not be obvious, but we plan to let struct tipc_uaddr contain information that is relevant for these functions in a later commit. Signed-off-by: Jon Maloy Acked-by: Ying Xue

[net-next 12/16] tipc: simplify signature of tipc_service_find_range()

2021-03-16 Thread jmaloy
From: Jon Maloy We simplify the signatures of the functions tipc_service_create_range() and tipc_service_find_range(). Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net/tipc/name_table.c | 14 -- 1 file changed, 8 in

[net-next 11/16] tipc: simplify signature of tipc_nametbl_lookup_group()

2021-03-16 Thread jmaloy
From: Jon Maloy We reduce the signature of tipc_nametbl_lookup_group() by using a struct tipc_uaddr pointer. This entails a couple of minor changes in the functions tipc_send_group_mcast/anycast/unicast/bcast() in socket.c Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-b

[net-next 10/16] tipc: simplify signature of tipc_nametbl_lookup_mcast_nodes()

2021-03-16 Thread jmaloy
From: Jon Maloy We follow up the preceding commits by reducing the signature of the function tipc_nametbl_lookup_mcast_nodes(). Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net/tipc/name_table.c | 8 net/tipc/name_tab

[net-next 09/16] tipc: simplify signature of tipc_namtbl_lookup_mcast_sockets()

2021-03-16 Thread jmaloy
From: Jon Maloy We reduce the signature of this function according to the same principle as the preceding commits. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net/tipc/name_table.c | 10 +- net/tipc/name_table.h | 5 +

[net-next 07/16] tipc: rename binding table lookup functions

2021-03-16 Thread jmaloy
From: Jon Maloy The binding table provides four different lookup functions, which purpose is not obvious neither by their names nor by the (lack of) descriptions. We now give these functions names that better match their purposes, and improve the comments that describe what they are doing. Sign

[net-next 08/16] tipc: refactor tipc_sendmsg() and tipc_lookup_anycast()

2021-03-16 Thread jmaloy
From: Jon Maloy We simplify the signature if function tipc_nametbl_lookup_anycast(), using address structures instead of discrete integers. This also makes it possible to make some improvements to the functions __tipc_sendmsg() in socket.c and tipc_msg_lookup_dest() in msg.c. Signed-off-by: Jon

[net-next 06/16] tipc: simplify signature of tipc_nametbl_withdraw() functions

2021-03-16 Thread jmaloy
From: Jon Maloy Following the principles of the preceding commits, we reduce the number of parameters passed along in tipc_sk_withdraw(), tipc_nametbl_withdraw() and associated functions. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long

[net-next 05/16] tipc: simplify call signatures for publication creation

2021-03-16 Thread jmaloy
From: Jon Maloy We simplify the call signatures for tipc_nametbl_insert_publ() and tipc_publ_create() so that fewer parameters are passed around. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin Long --- net/tipc/name_distr.c | 23 +

[net-next 04/16] tipc: simplify signature of tipc_namtbl_publish()

2021-03-16 Thread jmaloy
From: Jon Maloy Using the new address structure tipc_uaddr, we simplify the signature of function tipc_sk_publish() and tipc_namtbl_publish() so that fewer parameters need to be passed around. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang Le Acked-by: Tung Nguyen Acked-by: Xin

[net-next 03/16] tipc: introduce new unified address type for internal use

2021-03-16 Thread jmaloy
From: Jon Maloy We introduce a simplified version of struct sockaddr_tipc, using anonymous unions and structures. Apart from being nicer to work with, this struct will come in handy when we in a later commit add another address type. Signed-off-by: Jon Maloy Acked-by: Ying Xue Acked-by: Hoang

[net-next 02/16] tipc: move creation of publication item one level up in call chain

2021-03-16 Thread jmaloy
From: Jon Maloy We instantiate struct publication in tipc_nametbl_insert_publ() instead of as currently in tipc_service_insert_publ(). This has the advantage that we can pass a pointer to the publication struct to the next call levels, instead of the numerous individual parameters we pass on now.

[net-next 01/16] tipc: re-organize members of struct publication

2021-03-16 Thread jmaloy
From: Jon Maloy In a future commit we will introduce more members to struct publication. In order to keep this structure comprehensible we now group some of its current fields into the sub-structures where they really belong, - A struct tipc_service_range for the functional address the publicatio

[net-next 00/16] tipc: cleanups and simplifications

2021-03-16 Thread jmaloy
From: Jon Maloy We do a number of cleanups and simplifications, especially regarding call signatures in the binding table. This makes the code easier to understand and serves as preparation for upcoming functional additions. Jon Maloy (16): tipc: re-organize members of struct publication tip

Re: [PATCH net-next 5/9] net: hns3: refactor flow director configuration

2021-03-16 Thread Huazhong Tan
On 2021/3/16 4:00, Jakub Kicinski wrote: On Mon, 15 Mar 2021 20:23:47 +0800 Huazhong Tan wrote: From: Jian Shen Currently, there are 3 flow director work modes in HNS3 driver, include EP(ethtool), tc flower and aRFS. The flow director rules are configured synchronously and need holding spin

Re: [PATCH v4 RESEND net-next] net: socket: use BIT() for MSG_*

2021-03-16 Thread Guenter Roeck
On Wed, Mar 17, 2021 at 01:02:51AM +0200, Andy Shevchenko wrote: > On Wednesday, March 17, 2021, Guenter Roeck wrote: > > > Hi, > > > > On Tue, Mar 09, 2021 at 05:51:35PM -0800, menglong8.d...@gmail.com wrote: > > > From: Menglong Dong > > > > > > The bit mask for MSG_* seems a little confused h

[PATCH net-next 1/1] stmmac: intel: Add PSE and PCH PTP clock source selection

2021-03-16 Thread Ong Boon Leong
From: "Wong, Vee Khee" Intel mGbE variant implemented in EHL and TGL can be set to select different clock frequency based on GPO bits in MAC_GPIO_STATUS register. We introduce a new "void (*ptp_clk_freq_config)(void *priv)" in platform data so that if a platform is required to configure the freq

[PATCH net-next 0/1] stmmac: add PCH and PSE PTP clock setting

2021-03-16 Thread Ong Boon Leong
Hi, Intel mGBE controllers that are integrated into EHL, TGL SoC have different clock source selection. This patch adds the required setting for running linuxptp time-sync. The patch has been tested on both PSE (/dev/ptp0) and PCH TSN(/dev/ptp2) and the results for the time sync looks correct. #

[PATCH AUTOSEL 4.4 09/14] atm: uPD98402: fix incorrect allocation

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 3153724fc084d8ef640c611f269ddfb576d1dcb1 ] dev->dev_data is set in zatm.c, calling zatm_start() will overwrite this dev->dev_data in uPD98402_start() and a subsequent PRIV(dev)->lock (i.e dev->phy_data->lock) will result in a null-ptr-dereference. I believe th

[PATCH AUTOSEL 4.9 12/16] atm: idt77252: fix null-ptr-dereference

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4416e98594dc04590ebc498fc4e530009535c511 ] this one is similar to the phy_data allocation fix in uPD98402, the driver allocate the idt77105_priv and store to dev_data but later dereference using dev->dev_data, which will cause null-ptr-dereference. fix this is

[PATCH AUTOSEL 4.9 11/16] atm: uPD98402: fix incorrect allocation

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 3153724fc084d8ef640c611f269ddfb576d1dcb1 ] dev->dev_data is set in zatm.c, calling zatm_start() will overwrite this dev->dev_data in uPD98402_start() and a subsequent PRIV(dev)->lock (i.e dev->phy_data->lock) will result in a null-ptr-dereference. I believe th

[PATCH net-next v2 0/1] net: stmmac: add per-q coalesce support

2021-03-16 Thread Ong Boon Leong
Hi, This patch adds per-queue RX & TX coalesce control so that user can adjust the RX & TX interrupt moderation per queue. This is beneficial for mixed criticality control (according to VLAN priority) by user application. The v2 patch has been tested (with added negative tests) and results from t

[PATCH AUTOSEL 4.9 01/16] net: fec: ptp: avoid register access when ipg clock is disabled

2021-03-16 Thread Sasha Levin
From: Heiko Thiery [ Upstream commit 6a4d7234ae9a3bb31181f348ade9bbdb55aeb5c5 ] When accessing the timecounter register on an i.MX8MQ the kernel hangs. This is only the case when the interface is down. This can be reproduced by reading with 'phc_ctrl eth0 get'. Like described in the change in 9

Re: [RFC v2] net: sched: implement TCQ_F_CAN_BYPASS for lockless qdisc

2021-03-16 Thread Yunsheng Lin
On 2021/3/17 6:48, Cong Wang wrote: > On Mon, Mar 15, 2021 at 2:07 PM Jakub Kicinski wrote: >> >> I thought pfifo was supposed to be "lockless" and this change >> re-introduces a lock between producer and consumer, no? > > It has never been truly lockless, it uses two spinlocks in the ring buffer

[PATCH AUTOSEL 4.4 05/14] net: tehuti: fix error return code in bdx_probe()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 38c26ff3048af50eee3fcd591921357ee5bfd9ee ] When bdx_read_mac() fails, no error return code of bdx_probe() is assigned. To fix this bug, err is assigned with -EFAULT as error return code. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Signed-off-by: David

Re: [PATCH net-next] net: sched: remove unnecessay lock protection for skb_bad_txq/gso_skb

2021-03-16 Thread Yunsheng Lin
On 2021/3/17 2:41, Cong Wang wrote: > On Mon, Mar 15, 2021 at 2:29 AM Yunsheng Lin wrote: >> >> Currently qdisc_lock(q) is taken before enqueuing and dequeuing >> for lockless qdisc's skb_bad_txq/gso_skb queue, qdisc->seqlock is >> also taken, which can provide the same protection as qdisc_lock(q)

[PATCH AUTOSEL 4.4 06/14] sun/niu: fix wrong RXMAC_BC_FRM_CNT_COUNT count

2021-03-16 Thread Sasha Levin
From: Denis Efremov [ Upstream commit 155b23e6e53475ca3b8c2a946299b4d4dd6a5a1e ] RXMAC_BC_FRM_CNT_COUNT added to mp->rx_bcasts twice in a row in niu_xmac_interrupt(). Remove the second addition. Signed-off-by: Denis Efremov Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drive

[PATCH AUTOSEL 4.4 03/14] atm: eni: dont release is never initialized

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4deb550bc3b698a1f03d0332cde3df154d1b6c1e ] label err_eni_release is reachable when eni_start() fail. In eni_start() it calls dev->phy->start() in the last step, if start() fail we don't need to call phy->stop(), if start() is never called, we neither need to ca

[PATCH AUTOSEL 4.4 01/14] net: fec: ptp: avoid register access when ipg clock is disabled

2021-03-16 Thread Sasha Levin
From: Heiko Thiery [ Upstream commit 6a4d7234ae9a3bb31181f348ade9bbdb55aeb5c5 ] When accessing the timecounter register on an i.MX8MQ the kernel hangs. This is only the case when the interface is down. This can be reproduced by reading with 'phc_ctrl eth0 get'. Like described in the change in 9

[PATCH AUTOSEL 4.4 04/14] atm: lanai: dont run lanai_dev_close if not open

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit a2bd45834e83d6c5a04d397bde13d744a4812dfc ] lanai_dev_open() can fail. When it fail, lanai->base is unmapped and the pci device is disabled. The caller, lanai_init_one(), then tries to run atm_dev_deregister(). This will subsequently call lanai_dev_close() and u

[PATCH AUTOSEL 4.9 10/16] net: wan: fix error return code of uhdlc_init()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 62765d39553cfd1ad340124fe1e280450e8c89e2 ] When priv->rx_skbuff or priv->tx_skbuff is NULL, no error return code of uhdlc_init() is assigned. To fix this bug, ret is assigned with -ENOMEM in these cases. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Sign

[PATCH AUTOSEL 4.9 06/16] net: tehuti: fix error return code in bdx_probe()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 38c26ff3048af50eee3fcd591921357ee5bfd9ee ] When bdx_read_mac() fails, no error return code of bdx_probe() is assigned. To fix this bug, err is assigned with -EFAULT as error return code. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Signed-off-by: David

[PATCH AUTOSEL 4.9 07/16] sun/niu: fix wrong RXMAC_BC_FRM_CNT_COUNT count

2021-03-16 Thread Sasha Levin
From: Denis Efremov [ Upstream commit 155b23e6e53475ca3b8c2a946299b4d4dd6a5a1e ] RXMAC_BC_FRM_CNT_COUNT added to mp->rx_bcasts twice in a row in niu_xmac_interrupt(). Remove the second addition. Signed-off-by: Denis Efremov Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drive

[PATCH AUTOSEL 4.9 04/16] atm: lanai: dont run lanai_dev_close if not open

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit a2bd45834e83d6c5a04d397bde13d744a4812dfc ] lanai_dev_open() can fail. When it fail, lanai->base is unmapped and the pci device is disabled. The caller, lanai_init_one(), then tries to run atm_dev_deregister(). This will subsequently call lanai_dev_close() and u

[PATCH AUTOSEL 4.9 05/16] ixgbe: Fix memleak in ixgbe_configure_clsu32

2021-03-16 Thread Sasha Levin
From: Dinghao Liu [ Upstream commit 7a766381634da19fc837619b0a34590498d9d29a ] When ixgbe_fdir_write_perfect_filter_82599() fails, input allocated by kzalloc() has not been freed, which leads to memleak. Signed-off-by: Dinghao Liu Reviewed-by: Paul Menzel Tested-by: Tony Brelinski Signed-off

[PATCH AUTOSEL 4.9 03/16] atm: eni: dont release is never initialized

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4deb550bc3b698a1f03d0332cde3df154d1b6c1e ] label err_eni_release is reachable when eni_start() fail. In eni_start() it calls dev->phy->start() in the last step, if start() fail we don't need to call phy->stop(), if start() is never called, we neither need to ca

[PATCH AUTOSEL 4.4 10/14] atm: idt77252: fix null-ptr-dereference

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4416e98594dc04590ebc498fc4e530009535c511 ] this one is similar to the phy_data allocation fix in uPD98402, the driver allocate the idt77105_priv and store to dev_data but later dereference using dev->dev_data, which will cause null-ptr-dereference. fix this is

[PATCH AUTOSEL 4.14 15/21] atm: idt77252: fix null-ptr-dereference

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4416e98594dc04590ebc498fc4e530009535c511 ] this one is similar to the phy_data allocation fix in uPD98402, the driver allocate the idt77105_priv and store to dev_data but later dereference using dev->dev_data, which will cause null-ptr-dereference. fix this is

[PATCH AUTOSEL 4.14 14/21] atm: uPD98402: fix incorrect allocation

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 3153724fc084d8ef640c611f269ddfb576d1dcb1 ] dev->dev_data is set in zatm.c, calling zatm_start() will overwrite this dev->dev_data in uPD98402_start() and a subsequent PRIV(dev)->lock (i.e dev->phy_data->lock) will result in a null-ptr-dereference. I believe th

[PATCH AUTOSEL 4.14 13/21] net: wan: fix error return code of uhdlc_init()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 62765d39553cfd1ad340124fe1e280450e8c89e2 ] When priv->rx_skbuff or priv->tx_skbuff is NULL, no error return code of uhdlc_init() is assigned. To fix this bug, ret is assigned with -ENOMEM in these cases. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Sign

[PATCH AUTOSEL 4.14 08/21] sun/niu: fix wrong RXMAC_BC_FRM_CNT_COUNT count

2021-03-16 Thread Sasha Levin
From: Denis Efremov [ Upstream commit 155b23e6e53475ca3b8c2a946299b4d4dd6a5a1e ] RXMAC_BC_FRM_CNT_COUNT added to mp->rx_bcasts twice in a row in niu_xmac_interrupt(). Remove the second addition. Signed-off-by: Denis Efremov Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drive

[PATCH AUTOSEL 4.14 07/21] net: tehuti: fix error return code in bdx_probe()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 38c26ff3048af50eee3fcd591921357ee5bfd9ee ] When bdx_read_mac() fails, no error return code of bdx_probe() is assigned. To fix this bug, err is assigned with -EFAULT as error return code. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Signed-off-by: David

[PATCH AUTOSEL 4.14 12/21] net: hisilicon: hns: fix error return code of hns_nic_clear_all_rx_fetch()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 143c253f42bad20357e7e4432087aca747c43384 ] When hns_assemble_skb() returns NULL to skb, no error return code of hns_nic_clear_all_rx_fetch() is assigned. To fix this bug, ret is assigned with -ENOMEM in this case. Reported-by: TOTE Robot Signed-off-by: Jia-Ju

[PATCH AUTOSEL 4.14 05/21] Revert "r8152: adjust the settings about MAC clock speed down for RTL8153"

2021-03-16 Thread Sasha Levin
From: Hayes Wang [ Upstream commit 4b5dc1a94d4f92b5845e98bd9ae344b26d933aad ] This reverts commit 134f98bcf1b898fb9d6f2b91bc85dd2e5478b4b8. The r8153_mac_clk_spd() is used for RTL8153A only, because the register table of RTL8153B is different from RTL8153A. However, this function would be calle

[PATCH AUTOSEL 4.14 06/21] ixgbe: Fix memleak in ixgbe_configure_clsu32

2021-03-16 Thread Sasha Levin
From: Dinghao Liu [ Upstream commit 7a766381634da19fc837619b0a34590498d9d29a ] When ixgbe_fdir_write_perfect_filter_82599() fails, input allocated by kzalloc() has not been freed, which leads to memleak. Signed-off-by: Dinghao Liu Reviewed-by: Paul Menzel Tested-by: Tony Brelinski Signed-off

[PATCH AUTOSEL 4.14 04/21] atm: lanai: dont run lanai_dev_close if not open

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit a2bd45834e83d6c5a04d397bde13d744a4812dfc ] lanai_dev_open() can fail. When it fail, lanai->base is unmapped and the pci device is disabled. The caller, lanai_init_one(), then tries to run atm_dev_deregister(). This will subsequently call lanai_dev_close() and u

[PATCH AUTOSEL 4.14 03/21] atm: eni: dont release is never initialized

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4deb550bc3b698a1f03d0332cde3df154d1b6c1e ] label err_eni_release is reachable when eni_start() fail. In eni_start() it calls dev->phy->start() in the last step, if start() fail we don't need to call phy->stop(), if start() is never called, we neither need to ca

[PATCH AUTOSEL 4.14 01/21] net: fec: ptp: avoid register access when ipg clock is disabled

2021-03-16 Thread Sasha Levin
From: Heiko Thiery [ Upstream commit 6a4d7234ae9a3bb31181f348ade9bbdb55aeb5c5 ] When accessing the timecounter register on an i.MX8MQ the kernel hangs. This is only the case when the interface is down. This can be reproduced by reading with 'phc_ctrl eth0 get'. Like described in the change in 9

[PATCH AUTOSEL 4.19 16/23] atm: idt77252: fix null-ptr-dereference

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 4416e98594dc04590ebc498fc4e530009535c511 ] this one is similar to the phy_data allocation fix in uPD98402, the driver allocate the idt77105_priv and store to dev_data but later dereference using dev->dev_data, which will cause null-ptr-dereference. fix this is

[PATCH AUTOSEL 4.19 15/23] atm: uPD98402: fix incorrect allocation

2021-03-16 Thread Sasha Levin
From: Tong Zhang [ Upstream commit 3153724fc084d8ef640c611f269ddfb576d1dcb1 ] dev->dev_data is set in zatm.c, calling zatm_start() will overwrite this dev->dev_data in uPD98402_start() and a subsequent PRIV(dev)->lock (i.e dev->phy_data->lock) will result in a null-ptr-dereference. I believe th

[PATCH AUTOSEL 4.19 14/23] net: wan: fix error return code of uhdlc_init()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 62765d39553cfd1ad340124fe1e280450e8c89e2 ] When priv->rx_skbuff or priv->tx_skbuff is NULL, no error return code of uhdlc_init() is assigned. To fix this bug, ret is assigned with -ENOMEM in these cases. Reported-by: TOTE Robot Signed-off-by: Jia-Ju Bai Sign

[PATCH AUTOSEL 4.19 13/23] net: hisilicon: hns: fix error return code of hns_nic_clear_all_rx_fetch()

2021-03-16 Thread Sasha Levin
From: Jia-Ju Bai [ Upstream commit 143c253f42bad20357e7e4432087aca747c43384 ] When hns_assemble_skb() returns NULL to skb, no error return code of hns_nic_clear_all_rx_fetch() is assigned. To fix this bug, ret is assigned with -ENOMEM in this case. Reported-by: TOTE Robot Signed-off-by: Jia-Ju

  1   2   3   4   5   >