On Mon, 2019-06-24 at 21:00 -0400, Lucas Bates wrote:
> This patch restores the original behaviour for tdc prior to the
> introduction of the plugin system, where the network namespace
> functionality was split from the main script.
>
> It introduces the concept of required plugins for testcases,
[Reposting with correct format this time. Sorry.]
On Fri, Jun 21, 2019 at 12:20 AM CEST, Joe Stringer wrote:
> On Wed, Jun 19, 2019 at 2:14 AM Jakub Sitnicki wrote:
>>
>> Hey Florian,
>>
>> Thanks for taking a look at it.
>>
>> On Tue, Jun 18, 2019 at 03:52 PM CEST, Florian Westphal wrote:
>> > J
On 24 Jun 2019, at 18:42, Andrii Nakryiko wrote:
On Mon, Jun 24, 2019 at 2:37 AM Eelco Chaudron
wrote:
On 21 Jun 2019, at 21:13, Andrii Nakryiko wrote:
On Fri, Jun 21, 2019 at 8:26 AM Eelco Chaudron
wrote:
When an AF_XDP application received X packets, it does not mean X
frames can
On Fri, Jun 21, 2019 at 06:50 PM CEST, Joe Stringer wrote:
> On Fri, Jun 21, 2019 at 1:44 AM Jakub Sitnicki wrote:
>>
>> On Fri, Jun 21, 2019, 00:20 Joe Stringer wrote:
>>>
>>> On Wed, Jun 19, 2019 at 2:14 AM Jakub Sitnicki wrote:
>>> >
>>> > Hey Florian,
>>> >
>>> > Thanks for taking a look at
I don't understand the purpose of this patch. Could you please provide
some description about what this is about. mlxsw supports block sharing
between ports. Or what kind of "sharing" do you have in mind?
On Tue, Jun 25, 2019 at 10:16:27AM +0200, Jiri Pirko wrote:
> I don't understand the purpose of this patch. Could you please provide
> some description about what this is about. mlxsw supports block sharing
> between ports. Or what kind of "sharing" do you have in mind?
I'm refering to ethtool, tc
Quoting Andrew Lunn :
Hi Andrew,
+static int mt7530_isolate_ephy(struct dsa_switch *ds,
+ struct device_node *ephy_node)
+{
+ struct phy_device *phydev = of_phy_find_device(ephy_node);
+ int ret;
+
+ if (!phydev)
+ return 0;
+
+
Hi John,
On Mon, 24 Jun 2019 23:13:36 +0100
John Hurley wrote:
> TC hooks allow the application of filters and actions to packets at
> both ingress and egress of the network stack. It is possible, with
> poor configuration, that this can produce loops whereby an ingress
> hook calls a mirred egr
On Fri, Jun 21, 2019 at 07:16:03PM +0200, Jiri Pirko wrote:
> Thu, Jun 20, 2019 at 09:49:09PM CEST, pa...@netfilter.org wrote:
>
> [...]
>
> >
> >+static LIST_HEAD(tcf_block_cb_list);
>
> I still don't like the global list. Have to go throught the code more
> carefully, but why you can't pass t
This patch documents the qca8k's reset-gpios property that
can be used if the QCA8337N ends up in a bad state during
reset.
Signed-off-by: Christian Lamparter
---
Documentation/devicetree/bindings/net/dsa/qca8k.txt | 6 ++
1 file changed, 6 insertions(+)
diff --git a/Documentation/devicetre
The QCA8337(N) has a RESETn signal on Pin B42 that
triggers a chip reset if the line is pulled low.
The datasheet says that: "The active low duration
must be greater than 10 ms".
This can hopefully fix some of the issues related
to pin strapping in OpenWrt for the EA8500 which
suffers from detecti
Le 25/06/2019 à 03:00, Lucas Bates a écrit :
> This patch restores the original behaviour for tdc prior to the
> introduction of the plugin system, where the network namespace
> functionality was split from the main script.
>
> It introduces the concept of required plugins for testcases,
> and wil
>> switch (state->interface) {
>> case PHY_INTERFACE_MODE_NA:
>> +case PHY_INTERFACE_MODE_USXGMII:
>> +case PHY_INTERFACE_MODE_10GKR:
>> +if (bp->caps & MACB_CAPS_GIGABIT_MODE_AVAILABLE) {
>> +phylink_set(mask, 1baseCR_Full);
>> +
> -Original Message-
> From: Tariq Toukan
> Sent: Monday, June 17, 2019 19:16
> To: Florian Westphal ; netdev@vger.kernel.org
> Cc: Ran Rozenstein ; Maor Gottlieb
> ; eduma...@google.com
> Subject: Re: [PATCH net-next 0/2] net: ipv4: remove erroneous
> advancement of list pointer
>
>
>
On Tue, Jun 25, 2019 at 9:30 AM Eyal Birger wrote:
>
> Hi John,
>
> On Mon, 24 Jun 2019 23:13:36 +0100
> John Hurley wrote:
>
> > TC hooks allow the application of filters and actions to packets at
> > both ingress and egress of the network stack. It is possible, with
> > poor configuration, that
"Daniel T. Lee" writes:
> Currently, each xdp samples are inconsistent in the use.
> Most of the samples fetch the interface with it's name.
> (ex. xdp1, xdp2skb, xdp_redirect_cpu, xdp_sample_pkts, etc.)
>
> But some of the xdp samples are fetching the interface with
> ifindex by command argument
John Hurley wrote:
> Hi Eyal,
> The value of 4 is basically a revert to what it was on older kernels
> when TC had a TTL value in the skb:
> https://elixir.bootlin.com/linux/v3.19.8/source/include/uapi/linux/pkt_cls.h#L97
IIRC this TTL value was not used ever.
> I also found with my testing that
Ran Rozenstein wrote:
> > On 6/17/2019 5:02 PM, Florian Westphal wrote:
> > > Tariq reported a soft lockup on net-next that Mellanox was able to
> > > bisect to 2638eb8b50cf ("net: ipv4: provide __rcu annotation for
> > > ifa_list").
> > >
> > > While reviewing above patch I found a regression wh
Hi pablo,
Any idea about these two patches?
BR
wenxu
On 6/20/2019 9:17 AM, we...@ucloud.cn wrote:
> From: wenxu
>
> nft add table bridge firewall
> nft add chain bridge firewall zones { type filter hook prerouting priority -
> 300 \; }
> nft add rule bridge firewall zones counter ct zone se
Hi,
On 09/05/19 9:41 PM, Dan Murphy wrote:
> Create a m_can platform framework that peripheral
> devices can register to and use common code and register sets.
> The peripheral devices may provide read/write and configuration
> support of the IP.
>
> Acked-by: Wolfgang Grandegger
> Signed-off-by
Quoting Florian Fainelli :
Hi Florian
On 6/24/19 7:52 AM, René van Dorst wrote:
On some platforum the external phy can only interface to the port 5 of the
switch because the RGMII TX and RX lines are swapped. But it still can be
useful to use the internal phy of the switch to act as a WAN port
On 06/25/2019 08:37 AM, Eric Dumazet wrote:
> On 6/24/19 8:17 PM, Joe Stringer wrote:
>> On Fri, Jun 21, 2019 at 1:59 PM Florian Westphal wrote:
>>>
>>> Joe Stringer wrote:
As discussed during LSFMM, I've been looking at adding something like
an `skb_sk_assign()` helper to BPF so that l
When we disable IPv6 from the start up (ipv6.disable=1), there will be
no IPv6 route info in the dump message. If we return -1 when
ifi->ifi_family != AF_INET6, we will get error like
$ ip token list
Dump terminated
which will make user feel confused. There is no need to return -1 if the
dump mes
On Tue, Jun 25, 2019 at 10:15 AM Florian Westphal wrote:
>
> John Hurley wrote:
> > Hi Eyal,
> > The value of 4 is basically a revert to what it was on older kernels
> > when TC had a TTL value in the skb:
> > https://elixir.bootlin.com/linux/v3.19.8/source/include/uapi/linux/pkt_cls.h#L97
>
> II
Clarify the validate() behaviour in a few cases which weren't mentioned
in the documentation, but which are necessary for users to get the
correct behaviour.
Signed-off-by: Russell King
---
include/linux/phylink.h | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/in
On Tue, Jun 25, 2019 at 05:23:02PM +0800, wenxu wrote:
> Hi pablo,
>
> Any idea about these two patches?
Plan is to include them in the next batch.
> On 6/20/2019 9:17 AM, we...@ucloud.cn wrote:
> > From: wenxu
> >
> > nft add table bridge firewall
> > nft add chain bridge firewall zones { type
/Marek-Vasut/net-dsa-microchip-Convert-to-regmap/20190625-021215
config: x86_64-randconfig-ne0-06250702 (attached as .config)
compiler: gcc-7 (Debian 7.3.0-1) 7.3.0
reproduce:
# save the attached .config to linux build tree
make ARCH=x86_64
If you fix the issue, kindly add following
On Tue, 25 Jun 2019 11:08:22 +0200
Toke Høiland-Jørgensen wrote:
> "Daniel T. Lee" writes:
>
> > Currently, each xdp samples are inconsistent in the use.
> > Most of the samples fetch the interface with it's name.
> > (ex. xdp1, xdp2skb, xdp_redirect_cpu, xdp_sample_pkts, etc.)
> >
> > But some
At this point, with TCP encapsulation, the dst may be gone, but
xfrm_input needs one.
Signed-off-by: Sabrina Dubroca
---
net/ipv4/xfrm4_protocol.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/net/ipv4/xfrm4_protocol.c b/net/ipv4/xfrm4_protocol.c
index bcab48944c15..1665e1a05ec5 1
This will be used by TCP encapsulation to write packets to the encap
socket without holding the user socket's lock. Without this reinjection,
we're already holding the lock of the user socket, and then try to lock
the encap socket as well when we enqueue the encrypted packet.
While at it, add a BU
This patchset introduces support for TCP encapsulation of IKE and ESP
messages, as defined by RFC 8229 [0]. It is an evolution of what
Herbert Xu proposed in January 2018 [1] that addresses the main
criticism against it, by not interfering with the TCP implementation
at all. The networking stack no
This will be used by ESP over TCP to handle the queue of IKE messages.
Signed-off-by: Sabrina Dubroca
---
include/linux/skbuff.h | 11 ---
net/core/datagram.c| 26 --
net/ipv4/udp.c | 3 ++-
net/unix/af_unix.c | 7 ---
4 files changed, 30 ins
TCP encapsulation of IKE and IPsec messages (RFC 8229) is implemented
as a TCP ULP, overriding in particular the sendmsg and recvmsg
operations. A Stream Parser is used to extract messages out of the TCP
stream using the first 2 bytes as length marker. Received IKE messages
are put on "ike_queue",
From: Herbert Xu
For a function that needs to be called with the socket spinlock
held, sleeping would seem to be a bad idea. This function does
in fact avoid sleeping when calling kernel_sendpage_locked on the
page part of the skb. However, it doesn't do that when sending
the linear part. Resu
For espintcp encapsulation, we will need to get the source port from the
TCP header instead of UDP. Introduce a variable to hold the port.
Co-developed-by: Herbert Xu
Signed-off-by: Herbert Xu
Signed-off-by: Sabrina Dubroca
---
net/ipv4/esp4.c | 16 ++--
1 file changed, 14 insertio
Co-developed-by: Herbert Xu
Signed-off-by: Herbert Xu
Signed-off-by: Sabrina Dubroca
---
net/ipv4/esp4.c | 57 -
1 file changed, 37 insertions(+), 20 deletions(-)
diff --git a/net/ipv4/esp4.c b/net/ipv4/esp4.c
index 5608dd47ee97..344660e2a17b 100
'mngtmpaddr' option make the kernel manage temporary addresses
created from the specified one as template on behalf of Privacy
Extensions (RFC3041). This option should be available only for
IPv6 addresses, as correctly stated in the manpage.
However it is possible to set mngtmpaddr on IPv4 address
'home' option designates a IPv6 address as "home address" as
defined in RFC 6275. This option should be available only for
IPv6 addresses, as correctly stated in the manpage.
However it is possible to set home on IPv4 addresses, too:
$ ip link add dummy0 type dummy
$ ip -4 addr add 192.168.1.1 de
Hello!
On 25.06.2019 11:19, Jose Abreu wrote:
Some DT bindings do not have the PHY handle. Let's fallback to manually
discovery in case phylink_of_phy_connect() fails.
Reported-by: Katsuhiro Suzuki
Fixes: 74371272f97f ("net: stmmac: Convert to phylink and remove phylib logic")
Signed-off-by:
These days drivers are not required to fallback to smaller DMA masks,
but can just set the largest mask they support, removing the need for
this trial and error logic.
Signed-off-by: Christoph Hellwig
---
drivers/net/wireless/broadcom/b43legacy/dma.c | 39 +--
1 file changed, 1 i
Duplicate Address Detection (RFC 4862) is available only for IPv6
addresses. As a consequence, 'nodad' option, turning it off, should
be available only for IPv6, and is defined like that in the man page.
However it is possible to set nodad on IPv4 addresses, too:
$ ip link add dummy0 type dummy
$
'home', 'nodad' and 'mngtmpaddr' options are IPv6-only, but
it is possible to set them on IPv4 addresses, too. This should
not be possible.
Fix this adding a check on the protocol family before setting
the flags, and print warning messages on error to not break
existing scripted setups.
Andrea Cl
Hi Jesper,
Could you please clarify one question.
On Tue, Jun 18, 2019 at 03:05:47PM +0200, Jesper Dangaard Brouer wrote:
This patch is needed before we can allow drivers to use page_pool for
DMA-mappings. Today with page_pool and XDP return API, it is possible to
remove the page_pool object (f
On 2019-06-24 12:49 p.m., Eric Dumazet wrote:
Well, I would simply remove the skb_orphan() call completely.
My experience: You still need to call skb_orphan() from the lower level
(and set the skb destructor etc).
cheers,
jamal
On Mon, Jun 24, 2019 at 06:15:29PM -0400, Willem de Bruijn wrote:
> > > > + if (need_wait && !packet_next_frame(po, &po->tx_ring,
> > > > TP_STATUS_SEND_REQUEST)) {
> > > > + po->wait_on_complete = 1;
> > > > + timeo = sock_sndtimeo(&po->sk
Merge commit 1c8c5a9d38f60 ("Merge
git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next") undid the
fix from commit 36f9814a494 ("bpf: fix uapi hole for 32 bit compat
applications") by taking the gpl_compatible 1-bit field definition from
commit b85fab0e67b162 ("bpf: Add gpl_compatible flag
On 2019-06-24 11:26 p.m., Joe Stringer wrote:
[..]
I haven't got as far as UDP yet, but I didn't see any need for a
dependency on netfilter.
I'd be curious to see what you did. My experience, even for TCP is
the socket(transparent/tproxy) lookup code (to set skb->sk either
listening or establi
On Tue, Jun 25, 2019 at 12:21:45AM +0800, Xin Long wrote:
> Now in sctp_endpoint_init(), it holds the sk then creates auth
> shkey. But when the creation fails, it doesn't release the sk,
> which causes a sk defcnf leak,
>
> Here to fix it by only holding the sk when auth shkey is created
> succes
On 2019-06-24 6:13 p.m., John Hurley wrote:
These patches aim to prevent act_mirred causing stack overflow events from
recursively calling packet xmit or receive functions. Such events can
occur with poor TC configuration that causes packets to travel in loops
within the system.
Florian Westphal
On 2019-06-25 5:06 a.m., John Hurley wrote:
On Tue, Jun 25, 2019 at 9:30 AM Eyal Birger wrote:
I'm not sure on the history of why a value of 4 was selected here but
it seems to fall into line with my findings.
Back then we could only loop in one direction (as opposed to two right
now) - so
On Tue, 25 Jun 2019 13:50:14 +0300
Ivan Khoronzhuk wrote:
> Hi Jesper,
>
> Could you please clarify one question.
>
> On Tue, Jun 18, 2019 at 03:05:47PM +0200, Jesper Dangaard Brouer wrote:
> >This patch is needed before we can allow drivers to use page_pool for
> >DMA-mappings. Today with page
On Sat, 22 Jun 2019 19:24:10 -0700
Florian Fainelli wrote:
> Something like this should take care of that (untested). You might
> have to explicitly set the IMP port (port 8) in B53_UC_FWD_EN and
> B53_MC_FWD_EN, though since you turn on management mode, this may not
> be required. I might have s
Quoting Russell King - ARM Linux admin :
Hi Russel,
Thanks for your review, see also my comments and questions below.
Hi,
On Mon, Jun 24, 2019 at 04:52:47PM +0200, René van Dorst wrote:
Convert mt7530 to PHYLINK API
Signed-off-by: René van Dorst
---
drivers/net/dsa/mt7530.c | 237
On Mon, 24 Jun 2019 15:55:49 -0600
David Ahern wrote:
> On 6/14/19 7:33 PM, Stefano Brivio wrote:
> > diff --git a/ip/iproute.c b/ip/iproute.c
> > index 2b3dcc5dbd53..192442b42062 100644
> > --- a/ip/iproute.c
> > +++ b/ip/iproute.c
> > @@ -1602,6 +1602,16 @@ static int save_route_prep(void)
> >
With a current (5.1) kernel version, IPv6 exception routes can't be listed
(ip -6 route list cache) or flushed (ip -6 route flush cache). Kernel
support for this is being added back. Relevant net-next commits:
564c91f7e563 fib_frontend, ip6_fib: Select routes or exceptions dump from
RTM_F_CLONE
Quoting Daniel Santos :
Hi Daniel,
On 6/24/19 9:52 AM, René van Dorst wrote:
Convert mt7530 to PHYLINK API
Signed-off-by: René van Dorst
---
drivers/net/dsa/mt7530.c | 237 +--
drivers/net/dsa/mt7530.h | 9 ++
2 files changed, 187 insertions(+), 59 dele
Since commit 2f1242efe9d ("devlink: Add devlink health show command") we
use the sys/sysinfo.h header for the sysinfo(2) system call. But since
iproute2 carries a local version of the kernel struct sysinfo, this
causes a collision with libc that do not rely on kernel defined sysinfo
like musl libc:
32bit targets define uint64_t as long long unsigned. This leads to the
following build warning:
devlink.c: In function ‘pr_out_u64’:
devlink.c:1729:11: warning: format ‘%lu’ expects argument of type ‘long
unsigned int’, but argument 4 has type ‘uint64_t {aka long long unsigned int}’
[-Wformat=]
On Tue, Jun 25, 2019 at 01:27:50PM +0200, Jesper Dangaard Brouer wrote:
On Tue, 25 Jun 2019 13:50:14 +0300
Ivan Khoronzhuk wrote:
Hi Jesper,
Could you please clarify one question.
On Tue, Jun 18, 2019 at 03:05:47PM +0200, Jesper Dangaard Brouer wrote:
>This patch is needed before we can allo
On 6/25/19 1:59 AM, Vladimir Oltean wrote:
> On Tue, 25 Jun 2019 at 01:17, Marek Vasut wrote:
>>
>> On 6/24/19 12:35 AM, Marek Vasut wrote:
>>> Add basic SPI regmap support into the driver.
>>>
>>> Previous patches unconver that ksz_spi_write() is always ever called
>>> with len = 1, 2 or 4. We ca
On Tue, Jun 25, 2019 at 11:31:58AM +, René van Dorst wrote:
> > > +if (state->link || mode == MLO_AN_FIXED)
> > > +mcr |= PMCR_FORCE_LNK;
> >
> > This should be removed - state->link is not for use in mac_config.
> > Even in fixed mode, the link can be brought u
Multicast egress packets has skb_rtable(skb)->rt_iif set to the oif.
Depending on the socket, these packets might be recirculated back as
input and raw sockets that are opened for them are bound to the VRF. But
since skb_rtable(skb) is set and its rt_iif is non-zero, inet_iif()
function returns rt_
On Tue, Jun 25, 2019 at 02:51:08PM +0300, Ivan Khoronzhuk wrote:
On Tue, Jun 25, 2019 at 01:27:50PM +0200, Jesper Dangaard Brouer wrote:
On Tue, 25 Jun 2019 13:50:14 +0300
Ivan Khoronzhuk wrote:
Hi Jesper,
Could you please clarify one question.
On Tue, Jun 18, 2019 at 03:05:47PM +0200, Jesp
On 06/13/2019 11:39 AM, Toshiaki Makita wrote:
> This introduces bulk XDP_TX in veth.
> Improves XDP_TX performance by approximately 9%. The detailed
> explanation and performance numbers are shown in patch 2.
>
> v2:
> - Use stack for bulk queue instead of a global variable.
>
> v3:
> - Add act
On Tue, Jun 25, 2019 at 10:44:33AM +0100, Russell King wrote:
> Clarify the validate() behaviour in a few cases which weren't mentioned
> in the documentation, but which are necessary for users to get the
> correct behaviour.
>
> Signed-off-by: Russell King
Reviewed-by: Andrew Lunn
Andrew
On Tue, 25 Jun 2019 at 15:06, Marek Vasut wrote:
>
> On 6/25/19 1:59 AM, Vladimir Oltean wrote:
> > On Tue, 25 Jun 2019 at 01:17, Marek Vasut wrote:
> >>
> >> On 6/24/19 12:35 AM, Marek Vasut wrote:
> >>> Add basic SPI regmap support into the driver.
> >>>
> >>> Previous patches unconver that ksz
On Tue, Jun 25, 2019 at 1:02 AM Sudarsana Reddy Kalluru
wrote:
>
> Thanks for your changes and time on this. In general time-latching happens in
> couple or more milliseconds (even in some 100s of usec) under the normal
> traffic conditions. With this approach, there's a possibility that every
Dear All,
We are hitting the following WARN_ON condition:
WARN_ON((int)tcp_packets_in_flight(tp) < 0);
tcp_packets_in_flight = packets_out –( lost_out +
sacked_out ) + retrans_out (This value is coming -ve)
The tcp socket being used is in fin_wait_1 state.
The values f
On 24/06/2019 16:38, Björn Töpel wrote:
On Thu, 20 Jun 2019 at 18:55, Kevin Laatz wrote:
This patchset adds the ability to use unaligned chunks in the XDP umem.
Currently, all chunk addresses passed to the umem are masked to be chunk
size aligned (default is 2k, max is PAGE_SIZE). This limi
On 24/06/2019 20:23, Jakub Kicinski wrote:
On Thu, 20 Jun 2019 09:09:50 +, Kevin Laatz wrote:
diff --git a/include/net/xdp.h b/include/net/xdp.h
index 0f25b3675c5c..ea801fd2bf98 100644
--- a/include/net/xdp.h
+++ b/include/net/xdp.h
@@ -53,7 +53,8 @@ struct xdp_mem_info {
struct page_pool
On Tue, Jun 25, 2019 at 12:18 PM Jamal Hadi Salim wrote:
>
> On 2019-06-24 6:13 p.m., John Hurley wrote:
> > These patches aim to prevent act_mirred causing stack overflow events from
> > recursively calling packet xmit or receive functions. Such events can
> > occur with poor TC configuration tha
On Tue, Jun 25, 2019 at 5:09 AM Jesper Dangaard Brouer
wrote:
>
> On Tue, 25 Jun 2019 11:08:22 +0200
> Toke Høiland-Jørgensen wrote:
>
> > "Daniel T. Lee" writes:
> >
> > > Currently, each xdp samples are inconsistent in the use.
> > > Most of the samples fetch the interface with it's name.
> >
On Tue, Jun 25, 2019 at 7:03 AM Neil Horman wrote:
>
> On Mon, Jun 24, 2019 at 06:15:29PM -0400, Willem de Bruijn wrote:
> > > > > + if (need_wait && !packet_next_frame(po, &po->tx_ring,
> > > > > TP_STATUS_SEND_REQUEST)) {
> > > > > + po->wait_on_complete = 1;
Клиентские базы! Email: proda...@armyspy.com Узнайте подробнее!
On Tue, Jun 25, 2019 at 4:07 AM Baruch Siach wrote:
>
> Merge commit 1c8c5a9d38f60 ("Merge
> git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next") undid the
> fix from commit 36f9814a494 ("bpf: fix uapi hole for 32 bit compat
> applications") by taking the gpl_compatible 1-bit field defin
On 6/25/19 6:07 AM, Chinmay Agarwal wrote:
> Dear All,
>
> We are hitting the following WARN_ON condition:
>
> WARN_ON((int)tcp_packets_in_flight(tp) < 0);
>
> tcp_packets_in_flight = packets_out –( lost_out +
> sacked_out ) + retrans_out (This value is coming -ve)
>
> Th
On Thu, Jun 13, 2019 at 7:15 PM Matteo Croce wrote:
>
> On Wed, Jun 12, 2019 at 8:20 PM Stephen Hemminger
> wrote:
> >
> > On Wed, 12 Jun 2019 19:32:29 +0200
> > Matteo Croce wrote:
> >
> > > On Wed, Jun 12, 2019 at 6:04 PM Matteo Croce wrote:
> > > >
> > > > On Wed, Jun 12, 2019 at 5:55 PM Ste
On 6/24/2019 9:06 PM, Jason Gunthorpe wrote:
On Mon, Jun 24, 2019 at 07:55:32PM +0300, Yishai Hadas wrote:
+ /* Explicit filtering to kernel events which may occur frequently */
+ if (event_type == MLX5_EVENT_TYPE_CMD ||
+ event_type == MLX5_EVENT_TYPE_PAGE_REQUEST)
+
This is a respin of https://www.spinics.net/lists/netdev/msg526066.html
Since page_pool API fixes are merged into net-next we can now safely use
it's DMA mapping capabilities.
The first patch changes the buffer allocation from netdev_alloc_frag()
to page_pool API. Although this will lead to sli
Use page_pool and it's DMA mapping capabilities for Rx buffers instead
of netdev/napi_alloc_frag()
Although this will result in a slight performance penalty on small sized
packets (~10%) the use of the API will allow to easily add XDP support.
The penalty won't be visible in network testing i.e ip
The interface only supports 1 Tx queue so locking is introduced on
the Tx queue if XDP is enabled to make sure .ndo_start_xmit and
.ndo_xdp_xmit won't corrupt Tx ring
- Performance (SMMU off)
Benchmark XDP_SKB XDP_DRV
xdp1291kpps 344kpps
rxdrop 282kpps 342kpps
- Perfor
On Tue, Jun 25, 2019 at 07:16:55AM -0700, Alexei Starovoitov wrote:
> On Tue, Jun 25, 2019 at 4:07 AM Baruch Siach wrote:
> >
> > Merge commit 1c8c5a9d38f60 ("Merge
> > git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next") undid the
> > fix from commit 36f9814a494 ("bpf: fix uapi hole for
On 6/25/19 2:40 PM, Vladimir Oltean wrote:
> On Tue, 25 Jun 2019 at 15:06, Marek Vasut wrote:
>>
>> On 6/25/19 1:59 AM, Vladimir Oltean wrote:
>>> On Tue, 25 Jun 2019 at 01:17, Marek Vasut wrote:
On 6/24/19 12:35 AM, Marek Vasut wrote:
> Add basic SPI regmap support into the driver.
On Tue, Jun 25, 2019 at 8:08 AM Dmitry V. Levin wrote:
>
> On Tue, Jun 25, 2019 at 07:16:55AM -0700, Alexei Starovoitov wrote:
> > On Tue, Jun 25, 2019 at 4:07 AM Baruch Siach wrote:
> > >
> > > Merge commit 1c8c5a9d38f60 ("Merge
> > > git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next"
From: Jes Sorensen
This fixes an obvious build error that could have been caught by
simply building the code before pushing out the patch.
Cheers,
Jes
Jes Sorensen (1):
mlx5: Fix build when CONFIG_MLX5_EN_RXNFC is disabled
drivers/net/ethernet/mellanox/mlx5/core/en_ethtool.c | 3 ++-
1 fil
From: Jes Sorensen
The previous patch broke the build with a static declaration for
a public function.
Fixes: 8f0916c6dc5c (net/mlx5e: Fix ethtool rxfh commands when
CONFIG_MLX5_EN_RXNFC is disabled)
Signed-off-by: Jes Sorensen
---
drivers/net/ethernet/mellanox/mlx5/core/en_ethtool.c | 3 ++-
On Tue, Jun 25, 2019 at 08:19:35AM -0700, Alexei Starovoitov wrote:
> On Tue, Jun 25, 2019 at 8:08 AM Dmitry V. Levin wrote:
> > On Tue, Jun 25, 2019 at 07:16:55AM -0700, Alexei Starovoitov wrote:
> > > On Tue, Jun 25, 2019 at 4:07 AM Baruch Siach wrote:
> > > >
> > > > Merge commit 1c8c5a9d38f60
On Thu, 2019-06-20 at 10:33 -0700, Cong Wang wrote:
> On Thu, Jun 20, 2019 at 5:52 AM Davide Caratti wrote:
> > hello Cong, thanks for reading.
> >
> > On Wed, 2019-06-19 at 15:04 -0700, Cong Wang wrote:
> > > On Wed, Jun 19, 2019 at 2:10 PM Davide Caratti
> > > wrote:
> > > > on some CPUs (e.g
In commit a4dc70d46cf1 ("tipc: extend link reset criteria for stale
packet retransmission") we made link retransmission failure events
dependent on the link tolerance, and not only of the number of failed
retransmission attempts, as we did earlier. This works well. However,
keeping the original, ad
On Tue, Jun 25, 2019 at 04:24:14PM +0200, Eric Dumazet wrote:
>
>
> On 6/25/19 6:07 AM, Chinmay Agarwal wrote:
> > Dear All,
> >
> > We are hitting the following WARN_ON condition:
> >
> > WARN_ON((int)tcp_packets_in_flight(tp) < 0);
> >
> > tcp_packets_in_flight = packets_out –( lost
Hi all,
we're in the process of upgrading to kernel 4.19 and hit
a very rare lockup on boot during "xfrm_user" module load.
The tested kernel was 4.19.55.
When the strongswan IPsec service starts, it loads the xfrm_user module.
-> modprobe hangs forever.
Also network services like ssh or apache
windows real servers can handle gre tunnels, this patch allows
gre encapsulation with the tunneling method, thereby letting ipvs
be load balancer for windows-based services
Signed-off-by: Vadim Fedorenko
---
include/uapi/linux/ip_vs.h | 1 +
net/netfilter/ipvs/ip_vs_xmit.c | 76 ++
We increase the allocated headroom for the buffer copies to be
retransmitted. This eliminates the need for the lower stack levels
(UDP/IP/L2) to expand the headroom in order to add their own headers.
Signed-off-by: Jon Maloy
---
net/tipc/link.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(
On Tue, 25 Jun 2019 at 13:12, Roopa Prabhu wrote:
>
Hi Roopa,
Thank you for the review!
> On Sun, Jun 23, 2019 at 7:18 PM Taehee Yoo wrote:
> >
> > On Mon, 24 Jun 2019 at 03:07, David Miller wrote:
> > >
> >
> > Hi David,
> >
> > Thank you for the review!
> >
> > > From: Taehee Yoo
> > > Dat
On Tue, Jun 25, 2019 at 09:37:17AM -0400, Willem de Bruijn wrote:
> On Tue, Jun 25, 2019 at 7:03 AM Neil Horman wrote:
> >
> > On Mon, Jun 24, 2019 at 06:15:29PM -0400, Willem de Bruijn wrote:
> > > > > > + if (need_wait && !packet_next_frame(po,
> > > > > > &po->tx_ring, TP_STATUS_
On Tue, 2019-06-25 at 17:47 +0200, Davide Caratti wrote:
> On Thu, 2019-06-20 at 10:33 -0700, Cong Wang wrote:
> > On Thu, Jun 20, 2019 at 5:52 AM Davide Caratti wrote:
> > > hello Cong, thanks for reading.
> > >
> > > On Wed, 2019-06-19 at 15:04 -0700, Cong Wang wrote:
> > > > On Wed, Jun 19, 20
Yauheni reported the following code do not work correctly on BE arches:
ALU_ARSH_X:
DST = (u64) (u32) ((*(s32 *) &DST) >> SRC);
CONT;
ALU_ARSH_K:
DST = (u64) (u32) ((*(s32 *) &DST) >> IMM);
CONT;
and are causing failure of
Thomas Jarosch wrote:
> we're in the process of upgrading to kernel 4.19 and hit
> a very rare lockup on boot during "xfrm_user" module load.
> The tested kernel was 4.19.55.
>
> When the strongswan IPsec service starts, it loads the xfrm_user module.
> -> modprobe hangs forever.
>
> Also netwo
On Mon, Jun 24, 2019 at 1:44 PM David Ahern wrote:
>
> From: David Ahern
>
> Gateway validation does not need a dst_entry, it only needs the fib
> entry to validate the gateway resolution and egress device. So,
> convert ip6_nh_lookup_table from ip6_pol_route to fib6_table_lookup
> and ip6_route_
cgroup code tries to use argv[0] as the cgroup path,
but if it fails uses argv[1] to report errors.
Fixes: 5ccda64d38cc ("bpftool: implement cgroup bpf operations")
Signed-off-by: Jakub Kicinski
Reviewed-by: Quentin Monnet
---
tools/bpf/bpftool/cgroup.c | 6 +++---
1 file changed, 3 insertions(
1 - 100 of 279 matches
Mail list logo