Hi there!
Find your next opportunity at an event of your interest
10times is the world's largest business event platform to find events,
business conferences, trade shows, global seminars, networking meets and
workshops.
Events near me
On Sat, Jan 4, 2020 at 7:50 AM Ilya Maximets wrote:
>
> Most of callers doesn't initialize dpif_execute.hash leaving random
> value from the stack. And this random value used later while encoding
> netlink message and might produce unwanted kernel behavior.
>
> Fix that by fully initializing dpif
On Sat, Jan 4, 2020 at 8:16 AM Ilya Maximets wrote:
>
> upcalls are allocated on stack and 'hash' field must be initialized
> regardless of attribute existence because it will be used later.
>
> Conditional jump or move depends on uninitialised value(s)
> at 0xFA74A7: dpif_netlink_encode_exec
Bleep bloop. Greetings Yi-Hung Wei, I am a robot and I have tried out your
patch.
Thanks for your contribution.
I encountered some error that I wasn't expecting. See the details below.
checkpatch:
WARNING: Line lacks whitespace around operator
#134 FILE: lib/netdev-linux.c:1419:
numa_node
Hello,
Thank you for lending me your timeand as you may wish to know,I am the accounts
updating officer with a leading bank
here in London United Kingdom and the transaction is about an abandoned fund
with us here hence I have perfected
every arrangement to pull the funds totalling the sum of
Currently, the AF_XDP socket (XSK) related memory are allocated by main
thread in the main thread's NUMA domain. With the patch that detects
netdev-linux's NUMA node id, the PMD thread of AF_XDP port will be run on
the AF_XDP netdev's NUMA domain. If the net device's NUMA domain
is different from
From: William Tu
The patch detects the numa node id from the name of the netdev,
by reading the '/sys/class/net//device/numa_node'.
If not available, ex: virtual device, or any error happens,
return numa id 0. Currently only the afxdp netdev type uses it,
other linux netdev types are disabled du
On Fri, Jan 3, 2020 at 7:09 AM Ilya Maximets wrote:
>
> On 18.12.2019 21:31, Yi-Hung Wei wrote:
> > --- a/lib/netdev-afxdp.c
> > +++ b/lib/netdev-afxdp.c
> > @@ -692,6 +701,10 @@ netdev_afxdp_reconfigure(struct netdev *netdev)
> > netdev_change_seq_changed(netdev);
> > out:
> > ovs_mute
dpif logging functions expects to be called after the operation.
log_flow_del_message() dumps flow stats on success which are not
initialized before the actual call to netdev_flow_del():
Conditional jump or move depends on uninitialised value(s)
at 0x6090875: _itoa_word (_itoa.c:179)
by 0
upcalls are allocated on stack and 'hash' field must be initialized
regardless of attribute existence because it will be used later.
Conditional jump or move depends on uninitialised value(s)
at 0xFA74A7: dpif_netlink_encode_execute (dpif-netlink.c:1828)
by 0xFA6DE8: dpif_netlink_operate_
Most of callers doesn't initialize dpif_execute.hash leaving random
value from the stack. And this random value used later while encoding
netlink message and might produce unwanted kernel behavior.
Fix that by fully initializing dpif_execute structure. Using
designated initializers to avoid such
Hello
I'm Jeffrey Wayne, a private/individual lender located in Nevada, United
States,I lend money to borrowers nationwide and a few other countries overseas
who are looking to develop their business. I offer personal loans, business
loans & real estate loans etc
I am writing to see if you hav
ipv6_ra_send can run 2 times in a row before prepare_ipv6_ras updates
the route info. Clone route info string before running
packet_put_ra_route_info_opt in order to avoid sending truncated route
info on the wire.
Moreover move ip6_hdr definition just before accessing it because the
packet can be r
ipv6_ra_send can run 2 times in a row before prepare_ipv6_ras updates
the dnss list. Clone the dnss dynamic string before running
packet_put_ra_dnssl_opt in order to avoid sending truncated dnssl list
on the wire.
Moreover move ip6_hdr definition just before accessing it because the
packet can be r
Lorenzo Bianconi (2):
DNSSL: copy dnssl string in order to avoid truncated value
RA Route Info Option: copy route info string in order to avoid
truncated value
controller/pinctrl.c | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
--
2.21.0
_
Hi Nicolas,
I was wrong. Actually with existing OVS internal device, the xdp generic mode
works fine. Please see my test on kernel 5.3 below
#!/bin/bash
modprobe openvswitch
ovs-dpctl add-dp br0
ip addr add dev br0 10.1.1.2/24
ip link set dev br0 up
ip netns add at_ns0
ip link add p0 type veth
Fixes: b2ae40690ed7 ("netdev-offload-tc: Add recirculation support via tc
chains")
Signed-off-by: Ilya Maximets
---
lib/netdev-offload-tc.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/netdev-offload-tc.c b/lib/netdev-offload-tc.c
index 9e1c84d44..7453078d5 100644
---
tc_make_tcf_id() doesn't initialize the 'chain' field leaving it with a
random value from the stack. This makes request_from_tcf_id() create
request with random TCA_CHAIN included. These requests are obviously
doesn't work as needed leading to broken flow dump and various other
issues. Fix that
On Fri, Jan 03, 2020 at 02:28:03PM +0100, Ilya Maximets wrote:
> On 03.01.2020 00:54, William Tu wrote:
> > On Mon, Dec 23, 2019 at 5:22 PM Yi Yang (杨燚)-云服务集团
> > wrote:
> >>
> >> William, maybe you don't know that kind of tap interface you're saying
> >> only can be used for VM, that is why ope
Webinar interactivo - Ideal para capacitar equipos de trabajo
El actual esquema de fiscalización del SAT a través de los CFDI
Miércoles 29 de Enero de 2020 | Horario de 10:00 a 17:00 hrs.
Nuestro webinar trata sobre el actual esquema de fiscalización y la
determinación de diferencias por parte
Greetings,
Knowing one another is a gradual process My names are Mr. Ross Maxwell
MCewan,I would like to communicate with you write via this medium for
further introduction.
Best regard,
Mr. Ross M. McEwan,
Chief Executive Officer,
Royal Bank of Scotland Group Plc.
On Fri, Jan 3, 2020 at 5:28 AM Ilya Maximets wrote:
>
> On 03.01.2020 00:54, William Tu wrote:
> > On Mon, Dec 23, 2019 at 5:22 PM Yi Yang (杨燚)-云服务集团
> > wrote:
> >>
> >> William, maybe you don't know that kind of tap interface you're saying
> >> only can be used for VM, that is why openvswitch
>
> On 18 Dec 2019, at 3:20 pm, Ilya Maximets wrote:
>
> On 18.12.2019 05:48, Anju Thomas wrote:
>> Currently OVS maintains explicit packet drop/error counters only on port
>> level. Packets that are dropped as part of normal OpenFlow processing
>> are counted in flow stats of “drop” flows or
When ofproto/trace detects a recirc action it resumes execution at the
specified next table. However, if the ct action performs SNAT/DNAT,
e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
ports in the oftrace_recirc_node->flow field are not updated. This leads
to misleading outp
On 18.12.2019 21:31, Yi-Hung Wei wrote:
> Currently, the AF_XDP socket (XSK) related memory are allocated by main
> thread in the main thread's NUMA domain. With the patch that detects
> netdev-linux's NUMA node id, the PMD thread of AF_XDP port will be run on
> the AF_XDP netdev's NUMA domain. I
On 23.12.2019 22:34, Eveline Raine wrote:
> When setting mac address for an interface using ovs-vsctl command:
>
> ovs-vsctl set interface mac=XX:XX:XX:XX:XX:XX
>
> iface_set_mac() is responsible to delegate a request to set MAC to a
> netdev-specific set_etheraddr().
>
> At the moment ifac
On 03.01.2020 00:54, William Tu wrote:
> On Mon, Dec 23, 2019 at 5:22 PM Yi Yang (杨燚)-云服务集团
> wrote:
>>
>> William, maybe you don't know that kind of tap interface you're saying only
>> can be used for VM, that is why openvswitch has to introduce internal type
>> for the case I'm saying.
There
On 02.01.2020 19:33, Ben Pfaff wrote:
> On Thu, Jan 02, 2020 at 01:08:40PM +0100, Ilya Maximets wrote:
>> Python 3.6 versions of these packages are no longer available in
>> FreeBSD ports.
>>
>> Signed-off-by: Ilya Maximets
>
> Acked-by: Ben Pfaff
Thanks! Applied to master and backported to 2.
28 matches
Mail list logo