···5656 0 - disabled5757 1 - enabled58585959+fwmark_reflect - BOOLEAN6060+ Controls the fwmark of kernel-generated IPv4 reply packets that are not6161+ associated with a socket for example, TCP RSTs or ICMP echo replies).6262+ If unset, these packets have a fwmark of zero. If set, they have the6363+ fwmark of the packet they are replying to.6464+ Default: 06565+5966route/max_size - INTEGER6067 Maximum number of routes allowed in the kernel. Increase6168 this when using large numbers of interfaces and/or routes.···1215120812161209proxy_ndp - BOOLEAN12171210 Do proxy ndp.12111211+12121212+fwmark_reflect - BOOLEAN12131213+ Controls the fwmark of kernel-generated IPv6 reply packets that are not12141214+ associated with a socket for example, TCP RSTs or ICMPv6 echo replies).12151215+ If unset, these packets have a fwmark of zero. If set, they have the12161216+ fwmark of the packet they are replying to.12171217+ Default: 01218121812191219conf/interface/*:12201220 Change special settings per interface.
···252252 xgene_enet_wr_mac(pdata, AXGMAC_CONFIG_1, data & ~HSTTFEN);253253}254254255255-static void xgene_enet_reset(struct xgene_enet_pdata *pdata)255255+static int xgene_enet_reset(struct xgene_enet_pdata *pdata)256256{257257+ if (!xgene_ring_mgr_init(pdata))258258+ return -ENODEV;259259+257260 clk_prepare_enable(pdata->clk);258261 clk_disable_unprepare(pdata->clk);259262 clk_prepare_enable(pdata->clk);260263261264 xgene_enet_ecc_init(pdata);262265 xgene_enet_config_ring_if_assoc(pdata);266266+267267+ return 0;263268}264269265270static void xgene_enet_xgcle_bypass(struct xgene_enet_pdata *pdata,
+11-2
drivers/net/ethernet/broadcom/bcmsysport.c
···11101110 /* We just need one DMA descriptor which is DMA-able, since writing to11111111 * the port will allocate a new descriptor in its internal linked-list11121112 */11131113- p = dma_zalloc_coherent(kdev, 1, &ring->desc_dma, GFP_KERNEL);11131113+ p = dma_zalloc_coherent(kdev, sizeof(struct dma_desc), &ring->desc_dma,11141114+ GFP_KERNEL);11141115 if (!p) {11151116 netif_err(priv, hw, priv->netdev, "DMA alloc failed\n");11161117 return -ENOMEM;···11751174 if (!(reg & TDMA_DISABLED))11761175 netdev_warn(priv->netdev, "TDMA not stopped!\n");1177117611771177+ /* ring->cbs is the last part in bcm_sysport_init_tx_ring which could11781178+ * fail, so by checking this pointer we know whether the TX ring was11791179+ * fully initialized or not.11801180+ */11811181+ if (!ring->cbs)11821182+ return;11831183+11781184 napi_disable(&ring->napi);11791185 netif_napi_del(&ring->napi);11801186···11911183 ring->cbs = NULL;1192118411931185 if (ring->desc_dma) {11941194- dma_free_coherent(kdev, 1, ring->desc_cpu, ring->desc_dma);11861186+ dma_free_coherent(kdev, sizeof(struct dma_desc),11871187+ ring->desc_cpu, ring->desc_dma);11951188 ring->desc_dma = 0;11961189 }11971190 ring->size = 0;
···629629 if (skb->ip_summed == CHECKSUM_PARTIAL) {630630 vnet_hdr->flags = VIRTIO_NET_HDR_F_NEEDS_CSUM;631631 vnet_hdr->csum_start = skb_checksum_start_offset(skb);632632+ if (vlan_tx_tag_present(skb))633633+ vnet_hdr->csum_start += VLAN_HLEN;632634 vnet_hdr->csum_offset = skb->csum_offset;633635 } else if (skb->ip_summed == CHECKSUM_UNNECESSARY) {634636 vnet_hdr->flags = VIRTIO_NET_HDR_F_DATA_VALID;
+17-11
drivers/net/tun.c
···12351235 struct tun_pi pi = { 0, skb->protocol };12361236 ssize_t total = 0;12371237 int vlan_offset = 0, copied;12381238+ int vlan_hlen = 0;12391239+ int vnet_hdr_sz = 0;12401240+12411241+ if (vlan_tx_tag_present(skb))12421242+ vlan_hlen = VLAN_HLEN;12431243+12441244+ if (tun->flags & TUN_VNET_HDR)12451245+ vnet_hdr_sz = tun->vnet_hdr_sz;1238124612391247 if (!(tun->flags & TUN_NO_PI)) {12401248 if ((len -= sizeof(pi)) < 0)12411249 return -EINVAL;1242125012431243- if (len < skb->len) {12511251+ if (len < skb->len + vlan_hlen + vnet_hdr_sz) {12441252 /* Packet will be striped */12451253 pi.flags |= TUN_PKT_STRIP;12461254 }···12581250 total += sizeof(pi);12591251 }1260125212611261- if (tun->flags & TUN_VNET_HDR) {12531253+ if (vnet_hdr_sz) {12621254 struct virtio_net_hdr gso = { 0 }; /* no info leak */12631263- if ((len -= tun->vnet_hdr_sz) < 0)12551255+ if ((len -= vnet_hdr_sz) < 0)12641256 return -EINVAL;1265125712661258 if (skb_is_gso(skb)) {···1292128412931285 if (skb->ip_summed == CHECKSUM_PARTIAL) {12941286 gso.flags = VIRTIO_NET_HDR_F_NEEDS_CSUM;12951295- gso.csum_start = skb_checksum_start_offset(skb);12871287+ gso.csum_start = skb_checksum_start_offset(skb) +12881288+ vlan_hlen;12961289 gso.csum_offset = skb->csum_offset;12971290 } else if (skb->ip_summed == CHECKSUM_UNNECESSARY) {12981291 gso.flags = VIRTIO_NET_HDR_F_DATA_VALID;···13021293 if (unlikely(memcpy_toiovecend(iv, (void *)&gso, total,13031294 sizeof(gso))))13041295 return -EFAULT;13051305- total += tun->vnet_hdr_sz;12961296+ total += vnet_hdr_sz;13061297 }1307129813081299 copied = total;13091309- total += skb->len;13101310- if (!vlan_tx_tag_present(skb)) {13111311- len = min_t(int, skb->len, len);13121312- } else {13001300+ len = min_t(int, skb->len + vlan_hlen, len);13011301+ total += skb->len + vlan_hlen;13021302+ if (vlan_hlen) {13131303 int copy, ret;13141304 struct {13151305 __be16 h_vlan_proto;···13191311 veth.h_vlan_TCI = htons(vlan_tx_tag_get(skb));1320131213211313 vlan_offset = offsetof(struct vlan_ethhdr, h_vlan_proto);13221322- len = min_t(int, skb->len + VLAN_HLEN, len);13231323- total += VLAN_HLEN;1324131413251315 copy = min_t(int, vlan_offset, len);13261316 ret = skb_copy_datagram_const_iovec(skb, 0, iv, copied, copy);
+1-1
include/linux/socket.h
···256256#define MSG_EOF MSG_FIN257257258258#define MSG_FASTOPEN 0x20000000 /* Send data in TCP SYN */259259-#define MSG_CMSG_CLOEXEC 0x40000000 /* Set close_on_exit for file259259+#define MSG_CMSG_CLOEXEC 0x40000000 /* Set close_on_exec for file260260 descriptor received through261261 SCM_RIGHTS */262262#if defined(CONFIG_COMPAT)
-1
include/net/9p/transport.h
···3434 * @list: used to maintain a list of currently available transports3535 * @name: the human-readable name of the transport3636 * @maxsize: transport provided maximum packet size3737- * @pref: Preferences of this transport3837 * @def: set if this transport should be considered the default3938 * @create: member function to create a new connection on this transport4039 * @close: member function to discard a connection on this transport
···553553 /* We could not connect to a designated PHY, so use the switch internal554554 * MDIO bus instead555555 */556556- if (!p->phy)556556+ if (!p->phy) {557557 p->phy = ds->slave_mii_bus->phy_map[p->port];558558- else558558+ phy_connect_direct(slave_dev, p->phy, dsa_slave_adjust_link,559559+ p->phy_interface);560560+ } else {559561 pr_info("attached PHY at address %d [%s]\n",560562 p->phy->addr, p->phy->drv->name);563563+ }561564}562565563566int dsa_slave_suspend(struct net_device *slave_dev)
···2316231623172317/* Undo procedures. */2318231823192319+/* We can clear retrans_stamp when there are no retransmissions in the23202320+ * window. It would seem that it is trivially available for us in23212321+ * tp->retrans_out, however, that kind of assumptions doesn't consider23222322+ * what will happen if errors occur when sending retransmission for the23232323+ * second time. ...It could the that such segment has only23242324+ * TCPCB_EVER_RETRANS set at the present time. It seems that checking23252325+ * the head skb is enough except for some reneging corner cases that23262326+ * are not worth the effort.23272327+ *23282328+ * Main reason for all this complexity is the fact that connection dying23292329+ * time now depends on the validity of the retrans_stamp, in particular,23302330+ * that successive retransmissions of a segment must not advance23312331+ * retrans_stamp under any conditions.23322332+ */23332333+static bool tcp_any_retrans_done(const struct sock *sk)23342334+{23352335+ const struct tcp_sock *tp = tcp_sk(sk);23362336+ struct sk_buff *skb;23372337+23382338+ if (tp->retrans_out)23392339+ return true;23402340+23412341+ skb = tcp_write_queue_head(sk);23422342+ if (unlikely(skb && TCP_SKB_CB(skb)->sacked & TCPCB_EVER_RETRANS))23432343+ return true;23442344+23452345+ return false;23462346+}23472347+23192348#if FASTRETRANS_DEBUG > 123202349static void DBGUNDO(struct sock *sk, const char *msg)23212350{···24402411 * is ACKed. For Reno it is MUST to prevent false24412412 * fast retransmits (RFC2582). SACK TCP is safe. */24422413 tcp_moderate_cwnd(tp);24142414+ if (!tcp_any_retrans_done(sk))24152415+ tp->retrans_stamp = 0;24432416 return true;24442417 }24452418 tcp_set_ca_state(sk, TCP_CA_Open);···24592428 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPDSACKUNDO);24602429 return true;24612430 }24622462- return false;24632463-}24642464-24652465-/* We can clear retrans_stamp when there are no retransmissions in the24662466- * window. It would seem that it is trivially available for us in24672467- * tp->retrans_out, however, that kind of assumptions doesn't consider24682468- * what will happen if errors occur when sending retransmission for the24692469- * second time. ...It could the that such segment has only24702470- * TCPCB_EVER_RETRANS set at the present time. It seems that checking24712471- * the head skb is enough except for some reneging corner cases that24722472- * are not worth the effort.24732473- *24742474- * Main reason for all this complexity is the fact that connection dying24752475- * time now depends on the validity of the retrans_stamp, in particular,24762476- * that successive retransmissions of a segment must not advance24772477- * retrans_stamp under any conditions.24782478- */24792479-static bool tcp_any_retrans_done(const struct sock *sk)24802480-{24812481- const struct tcp_sock *tp = tcp_sk(sk);24822482- struct sk_buff *skb;24832483-24842484- if (tp->retrans_out)24852485- return true;24862486-24872487- skb = tcp_write_queue_head(sk);24882488- if (unlikely(skb && TCP_SKB_CB(skb)->sacked & TCPCB_EVER_RETRANS))24892489- return true;24902490-24912431 return false;24922432}24932433