[PATCH] veth: Cleanly handle a missing peer_tb argument on creation.

2007-09-12 Thread Eric W. Biederman
reproduce the failures. Given that some of the most interesting netlink attributes to specify like a mac address or a network device name seem are generally the wrong thing to do this seems like the right approach. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/veth.c | 16

Re: [PATCH 1/4] [IPROUTE2] Revert Make ip utility veth driver aware

2007-09-12 Thread Eric W. Biederman
[EMAIL PROTECTED] (Eric W. Biederman) writes: Pavel Emelyanov [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Stephen it looks like you weren't cc'd on the latest version of the veth support. So this patchset first reverts the old He was. The latest version looks completely different

Re: [PATCH] [IPROUTE2] Add support for moving links between network namespaces

2007-09-12 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: On Wed, 12 Sep 2007 07:05:42 -0600 [EMAIL PROTECTED] (Eric W. Biederman) wrote: This adds support for setting the IFLA_NET_NS_PID attribute on links allowing them to be moved between network namespaces. Signed-off-by: Eric W. Biederman [EMAIL

Re: [PATCH] veth: Cleanly handle a missing peer_tb argument on creation.

2007-09-12 Thread Eric W. Biederman
Pavel Emelyanov [EMAIL PROTECTED] writes: +} -tbp = peer_tb; -} else -tbp = tb; The intention of this part was to get the same parameters for peer as for the first device if no peer argument was specified for ip utility. Does it still work? I know it is

Re: [PATCH 4/4] [IPROUTE2] iproute2: link_veth support bug fixes.

2007-09-12 Thread Eric W. Biederman
Pavel Emelyanov [EMAIL PROTECTED] writes: [snip] @@ -25,6 +26,3 @@ clean: LDLIBS += -ldl LDFLAGS += -Wl,-export-dynamic - -%.so: %.c -$(CC) $(CFLAGS) -shared $ -o $@ %) How do we get the .so file then? The code was built into iproute2, so we don't need the .so file.

Re: [PATCH] veth: Cleanly handle a missing peer_tb argument on creation.

2007-09-12 Thread Eric W. Biederman
Pavel Emelyanov [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Pavel Emelyanov [EMAIL PROTECTED] writes: + } - tbp = peer_tb; - } else - tbp = tb; The intention of this part was to get the same parameters for peer as for the first device if no peer argument

[PATCH] net: Fix race when opening a proc file while a network namespace is exiting.

2007-09-12 Thread Eric W. Biederman
. In that case I return -ENXIO because effectively the network namespace has already gone away so the files we are trying to access don't exist anymore. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- fs/proc/proc_net.c |6 ++ include/linux/proc_fs.h |5 + include/net

[PATCH] net: Fix the prototype of call_netdevice_notifiers

2007-09-13 Thread Eric W. Biederman
This replaces the void * parameter with a struct net_device * which is what is actually required. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/netdevice.h |2 +- net/core/dev.c|4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git

Network Namespace status

2007-09-13 Thread Eric W. Biederman
Now that the network namespace work is partly merged I figure a short status summary of where everything is at is in order. David Miller has merged the core of the network namespace work and that probably needs to sit just a little while to make certain we don't have unexpected breakage. Before

Re: Network Namespace status

2007-09-14 Thread Eric W. Biederman
Oliver Hartkopp [EMAIL PROTECTED] writes: can you send me your current AF_PACKET patch? I just want to update our recent post of the CAN (controller area network) subsystem (AF_CAN) which is (in some parts) similar to AF_PACKET. So i can take a look on it to provide the latest technique in

Re: [PATCH][NETNS] Use list_for_each_entry_continue_reverse in setup_net

2007-09-14 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: On Fri, 14 Sep 2007 11:39:32 +0400 Pavel Emelyanov [EMAIL PROTECTED] wrote: I proposed introducing a list_for_each_entry_continue_reverse macro to be used in setup_net() when unrolling the failed -init callback. Here is the macro and some more

Re: wireless vs. network namespaces

2007-09-14 Thread Eric W. Biederman
Johannes Berg [EMAIL PROTECTED] writes: Now that the network namespace work is in net-2.6.24, I'm wondering how wireless will be handling this. Is there any benefit at all to a wireless device supporting network namespaces? Good question. Network namespaces are designed as a general tool so

Re: [PATCH][NETNS] Use list_for_each_entry_continue_reverse in setup_net

2007-09-14 Thread Eric W. Biederman
, but the code looks nicer. Signed-off-by: Pavel Emelyanov [EMAIL PROTECTED] Acked-by: Eric W. Biederman [EMAIL PROTECTED] Eric - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo

Re: [PATCH][NETNS] Use list_for_each_entry_continue_reverse in setup_net

2007-09-14 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: Could we just make it so dev-init is not allowed to fail? Then it can be a void function and the nasty unwind code can go? Unfortunately we need to allocate memory, and perform other operations that can fail. That's the nature of the problem. So I

Re: Network Namespace status

2007-09-16 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Thu, 13 Esp 2007 13:12:08 -0600 The final blocker to having multiple useful instances of network namespaces is the loopback device. We recognize the network namespace of incoming packets by looking

Re: [PATCH][NETNS] Use list_for_each_entry_continue_reverse in setup_net

2007-09-16 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Stephen Hemminger [EMAIL PROTECTED] Date: Fri, 14 Sep 2007 22:07:14 +0200 Could we just make it so dev-init is not allowed to fail? Then it can be a void function and the nasty unwind code can go? Someone (not me :-) need to do an audit to find

Re: [PATCH][NETNS] Use list_for_each_entry_continue_reverse in setup_net

2007-09-17 Thread Eric W. Biederman
, but the code looks nicer. Signed-off-by: Pavel Emelyanov [EMAIL PROTECTED] Acked-by: Eric W. Biederman [EMAIL PROTECTED] Pavel if you are going down this route. Could you look at cleanup_net as well. The reverse walk there could probably benefit from being list_for_each_entry_reverse. Eric

Re: [net-2.6.24][patch 2/2] Dynamically allocate the loopback device

2007-09-17 Thread Eric W. Biederman
he will use this for the namespace stuff. Acked-by: Eric W. Biederman [EMAIL PROTECTED] Not that it doesn't already have my signed off by. I have an earlier version of this patch sitting in my tree, along with some additional patches to make this per namespace. I don't really care which version

Re: [net-2.6.24][patch 2/2] Dynamically allocate the loopback device

2007-09-26 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: I've put these patches into the just-rebased net-2.6.24 tree. I made a minor modification to the second patch, the out_free_netdev: code in loopback_init() ended like this: out_free_netdev: free_netdev(dev); goto out; return err;

[PATCH] net: Fix running without sysfs

2007-09-26 Thread Eric W. Biederman
special cases from net/core/dev.c renames functions from netdev_sysfs_ to netdev_kobject_ and always compiles in net-sysfs.c net-sysfs.c is modified with a CONFIG_SYSFS guard around the parts that are actually sysfs specific. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core

[PATCH] net: Add network namespace clone unshare support.

2007-09-26 Thread Eric W. Biederman
namespace support into code paths that exist when the CONFIG_NET is not selected there are a few additions made to net_namespace.h to allow a few more functions to be used when the networking stack is not compiled in. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/sched.h

[PATCH 1/4] net: Dynamically allocate the per cpu counters for the loopback device.

2007-09-26 Thread Eric W. Biederman
network namespace instances. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/loopback.c | 32 1 files changed, 28 insertions(+), 4 deletions(-) diff --git a/drivers/net/loopback.c b/drivers/net/loopback.c index 4b6f7b2..f3018bb 100644

[PATCH 2/4] net ipv4: Remove unnecessary test for the loopback device from inetdev_destroy

2007-09-26 Thread Eric W. Biederman
and calling inetdev_destroy works fine so there appears to be no reason for avoiding unregistering the loopback device. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipv4/devinet.c |2 -- 1 files changed, 0 insertions(+), 2 deletions(-) diff --git a/net/ipv4/devinet.c b/net/ipv4

[PATCH 3/4] net ipv4: When possible test for IFF_LOOPBACK and not dev == loopback_dev

2007-09-26 Thread Eric W. Biederman
Now that multiple loopback devices are becoming possible it makes the code a little cleaner and more maintainable to test if a deivice is th a loopback device by testing dev-flags IFF_LOOPBACK instead of dev == loopback_dev. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipv4

[PATCH 4/4] net: Make the loopback device per network namespace

2007-09-26 Thread Eric W. Biederman
it as init_net.loopback_dev, keeping all of the code compiling and working. A later pass will be needed to update the users to use something other than the initial network namespace. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/loopback.c | 26 +- include/linux

[PATCH] netns: Simplify the network namespace list locking rules.

2007-09-26 Thread Eric W. Biederman
it and looking at the alternatives carefully it looks like the simplest and most maintainable solution is to remove net_list_mutex altogether, and to use the rtnl_mutex instead. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/net/net_namespace.h |3 --- net/core/net_namespace.c

Re: [PATCH 1/4] net: Dynamically allocate the per cpu counters for the loopback device.

2007-09-27 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Wed, 26 Sep 2007 17:53:40 -0600 This patch add support for dynamically allocating the statistics counters for the loopback device and adds appropriate device methods for allocating and freeing

Re: [PATCH 5/7] CAN: Add virtual CAN netdevice driver

2007-09-27 Thread Eric W. Biederman
Urs Thuermann [EMAIL PROTECTED] writes: This patch adds the virtual CAN bus (vcan) network driver. The vcan device is just a loopback device for CAN frames, no real CAN hardware is involved. I'm trying to wrap my head around the CAN use of IFF_LOOPBACK. 6.2 loopback As described in

Re: [PATCH 3/4] net ipv4: When possible test for IFF_LOOPBACK and not dev == loopback_dev

2007-09-27 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Now that multiple loopback devices are becoming possible it makes the code a little cleaner and more maintainable to test if a deivice is th a loopback device by testing dev-flags IFF_LOOPBACK instead of dev == loopback_dev

Re: [PATCH 5/7] CAN: Add virtual CAN netdevice driver

2007-09-27 Thread Eric W. Biederman
I guess in particular IFF_LOOPBACK means that all packets from a device will come right back to the current machine, and go nowhere else. That usage sounds completely different then the CAN usage which appears to mean. Broadcast packets will be returned to this machine as well as being sent out

Re: [PATCH] various dst_ifdown routines to catch refcounting bugs

2007-09-27 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Moving dst entries into init_net.loopback_dev is not a good thing. This hides obvious and non-obvious ref-counting bugs. Acked-by: Eric W. Biederman [EMAIL PROTECTED] To be clear using init_net.loopback is currently safe because we don't have any

Re: [Devel] [PATCH 4/4] net: Make the loopback device per network namespace

2007-09-27 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Eric W. Biederman wrote: This patch makes loopback_dev per network namespace. Adding code to create a different loopback device for each network namespace and adding the code to free a loopback device when a network namespace exits. This patch

Re: [PATCH] net: Add network namespace clone unshare support.

2007-09-27 Thread Eric W. Biederman
Cedric Le Goater [EMAIL PROTECTED] writes: diff --git a/include/linux/sched.h b/include/linux/sched.h index a01ac6d..e10a0a8 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -27,6 +27,7 @@ #define CLONE_NEWUTS0x0400 /* New utsname group? */

Re: [PATCH 1/4] net: Dynamically allocate the per cpu counters for the loopback device.

2007-09-27 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Thu, 27 Sep 2007 01:48:00 -0600 I'm not doing get_cpu/put_cpu so does the comment make sense in relationship to per_cpu_ptr? It is possible. But someone would need to go check for sure. Verified

[PATCH] netns: CLONE_NEWNET don't use the same clone flag as the pid namespace.

2007-09-27 Thread Eric W. Biederman
Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/sched.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/include/linux/sched.h b/include/linux/sched.h index e10a0a8..d82c1f7 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -27,7

[PATCH] Bring comments in loopback.c uptodate.

2007-09-27 Thread Eric W. Biederman
A hint as to why it is safe to use per cpu variables, and note that we actually can have multiple instances of the loopback device now. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/loopback.c |4 +++- 1 files changed, 3 insertions(+), 1 deletions(-) diff --git

Re: [PATCH] net: Add network namespace clone unshare support.

2007-09-27 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: Eric, pick an appropriate new non-conflicting number NOW. Done. My apologies for the confusion. I thought the way Cedric and the IBM guys were testing someone would have shouted at me long before now. This adds unnecessary extra work for Andrew Morton,

Re: [PATCH] net: Add network namespace clone unshare support.

2007-09-27 Thread Eric W. Biederman
Andrew Morton [EMAIL PROTECTED] writes: On Thu, 27 Sep 2007 17:10:53 -0700 (PDT) David Miller [EMAIL PROTECTED] wrote: I will gladly do what I can, to help. Working against 3 trees development at the moment is a bit of a development challenge. Andrew has to work against 30 or so I

Re: /proc/net/ bad hard links count [Was: 2.6.23-rc8-mm2]

2007-09-28 Thread Eric W. Biederman
Jiri Slaby [EMAIL PROTECTED] writes: On 09/27/2007 11:22 AM, Andrew Morton wrote: ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.23-rc8/2.6.23-rc8-mm2/ Yep. # find /proc /dev/null find: WARNING: Hard link count is wrong for /proc/net: this may be a bug in your

Re: [PATCH 5/7] CAN: Add virtual CAN netdevice driver

2007-09-28 Thread Eric W. Biederman
Oliver Hartkopp [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Currently IFF_LOOPBACK set in dev-flags means we are dealing with drivers/net/loopback.c. This is a very general view, don't you think? The one is an interface flag and the other one is an interface itself. This looks

[PATCH] rtnl: Simplify ASSERT_RTNL

2007-09-28 Thread Eric W. Biederman
ASSERT_RTNL to use that. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/rtnetlink.h |4 ++-- net/core/rtnetlink.c |5 + 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/include/linux/rtnetlink.h b/include/linux/rtnetlink.h index dff3192..9c21e45

[PATCH 1/5] net: Modify all rtnetlink methods to only work in the initial namespace

2007-09-28 Thread Eric W. Biederman
be disabled. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/bridge/br_netlink.c |9 + net/core/fib_rules.c| 11 +++ net/core/neighbour.c| 18 ++ net/core/rtnetlink.c| 19 +++ net/decnet/dn_dev.c | 12 net

[PATCH 2/5] net: Make rtnetlink infrastructure network namespace aware

2007-09-28 Thread Eric W. Biederman
After this patch none of the netlink callback support anything except the initial network namespace but the rtnetlink infrastructure now handles multiple network namespaces. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/rtnetlink.h |8 ++-- include/net

[PATCH 3/5] net: Make the netlink methods in rtnetlink handle multiple network namespaces

2007-09-28 Thread Eric W. Biederman
about are invisible. If applications start getting confused or when ifindex numbers become local to the network namespace we may need to do something different in the future. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core/rtnetlink.c | 27 +++ 1 files

[PATCH 4/5] net: Make AF_PACKET handle multiple network namespaces

2007-09-28 Thread Eric W. Biederman
This is done by making packet_sklist_lock and packet_sklist per network namespace and adding an additional filter condition on received packets to ensure they came from the proper network namespace. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/net/net_namespace.h |4 + net

Re: [PATCH 2/5] net: Make rtnetlink infrastructure network namespace aware

2007-09-29 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: I'm wondering why this receive queue processing on unlock is still necessary today, we don't do trylock in rtnetlink_rcv anymore, so all senders will simply wait until the lock is released and then process the queue. Good question, I should probably

Re: [PATCH 5/5] net: Make AF_UNIX per network namespace safe.

2007-09-29 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Because of the global nature of garbage collection, and because of the cost of per namespace hash tables unix_socket_table has been kept global. With a filter added on lookups so we don't see sockets from the wrong namespace

Re: [PATCH] rtnl: Simplify ASSERT_RTNL

2007-09-29 Thread Eric W. Biederman
Herbert Xu [EMAIL PROTECTED] writes: Eric W. Biederman [EMAIL PROTECTED] wrote: Currently we have the call path: macvlan_open - dev_unicast_add - __dev_set_rx_mode - __dev_set_promiscuity - ASSERT_RTNL - mutex_trylock When mutex debugging is on taking a mutex complains if we

Re: [PATCH 2/5] net: Make rtnetlink infrastructure network namespace aware

2007-09-29 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Maybe I can save you some time: we used to do down_trylock() for the rtnl mutex, so senders would simply return if someone else was already processing the queue *or* the rtnl was locked for some other reason. In the first case the process already

Re: [Devel] Re: [PATCH 2/5] net: Make rtnetlink infrastructure network namespace aware

2007-10-01 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: The presence of the message in the queue during rtnl_unlock is quite possible as normal user-kernel message processing path for rtnl is the following: netlink_sendmsg netlink_unicast netlink_sendskb skb_queue_tail

Re: [PATCH] memory leak in netlink user-kernel processing

2007-10-01 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Denis V. Lunev wrote: By the way, Patrick, this looks like nlk-pid == 0 if and only if this is a kernel socket. Right? Thats correct. I have told with Alexey Kuznetsov and we have discrovered a way to get rid of

Re: e1000e oops, sysfs related?

2007-10-05 Thread Eric W. Biederman
Kok, Auke [EMAIL PROTECTED] writes: maximilian attems wrote: Linux tau 2.6.23-rc8-mm2-686 #1 SMP Wed Oct 3 23:56:32 CEST 2007 i686 GNU/Linux eth0 renamed to eth1 sysfs: duplicate filename 'eth1' can not be created WARNING: at fs/sysfs/dir.c:433 sysfs_add_one() [c0104f9c]

Re: MSI interrupts and disable_irq

2007-10-05 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: On Fri, 28 Sep 2007 22:47:16 -0400 Jeff Garzik [EMAIL PROTECTED] wrote: Ayaz Abdulla wrote: I am trying to track down a forcedeth driver issue described by bug 9047 in bugzilla (2.6.23-rc7-git1 forcedeth w/ MCP55 oops under heavy load). I

Re: [NET] IPv6 oops bisected

2007-10-08 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: David Miller wrote: From: Denis V. Lunev [EMAIL PROTECTED] Date: Mon, 08 Oct 2007 10:34:23 +0400 OK. I am installing Fedora 7 right now... You don't need to install Fedora, just read the code! :-) The bug is obvious and it's been explained

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-09 Thread Eric W. Biederman
Pavel Emelyanov [EMAIL PROTECTED] writes: Currently indexes for netdevices come sequentially one by one, and the same stays true even for devices that are created for namespaces. Side effects of this are: * lo device has not 1 index in a namespace. This may break some userspace that

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-09 Thread Eric W. Biederman
David Stevens [EMAIL PROTECTED] writes: Sorry if this is a dumb question, but what is the model you intend for SNMP? Do you want each namespace to be its own virtual machine with its own, separate MIB? Each network namespace appears to user space as a completely separate network stack. So

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-09 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Tue, 09 Oct 2007 11:43:58 -0600 David Stevens [EMAIL PROTECTED] writes: Sorry if this is a dumb question, but what is the model you intend for SNMP? Do you want each namespace to be its own virtual

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-10 Thread Eric W. Biederman
Pavel Emelyanov [EMAIL PROTECTED] writes: I know there are several data structures internal to the kernel that are indexed by ifindex, and not struct net_device *. There is the iflink field in struct net_device. We need a way to refer to network devices in other namespaces in rtnetlink in

Re: [Devel] [PATCH 1/5] net: Modify all rtnetlink methods to only work in the initial namespace

2007-10-10 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Before I can enable rtnetlink to work in all network namespaces I need to be certain that something won't break. So this patch deliberately disables all of the rtnletlink methods in everything except the initial network

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-10 Thread Eric W. Biederman
Johannes Berg [EMAIL PROTECTED] writes: On Tue, 2007-10-09 at 11:41 -0600, Eric W. Biederman wrote: So please hold off on this until the kernel has been audited and we have removed all of the uses of ifindex that assume ifindex is global, that we can find. I certainly have this assumption

Re: [PATCH] rtnl: Simplify ASSERT_RTNL

2007-10-11 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Fri, 28 Sep 2007 18:59:08 -0600 Currently we have the call path: macvlan_open - dev_unicast_add - __dev_set_rx_mode - __dev_set_promiscuity - ASSERT_RTNL - mutex_trylock When mutex debugging

Re: [PATCH] rtnl: Simplify ASSERT_RTNL

2007-10-11 Thread Eric W. Biederman
Herbert Xu [EMAIL PROTECTED] writes: On Thu, Oct 11, 2007 at 12:57:31AM -0600, Eric W. Biederman wrote: There was a practical suggestion by Herbert that ASSERT_RTNL have a might_sleep() added. That suggestion will currently result in ASSERT_RTNL firing unnecessarily from the macvlan_open

Re: [PATCH] rtnl: Simplify ASSERT_RTNL

2007-10-11 Thread Eric W. Biederman
Herbert Xu [EMAIL PROTECTED] writes: Well thanks to that warning we're on our way of improving the code that triggered it in such a way that this warning will soon go silent. That's precisely the reason why I object to having this warning removed. Now you have a good point that this

Re: [PATCH][NETNS] Make ifindex generation per-namespace

2007-10-11 Thread Eric W. Biederman
Johannes Berg [EMAIL PROTECTED] writes: On Wed, 2007-10-10 at 13:51 -0600, Eric W. Biederman wrote: Yes. Netlink sockets are per-namespace and you can use the namespace of a netlink socket to look up a netdev. Ok, thanks. I still haven't really looked into the wireless vs. net namespaces

Re: [PATCH] rtnl: Simplify ASSERT_RTNL

2007-10-11 Thread Eric W. Biederman
David, all. My apologies. I'm tired and I don't have the energy to grok yet another part of the kernel right now. So I can not productively participate in this discussion. I do agree that the locking below dev_unicast_add() that was exposed by the macvlan driver is unmaintainable even if it is

Re: Don't leak 'listeners' in netlink_kernel_create()

2007-10-14 Thread Eric W. Biederman
) check is false. This patch avoids the leak. Signed-off-by: Jesper Juhl [EMAIL PROTECTED] This patch appears trivially correct to me. Acked-by: Eric W. Biederman [EMAIL PROTECTED] --- af_netlink.c |2 ++ 1 file changed, 2 insertions(+) --- linux-2.6/net/netlink/af_netlink.c~ 2007

Re: appletalk bugs

2007-10-22 Thread Eric W. Biederman
to check up on sysctl values. This should fix it. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- diff --git a/kernel/sysctl_check.c b/kernel/sysctl_check.c index 3c9ef5a..ed6fe51 100644 --- a/kernel/sysctl_check.c +++ b/kernel/sysctl_check.c @@ -731,7 +731,7 @@ static struct trans_ctl_table

Re: [NETNS] Oops in register_pernet_operations() with CONFIG_NET_NS=n

2007-10-25 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: The patch attached should help. The idea is simple. The init should be called only once without NETNS. Period. No need for any lists. I'll resend it to Dave after the ACK. First in the case of the code that is currently merged none of the __net_init

Re: [NETNS] Oops in register_pernet_operations() with CONFIG_NET_NS=n

2007-10-25 Thread Eric W. Biederman
Benjamin Thery [EMAIL PROTECTED] writes: Denis V. Lunev wrote: The patch attached should help. The idea is simple. The init should be called only once without NETNS. Period. No need for any lists. This is the kind of idea I had but I didn't think it could be that simple. :) Thanks Denis.

Re: on the topic of alternate MAC addresses

2007-10-25 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Jeff Garzik [EMAIL PROTECTED] Date: Tue, 23 Oct 2007 22:25:05 -0400 h. Using ethtool isn't a big deal, but IMO you probably want more than just an exported list for the usage you described... it sounds like some sort of reservation system

Re: [NETNS] Oops in register_pernet_operations() with CONFIG_NET_NS=n

2007-10-25 Thread Eric W. Biederman
Benjamin Thery [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Benjamin Thery [EMAIL PROTECTED] writes: Denis V. Lunev wrote: The patch attached should help. The idea is simple. The init should be called only once without NETNS. Period. No need for any lists. This is the kind of idea I

Re: [NETNS] Oops in register_pernet_operations() with CONFIG_NET_NS=n

2007-10-25 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Benjamin Thery [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Benjamin Thery [EMAIL PROTECTED] writes: Denis V. Lunev wrote: The patch attached should help. The idea is simple. The init should be called only once

Re: on the topic of alternate MAC addresses

2007-10-25 Thread Eric W. Biederman
Rick Jones [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Duplicate mac addresses across interfaces on the same machine should generally be a don't care. Although there may some cases we don't mind. What might the switches think of that? Outside of the context of a link-aggregate I

Re: [2.6 patch] always export sysctl_{r,w}mem_max

2007-10-26 Thread Eric W. Biederman
#ifdef sounds good to me. Acked-by: Eric W. Biederman [EMAIL PROTECTED] -- snip -- Signed-off-by: Adrian Bunk [EMAIL PROTECTED] --- 22ea6cd56e4fa844b0b1bbab2542f09eb6c9a5ab diff --git a/net/core/sock.c b/net/core/sock.c index febbcbc..ee1cc4f 100644 --- a/net/core/sock.c +++ b/net/core

Re: [NETNS] Oops in register_pernet_operations() with CONFIG_NET_NS=n

2007-10-26 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: Thanks for doing this. But this appears to be still discussed, so I'll give Denis and others another day to work out the fix they want to include. At this point I think all that really needs to happen is to remove __net_initdata. The function

[PATCH] net: Marking struct pernet_operations __net_initdata was inappropriate

2007-10-26 Thread Eric W. Biederman
. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/loopback.c |2 +- fs/proc/proc_net.c |2 +- include/net/net_namespace.h |2 -- net/core/dev.c |6 +++--- net/core/dev_mcast.c|2 +- net/netlink/af_netlink.c|2 +- 6

[PATCH] netns: Fix get_net_ns_by_pid

2007-10-26 Thread Eric W. Biederman
race I introduced with accessing current is actually removed. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core/rtnetlink.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index 4a2640d..e1ba26f 100644 --- a/net

Re: [2.6 patch] always export sysctl_{r,w}mem_max

2007-10-26 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Rick Jones [EMAIL PROTECTED] Date: Fri, 26 Oct 2007 16:31:47 -0700 Eric W. Biederman wrote: Adrian Bunk [EMAIL PROTECTED] writes: This patch fixes the following build error with CONFIG_SYSCTL=n: -- snip -- ... ERROR

Re: [PATCH] net: Marking struct pernet_operations __net_initdata was inappropriate

2007-10-27 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: Applied, thanks Eric. Although juding by his comments I though that Denis had different plans in mind to fix this. He might. Somehow I wasn't on that thread so I missed it until after I sent this patch. Reading through that thread again it looks like

Re: [patch 1/1][NETNS] resend: fix net released by rcu callback

2007-10-30 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: When a network namespace reference is held by a network subsystem, and when this reference is decremented in a rcu update callback, we must ensure that there is no more outstanding rcu update before trying to free the network namespace. In the

Re: [patch 1/1][IPV6] resend: remove duplicate call to proc_net_remove

2007-10-30 Thread Eric W. Biederman
-by: Eric W. Biederman [EMAIL PROTECTED] Looks like a good clean up to me. --- net/ipv6/addrconf.c |4 1 file changed, 4 deletions(-) Index: net-2.6/net/ipv6/addrconf.c === --- net-2.6.orig/net/ipv6/addrconf.c

Re: [patch 1/1][NETNS] resend: fix net released by rcu callback

2007-10-30 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Yes, I had this problem when doing ipv6 isolation for netns49. The ipv6 subsystem creation failed and the different subsystem where rollbacked in the setup_net function. When the network namespace was about to be freed in free_net function, I had the

Re: dev_ifname32() fails on 32-64bit calls in copy_in_user().

2007-10-31 Thread Eric W. Biederman
Benjamin Herrenschmidt [EMAIL PROTECTED] writes: Bug is in the new dev_ifname32: uifr = compat_alloc_user_space(sizeof(struct ifreq)); if (copy_in_user(uifr, compat_ptr(arg), sizeof(struct ifreq32))); return -EFAULT; There's a stray ; after the if statement, that

Re: [PATCH 0/5] Make nicer CONFIG_NET_NS=n case code

2007-10-31 Thread Eric W. Biederman
Eric Dumazet [EMAIL PROTECTED] writes: Definitly wanted here. Thank you. One more refcounting on each socket creation/deletion was expensive. Really? Have you actually measured that? If the overhead is measurable and expensive we may want to look at per cpu counters or something like that.

Re: [PATCH 0/5] Make nicer CONFIG_NET_NS=n case code

2007-10-31 Thread Eric W. Biederman
Eric Dumazet [EMAIL PROTECTED] writes: Eric W. Biederman a écrit : Eric Dumazet [EMAIL PROTECTED] writes: Definitly wanted here. Thank you. One more refcounting on each socket creation/deletion was expensive. Really? Have you actually measured that? If the overhead is measurable

Re: [PATCH 0/5] Make nicer CONFIG_NET_NS=n case code

2007-10-31 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Eric Dumazet [EMAIL PROTECTED] Date: Wed, 31 Oct 2007 23:40:59 +0100 Eric W. Biederman a écrit : Eric Dumazet [EMAIL PROTECTED] writes: Definitly wanted here. Thank you. One more refcounting on each socket creation/deletion

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: The loopback is now dynamically allocated. The ipv6 code was written considering the loopback is allocated before the ipv6 protocol initialization. This is still the case when we don't use multiple network namespaces. You do know that

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: Index: linux-2.6-netns/net/ipv6/addrconf.c === --- linux-2.6-netns.orig/net/ipv6/addrconf.c +++ linux-2.6-netns/net/ipv6/addrconf.c @@ -2272,7 +2272,8 @@ static int addrconf_notify(struct

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: why should we care on down? we are destroying the device. It should gone. All references to it should also gone. So, we should perform the cleaning and remove all IPv6 addresses, so notifier should also work. We need to take care of netdev down,

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-12 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Denis V. Lunev [EMAIL PROTECTED] writes: Index: linux-2.6-netns/net/ipv6/addrconf.c === --- linux-2.6-netns.orig/net/ipv6/addrconf.c +++ linux-2.6-netns/net

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-13 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: Well this is a weird way to get to this part of the conversation. From: Denis V. Lunev [EMAIL PROTECTED] Date: Mon, 12 Nov 2007 19:49:03 +0300 Unregister for a loopback in !init_net is a _valid_ operation and should be clean, i.e. without kludges in

Re: [patch 1/1][NETNS][IPV6] protect addrconf from loopback registration

2007-11-13 Thread Eric W. Biederman
YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED] writes: In article [EMAIL PROTECTED] (at Mon, 12 Nov 2007 12:50:53 -0700), [EMAIL PROTECTED] (Eric W. Biederman) says: My opinion is that both your analysis is slightly off (as to the cause of your problems) and that your approach to fix your

Re: [PATCH] IPVS: Fix sysctl warnings about missing strategy

2007-11-14 Thread Eric W. Biederman
Simon Horman [EMAIL PROTECTED] writes: Hi Christian, Hi Dave, I have indeed been looking into this of late. Assuming that you use of CTL_UNNUMBERED is correct, this patch looks fine to me. Acked. I was planning to do the same and also switch over all the other entries over to use

Re: [PATCH] Fix warning for token-ring from sysctl checker

2007-11-14 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Olof Johansson [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 01:23:13 -0600 As seen when booting ppc64_defconfig: sysctl table check failed: /net/token-ring .3.14 procname does not match binary path procname Signed-off-by: Olof Johansson [EMAIL

Re: [patch 0/3] IPVS: Use CTL_UNNUMBERED

2007-11-14 Thread Eric W. Biederman
Simon Horman [EMAIL PROTECTED] writes: Hi, this series of three patches, the first of which is by Christian Borntraeger, switches IPVS over to use CTL_UNNUMBERED, removing a lot of unused cruft. Acked-by: Eric W. Biederman [EMAIL PROTECTED] Looks sane to me. Eric - To unsubscribe from

Re: [PATCH] IPVS: Fix sysctl warnings about missing strategy

2007-11-14 Thread Eric W. Biederman
Julian Anastasov [EMAIL PROTECTED] writes: I assume /proc/sys is still valid place, only sysctl interface is scheduled for removal. Yes. The ascii versions of the sysctls that show up in /proc/sys are definitely still valid. So, as long as these entries are not accessible from sysctl

Re: [PATCH] Fix warning for token-ring from sysctl checker

2007-11-14 Thread Eric W. Biederman
Olof Johansson [EMAIL PROTECTED] writes: On Wed, Nov 14, 2007 at 08:45:28AM -0800, Randy Dunlap wrote: On Wed, 14 Nov 2007 08:56:20 -0700 Eric W. Biederman wrote: David Miller [EMAIL PROTECTED] writes: From: Olof Johansson [EMAIL PROTECTED] Date: Tue, 13 Nov 2007 01:23:13 -0600

Re: [PATCH] IPVS: Fix sysctl warnings about missing strategy

2007-11-14 Thread Eric W. Biederman
Simon Horman [EMAIL PROTECTED] writes: On Thu, Nov 15, 2007 at 02:38:32AM +0200, Julian Anastasov wrote: Hi Julian, On Tue, 13 Nov 2007, Simon Horman wrote: [snip] As for the commented out entries. They are supposed to be exposed by some other means - I believe the thinking was to

Re: [PATCH 1/2] cleanup pernet operation without CONFIG_NET_NS

2007-11-15 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: If CONFIG_NET_NS is not set, the only namespace is possible. This patch removes list of pernet_operations and cleanups code a bit. This list is not needed if there are no namespaces. We should just call -init method. Additionally, the -exit will be

Re: [PATCH 2/2] move unneeded data to initdata section

2007-11-15 Thread Eric W. Biederman
Denis V. Lunev [EMAIL PROTECTED] writes: This patch reverts Eric's commit 2b008b0a8e96b726c603c5e1a5a7a509b5f61e35 It diets .text .data section of the kernel if CONFIG_NET_NS is not set. This is safe after list operations cleanup. Ok. This patch is technically safe because none of the

<    1   2   3   4   5   6   7   8   9   10   >