[PATCH 34/59] sysctl: s390 Remove unnecessary use of insert_at_head

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/s390/appldata/appldata_base.c |4 ++-- arch/s390/kernel/debug.c |2 +- arch/s390/mm/cmm.c |2 +- 3 files changed, 4 insertions(+), 4 deletions

[PATCH 28/59] sysctl: C99 Convert arch/ia64/sn/kernel/xpc_main.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/ia64/sn/kernel/xpc_main.c | 86 +-- 1 files changed, 38 insertions(+), 48 deletions(-) diff --git a/arch/ia64/sn/kernel/xpc_main.c b/arch/ia64

[PATCH 59/59] sysctl: Remove the proc_dir_entry member for the sysctl tables.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted It isn't needed anymore, all of the users are gone, and all of the ctl_table initializers have been converted to use explicit names of the fields they are initializing. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux

[PATCH 56/59] sysctl: factor out sysctl_head_next from do_sysctl

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The current logic to walk through the list of sysctl table headers is slightly painful and implement in a way it cannot be used by code outside sysctl.c I am in the process of implementing a version of the sysctl proc support that instead

[PATCH 32/59] sysctl: C99 convert arch/mips/lasat/sysctl.c and remove ABI breakage.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted While C99 converting the ctl_table initializers I realized that the binary sysctl numbers were in conflict with the binary values under CTL_KERN. Including CTL_KERN KERN_VERSION as used by glibc. So I just removed the sysctl binary interface

[PATCH 58/59] sysctl: Reimplement the sysctl proc support

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted With this change the sysctl inodes can be cached and nothing needs to be done when removing a sysctl table. For a costk of 2K code we will save about 4K of static tables (when we remove de from ctl_table) and 70K in proc_dir_entries that we

[PATCH 14/59] sysctl: C99 convert xfs ctl_tables

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- fs/xfs/linux-2.6/xfs_sysctl.c | 258 1 files changed, 180 insertions(+), 78 deletions(-) diff --git a/fs/xfs/linux-2.6/xfs_sysctl.c b/fs/xfs

[PATCH 55/59] sysctl: Remove insert_at_head from register_sysctl

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The semantic effect of insert_at_head is that it would allow new registered sysctl entries to override existing sysctl entries of the same name. Which is pain for caching and the proc interface never implemented. I have done an audit

Re: [PATCH 0/59] Cleanup sysctl

2007-01-17 Thread Eric W. Biederman
Kirill Korotaev [EMAIL PROTECTED] writes: Eric, really good job! Patches: 1-13, 15-24, 26-32, 34-44, 46-49, 52-55, 57 (all except below) Acked-By: Kirill Korotaev [EMAIL PROTECTED] 14/59 - minor (extra space) 25/59 - minor note 33/59 - not sorted sysctl IDs 45/59 - typo 50/59 -

Re: [PATCH 50/59] sysctl: Move utsname sysctls to their own file

2007-01-17 Thread Eric W. Biederman
Kirill Korotaev [EMAIL PROTECTED] writes: Eric, though I personally don't care much: 1. I ask for not setting your authorship/copyright on the code which you just copied from other places. Just doesn't look polite IMHO. I can't claim complete ownership of the code, there was plenty of feed

[PATCH] net: Fix the fib trie iterator to work with a single entry routing tables

2007-01-24 Thread Eric W. Biederman
is a simple fix for the fib proc iterator so it works even when there is only a single route in a routing table. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipv4/fib_trie.c | 21 - 1 files changed, 16 insertions(+), 5 deletions(-) diff --git a/net/ipv4

[PATCH] decnet: handle a failure in neigh_parms_alloc

2007-01-24 Thread Eric W. Biederman
While enhancing the neighbour code to handle multiple network namespaces I noticed that decnet is assuming neigh_parms_alloc will allways succeed, which is clearly wrong. So handle the failure. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/decnet/dn_dev.c |5 + 1 files

Re: [PATCH] net: Fix the fib trie iterator to work with a single entry routing tables

2007-01-24 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Robert Olsson [EMAIL PROTECTED] Date: Wed, 24 Jan 2007 22:43:30 +0100 Yes the case when the trie is just a single leaf got wrong with the iterator and your patchs cures it. I think we have a similar problem with /proc/net/fib_trie I'm happy to

[PATCH] net: decnet handle a failure in neigh_parms_alloc (take 2)

2007-01-24 Thread Eric W. Biederman
While enhancing the neighbour code to handle multiple network namespaces I noticed that decnet is assuming neigh_parms_alloc will allways succeed, which is clearly wrong. So handle the failure. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/decnet/dn_dev.c | 11 +-- 1

Re: [PATCH 1/12] L2 network namespace (v3): current network namespace operations

2007-01-24 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Wednesday 17 January 2007 23:16, Eric W. Biederman wrote: Dmitry Mishin [EMAIL PROTECTED] writes: Added functions and macros required to operate with network namespaces. They are required in order to switch network namespace for incoming packets

Re: [PATCH RFC 31/31] net: Add etun driver

2007-01-25 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: Eric W. Biederman wrote: From: Eric W. Biederman [EMAIL PROTECTED] - unquoted etun is a simple two headed tunnel driver that at the link layer looks like ethernet. It's target audience is communicating between network namespaces but it is general enough

Re: [PATCH RFC 2/31] net: Implement a place holder network namespace

2007-01-25 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: + +#define __per_net_start ((char *)0) +#define __per_net_end ((char *)0) Don't use these use NULL NULL has the wrong data type. These are compiled out character array normally generated by the linker script. I'm not even certain I need

[RFC PATCH 0/31] An introduction and A path for merging network namespace work

2007-01-25 Thread Eric W. Biederman
The idea of a network namespace is fundamentally quite simple. We create a mechanism that from the users perspective allows creation of separate instances of the network stack. When combined with mechanism like chroot this results in a much more complete isolation. When seen in the context of

[PATCH RFC 3/31] net: Add a network namespace parameter to tasks

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This is the network namespace from which all which all sockets and anything else under user control ultimately get their network namespace parameters. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/nsproxy.h |2 ++ 1

[PATCH RFC 8/31] net: Make /sys/class/net handle multiple network namespaces

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted In combination with the sysfs support I am in the process of merging with gregkh, creates a separate instance of the /sys/class/net directory for each network namespace so two devices with the same name do not conflict. Then a network namespace

[PATCH RFC 1/31] net: Add net_namespace_type.h to allow for per network namespace variables.

2007-01-25 Thread Eric W. Biederman
for having the linker build and dynamically change structures for us appears applicable here and a lot less nuisance then what I did before so I am implementing a tailored version of that technique as well, and again this makes it very simple to compile the code out. Signed-off-by: Eric W. Biederman [EMAIL

[PATCH RFC 30/31] net: Make AF_UNIX per network namespace safe.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Because of the global nature of garbage collection, and because of the cost of per namespace hash tables unix_socket_table has been kept global. With a filter added on lookups so we don't see sockets from the wrong namespace. Currently I

[PATCH RFC 31/31] net: Add etun driver

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted etun is a simple two headed tunnel driver that at the link layer looks like ethernet. It's target audience is communicating between network namespaces but it is general enough it may have other uses as well. Signed-off-by: Eric W. Biederman

[PATCH RFC 23/31] net: Modify all rtnetlink methods to only work in the initial namespace

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Before I can enable rtnetlink to work in all network namespaces I need to be certain that something won't break. So this patch deliberately disables all of the methods and when they are audited this extra check can be disabled. Signed-off

[PATCH RFC 15/31] net: Make the loopback device per network namespace

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This patch makes the loopback_dev per network namespace. The loopback device registers itself as a pernet_device so we can register the new loopback_dev instance when we add a new network namespace and so we can unregister the loopback device

[PATCH RFC 19/31] net: sysfs interface support for moving devices between network namespaces.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted I haven't a clue if this interface will meet with widespread approval but at this point it is simple, and very useful. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core/net-sysfs.c | 35 +++ 1

[PATCH RFC 4/31] net: Add a network namespace tag to struct net_device

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Please note that network devices do not increase the count count on the network namespace. The are inside the network namespace and so the network namespace tag is in the nature of a back pointer and so getting and putting the network

[PATCH RFC 5/31] net: Add a network namespace parameter to struct sock

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Sockets need to get a reference to their network namespace, or possibly a simple hold if someone registers on the network namespace notifier and will free the sockets when the namespace is going to be destroyed. Signed-off-by: Eric W

[PATCH RFC 6/31] net: Add a helper to get a reference to the initial network namespace.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The initial network namespace is special and we need to use it for various things. Probably the biggest initial use will be to ensure code that can't cope with multiple namespaces only sees the initial network namespace. For that reason

[PATCH RFC 26/31] net: Make the netlink methods in rtnetlink handle multiple network namespaces

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted It turns out after a quick audit that except for removing the checks there is really nothing to do here. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core/rtnetlink.c | 21 +++-- 1 files changed, 3 insertions

[PATCH RFC 22/31] net: Add network namespace clone support.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This patch allows you to create a new network namespace using sys_clone(...). Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/sched.h|1 + kernel/nsproxy.c | 11 +++ net/core/net_namespace.c

[PATCH RFC 27/31] net: Make the xfrm sysctls per network namespace.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted In particalure I moved: /proc/sys/net/core/xfrm_aevent_etime /proc/sys/net/core/xfrm_aevent_rseqth Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/net/xfrm.h |4 ++-- net/core/sysctl_net_core.c | 37

[PATCH RFC 28/31] net: Make the SOMAXCONN sysctl per network namespace

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/socket.h |3 ++- net/core/sysctl_net_core.c | 16 net/socket.c |7 --- 3 files changed, 14 insertions(+), 12 deletions

[PATCH RFC 11/31] net: Initialize the network namespace of network devices.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Except for carefully selected pseudo devices all network interfaces should start out in the initial network namespace. Ultimately it will be register_netdev that examines what dev-nd_net is set to and places a device in a network namespace

[PATCH RFC 24/31] net: Make rtnetlink network namespace aware

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted After this patch none of the netlink callback support anything except the initial network namespace but the rtnetlink infrastructure now handles multiple network namespaces. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux

[PATCH RFC 17/31] net: Factor out __dev_alloc_name from dev_alloc_name

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted When forcibly changing the network namespace of a device I need something that can generate a name for the device in the new namespace without overwriting the old name. __dev_alloc_name provides me that functionality. Signed-off-by: Eric W

[PATCH RFC 20/31] net: Implement CONFIG_NET_NS

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Add the config option to enable multiple network namespaces. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/Kconfig |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) diff --git a/net/Kconfig b/net/Kconfig index

[PATCH RFC 25/31] net: Make wireless netlink event generation handle multiple network namespaces

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/core/wireless.c | 15 ++- 1 files changed, 10 insertions(+), 5 deletions(-) diff --git a/net/core/wireless.c b/net/core/wireless.c index 9036359..d534617 100644

[PATCH RFC 29/31] net: Make AF_PACKET handle multiple network namespaces

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This is done by making all of the relevant global variables per network namespace. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/packet/af_packet.c | 125 +++- 1 files changed, 81

[PATCH RFC 9/31] net: Implement the per network namespace sysctl infrastructure

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The user interface is: register_net_sysctl_table and unregister_net_sysctl_table. Very much like the current interface except there is an network namespace parameter. This this any sysctl in the net_root_table and it's subdirectories

[PATCH RFC 18/31] net: Implment network device movement between namespaces

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This patch introduces NETIF_F_NETNS_LOCAL a flag to indicate a network device is local to a single network namespace and should never be moved. Useful for pseudo devices that we need an instance in each network namespace (like the loopback

[PATCH RFC 2/31] net: Implement a place holder network namespace

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Many of the changes to the network stack will simply be adding a network namespace parameter to function calls or moving variables from globals to being per network namespace. When those variables have initializers that cannot statically

[PATCH RFC 21/31] net: Implement the guts of the network namespace infrastructure

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Support is added for the .data.pernet section where all of the variables who have a single instance in each network namespace will live. Every architectures linker script is modified so is should work. Summarizing the functions: net_ns_init

[PATCH RFC 14/31] net: Support multiple network namespaces with netlink

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Each netlink socket will live in exactly one network namespace, this includes the controlling kernel sockets. This patch updates all of the existing netlink protocols to only support the initial network namespace. Request by clients in other

[PATCH RFC 10/31] net: Make socket creation namespace safe.

2007-01-25 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This patch passes in the namespace a new socket should be created in and has the socket code do the appropriate reference counting. By virtue of this all socket create methods are touched. In addition the socket create methods are modified so

Re: [PATCH RFC 1/31] net: Add net_namespace_type.h to allow for per network namespace variables.

2007-01-25 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: Can all this be a nop if a CONFIG option is not selected? That is exactly what this infrastructure supports. What you see is the version that comes into effect when the CONFIG option is not selected. From using an empty structure to replace a pointer

Re: [PATCH] net: Fix the fib trie iterator to work with a single entry routing tables

2007-01-26 Thread Eric W. Biederman
Robert Olsson [EMAIL PROTECTED] writes: David Miller writes: Yes the case when the trie is just a single leaf got wrong with the iterator and your patchs cures it. I think we have a similar problem with /proc/net/fib_trie I'm happy to review a fix for that :-) When main

Re: 2.6.20-rc7: known regressions (v2) (part 1)

2007-02-02 Thread Eric W. Biederman
Auke Kok [EMAIL PROTECTED] writes: Adrian Bunk wrote: This email lists some known regressions in 2.6.20-rc7 compared to 2.6.19 that are not yet fixed in Linus' tree. If you find your name in the Cc header, you are either submitter of one of the bugs, maintainer of an affectected subsystem

Re: 2.6.20-rc7: known regressions (v2) (part 1)

2007-02-03 Thread Eric W. Biederman
Auke Kok [EMAIL PROTECTED] writes: maybe I've been unclear, but here's how e1000 detects link changes: 1) by checking every 2 seconds in the watchdog by reading PHY registers 2) by receiving an interrupt from the NIC with the LSI bit in the interrupt control register if the link is down to

Re: 2.6.20-rc7: known regressions (v2) (part 1)

2007-02-03 Thread Eric W. Biederman
Auke Kok [EMAIL PROTECTED] writes: that's explained by a driver change that did that. Since at initialization we're basically waiting for a link change to tell the stack that we're up, we decided to change the order to have the hardware fire an LSI interrupt to trigger a watchdog run. So

Re: 2.6.20-rc7: known regressions (v2) (part 1)

2007-02-03 Thread Eric W. Biederman
Adam Kropelin [EMAIL PROTECTED] writes: Can I get the corresponding lspci -xxx output. I suspect the BIOS did not program the hypertransport MSI mapping capabilities correctly. All it has to do is set the enable but still, occasionally BIOS writers miss the most amazing things. Here you

Re: 2.6.20-rc7: known regressions (v2) (part 1)

2007-02-03 Thread Eric W. Biederman
Adam Kropelin [EMAIL PROTECTED] writes: Naive question... Can the pci layer (or e1000) detect that MSI is not enabled in the hardware and avoid using it in that case? With the number of MSI problems showing up it seems risky to assume it's usable on any given platform without some sort of

Re: [RFC] [patch 0/6] [Network namespace] introduction

2006-06-15 Thread Eric W. Biederman
My apologies for not looking at this earlier I had an email hickup so I'm having to recreate the context from email archives, and you didn't copy me. Have you seen my previous work in this direction? I know I had a much much more complete implementation. The only part I had not completed was

Re: [RFC] [patch 0/6] [Network namespace] introduction

2006-06-16 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Have you seen my previous work in this direction? I know I had a much much more complete implementation. The only part I had not completed was iptables support and that was about a days more work. No, I didn't see your

[PATCH] ipv6 tcp_v6_send_synack: release the destination

2006-01-25 Thread Eric W. Biederman
tcp_make_synack consume the dst entry so we still have a dst_entry with a bumped refrence count at the end of this function. Therefore we need to call dst_release just before we return just like tcp_v4_send_synack does. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipv6/tcp_ipv6.c |1 + 1

[PATCH] ipv6: addrconf_ifdown fix dst refcounting.

2006-01-25 Thread Eric W. Biederman
elevated. Fix this by simply moving rt6_ifdown where we flush the routes after we have removed all of the addresses from the interface. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipv6/addrconf.c |7 ++- 1 files changed, 6 insertions(+), 1 deletions

Re: [PATCH] ipv6: addrconf_ifdown fix dst refcounting.

2006-01-27 Thread Eric W. Biederman
Herbert Xu [EMAIL PROTECTED] writes: On Wed, Jan 25, 2006 at 08:12:02PM +, Eric W. Biederman wrote: Unfortunately because we have already call rt6_ifdown() the route is not found in the routing table, the dst_free does not decrement the count and is therefore unable to free the dst entry

Re: [PATCH] ipv6 tcp_v6_send_synack: release the destination

2006-01-31 Thread Eric W. Biederman
David S. Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Wed, 25 Jan 2006 13:08:53 -0700 Analysis: Currently tcp_v6_send_synack is never called with a dst entry so dst always comes in as NULL. ip6_dst_lookup calls ip6_route_output which calls dst_hold

Re: Van Jacobson net channels

2006-02-02 Thread Eric W. Biederman
Jeff Garzik [EMAIL PROTECTED] writes: Andi Kleen wrote: There was already talk some time ago to make NAPI drivers use the hardware mitigation again. The reason is when you have This was discussed on the netdev list, and the conclusion was that you want both NAPI and hw mitigation. This

Re: [PATCH] ipv6: addrconf_ifdown fix dst refcounting.

2006-02-02 Thread Eric W. Biederman
Herbert Xu [EMAIL PROTECTED] writes: On Fri, Jan 27, 2006 at 01:00:49AM -0700, Eric W. Biederman wrote: However I do know I have correctly found the leak. Yes you are right. The locking/refcounting in addrconf.c is such a mess. I've asked a number of times before as to why most

Re: Van Jacobson net channels

2006-02-02 Thread Eric W. Biederman
Christopher Friesen [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Jeff Garzik [EMAIL PROTECTED] writes: This was discussed on the netdev list, and the conclusion was that you want both NAPI and hw mitigation. This was implemented in a few drivers, at least. How does that deal

Re: Van Jacobson net channels

2006-02-02 Thread Eric W. Biederman
Leonid Grossman [EMAIL PROTECTED] writes: There two facilities (at least, in our ASIC, but there is no reason this can't be part of the generic multi-channel driver interface that I will get to shortly) to deal with it. - hardware supports more than one utilization-based interrupt rate (we

Re: Network virtualization/isolation

2006-11-25 Thread Eric W. Biederman
Leonid Grossman [EMAIL PROTECTED] writes: I did not mean kernel bypass, just L2 hw channels that for all practical purposes act as separate NICs - different MAC addresses, no blocking, independent reset, etc. Yes. Nearly all of what you need for safe kernel bypass. In the worst case I

Re: Network virtualization/isolation

2006-11-26 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Sat, Nov 25, 2006 at 01:21:39AM -0700, Eric W. Biederman wrote: There are two techniques in real use. - Bind/Accept filtering Which layer 3 addresses a socket can bind/accept are filtered, but otherwise the network stack remains unchanged

Re: Network virtualization/isolation

2006-11-28 Thread Eric W. Biederman
I do not want to get into a big debate on the merits of various techniques at this time. We seem to be in basic agreement about what we are talking about. There is one thing I think we can all agree upon. - Everything except isolation at the network device/L2 layer, does not allow guests to

Re: Network virtualization/isolation

2006-12-03 Thread Eric W. Biederman
Ok. Just a quick summary of where I see the discussion. We all agree that L2 isolation is needed at some point. The approaches discussed for L2 and L3 are sufficiently orthogonal that we can implement then in either order. You would need to unshare L3 to unshare L2, but if we think of them as

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
jamal [EMAIL PROTECTED] writes: I have removed the Re: just to add some freshness to the discussion So i read quickly the rest of the discussions. I was almost suprised to find that i agree with Eric on a lot of opinions (we also agree that vindaloo is good for you i guess);- The two issues

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
jamal [EMAIL PROTECTED] writes: On Mon, 2006-04-12 at 05:15 -0700, Eric W. Biederman wrote: jamal [EMAIL PROTECTED] writes: Containers are a necessary first step to getting migration and checkpoint/restart assistance from the kernel. Isnt it like a MUST have if you are doing things from

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: Ok. Just a quick summary of where I see the discussion. We all agree that L2 isolation is needed at some point. As we all agreed on this, may be it is time to send patches one-by-one

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Monday 04 December 2006 18:35, Eric W. Biederman wrote: [skip] Where and when you look to find the network namespace that applies to a packet is the primary difference between the OpenVZ L2 implementation and my L2 implementation

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: Ok. Just a quick summary of where I see the discussion. We all agree that L2 isolation is needed at some point. As we all

Re: [Devel] Re: Network virtualization/isolation

2006-12-08 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: But, ok, it is not the real point to argue so much imho and waste our time instead of doing things. well, IMHO better talk (and think) first, then implement something ... not the other way round, and then start fixing up the mess ... Well we need a

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: Herbert Poetzl [EMAIL PROTECTED] writes: But, ok, it is not the real point to argue so much imho and waste our time instead of doing things. well, IMHO better talk (and think

Re: APIC error on 32-bit kernel

2007-03-27 Thread Eric W. Biederman
Jay Cliburn [EMAIL PROTECTED] writes: We're trying to track down the source of a problem that occurs whenever the atl1 network driver is activated on a 32-bit 2.6.21-rc4 kernel. We need help from netdev. We can load the driver just fine, but whenever we activate the network, we see APIC

Re: APIC error on 32-bit kernel

2007-03-27 Thread Eric W. Biederman
Jay Cliburn [EMAIL PROTECTED] writes: On Tue, 27 Mar 2007 14:42:20 -0600 [EMAIL PROTECTED] (Eric W. Biederman) wrote: Thanks for replying, Eric. I've added atl1-devel to the cc list. Do you have msi's working in 2.6.21-rc4 in the x86_64 kernel? I can't personally verify it anymore

Re: L2 network namespace benchmarking

2007-03-27 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: 3. General observations --- The objective to have no performances degrations, when the network namespace is off in the kernel, is reached in both solutions. When the network is used outside the container and the network

Re: L2 network namespace benchmarking

2007-03-28 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Daniel Lezcano [EMAIL PROTECTED] writes: 3. General observations --- The objective to have no performances degrations, when the network namespace is off in the kernel, is reached in both solutions

Re: L2 network namespace benchmarking

2007-03-28 Thread Eric W. Biederman
Kirill Korotaev [EMAIL PROTECTED] writes: Ideally we can optimize the bridge code or something equivalent to it so that we can take one look at the destination mac address and know which network namespace we should be in. Potentially moving this work to hardware when the hardware supports

Re: L2 network namespace benchmarking

2007-03-29 Thread Eric W. Biederman
Benjamin Thery [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Daniel Lezcano [EMAIL PROTECTED] writes: [...] * When do you expect to have the network namespace into mainline ? My current goal is to finish my rebase against 2.6.linus_lastest in the next couple of days after having

Re: L2 network namespace benchmarking (resend with Service Demand)

2007-03-30 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Hi, as suggested Rick, I added the Service Demand results to the matrix. Thanks. The latency number is interesting and it confirms what we were seeing looking at cpu usage. We don't have an inexpesive way to get a packet from the outside world to a

Re: L2 network namespace benchmarking (resend with Service Demand)

2007-04-06 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Hi, as suggested Rick, I added the Service Demand results to the matrix. A couple of random thoughts in trying to understand the numbers you are seeing. - Checksum offloading? You have noted that with the bridge netfilter support disabled you are

Re: L2 network namespace benchmarking (resend with Service Demand)

2007-04-06 Thread Eric W. Biederman
Benjamin Thery [EMAIL PROTECTED] writes: Eric W. Biederman wrote: A couple of random thoughts in trying to understand the numbers you are seeing. - Checksum offloading? You have noted that with the bridge netfilter support disabled you are still seeing additional checksum overhead

[PATCH] net: Add etun driver

2007-04-06 Thread Eric W. Biederman
/newif To destroy a pair of devices: echo -n 'veth0' /sys/module/etun/parameters/delif Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/Kconfig | 14 ++ drivers/net/Makefile |1 + drivers/net/etun.c | 486 ++ 3 files

Re: network namespace website

2007-04-06 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: Hi, Eric Biederman has posted a few weeks ago a RFC-patchset concerning the network namespace. I ported it to the 2.6.20 kernel and uploaded the patchset to http://lxc.sourceforge.net/network.php For the part I had to used (TCP/UDP-IPV4 with

Re: [PATCH] net: Add etun driver

2007-04-06 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: Is there any way to tell for certain if an interface is a etun or not? Maybe a file could be found (or not) in sysfs somewhere? Link for any decent network driver ethtool -i interface Also, how do you find the peer device from user-space? This would be

Re: [PATCH] net: Add etun driver

2007-04-06 Thread Eric W. Biederman
Roland Dreier [EMAIL PROTECTED] writes: +/* + * The higher levels take care of making this non-reentrant (it's + * called with bh's disabled). + */ +static int etun_xmit(struct sk_buff *skb, struct net_device *tx_dev) You have this comment, but then... + dev-features

Re: [PATCH] net: Add etun driver

2007-04-06 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: Why not implement a true virtual network rather than simple tunnel pairs? Mostly I don't even need etun. It is a cheap way to make up for the lack of sufficient physical network adapters on the machine. If you plug in enough network cards into the

Re: [PATCH] net: Add etun driver

2007-04-06 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: I guess that will do, but then if you ever change the strings, any user-space that is depending on this will break or have to be modified with additional cruft. It seems cleaner to me to have an ioctl or a specific place in /proc or some other virtual

Re: [PATCH] net: Add etun driver

2007-04-09 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Patrick McHardy [EMAIL PROTECTED] Date: Mon, 09 Apr 2007 18:58:13 +0200 It would be nice if someone would finally come up with a generic interface based on netlink (RTM_NEWLINK) instead of adding yet another couple of homegrown interfaces. I

Re: [PATCH] net: Add etun driver

2007-04-10 Thread Eric W. Biederman
Johannes Berg [EMAIL PROTECTED] writes: Our virtual devices are always associated with a piece of hardware, and we really want them to be associated with that at all times, even when not UP. Everything else seems like a huge complication if only because then we can't have whoever will be

Re: Getting the new RxRPC patches upstream

2007-04-19 Thread Eric W. Biederman
David Howells [EMAIL PROTECTED] writes: Eric W. Biederman [EMAIL PROTECTED] wrote: What is the ETA on your patches? That depends on Dave Miller now, I think. I'm assuming they need to go through the network GIT tree to get to Linus. Certainly Andrew Morton seems to think so. Ok. I

Re: Getting the new RxRPC patches upstream

2007-04-19 Thread Eric W. Biederman
David Howells [EMAIL PROTECTED] writes: Eric W. Biederman [EMAIL PROTECTED] wrote: Ok. I don't see any patches in -mm so I was assuming these patches have not been queued up anywhere. They haven't been quite yet. Is it your intention to kill these features in 2.6.22? That is my goal

Re: sysctls

2007-04-25 Thread Eric W. Biederman
Andrew Morton [EMAIL PROTECTED] writes: I note that the networking tree is adding new sysctls: HEAD/include/linux/sysctl.h NET_IPV6_ACCEPT_SOURCE_ROUTE=25, === NET_IPV6_OPTIMISTIC_DAD=24, NET_IPV6_ACCEPT_SOURCE_ROUTE=25, /include/linux/sysctl.h (Well, it's

Re: sysctls

2007-04-25 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: Andrew Morton [EMAIL PROTECTED] Date: Wed, 25 Apr 2007 12:29:24 -0700 I note that the networking tree is adding new sysctls: HEAD/include/linux/sysctl.h NET_IPV6_ACCEPT_SOURCE_ROUTE=25, === NET_IPV6_OPTIMISTIC_DAD=24,

Re: sysctls

2007-04-25 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Wed, 25 Apr 2007 14:06:34 -0600 David for clarity do you happen to know of anyone using binary sysctl values? None at all. In particular is there any reason not to use CTL_UNNUMBERED for new

Re: [PATCH] Virtual ethernet device (tunnel)

2007-05-02 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: jamal wrote: On Wed, 2007-02-05 at 14:34 +0200, Patrick McHardy wrote: Thats a lot better than using sysfs, but I think it would be preferrable to use rtnetlink instead of genetlink for network configuration. or you can just hold rtnl while

Re: [PATCH] forcedeth: move config to gigabit menu

2006-03-16 Thread Eric W. Biederman
Ayaz Abdulla [EMAIL PROTECTED] writes: Can we remove Reverse Engineered and (EXPERIMENTAL) now? Can we get better bit names in the driver? Having unknown xyz in half of the names is scare? Can we have some help fixing the problem where the on some boots the driver cannot receive packets? Or

Re: [PATCH] forcedeth: move config to gigabit menu

2006-03-16 Thread Eric W. Biederman
but that is still horribly bad. I will work on clearing up some of those names. Thanks. -Original Message- From: Eric W. Biederman [mailto:[EMAIL PROTECTED] Sent: Thursday, March 16, 2006 9:58 AM To: Ayaz Abdulla Cc: Stephen Hemminger; Manfred Spraul [EMAIL PROTECTED], Jeff Garzik [EMAIL

Re: [PATCH] forcedeth: move config to gigabit menu

2006-03-16 Thread Eric W. Biederman
Ayaz Abdulla [EMAIL PROTECTED] writes: Its hard for me to believe that you would think that there is no indication of the driver being actively supported. Take a look at the revision history in the forcedeth.c file. There have been 18 revisions in less then a year timeframe. There is no

Re: [PATCH] forcedeth: move config to gigabit menu

2006-03-16 Thread Eric W. Biederman
Jeff Garzik [EMAIL PROTECTED] writes: Eric W. Biederman wrote: There is no maintainer contact in the driver nor in the maintainers file. It has clearly been bug fixed but simply didn't look like there was a maintainer. Then you clearly did not look at all. Simply running the command

<    1   2   3   4   5   6   7   8   9   10   >