From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Thu, 23 Oct 2008 08:56:08 -0700
> To make testing of the network namespace simpler allow
> the network namespace code and the sysfs code to be
> compiled and run at the same time. To do this only
> virtual devices are allowed in the additional net
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Mon, 27 Oct 2008 13:19:27 -0700
> What I was thinking is that it goes into your tree for 2.6.29. Allowing
> for better test coverage in the short term, and removing the pressure
> to do a hack job on sysfs just to reduce the pain of testing.
Fair
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Wed, 05 Nov 2008 15:25:39 -0800
>
> I was recently hunting a bug that occurred in network namespace
> cleanup. In looking at the code it became apparrent that we have
> and will continue to have cases where if we have anything going
> on in a net
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Wed, 05 Nov 2008 15:27:34 -0800
>
> I have been tracking for a while a case where when the
> network namespace exits the cleanup gets stck in an
> endless precessess of:
>
> unregister_netdevice: waiting for lo to become free. Usage count = 3
> u
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Wed, 05 Nov 2008 15:22:26 -0800
>
> When physical devices are inside of network namespace and that
> network namespace terminates we can not make them go away. We
> have to keep them and moving them to the initial network namespace
> is the best
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Thu, 06 Nov 2008 05:02:33 -0800
> Dave can you please drop this one for the moment.
>
> I cleaned up my patch after the basic testing was over and the
> result is a kernel that won't boot. So if we can prevent this
> patch from spreading and brea
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Thu, 06 Nov 2008 07:34:28 -0800
>
> We need to setup the network namespace state before we register
> the notifier. Otherwise if a network device is already registered
> we get a nasty NULL pointer dereference.
>
> Signed-off-by: Eric W. Biederm
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Thu, 06 Nov 2008 07:36:00 -0800
> I was recently hunting a bug that occurred in network namespace
> cleanup. In looking at the code it became apparrent that we have
> and will continue to have cases where if we have anything going
> on in a networ
From: [EMAIL PROTECTED] (Eric W. Biederman)
Date: Tue, 25 Nov 2008 09:40:59 -0800
> Daniel Lezcano <[EMAIL PROTECTED]> writes:
>
> > This patch will filter out the uevent not related to the init_net.
> > Without this patch if a network device is created in a network
> > namespace with the same na
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:33 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:34 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:35 +0300
> To avoid unnecessary complications with passing netns around.
>
> * set once, very early after allocating
> * once set, never changes
>
> For a while create every xfrm_state in init_net.
>
> Signed-off-by: Alexey
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:36 +0300
> This is done to get
> a) simple "something leaked" check
> b) cover possible DoSes when other netns puts many, many xfrm_states
>onto a list.
> c) not miss "alien xfrm_state" check in some of list iterators in fu
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:37 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:39 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:42 +0300
> All of this is implicit passing which netns's hashes should be resized.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:40 +0300
> Since hashtables are per-netns, they can be independently resized.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROT
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:38 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:41 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:45 +0300
> Dissalow spurious wakeups in __xfrm_lookup().
typo, which I fixed...
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied, thanks.
___
Containers mail
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:43 +0300
> km_waitq is going to be made per-netns to disallow spurious wakeups
> in __xfrm_lookup().
>
> To not wakeup after every garbage-collected xfrm_state (which potentially
> can be from different netns) make state GC li
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:46 +0300
> Again, to avoid complications with passing netns when not necessary.
> Again, ->xp_net is set-once field, once set it never changes.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:44 +0300
> State GC is per-netns, and this is part of it.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:47 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied, thanks.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/conta
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:49 +0300
> Per-netns hashes are independently resizeable.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:51 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:52 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:53 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:54 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:55 +0300
> Take netns from xfrm_state or xfrm_policy.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.lin
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:56 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:50 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:48 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:57 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:58 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:26:59 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:00 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:03 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:01 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:02 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:05 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:06 +0300
> Pass netns to xfrm_lookup()/__xfrm_lookup(). For that pass netns
> to flow_cache_lookup() and resolver callback.
>
> Take it from socket or netdevice. Stub DECnet to init_net.
>
> Signed-off-by: Alexey Dobriyan <[E
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:04 +0300
> Add netns parameter to xfrm_policy_bysel_ctx(), xfrm_policy_byidx().
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PR
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:08 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:07 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:12 +0300
> Stub senders to init_net's one temporarily.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.li
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:11 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:09 +0300
> Allow netdevice notifier as result.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foun
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:10 +0300
> Pass netns pointer to struct xfrm_policy_afinfo::garbage_collect()
>
> [This needs more thoughts on what to do with dst_ops]
> [Currently stub to init_net]
Yes, this dst_ops issue has been brought up a
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:13 +0300
> Grab netns either from netlink socket, state or policy.
>
> SA and SPD flush are in init_net for now, this requires little
> attention, see below.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:14 +0300
> SA and SPD flush are executed with NULL SA and SPD respectively, for
> these cases pass netns explicitly from userspace socket.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
__
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:15 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:16 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:17 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:18 +0300
> SA/SPD doesn't pin netns (and it shouldn't), so get rid of them by hand.
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAI
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:19 +0300
> * netns boilerplate
> * keep per-netns socket list
> * keep per-netns number of sockets
>
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mai
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:21 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:20 +0300
> * interaction with userspace -- take netns from userspace socket.
> * in ->notify hook take netns either from SA or explicitly passed --
> we don't know if SA/SPD flush is coming.
> * stub policy migration with
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:24 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:25 +0300
> Make
> net.core.xfrm_aevent_etime
> net.core.xfrm_acq_expires
> net.core.xfrm_aevent_rseqth
> net.core.xfrm_larval_drop
>
> sysctls per-netns.
>
> For that make net_core_path[] global, regis
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:23 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/containers
_
From: Alexey Dobriyan <[EMAIL PROTECTED]>
Date: Tue, 25 Nov 2008 20:27:22 +0300
> Signed-off-by: Alexey Dobriyan <[EMAIL PROTECTED]>
Yahoo! Applied.
___
Containers mailing list
[EMAIL PROTECTED]
https://lists.linux-foundation.org/mailman/listinfo/conta
From: Cyrill Gorcunov
Date: Sat, 10 Jan 2009 15:54:44 +0300
> Maybe you have some other commits which are not propogated
> to net-next-2.6 yet?
net-next-2.6 is a throw away tree that is a clone of essentially
2.6.28 after Linus first took the net-next-2.6
It has not been updated for weeks, all
From: Paul Mackerras
Date: Sun, 11 Jan 2009 11:33:21 +1100
> Cyrill Gorcunov writes:
>
> > From: Cyrill Gorcunov
> > Subecjt: [RFC] net: ppp_generic - introduce net-namespace functionality
> >
> > - Each namespace contain ppp channels and units separately
> > with appropriate locks
>
> This
From: Divy Le Ray
Date: Tue, 20 Jan 2009 16:09:00 -0800
> For some reason, I see your your mail' date pointing to 12/31/1969.
Yes, he knows. It's a quilt hiccup.
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
From: Cyrill Gorcunov
Date: Tue, 20 Jan 2009 17:05:10 +0300
> Hi, here is a series of patches in hope to bring
> net-namespace functionality for PPP, PPPoE, PPPoL2TP
> protocols.
All applied, thanks Cyrill.
___
Devel mailing list
Devel@openvz.org
http
From: "Denis V. Lunev"
Date: Fri, 20 Feb 2009 18:57:23 +0300
> Acked-by: Denis V. Lunev
Applied.
___
Containers mailing list
contain...@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
From: "Denis V. Lunev"
Date: Fri, 20 Feb 2009 18:57:02 +0300
> Acked-by: Denis V. Lunev
Applied.
___
Containers mailing list
contain...@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
From: ebied...@xmission.com (Eric W. Biederman)
Date: Fri, 20 Feb 2009 08:02:57 -0800
>
> It turns out that net_alive is unnecessary, and the original problem
> that led to it being added was simply that the icmp code thought
> it was a network device and wound up being unable to handle packets
>
From: ebied...@xmission.com (Eric W. Biederman)
Date: Wed, 25 Feb 2009 21:49:04 -0800
> @@ -249,6 +253,19 @@ static int veth_close(struct net_device *dev)
> return 0;
> }
>
> +static int is_valid_veth_mtu(int new_mtu)
> +{
> + return (new_mtu >= MIN_MTU && new_mtu <= MAX_MTU);
> +}
>
From: ebied...@xmission.com (Eric W. Biederman)
Date: Fri, 27 Feb 2009 04:41:48 -0800
> David Miller writes:
>
> > From: ebied...@xmission.com (Eric W. Biederman)
> > Date: Wed, 25 Feb 2009 21:49:04 -0800
> >
> >> @@ -249,6 +253,19 @@ static int veth_close(struc
From: ebied...@xmission.com (Eric W. Biederman)
Date: Wed, 25 Feb 2009 21:47:29 -0800
>
> The current implementation of carrier detect in veth is broken.
> It reports the link is down until both sides of the veth pair
> are administatively up and then forever after it reports link up.
>
> So fix
From: Daniel Lezcano
Date: Wed, 25 Feb 2009 13:43:29 +0100
> I don't see these patches in the net-2.6 tree. Shouldn't they be in
> net-2.6 too ?
Ok, I'll think about cherry picking them into net-2.6...
___
Containers mailing list
contain...@lists.linux
From: ebied...@xmission.com (Eric W. Biederman)
Date: Tue, 03 Mar 2009 20:14:18 -0800
> The limitation to only 1500 byte mtu's limits the utility of the veth
> device for testing routing. So implement implement a configurable
> MTU.
>
> For consistency I drop packets on the receive side when the
From: Alexey Dobriyan
Date: Mon, 4 May 2009 03:28:25 +0400
> copy_net_ns() doesn't copy anything, it creates fresh netns, so get/put of old
> netns isn't needed.
>
> Signed-off-by: Alexey Dobriyan
> Acked-by: Serge Hallyn
Applied to net-next-2.6
___
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 04 Feb 2008 11:10:37 +0300
> The port offset calculations depend on the protocol family, but,
> as Adrian noticed, I broke this logic with the commit
>
> 5ee31fc1ecdcbc234c8c56dcacef87c8e09909d8
> [INET]: Consolidate inet(6)_hash_co
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Tue, 5 Feb 2008 12:58:56 +0300
> The line in the /proc/net/fib_trie for route with TOS specified
> - has extra \n at the end
> - does not have a space after route scope
> like below.
>|-- 1.1.1.1
> /32 universe UNICASTtos
What part of "no new features" did you not understand?
___
Devel mailing list
Devel@openvz.org
https://openvz.org/mailman/listinfo/devel
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Fri, 8 Feb 2008 17:14:17 +0300
> Merge error paths inside igmp_rcv.
>
> Signed-off-by: Denis V. Lunev <[EMAIL PROTECTED]>
Applied, but this kind of cleanup is borderline during this
time period. Please queue such things up for when I open up
net
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Mon, 18 Feb 2008 11:59:38 +0300
> The result of the ip_route_output is not assigned to skb. This means that
> - it is leaked
> - possible OOPS below dereferrencing skb->dst
> - no ICMP message for this case
>
> Signed-off-by: Denis V. Lunev <[EMAIL
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Tue, 19 Feb 2008 16:12:38 +0300
> release_net is missed on the error path in pneigh_lookup.
>
> Signed-off-by: Denis V. Lunev <[EMAIL PROTECTED]>
Applied, thanks a lot.
___
Devel mailing list
Devel@open
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Fri, 22 Feb 2008 12:37:03 +0300
> The neigh_hash_grow() may update the tbl->hash_rnd value, which
> is used in all tbl->hash callbacks to calculate the hashval.
>
> Two lookup routines may race with this, since they call the
> ->hash callback with
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Thu, 21 Feb 2008 15:38:16 +0300
> Changelog:
>
> Use the added dev_alloc_name() call to create tunnel device name,
> rather than iterate in a hand-made loop with an artificial limit.
>
> Thanks Patrick for noticing this.
>
> Signed-off-by: Pavel E
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Tue, 26 Feb 2008 10:47:44 +0300
> That's because you skipped the first patch titled "Don't create
> tunnels with '%' in name.", which adds the dev_alloc_name() call
> and tosses the error paths a bit. Without this first patch, these
> four drivers
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Wed, 27 Feb 2008 10:44:33 +0300
> Four tunnel drivers (ip_gre, ipip, ip6_tunnel and sit) can
> receive a pre-defined name for a device from the userspace.
> Since these drivers call the register_netdevice() (rtnl_lock,
> is held), which does _not_ ge
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Tue, 19 Feb 2008 10:28:36 +0300
> This set finally allows to manipulate with network devices inside a
> namespace and allows to configure them [via netlink]. 'route' is not yet
> supported (but prepared to) as it requires a socket.
>
> Additionally
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Fri, 29 Feb 2008 16:40:55 +0300
> So, change icmp(v6)_sk creation/disposal to the scheme used in the netlink
> for rtnl, i.e. create a socket in the context of the init_net and
> assign the namespace without getting a referrence later.
>
> Also use
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Fri, 29 Feb 2008 16:40:58 +0300
> +static void __net_exit icmpv6_sk_exit(struct net *net)
> +{
Since you call this from __new_init code, won't this
create a section conflict when ipv6 is built statically
into the kernel?
___
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Fri, 29 Feb 2008 16:39:20 +0300
> This set of patches is targeted to create separate icmp_socket inside
> each namespace. Both IPv4 and IPv6 codepaths are affected.
>
> Though, in order to do this smoothly, a bit of optimisations are
> performed. T
From: Sam Ravnborg <[EMAIL PROTECTED]>
Date: Fri, 29 Feb 2008 21:12:47 +0100
> On Fri, Feb 29, 2008 at 11:23:42AM -0800, David Miller wrote:
> > From: "Denis V. Lunev" <[EMAIL PROTECTED]>
> > Date: Fri, 29 Feb 2008 16:40:58 +0300
> >
> > > +s
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Sat, 01 Mar 2008 01:05:41 +0300
> Though, I have made a similar mistake in the IPv4 code. Pls consider
> the patch attached.
Applied and pushed out to net-2.6.26, thanks.
___
Containers mailing list
[EMAI
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Tue, 18 Mar 2008 17:35:23 +0300
> addrconf_ifdown is broken in respect to the usage of how parameter. This
> function is called with (event != NETDEV_DOWN) and (2) on the IPv6 stop.
> It the latter case inet6_dev from loopback device should be destr
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Sun, 23 Mar 2008 11:13:16 +0300
> First, this behaviour is broken for a namespace right now in the 2.6.26
> tree. inet6_dev pointer will be NULL for a loopback inside the
> namespace. The case is simple. Just remove all INET6 addresses from a
> loop
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Sun, 23 Mar 2008 17:34:59 +0300
> You are perfectly correct and the place in addrconf_cleanup is that
> place when we believe that we should destroy all the staff.
>
> You see, it is pretty useless to call addrconf_ifdown(dev, 2) after
> addrconf_d
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 13:46:58 +0300
> After the commit a91275eff43a527e1a25d6d034cbcd19ee323e64 ([NETNS][IPV6]
> udp - make proc handle the network namespace) it is now possible to make
> this file present in newly created namespaces.
>
> Signed-off-by:
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 13:50:30 +0300
> Just introduce a helper to remove ifdefs from inside the
> udplite4_register function. This will help to make the next
> patch nicer.
>
> Signed-off-by: Pavel Emelyanov <[EMAIL PROTECTED]>
Applied.
___
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 13:48:54 +0300
> After the commit f40c8174d3c21bf178283f3ef3aa8c7bf238fdec ([NETNS][IPV4]
> tcp - make proc handle the network namespaces) it is now possible to make
> this file present in newly created namespaces.
>
> Signed-off-b
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 13:53:01 +0300
> UDP-Lite sockets are displayed in another files, rather than
> UDP ones, so make the present in namespaces as well.
>
> Signed-off-by: Pavel Emelyanov <[EMAIL PROTECTED]>
Applied.
_
From: Pavel Emelyanov <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 13:55:09 +0300
> This file displays the registered packet types, but some of them
> (packet sockets creates such) can be bound to a net device and
> showing them in a wrong namespace is not correct.
>
> Signed-off-by: Pavel Emelyano
From: "Denis V. Lunev" <[EMAIL PROTECTED]>
Date: Mon, 24 Mar 2008 17:33:05 +0300
> This patch set finally enables TCP/UDP and ICMP inside a namespace.
> In order to do this we fix ARP processing, IP options processing and
> allow packets to flow to namespace aware protocols.
>
> Finally, this mak
1 - 100 of 561 matches
Mail list logo