<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/tools/net, branch v3.16</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/tools/net?h=v3.16</id>
<link rel='self' href='https://git.amat.us/linux/atom/tools/net?h=v3.16'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2014-05-16T20:44:08Z</updated>
<entry>
<title>tools: bpf_jit_disasm: increase image buffer size</title>
<updated>2014-05-16T20:44:08Z</updated>
<author>
<name>Alexei Starovoitov</name>
<email>ast@plumgrid.com</email>
</author>
<published>2014-05-15T22:56:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9bb1a208fddda94ea3c6df1fc9a225f92761cf1c'/>
<id>urn:sha1:9bb1a208fddda94ea3c6df1fc9a225f92761cf1c</id>
<content type='text'>
JITed seccomp filters can be quite large if they check a lot of syscalls
Simply increase buffer size

Signed-off-by: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Acked-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_jit_disasm: ignore image address for disasm</title>
<updated>2014-05-16T20:44:08Z</updated>
<author>
<name>Alexei Starovoitov</name>
<email>ast@plumgrid.com</email>
</author>
<published>2014-05-15T22:56:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ed4afd451f12ea57f9aaaf6f8442eee7e415fa1a'/>
<id>urn:sha1:ed4afd451f12ea57f9aaaf6f8442eee7e415fa1a</id>
<content type='text'>
seccomp filters use kernel JIT image addresses, so bpf_jit_enable=2 prints
[ 20.146438] flen=3 proglen=82 pass=0 image=0000000000000000
[ 20.146442] JIT code: 00000000: 55 48 89 e5 48 81 ec 28 02 00 00 ...

ignore image address, so that seccomp filters can be disassembled

Signed-off-by: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Acked-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2014-05-12T17:19:14Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2014-05-12T17:19:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5f013c9bc70214dcacd5fbed5a06c217d6ff9c59'/>
<id>urn:sha1:5f013c9bc70214dcacd5fbed5a06c217d6ff9c59</id>
<content type='text'>
Conflicts:
	drivers/net/ethernet/altera/altera_sgdma.c
	net/netlink/af_netlink.c
	net/sched/cls_api.c
	net/sched/sch_api.c

The netlink conflict dealt with moving to netlink_capable() and
netlink_ns_capable() in the 'net' tree vs. supporting 'tc' operations
in non-init namespaces.  These were simple transformations from
netlink_capable to netlink_ns_capable.

The Altera driver conflict was simply code removal overlapping some
void pointer cast cleanups in net-next.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bpf_dbg: fix wrong register usage</title>
<updated>2014-04-30T20:12:22Z</updated>
<author>
<name>Brendan Hickey</name>
<email>bhickey@google.com</email>
</author>
<published>2014-04-30T08:24:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e5744fe9d262d11131916d04ea79ea539fe296c0'/>
<id>urn:sha1:e5744fe9d262d11131916d04ea79ea539fe296c0</id>
<content type='text'>
The AND instruction is erroneously using the X register instead
of the K register.

Signed-off-by: Brendan Hickey &lt;bhickey@google.com&gt;
Signed-off-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>filter: added BPF random opcode</title>
<updated>2014-04-23T01:27:57Z</updated>
<author>
<name>Chema Gonzalez</name>
<email>chema@google.com</email>
</author>
<published>2014-04-21T16:21:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4cd3675ebf74d7f559038ded6aa8088e4099a83d'/>
<id>urn:sha1:4cd3675ebf74d7f559038ded6aa8088e4099a83d</id>
<content type='text'>
Added a new ancillary load (bpf call in eBPF parlance) that produces
a 32-bit random number. We are implementing it as an ancillary load
(instead of an ISA opcode) because (a) it is simpler, (b) allows easy
JITing, and (c) seems more in line with generic ISAs that do not have
"get a random number" as a instruction, but as an OS call.

The main use for this ancillary load is to perform random packet sampling.

Signed-off-by: Chema Gonzalez &lt;chema@google.com&gt;
Acked-by: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Acked-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2014-03-15T02:31:55Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2014-03-15T02:31:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=85dcce7a73f1cc59f7a96fe52713b1630f4ca272'/>
<id>urn:sha1:85dcce7a73f1cc59f7a96fe52713b1630f4ca272</id>
<content type='text'>
Conflicts:
	drivers/net/usb/r8152.c
	drivers/net/xen-netback/netback.c

Both the r8152 and netback conflicts were simple overlapping
changes.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools/net/Makefile: Define PACKAGE to fix build problems</title>
<updated>2014-03-12T04:07:55Z</updated>
<author>
<name>Markos Chandras</name>
<email>markos.chandras@imgtec.com</email>
</author>
<published>2014-03-11T08:49:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=406764622fb71e5f4efb39ff111ef87713815f6d'/>
<id>urn:sha1:406764622fb71e5f4efb39ff111ef87713815f6d</id>
<content type='text'>
Fixes the following build problem with binutils-2.24

gcc -Wall -O2   -c -o bpf_jit_disasm.o bpf_jit_disasm.c
In file included from bpf_jit_disasm.c:25:0:
/usr/include/bfd.h:35:2: error: #error config.h must be included
before this header
 #error config.h must be included before this header

This is similar to commit 3ce711a6abc27abce1554e1d671a8762b7187690
"perf tools: bfd.h/libbfd detection fails with recent binutils"

See: https://sourceware.org/bugzilla/show_bug.cgi?id=14243

CC: David S. Miller &lt;davem@davemloft.net&gt;
CC: Daniel Borkmann &lt;dborkman@redhat.com&gt;
CC: netdev@vger.kernel.org
Acked-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: Markos Chandras &lt;markos.chandras@imgtec.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_dbg: various misc code cleanups</title>
<updated>2014-02-25T00:02:10Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>dborkman@redhat.com</email>
</author>
<published>2014-02-22T17:37:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7debf7806e0e984ea7e43cc271dc9400b0dffc14'/>
<id>urn:sha1:7debf7806e0e984ea7e43cc271dc9400b0dffc14</id>
<content type='text'>
Lets clean up bpf_dbg a bit and improve its code slightly
in various areas: i) Get rid of some macros as there's no
good reason for keeping them, ii) remove one unused variable
and reduce scope of various variables found by cppcheck,
iii) Close non-default file descriptors when exiting the shell.

Signed-off-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bpf_exp: free duplicated labels at exit time</title>
<updated>2013-12-17T22:11:00Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>dborkman@redhat.com</email>
</author>
<published>2013-12-16T10:45:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d207cf4c1ad27c6f8881857ca301f8489826116d'/>
<id>urn:sha1:d207cf4c1ad27c6f8881857ca301f8489826116d</id>
<content type='text'>
Valgrind found that extracted labels that are passed from the lexer
weren't freed upon exit. Therefore, add a small helper function that
walks label tables and frees them. Since also NULL can be passed to
free(3), we do not need to take care of that here. While at it, fix
up a spacing error in bpf_set_curr_label().

Signed-off-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bpf_dbg: always close socket in bpf_runnable</title>
<updated>2013-12-17T22:11:00Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>dborkman@redhat.com</email>
</author>
<published>2013-12-16T10:45:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8b138da62f3ef370bebaaed7385020993bb787ae'/>
<id>urn:sha1:8b138da62f3ef370bebaaed7385020993bb787ae</id>
<content type='text'>
We must not leave the socket intact in bpf_runnable(). The socket
is used to test if the filter code is being accepted by the kernel
or not. So right after we do the setsockopt(2), we need to close
it again.

Signed-off-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
