<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/tools/net, branch v4.8.6</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.8.6</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.8.6'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2016-05-09T03:32:59Z</updated>
<entry>
<title>tools: bpf_jit_disasm: check for klogctl failure</title>
<updated>2016-05-09T03:32:59Z</updated>
<author>
<name>Colin Ian King</name>
<email>colin.king@canonical.com</email>
</author>
<published>2016-05-05T22:39:33Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=25a54342fde903b6abc2680594cf3e4864686339'/>
<id>urn:sha1:25a54342fde903b6abc2680594cf3e4864686339</id>
<content type='text'>
klogctl can fail and return -ve len, so check for this and
return NULL to avoid passing a (size_t)-1 to malloc.

Signed-off-by: Colin Ian King &lt;colin.king@canonical.com&gt;
Acked-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools, bpf_asm: simplify parser rule for BPF extensions</title>
<updated>2016-02-22T18:29:42Z</updated>
<author>
<name>Ray Bellis</name>
<email>ray@isc.org</email>
</author>
<published>2016-02-22T10:02:40Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b1d95ae5c5bd3deba84d00c4f83d7d0836b5936f'/>
<id>urn:sha1:b1d95ae5c5bd3deba84d00c4f83d7d0836b5936f</id>
<content type='text'>
We can already use yylval in the lexer for encoding the BPF extension
number, so that the parser rules can be further reduced to a single one
for each B/H/W case.

Signed-off-by: Ray Bellis &lt;ray@isc.org&gt;
Signed-off-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bpf_dbg: do not initialise statics to 0</title>
<updated>2016-02-11T09:24:45Z</updated>
<author>
<name>Wei Tang</name>
<email>tangwei@cmss.chinamobile.com</email>
</author>
<published>2016-02-04T09:36:23Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=1490d2bd1bbcf9ad127f7764b7f28b26a55e011b'/>
<id>urn:sha1:1490d2bd1bbcf9ad127f7764b7f28b26a55e011b</id>
<content type='text'>
This patch fixes the checkpatch.pl error to bpf_dbg.c:

ERROR: do not initialise statics to 0

Signed-off-by: Wei Tang &lt;tangwei@cmss.chinamobile.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools/net: Use include/uapi with __EXPORTED_HEADERS__</title>
<updated>2015-11-15T22:24:33Z</updated>
<author>
<name>Kamal Mostafa</name>
<email>kamal@canonical.com</email>
</author>
<published>2015-11-11T22:24:27Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d7475de58575c904818efa369c82e88c6648ce2e'/>
<id>urn:sha1:d7475de58575c904818efa369c82e88c6648ce2e</id>
<content type='text'>
Use the local uapi headers to keep in sync with "recently" added #define's
(e.g. SKF_AD_VLAN_TPID).  Refactored CFLAGS, and bpf_asm doesn't need -I.

Fixes: 3f356385e8a4 ("filter: bpf_asm: add minimal bpf asm tool")
Signed-off-by: Kamal Mostafa &lt;kamal@canonical.com&gt;
Acked-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_jit_disasm: make get_last_jit_image return unsigned</title>
<updated>2015-09-29T05:18:01Z</updated>
<author>
<name>Andrzej Hajda</name>
<email>a.hajda@samsung.com</email>
</author>
<published>2015-09-25T06:45:43Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=4de61ba234c0d5834bfec1cbe180008b9d2e1827'/>
<id>urn:sha1:4de61ba234c0d5834bfec1cbe180008b9d2e1827</id>
<content type='text'>
The function returns always non-negative values.

The problem has been detected using proposed semantic patch
scripts/coccinelle/tests/assign_signed_to_unsigned.cocci [1].

[1]: http://permalink.gmane.org/gmane.linux.kernel/2046107

Signed-off-by: Andrzej Hajda &lt;a.hajda@samsung.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>bpf_jit_disasm: also support reading jit dump from file</title>
<updated>2015-07-31T22:13:14Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>daniel@iogearbox.net</email>
</author>
<published>2015-07-30T14:04:22Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=a6ed38361b1e0f08d630bd491051c254d1fc71b9'/>
<id>urn:sha1:a6ed38361b1e0f08d630bd491051c254d1fc71b9</id>
<content type='text'>
This patch adds support to read the dmesg BPF JIT dump also from a
file instead of the klog buffer. I found this quite useful when going
through some 'before/after patch' logs. It also fixes a regex leak
found by valgrind when no image dump was found.

Signed-off-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_jit_disasm: fix segfault on disabled debugging log output</title>
<updated>2015-05-27T04:24:10Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>daniel@iogearbox.net</email>
</author>
<published>2015-05-25T12:08:03Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=082739aa458a74add9a2362988e5aca0367bfa53'/>
<id>urn:sha1:082739aa458a74add9a2362988e5aca0367bfa53</id>
<content type='text'>
With recent debugging, I noticed that bpf_jit_disasm segfaults when
there's no debugging output from the JIT compiler to the kernel log.

Reason is that when regexec(3) doesn't match on anything, start/end
offsets are not being filled out and contain some uninitialized garbage
from stack. Thus, we need zero out offsets first.

Signed-off-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_asm: cleanup vlan extension related token</title>
<updated>2015-03-25T01:21:41Z</updated>
<author>
<name>Daniel Borkmann</name>
<email>daniel@iogearbox.net</email>
</author>
<published>2015-03-24T22:19:24Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=835c3d9b7a28f5ecfc2dea2300946e27811f16a5'/>
<id>urn:sha1:835c3d9b7a28f5ecfc2dea2300946e27811f16a5</id>
<content type='text'>
We now have K_VLANT, K_VLANP and K_VLANTPID. Clean them up into more
descriptive token, namely K_VLAN_TCI, K_VLAN_AVAIL and K_VLAN_TPID.

Signed-off-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>filter: introduce SKF_AD_VLAN_TPID BPF extension</title>
<updated>2015-03-24T19:25:15Z</updated>
<author>
<name>Michal Sekletar</name>
<email>msekleta@redhat.com</email>
</author>
<published>2015-03-24T13:48:41Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=27cd5452476978283decb19e429e81fc6c71e74b'/>
<id>urn:sha1:27cd5452476978283decb19e429e81fc6c71e74b</id>
<content type='text'>
If vlan offloading takes place then vlan header is removed from frame
and its contents, both vlan_tci and vlan_proto, is available to user
space via TPACKET interface. However, only vlan_tci can be used in BPF
filters.

This commit introduces a new BPF extension. It makes possible to load
the value of vlan_proto (vlan TPID) to register A. Support for classic
BPF and eBPF is being added, analogous to skb-&gt;protocol.

Cc: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Cc: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Cc: Jiri Pirko &lt;jpirko@redhat.com&gt;

Signed-off-by: Michal Sekletar &lt;msekleta@redhat.com&gt;
Acked-by: Daniel Borkmann &lt;daniel@iogearbox.net&gt;
Acked-by: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Reviewed-by: Jiri Pirko &lt;jiri@resnulli.us&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>tools: bpf_jit_disasm: increase image buffer size</title>
<updated>2014-05-16T20:44:08Z</updated>
<author>
<name>Alexei Starovoitov</name>
<email>ast@plumgrid.com</email>
</author>
<published>2014-05-15T22:56:39Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9bb1a208fddda94ea3c6df1fc9a225f92761cf1c'/>
<id>urn:sha1:9bb1a208fddda94ea3c6df1fc9a225f92761cf1c</id>
<content type='text'>
JITed seccomp filters can be quite large if they check a lot of syscalls
Simply increase buffer size

Signed-off-by: Alexei Starovoitov &lt;ast@plumgrid.com&gt;
Acked-by: Daniel Borkmann &lt;dborkman@redhat.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
