nux Programmer's Manual"
> .SH NAME
> -rtnetlink \- Linux IPv4 routing socket
> +rtnetlink \- Linux routing socket
> .SH SYNOPSIS
> .nf
> .B #include
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
thread to be associated with a NIC HW
> +receive queue and service all the connection requests received on that RX
> +queue. This mapping between a app thread and a HW NIC queue streamlines the
> +flow of data from the NIC to the application.
> +.TP
> .B SO_KEEPALIVE
> Enable sen
On 10/28/20 7:13 AM, Michael Kerrisk (man-pages) wrote:
> On 10/28/20 2:15 AM, Sridhar Samudrala wrote:
>> Add documentation for SO_INCOMING_NAPI_ID in socket.7 man page.
>
> Hello Sridhar,
>
> Thank you!
>
> Would it be possible for you to resubmit the patch, with a
[CC += beej, to alert the author about the memory leaks
in the network programming guide]
Hello Marko,
> On Thu, Sep 17, 2020 at 7:42 AM Michael Kerrisk (man-pages) <
> mtk.manpa...@gmail.com> wrote:
>
>> Hi Marko,
>>
>> On Thu, 17 Sep 2020 at 07:34, Mark
gt; datagrams, and read responses from server */
>
When you say "memory leak", do you mean that something like valgrind
complains? I mean, strictly speaking, there is no memory leak that I
can see that is fixed by that patch, since the if-branches that the
freeaddrinfo() calls
ating the interfaces:
> +.PP
> +.in +4n
> +.EX
> +# ip link add netns type veth peer netns
> +.EE
> +.in
> +.PP
> +or, for an existing
> .B veth
> -device as above and then moves one side of the pair to the other namespace:
> +pair, move one side to the other name
On 1 February 2018 at 19:03, Stefan Hajnoczi wrote:
> On Tue, Jan 30, 2018 at 10:31:54PM +0100, Michael Kerrisk (man-pages) wrote:
>> Hi Stefan,
>>
>> Ping on the below please, since it either blocks the man-pages release
>> I'd currently like to make, or I must
Hi Stefan,
Ping on the below please, since it either blocks the man-pages release
I'd currently like to make, or I must remove the vsock.7 page for this
release.
Thanks,
Michael
On 26 January 2018 at 22:47, Michael Kerrisk (man-pages)
wrote:
> Stefan,
>
> I've just now n
PT
> +Invalid socket option in
> +.B setsockopt (2)
> +or
> +.B getsockopt (2).
> +.TP
> +.B EPROTONOSUPPORT
> +Invalid socket protocol number. Protocol should always be 0.
> +.TP
> +.B ESOCKTNOSUPPORT
> +Unsupported socket type in
> +.B socket (2).
> +Only
> +.B SOCK_
nges:
>
> https://github.com/avikivity/seastar/commits/aio
>
> Changes since V1:
> - handle the NULL ->poll case in vfs_poll
> - dropped the file argument to the ->poll_mask socket operation
> - replace the ->pre_poll socket operation with ->get_pol
Hello Mahesh,
On 12/28/2017 01:45 AM, Mahesh Bandewar (महेश बंडेवार) wrote:
> On Wed, Dec 27, 2017 at 12:23 PM, Michael Kerrisk (man-pages)
> wrote:
>> Hello Mahesh,
>>
>> On 27 December 2017 at 18:09, Mahesh Bandewar (महेश बंडेवार)
>> wrote:
>>> Hello
TY_U32S,
> + caps_bitmap, CAP_LAST_CAP);
> + if (ret != CAP_LAST_CAP)
> + return -1;
> +
> + controlled_userns_caps_whitelist = tmp;
> + }
> + return 0;
> +}
> +#endif /* CONFIG_SYSCTL */
>
>> Mahesh Bandewar (2):
>> capability: introduce sysctl for controlled user-ns capability whitelist
>> userns: control capabilities of some user namespaces
>>
>> Documentation/sysctl/kernel.txt | 21 +
>> include/linux/capability.h | 7 ++
>> include/linux/user_namespace.h | 25
>> kernel/capability.c | 52
>> +
>> kernel/sysctl.c | 5
>> kernel/user_namespace.c | 4
>> security/commoncap.c| 8 +++
>> 7 files changed, 122 insertions(+)
>>
>> --
>> 2.15.0.531.g2ccb3012c9-goog
>>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-api" in
> the body of a message to majord...@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
r
>> +.BR sendmsg (2)
>> +and
>> +.B MSG_PEEK
>> +for
>> +.BR recvmsg (2).
>> +.TP
>> +.B EADDRINUSE
>> +Unable to bind to a port that is already in use.
>> +.TP
>> +.B EADDRNOTAVAIL
>> +Unable to find a free port for binding or unable to bind to a non-local CID.
>> +.TP
>> +.B ENOTCONN
>> +Unable to perform operation on an unconnected socket.
>> +.TP
>> +.B ENOPROTOOPT
>> +Invalid socket option in
>> +.BR setsockopt (2)
>> +or
>> +.BR getsockopt (2).
>> +.TP
>> +.B EPROTONOSUPPORT
>> +Invalid socket protocol number. Protocol should always be 0.
>> +.TP
>> +.B ESOCKTNOSUPPORT
>> +Unsupported socket type in
>> +.BR socket (2).
>> +Only
>> +.B SOCK_STREAM
>> +and
>> +.B SOCK_DGRAM
>> +are valid.
>> +.SH VERSIONS
>> +Support for VMware (VMCI) has been available since Linux 3.9. KVM (virtio)
>> is
>> +supported since Linux 4.8. Hyper-V is supported since 4.14.
>> +.SH SEE ALSO
>> +.BR socket (2),
>> +.BR bind (2),
>> +.BR connect (2),
>> +.BR listen (2),
>> +.BR send (2),
>> +.BR recv (2),
>> +.BR capabilities (7)
>> --
>> 2.14.3
>>
>
> Looks great to me. Thanks for doing this. I don’t have anything to add.
>
> Reviewed-by: Jorgen Hansen
Thanks, Jorgen!
Cheers,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
OPROTOOPT
> +Invalid socket option in
> +.BR setsockopt (2)
> +or
> +.BR getsockopt (2).
> +.TP
> +.B EPROTONOSUPPORT
> +Invalid socket protocol number. Protocol should always be 0.
> +.TP
> +.B ESOCKTNOSUPPORT
> +Unsupported socket type in
> +.BR socket (2).
> +Only
> +.B SOCK_STREAM
> +and
> +.B SOCK_DGRAM
> +are valid.
> +.SH VERSIONS
> +Support for VMware (VMCI) has been available since Linux 3.9. KVM (virtio)
> is
> +supported since Linux 4.8. Hyper-V is supported since 4.14.
> +.SH SEE ALSO
> +.BR socket (2),
> +.BR bind (2),
> +.BR connect (2),
> +.BR listen (2),
> +.BR send (2),
> +.BR recv (2),
> +.BR capabilities (7)
Cheers,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
n7/socket.7
@@ -881,8 +881,7 @@ compete to receive datagrams on the same socket.
.\" commit 3b885787ea4112eaa80945999ea0901bf742707f
Indicates that an unsigned 32-bit value ancillary message (cmsg)
should be attached to received skbs indicating
-the number of packets dropped by the socket between
-the last received packet and this received packet.
+the number of packets dropped by the socket since its creation.
.TP
.B SO_SNDBUF
Sets or gets the maximum socket send buffer in bytes.
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
an unsigned 32-bit value ancillary message
> (cmsg) should be attached to
> received skbs indicating the number of packets dropped by the
> socket since its
> creation.
Thanks for the report. See also my reply to Petr in just a moment.
I've taken your
example code in the
> manpage, how about also including a brief comment to the effect that
> using 8192 bytes will avoid message truncation problems on platforms
> with a large PAGE_SIZE?
>
> /* avoid msg truncation on > 4096 byte PAGE_SIZE platforms */
>
> or s
Using an
> 8k buffer
> as implied in netlink.h prevents problems with any page size.
>
> Lets change the example so others don't propagate the problem further.
>
> Signed-off-by David Wilder
Thanks, David. Patch applied.
Cheers,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
On 04/19/2017 10:13 PM, Eric Dumazet wrote:
> On Wed, 2017-04-19 at 20:48 +0200, Michael Kerrisk (man-pages) wrote:
>> Hi Eric,
>>
>> [reodering for clarity]
>>
>>>> On 02/19/2017 09:55 PM, Michael Kerrisk (man-pages) wrote:
>>>>> [CC += Eri
Hi Eric,
[reodering for clarity]
>> On 02/19/2017 09:55 PM, Michael Kerrisk (man-pages) wrote:
>>> [CC += Eric, so that he might review]
>>>
>>> Hello Francois,
>>>
>>> On 02/18/2017 05:06 AM, Francois Saint-Jacques wrote:
>>>> Th
Ping Eric!
Would you have a chance to review the proposed text below, please.
Thanks,
Michael
On 02/19/2017 09:55 PM, Michael Kerrisk (man-pages) wrote:
> [CC += Eric, so that he might review]
>
> Hello Francois,
>
> On 02/18/2017 05:06 AM, Francois Saint-Jacques wrote:
>&g
+-
> include/uapi/asm-generic/socket.h |2 +
> net/core/dev.c | 16 ++--
> net/core/sock.c | 22 ++
> net/ipv4/tcp_ipv4.c|1
> 18 files changed, 183 insertions(+), 11 deletions(-)
>
> --
--
Michael Kerrisk Linux man-pages maintainer;
http://www.kernel.org/doc/man-pages/
Author of "The Linux Programming Interface", http://blog.man7.org/
will also solve the
> problem around duplicate address detection and multiplexing packets to
> the IGMP or MLD state machines.
>
> The resource consumption in comparison with ordinary namespaces will be
> much lower. All in all, we will have far less networking subsystems t
.c | 327 --
> net/core/sock.c | 29 ++
> net/ipv4/ip_output.c | 34 +-
> net/ipv4/raw.c| 27 +-
> net/ipv4/tcp.c | 37 +-
> net/packet/af_packet.c
e RX queue
that is associated with a particular CPU, the typical use
case is to employ one listening process per RX queue, with
the incoming flow being handled by a listener on the same
CPU that is handling the RX queue. This p
On 26 July 2016 at 18:52, Kees Cook wrote:
> On Tue, Jul 26, 2016 at 8:06 AM, Eric W. Biederman
> wrote:
>> "Michael Kerrisk (man-pages)" writes:
>>
>>> Hello Eric,
>>>
>>> I realized I had a question after the last mail.
>>>
>
Hello Eric,
I realized I had a question after the last mail.
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
Can yo
Hello Eric,
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
The maximum sane case I can imagine is if every process i
Hi Andrey,
On 06/10/2016 10:28 PM, Andrey Vagin wrote:
> Cc: Kir Kolyshkin
> Cc: Michael Kerrisk
> Cc: Herbert Xu
> Cc: Patrick McHardy
> Cc: Christophe Ricard
> Cc: Nicolas Dichtel
> Signed-off-by: Andrey Vagin
> --
l still be delivered.
> To stop receiving data from all sources at once, use
> -.BR IP_LEAVE_GROUP .
> +.BR IP_DROP_MEMBERSHIP .
> .IP
> Argument is an
> .I ip_mreq_source
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
On 03/01/2016 11:10 AM, Vincent Bernat wrote:
> ❦ 1 mars 2016 11:03 +0100, "Michael Kerrisk (man-pages)"
> :
>
>> Once the SO_LOCK_FILTER option has been enabled,
>> attempts by an unprivileged process to change or remove
>>
ETACH_BPF
> SO_LOCK_FILTER
>
> Signed-off-by: Craig Gallek
> ---
> v2 changes:
> - Content suggestions from Michael Kerrisk :
> * Clarify socket filter return value semantics
> * Clarify wording of minimal kernel versions
> * Explain behavior of multiple
ince/
> +.TP
> .BR SO_DOMAIN " (since Linux 2.6.32)"
> Retrieves the socket domain as an integer, returning a value such as
> .BR AF_INET6 .
> @@ -991,17 +1070,6 @@ where only the later program needs to set the
> option.
> Typically this difference is invisible, since,
o routing system */
> +#define SIOCRTMSG0x890D /* unused */
>
> /* Socket configuration controls. */
> #define SIOCGIFNAME 0x8910 /* get iface name */
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org
0);
> + (timeout_ts\->tv_sec * 1000 + timeout_ts\->tv_nsec / 100);
> pthread_sigmask(SIG_SETMASK, &sigmask, &origmask);
> ready = poll(&fds, nfds, timeout);
> pthread_sigmask(SIG_SETMASK, &origmask, NULL);
--
Michael Kerrisk
Linux man-p
9 @@ SYSCALL_DEFINE3(bpf, int, cmd, union bpf_attr __user *,
> uattr, unsigned int, siz
> case BPF_PROG_LOAD:
> err = bpf_prog_load(&attr);
> break;
> + case BPF_PROG_DUMP:
> + err = bpf_prog_dump(&attr, uattr)
security_capable_noaudit(current_cred(), current_user_ns(),
> +CAP_SYS_ADMIN) != 0)
> + return -EACCES;
> +
> /*
> * Make sure we cannot change seccomp or nnp state via TSYNC
> * while another thread
YPE_SECCOMP,
> +};
> +
> static int __init register_sk_filter_ops(void)
> {
> bpf_register_prog_type(&sk_filter_type);
> bpf_register_prog_type(&sched_cls_type);
> bpf_register_prog_type(&sched_act_type);
> + bpf_register_prog_type(&a
->seccomp.filter; cur; cur = cur->prev) {
> + if (cur->prog == prog) {
> + if (!cur->prev)
> + ret = -ENOENT;
> + else
> + ret = bpf_prog_set(fd, cur-&
s,
>> if (flags & ~SECCOMP_FILTER_FLAG_MASK)
>> return -EINVAL;
>>
>> + /*
>> +* Installing a seccomp filter requires that the task has
>> +* CAP_SYS_ADMIN in its namespace or be running with no_new_privs.
>> +* This avoids
Stephen Hemminger wrote:
> On Fri, 14 Dec 2007 09:48:32 +0100
> Michael Kerrisk <[EMAIL PROTECTED]> wrote:
>
>> Hello Linux networking folk,
>>
>> I received the patch below for the tcp.7 man page. Would anybody here be
>> prepared to review the
viewed/changed via the sysctl variable
+.IR net.ipv4.tcp_congestion_control "."
+If you feel, you are missing an algorithm in the list,
+you may try to load the corresponding module using
+.BR modprobe (8),
+or if your kernel is built with module autoloading support
+.RI ( CONFIG_KMOD )
+and
> It really looks like time for major overhaul of that (and related) man-pages
> is needed...
Yes. Andi Kleen did a good job of putting some pages together in
the 2.2 timeframe, but no-one else carried on the work since then,
and there is much that sould be updated in the *.7 networking
pages.
C
VE_ANYCAST
IPV6_V6ONLY
IPV6_RECVPKTINFO
IPV6_2292PKTINFO
Can anyone help with documenting any of these please?
Cheers,
Michael
--
Michael Kerrisk
maintainer of Linux man pages Sections 2, 3, 4, 5, and 7
Want to help with man page maintenance? Grab the latest tarball at
http://www.kernel.org/pub/
; +to this socket.
> .TP
> .B IPV6_UNICAST_HOPS
> Set the unicast hop limit for the socket.
> -
> To unsubscribe from this list: send the line "unsubscribe linux-man" in
> the body of a message to [EMAIL PROTECTED]
> More majordomo info at http://vger.kerne
On 9/28/07, Stephen Hemminger <[EMAIL PROTECTED]> wrote:
> On Thu, 27 Sep 2007 13:53:34 -0700 (PDT)
> David Miller <[EMAIL PROTECTED]> wrote:
>
> > From: Stephen Hemminger <[EMAIL PROTECTED]>
> > Date: Mon, 24 Sep 2007 15:34:35 -0700
> >
> > > The bug http://bugzilla.kernel.org/show_bug.cgi?id=5731
, perhaps you can clarify that in the manpages
I added the following to sockets.7:
Timeouts have
effect for socket I/O calls (read(2), recv(2),
recvfrom(2),recvmsg(2),write(2), send(2),
sendto(2), sendmsg(2)); timeouts have no e
TFILTER needed.
FIXME More details on NETLINK_KOBJECT_UEVENT needed.
FIXME NLM_F_ATOMIC is not used any more?
FIXME Explain more about nlmsg_seq and nlmsg_pid.
==
man7/udp.7
FIXME document UDP_ENCAP (new in kernel 2.5.67)
--
Michael Kerrisk
maintainer of Linux man pag
rs,
Michael
> >
> >
> > diff -rU3 man-pages-2.43-a/man7/ip.7 man-pages-2.43-b/man7/ip.7
> > --- man-pages-2.43-a/man7/ip.7 2006-09-26 09:54:29.0 -0400
> > +++ man-pages-2.43-b/man7/ip.7 2007-03-27 15:46:18.0 -0400
--
Michael Kerrisk
m
sis that
-- the IPPROTO_* constants are what appear in POSIX, and
-- glibc defines the IPPROTO_* constants with the same values
as the corresponding SOL_* constants.
Does anyone see a problem with this change in the docs?
Cheers,
Michael
--
Michael Kerrisk
maintainer of Linux man pages Sections
t; > Recently (not yet published), I went though ip(7), tcp(7), udp(7)
> > etc, and changed SOL_IP to IPPROTO_IP, SOL_TCP to IPPROTO_TCP,
> > etc, on the basis that
> >
> > -- the IPPROTO_* constants are what appear in POSIX, and
>
> That's goo
ase, can someone please
> > send me the latest version?
>
> Actually they're kind of maintained in the manpages package on kernel.org
Yes.
> The maintainer is Michael Kerrisk <[EMAIL PROTECTED]>
Yes.
> ftp://ftp.kernel.org/pub/linux/docs/manpages/
>
> Just
53 matches
Mail list logo