Displaying 20 results from an estimated 77 matches for "in6_addr".
2015 Jan 30
0
[PATCH v2 1/3] ipv6: Select fragment id during UFO segmentation if not set.
...+------
net/ipv6/udp_offload.c | 10 +++++++++-
4 files changed, 38 insertions(+), 13 deletions(-)
diff --git a/include/net/ipv6.h b/include/net/ipv6.h
index 4292929..9bf85d3 100644
--- a/include/net/ipv6.h
+++ b/include/net/ipv6.h
@@ -671,6 +671,9 @@ static inline int ipv6_addr_diff(const struct in6_addr *a1, const struct in6_add
return __ipv6_addr_diff(a1, a2, sizeof(struct in6_addr));
}
+u32 __ipv6_select_ident(u32 hashrnd, struct in6_addr *dst,
+ struct in6_addr *src);
+void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt);
void ipv6_proxy_select_ident(struct sk_buff *skb);...
2015 Jan 30
0
[PATCH v2 1/3] ipv6: Select fragment id during UFO segmentation if not set.
...+------
net/ipv6/udp_offload.c | 10 +++++++++-
4 files changed, 38 insertions(+), 13 deletions(-)
diff --git a/include/net/ipv6.h b/include/net/ipv6.h
index 4292929..9bf85d3 100644
--- a/include/net/ipv6.h
+++ b/include/net/ipv6.h
@@ -671,6 +671,9 @@ static inline int ipv6_addr_diff(const struct in6_addr *a1, const struct in6_add
return __ipv6_addr_diff(a1, a2, sizeof(struct in6_addr));
}
+u32 __ipv6_select_ident(u32 hashrnd, struct in6_addr *dst,
+ struct in6_addr *src);
+void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt);
void ipv6_proxy_select_ident(struct sk_buff *skb);...
2015 Feb 03
0
[PATCH v3 net 1/3] ipv6: Select fragment id during UFO segmentation if not set.
...+------
net/ipv6/udp_offload.c | 10 +++++++++-
4 files changed, 47 insertions(+), 21 deletions(-)
diff --git a/include/net/ipv6.h b/include/net/ipv6.h
index 4292929..9bf85d3 100644
--- a/include/net/ipv6.h
+++ b/include/net/ipv6.h
@@ -671,6 +671,9 @@ static inline int ipv6_addr_diff(const struct in6_addr *a1, const struct in6_add
return __ipv6_addr_diff(a1, a2, sizeof(struct in6_addr));
}
+u32 __ipv6_select_ident(u32 hashrnd, struct in6_addr *dst,
+ struct in6_addr *src);
+void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt);
void ipv6_proxy_select_ident(struct sk_buff *skb);...
2015 Feb 03
0
[PATCH v3 net 1/3] ipv6: Select fragment id during UFO segmentation if not set.
...+------
net/ipv6/udp_offload.c | 10 +++++++++-
4 files changed, 47 insertions(+), 21 deletions(-)
diff --git a/include/net/ipv6.h b/include/net/ipv6.h
index 4292929..9bf85d3 100644
--- a/include/net/ipv6.h
+++ b/include/net/ipv6.h
@@ -671,6 +671,9 @@ static inline int ipv6_addr_diff(const struct in6_addr *a1, const struct in6_add
return __ipv6_addr_diff(a1, a2, sizeof(struct in6_addr));
}
+u32 __ipv6_select_ident(u32 hashrnd, struct in6_addr *dst,
+ struct in6_addr *src);
+void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt);
void ipv6_proxy_select_ident(struct sk_buff *skb);...
2007 Mar 19
9
[BUG?] ip ru flush && RTNETLINK answers: Numerical result out of range
After an:
# ip ru flush
I loose all my ip rules but the priority 0 one.
root@sarasvati:~# ip ru
0: from all lookup 255
root@sarasvati:~#
Ok with that, but now i''m not able to insert any new rule.
This leads to a total loose of conectivity.
root@sarasvati:~# ip ru add from all table default
RTNETLINK answers: Numerical result out of range
root@sarasvati:~# ip ru add from all
2015 Feb 03
4
[PATCH v4 net 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2015 Feb 03
4
[PATCH v4 net 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2015 Jan 30
9
[PATCH v2 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2015 Jan 30
9
[PATCH v2 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2000 Jan 17
1
pre27 compilation fails on Sol7 box
.../local/ssh//libexec/ssh/ssh-askpass\" \
-DHAVE_CONFIG_H -c atomicio.c
In file included from includes.h:106,
from atomicio.c:26:
fake-socket.h:30: parse error before u_int8_t'
fake-socket.h:30: warning: no semicolon at end of
struct or union
fake-socket.h:39: field sin6_addr' has incomplete type
*** Error code 1
make: Fatal error: Command failed for target atomicio.o'
This is indeed bizarre because the bit of code in question is:
------->8-----fake-socket.h--starting-at-line-28-------
#ifndef HAVE_STRUCT_IN6_ADDR
struct in6_addr {
u_int8_t s6_addr[16...
2008 Sep 12
4
Custom build kernel patch fails big time.
...= {
.nl_u = {
.ip4_u = {
- .saddr = local,
- .daddr = remote,
+ .saddr = fl->fl4_dst,
+ .daddr = fl->fl4_src,
.tos = fl->fl4_tos
}
}
};
+ union {
+ struct in6_addr *in6;
+ struct in_addr *in;
+ } remote, local;
+ unsigned short outer_family = 0, beet = 0;
int i;
int err;
int header_len = 0;
@@ -75,7 +80,6 @@
for (i = 0; i < nx; i++) {
struct dst_entry *dst1 = dst_alloc(&xfrm4_dst_ops);
struct xfrm_dst...
2015 Feb 02
5
[PATCH v3 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2015 Feb 02
5
[PATCH v3 0/3] Restore UFO support to virtio_net devices
commit 3d0ad09412ffe00c9afa201d01effdb6023d09b4
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Oct 30 18:27:12 2014 +0000
drivers/net: Disable UFO through virtio
Turned off UFO support to virtio-net based devices due to issues
with IPv6 fragment id generation for UFO packets. The issue
was that IPv6 UFO/GSO implementation expects the fragment id
to be supplied in
2007 Jan 08
2
Re: [nut-commits] svn commit r714 - in trunk: . server
...tested
it on a little-endian machine, but it seems to me from inet(3) that:
*.s_addr is in network byte order,
((const u_int32_t *)ip6)[3] is in network byte order (???)
prefix is in host byte order.
I cannot find the man page for struct in6_addr, so I am not sure about
the byte order of ip6, but it seems that if it's a byte array
converted to a int32 array, it should be big-endian.
-- Peter
Arjen de Korte wrote:
>
> Author: adkorte-guest
> Date: Sun Jan 7 21:37:56 2007
> New Revision: 714
>
> Modified:
> t...
2006 Jan 04
1
Samba 3.0.21 requires OS to be IPV6 Compliant ?
Hi,
My last post about compilation problems of 3.0.21 on Solaris 2.5 and 7
has no answer,so I investigated a bit more further to try to find out
the differences with 3.0.20b.
Problems come from winbind_nss_solaris.c witch evolved a lot in 3.0.21.
Several references are done to struct in6_addr witch are not defined on
solaris 7 and older.
If I'm not wrong in my diagnostic, is there a solution to allow
compilation without IPV6 support ?
Thank's for your help,
Pierre
2004 Aug 06
3
src/net/resolver.c patches for better IPv6 resolution
...I have no clue what I'm doing yet?
<p>--- resolver.c-ORIG Mon Aug 5 16:48:03 2002
+++ resolver.c Sun Sep 29 19:43:54 2002
@@ -42,6 +42,13 @@
static mutex_t _resolver_mutex;
static int _initialized = 0;
+/* ugly hacks */
+struct in_addr inp;
+union {
+ struct in_addr v4addr;
+ struct in6_addr v6addr;
+} addr_u;
+
char *resolver_getname(const char *ip, char *buff, int len)
{
if (!_isip(ip)) {
@@ -65,18 +72,11 @@
static int _isip(const char *what)
{
#ifdef HAVE_IPV6
- union {
- struct in_addr v4addr;
- struct in6_addr v6addr;
- } addr_u;
-
if (inet_pton(AF_INET, w...
2011 Sep 25
1
[nut-commits] buildbot failure in Network UPS Tools on FreeBSD-x86
...scan.h:23,
from ../../../tools/nut-scanner/scan_nut.c:22:
../../../tools/nut-scanner/nutscan-ip.h:33: error: field 'start6' has
incomplete type ../../../tools/nut-scanner/nutscan-ip.h:34: error:
field 'stop6' has incomplete type
http://www.faqs.org/rfcs/rfc2133.html (search for in6_addr)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/nut-upsdev/attachments/20110924/f49ec01e/attachment.html>
2015 Jan 26
0
[PATCH 1/3] ipv6: Select fragment id during UFO/GSO segmentation if not set.
...;
+ /* 2 or 4 bit hole */
#ifdef CONFIG_NET_SCHED
__u16 tc_index; /* traffic control index */
diff --git a/include/net/ipv6.h b/include/net/ipv6.h
index 4292929..ca6137b 100644
--- a/include/net/ipv6.h
+++ b/include/net/ipv6.h
@@ -671,7 +671,9 @@ static inline int ipv6_addr_diff(const struct in6_addr *a1, const struct in6_add
return __ipv6_addr_diff(a1, a2, sizeof(struct in6_addr));
}
+void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt);
void ipv6_proxy_select_ident(struct sk_buff *skb);
+void ipv6_skb_set_fragid(struct sk_buff *skb, __be32 frag_id);
int ip6_dst_hoplimit...
2014 Oct 27
3
[PATCH net 0/2] drivers/net,ipv6: Fix IPv6 fragment ID selection for virtio
The virtio net protocol supports UFO but does not provide for passing a
fragment ID for fragmentation of IPv6 packets. We used to generate a
fragment ID wherever such a packet was fragmented, but currently we
always use ID=0!
Ben.
Ben Hutchings (2):
drivers/net: Disable UFO through virtio
drivers/net,ipv6: Select IPv6 fragment idents for virtio UFO packets
drivers/net/macvtap.c | 16
2014 Oct 27
3
[PATCH net 0/2] drivers/net,ipv6: Fix IPv6 fragment ID selection for virtio
The virtio net protocol supports UFO but does not provide for passing a
fragment ID for fragmentation of IPv6 packets. We used to generate a
fragment ID wherever such a packet was fragmented, but currently we
always use ID=0!
Ben.
Ben Hutchings (2):
drivers/net: Disable UFO through virtio
drivers/net,ipv6: Select IPv6 fragment idents for virtio UFO packets
drivers/net/macvtap.c | 16