similar to: [Bridge] No UDP NFS over bridges in Linux 2.6.16.x?

Displaying 20 results from an estimated 1000 matches similar to: "[Bridge] No UDP NFS over bridges in Linux 2.6.16.x?"

2006 Jul 06
12
kernel BUG at net/core/dev.c:1133!
Looks like the GSO is involved? I got this while running Dom0 only (no guests), with a BOINC/Rosetta@home application running on all 4 cores. changeset: 10649:8e55c5c11475 Build: x86_32p (pae). ------------[ cut here ]------------ kernel BUG at net/core/dev.c:1133! invalid opcode: 0000 [#1] SMP CPU: 0 EIP: 0061:[<c04dceb0>] Not tainted VLI EFLAGS: 00210297 (2.6.16.13-xen
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000 David Woodhouse <dwmw2@infradead.org> wrote: > On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote: > > It's not really an oops, just a warning that stack space got quiet > > tight. > > > > The problem seems to be that the br netfilter code is nesting far too > > deeply and recursing several times. Looks like a design
2007 Apr 18
2
[Bridge] large packet size doesn't work
Hi, I have just configured a Linux box with kernel 2.6.16.7 and configured two ethernet interfaces (with MTU 1500) in bridge mode. CONFIG_BRIDGE_NETFILTER is enabled. The problem is that ping -s 1500 192.168.0.2 doesn't work from 192.168.0.1 if the systems are separated by the bridge. Normal ping with smaller packet size works ok. What is wrong? Best Regards Fulvio Ricciardi
2008 Jun 12
1
[7-STABLE] ping -s 4000 with ipsec panic
[FreeBSD 7-STABLE/i386] Hello, I've got a 100 % reproductible panic with ipsec when using a 'ping -s 4000'. It works without ipsec My ipsec setup is very simple, i just use setkey: /etc/ipsec.conf flush; spdflush; add 192.168.1.21 192.168.1.200 esp 1011 -E rijndael-cbc "0123456789012345"; add 192.168.1.200 192.168.1.21 esp 1012 -E rijndael-cbc
2007 Apr 18
1
[Bridge] bridge at start up
hi i have gone through the achieves but still could not get my bridge to suvive a reboot . please can anyone help me am using fedora core 2 -----Original message----- From: bridge-request@lists.osdl.org Date: Fri, 28 Jan 2005 03:08:06 +0100 To: bridge@lists.osdl.org Subject: Bridge Digest, Vol 17, Issue 25 > Send Bridge mailing list submissions to > bridge@lists.osdl.org > >
2007 Apr 18
4
[Bridge] [PATCH/RFC] Let {ip, arp}tables "see" bridged VLAN tagged {I, AR}P packets
Hi all, The patch below does four trivial changes and one big change Trivial changes, these are all in br_netfilter.c: - check ar_pln==4 when giving bridged ARP packets to arptables - delete unnecessary if in br_nf_local_in - add more logging for the "Argh" message - add some brag-comments in the file head comment Big change: let {ip,arp}tables see VLAN tagged {I,AR}P packets. This
2007 Apr 18
5
[Bridge] Any way of knowing a packet's been defragmented
Hello, Due to a recent change in the bridge code, we now need a way of knowing if a packet has been defragmented. The bridge code now checks on the packet size and drops packets that are too big for the output port. Defragmented packets will get refragmented later, so they shouldn't be dropped. I've been reading the defragmentation code and can't find an easy way of knowing if a
2007 Apr 18
7
[Bridge] Passing vlan tagged packets through linux bridge
> Use an Intel pro/100 or pro/1000 driver..they are known to > work with VLANs. > > I guess it's also possible that it's a problem in the > bridging code, so try the latest kernel > as well... I compiled the latest 2.6.19 kernel and tested it with two 3COM 3c905c fast ethernet interfaces which work fine with vlan 802.1q tagging, but when I have added the eth0 and eth1
2014 Jan 17
3
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
Hola, Como miembro activo de la OKFN, y asistente en lo posible a las quedadas de R, canalizo la propuesta de organizar un hackaton en colaboración entre estos dos grupos/asociaciones. La OKFN en una frase: "OKFN Spain es el grupo local de la OKFN, organización sin animo de lucro internacional para la promoción del conocimiento abierto." Para más info: - http://okfn.es/ -
2014 Jan 20
2
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
En realidad ya nos conocemos, al menos de vista, yo he ido a 2-3 quedadas del grupo local en Madrid. Y con Carlos Gil he coincidido en el Medialab y las jornadas de periodismo de la UCM, en el que presentaba mi proyecto http://transparenciadecuentaspublicas.es/ (más que nada por si alguno me podéis poner cara) Ok, yo creo que la reunión del 29 por la tarde es muy buen momento para hablar de algo
2014 Jan 20
2
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
Hola Miguel, Sí, no sé por qué pero en tu primer correo no te busqué en la red, pero lo acabo de hacer y claro que te conozco. Entonces el miércoles de la semana que viene lo hablamos en la reunión. Como hay otro tema del que también se quería hablar (el curso StatLearning) lo voy a poner en la agenda y así nos acordamos de todo. Gracias, Carlos Ortega www.qualityexcellence.es El 20 de
2007 Apr 18
3
[Bridge] My configuration in Bridge, 802.1Q VLAN, and hotmail login, Thanks to all
Hi All, For my issue, first thanks to ALL, I have some idea of it. Also Thank Peter for his kind remind, I would become one good guy in this list. Most mentioned MTU, but how I assure that the problem is just MTU, how I debug it? Here is my bridge configuration: Internet | | Gateway | | eth0 Ethernet Bridge | eth1 | H u b ( one normal hub
2023 May 19
2
[Bridge] [PATCH net-next 1/5] skbuff: bridge: Add layer 2 miss indication
On Thu, May 18, 2023 at 07:08:47PM +0300, Nikolay Aleksandrov wrote: > On 18/05/2023 14:33, Ido Schimmel wrote: > > diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c > > index fc17b9fd93e6..d8ab5890cbe6 100644 > > --- a/net/bridge/br_input.c > > +++ b/net/bridge/br_input.c > > @@ -334,6 +334,7 @@ static rx_handler_result_t br_handle_frame(struct sk_buff
2007 Apr 04
2
aggregate printing with S10
Using the following dtrace command, I can see who''s calling what with lots of +/- numbers: dtrace -n ''fbt:ip:ip_output:entry{@dbtypes[((mblk_t *)arg1)->b_datap->db_type,caller] = count();}'' ...the output is what I want but not how I want to see it. What I''d rather see is the function names associated with caller and for db_type to be output in hex.
2006 Mar 18
2
IPSEC with MAC/MLS support crack
Hi, When I use FreeBSD-6.0 Release (also FreeBSD-5.4), I found IPSEC can't coexists with MAC. When the IpSec is setup, and we connects the TCP server with IPSEC and MAC support, the server innevitably crack. Because the m_pkthdr of some mbuf is mangled by unknown reasons. Following is my kernel configuration: options MAC options MAC_DEBUG options UFS_EXTATTR options
2003 Mar 31
5
rfc3514 - Security Flag in the IPv4 Header
Any chance of this being implemented in fbsd? Could be usefull ;-) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt -- :{ andyf@speednet.com.au Andy Farkas System Administrator Speednet Communications http://www.speednet.com.au/
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi, This is a second try to fix the long chain call lengths in netfilter. The difference with the previous patch is that I got rid of the extra argument. I somehow didn't see it could be done without using the 'int *ret2' argument. A comment on the number of arguments to nf_hook_slow: I don't think the number of arguments should be decreased. For the bridge-nf code, f.e., the
2007 Apr 18
1
[Bridge] [PATCH] [2.6.15.4] Fix has_bridge_parent undefined with CONFIG_NETFILTER_DEBUG
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Apparently introduced in the latest stable set; I am not sure if this is a right fix but given that bridge parent already exists at this point it was rather silly to fetch it again. - -regards - -andrey Subject: [PATCH] [2.6.15.4] Fix has_bridge_parent undefined with CONFIG_NETFILTER_DEBUG This changes br_nf_post_routing to use realoutdev in
2013 Apr 30
6
[Bridge] [PATCHv4 net-next 0/2] Add two new flags to bridge.
The following series adds 2 new flags to bridge. One flag allows the user to control whether mac learning is performed on the interface or not. By default mac learning is on. The other flag allows the user to control whether unicast traffic is flooded (send without an fdb) to a given unicast port. Default is on. Changes since v4: - Implemented Stephen's suggestions. Changes since v2: -
2006 Apr 19
1
kernel 2.6.16.* with xen 3.0.2?
Hi, are there any patches for getting linux kernel 2.6.16.* working with xen 3.0.2. A friend told me .1 works fine, and .5 does not work at all, but maybe that information is outdated? Also there seem to be a number of security issues (2.6.16.9 was released today), so it would be nice if we could use the latest stable kernel with these fixes. are there patches to fix any problem with xen