Displaying 20 results from an estimated 1000 matches similar to: "[Bridge] No UDP NFS over bridges in Linux 2.6.16.x?"
2006 Jul 06
12
kernel BUG at net/core/dev.c:1133!
Looks like the GSO is involved?
I got this while running Dom0 only (no guests), with a
BOINC/Rosetta@home application running on all 4 cores.
changeset: 10649:8e55c5c11475
Build: x86_32p (pae).
------------[ cut here ]------------
kernel BUG at net/core/dev.c:1133!
invalid opcode: 0000 [#1]
SMP
CPU: 0
EIP: 0061:[<c04dceb0>] Not tainted VLI
EFLAGS: 00210297 (2.6.16.13-xen
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000
David Woodhouse <dwmw2@infradead.org> wrote:
> On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote:
> > It's not really an oops, just a warning that stack space got quiet
> > tight.
> >
> > The problem seems to be that the br netfilter code is nesting far too
> > deeply and recursing several times. Looks like a design
2007 Apr 18
2
[Bridge] large packet size doesn't work
Hi,
I have just configured a Linux box with kernel 2.6.16.7 and configured two
ethernet interfaces (with MTU 1500) in bridge mode. CONFIG_BRIDGE_NETFILTER
is enabled.
The problem is that ping -s 1500 192.168.0.2 doesn't work from 192.168.0.1
if the systems are separated by the bridge. Normal ping with smaller packet
size works ok.
What is wrong?
Best Regards
Fulvio Ricciardi
2008 Jun 12
1
[7-STABLE] ping -s 4000 with ipsec panic
[FreeBSD 7-STABLE/i386]
Hello,
I've got a 100 % reproductible panic with ipsec when using a
'ping -s 4000'. It works without ipsec
My ipsec setup is very simple, i just use setkey:
/etc/ipsec.conf
flush;
spdflush;
add 192.168.1.21 192.168.1.200 esp 1011 -E rijndael-cbc
"0123456789012345";
add 192.168.1.200 192.168.1.21 esp 1012 -E rijndael-cbc
2007 Apr 18
1
[Bridge] bridge at start up
hi i have gone through the achieves but still could not get my bridge to suvive a reboot .
please can anyone help me am using fedora core 2
-----Original message-----
From: bridge-request@lists.osdl.org
Date: Fri, 28 Jan 2005 03:08:06 +0100
To: bridge@lists.osdl.org
Subject: Bridge Digest, Vol 17, Issue 25
> Send Bridge mailing list submissions to
> bridge@lists.osdl.org
>
>
2007 Apr 18
4
[Bridge] [PATCH/RFC] Let {ip, arp}tables "see" bridged VLAN tagged {I, AR}P packets
Hi all,
The patch below does four trivial changes and one big change
Trivial changes, these are all in br_netfilter.c:
- check ar_pln==4 when giving bridged ARP packets to arptables
- delete unnecessary if in br_nf_local_in
- add more logging for the "Argh" message
- add some brag-comments in the file head comment
Big change: let {ip,arp}tables see VLAN tagged {I,AR}P packets.
This
2007 Apr 18
5
[Bridge] Any way of knowing a packet's been defragmented
Hello,
Due to a recent change in the bridge code, we now need a way of knowing if
a packet has been defragmented. The bridge code now checks on the packet
size and drops packets that are too big for the output port. Defragmented
packets will get refragmented later, so they shouldn't be dropped.
I've been reading the defragmentation code and can't find an easy way of
knowing if a
2007 Apr 18
7
[Bridge] Passing vlan tagged packets through linux bridge
> Use an Intel pro/100 or pro/1000 driver..they are known to
> work with VLANs.
>
> I guess it's also possible that it's a problem in the
> bridging code, so try the latest kernel
> as well...
I compiled the latest 2.6.19 kernel and tested it with two
3COM 3c905c fast ethernet interfaces which work fine with
vlan 802.1q tagging, but when I have added the eth0 and eth1
2014 Jan 17
3
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
Hola,
Como miembro activo de la OKFN, y asistente en lo posible a las quedadas de
R, canalizo la propuesta de organizar un hackaton en colaboración entre
estos dos grupos/asociaciones.
La OKFN en una frase: "OKFN Spain es el grupo local de la OKFN,
organización sin animo de lucro internacional para la promoción del
conocimiento abierto."
Para más info:
- http://okfn.es/
-
2014 Jan 20
2
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
En realidad ya nos conocemos, al menos de vista, yo he ido a 2-3 quedadas
del grupo local en Madrid. Y con Carlos Gil he coincidido en el Medialab y
las jornadas de periodismo de la UCM, en el que presentaba mi proyecto
http://transparenciadecuentaspublicas.es/ (más que nada por si alguno me
podéis poner cara)
Ok, yo creo que la reunión del 29 por la tarde es muy buen momento para
hablar de algo
2014 Jan 20
2
propuesta hackaton con Open Knowledge FoundatioN Spain (OKFN)
Hola Miguel,
Sí, no sé por qué pero en tu primer correo no te busqué en la red, pero lo
acabo de hacer y claro que te conozco.
Entonces el miércoles de la semana que viene lo hablamos en la reunión.
Como hay otro tema del que también se quería hablar (el curso StatLearning)
lo voy a poner en la agenda y así nos acordamos de todo.
Gracias,
Carlos Ortega
www.qualityexcellence.es
El 20 de
2007 Apr 18
3
[Bridge] My configuration in Bridge, 802.1Q VLAN, and hotmail login, Thanks to all
Hi All,
For my issue, first thanks to ALL, I have some idea of it.
Also Thank Peter for his kind remind, I would become one good guy in
this list.
Most mentioned MTU, but how I assure that the problem is just MTU, how I
debug it?
Here is my bridge configuration:
Internet
|
|
Gateway
|
| eth0
Ethernet Bridge
| eth1
|
H u b ( one normal hub
2023 May 19
2
[Bridge] [PATCH net-next 1/5] skbuff: bridge: Add layer 2 miss indication
On Thu, May 18, 2023 at 07:08:47PM +0300, Nikolay Aleksandrov wrote:
> On 18/05/2023 14:33, Ido Schimmel wrote:
> > diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c
> > index fc17b9fd93e6..d8ab5890cbe6 100644
> > --- a/net/bridge/br_input.c
> > +++ b/net/bridge/br_input.c
> > @@ -334,6 +334,7 @@ static rx_handler_result_t br_handle_frame(struct sk_buff
2007 Apr 04
2
aggregate printing with S10
Using the following dtrace command, I can see who''s calling what with lots of +/- numbers:
dtrace -n ''fbt:ip:ip_output:entry{@dbtypes[((mblk_t *)arg1)->b_datap->db_type,caller] = count();}''
...the output is what I want but not how I want to see it.
What I''d rather see is the function names associated with caller and for db_type to be output in hex.
2006 Mar 18
2
IPSEC with MAC/MLS support crack
Hi, When I use FreeBSD-6.0 Release (also FreeBSD-5.4),
I found
IPSEC can't coexists with MAC.
When the IpSec is setup, and we connects the TCP
server with IPSEC and MAC support, the server
innevitably crack. Because the m_pkthdr of some mbuf
is mangled by unknown reasons.
Following is my kernel configuration:
options MAC
options MAC_DEBUG
options UFS_EXTATTR
options
2003 Mar 31
5
rfc3514 - Security Flag in the IPv4 Header
Any chance of this being implemented in fbsd? Could be usefull ;-)
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt
--
:{ andyf@speednet.com.au
Andy Farkas
System Administrator
Speednet Communications
http://www.speednet.com.au/
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi,
This is a second try to fix the long chain call lengths in netfilter.
The difference with the previous patch is that I got rid of the extra
argument. I somehow didn't see it could be done without using the 'int
*ret2' argument.
A comment on the number of arguments to nf_hook_slow: I don't think the
number of arguments should be decreased. For the bridge-nf code, f.e.,
the
2007 Apr 18
1
[Bridge] [PATCH] [2.6.15.4] Fix has_bridge_parent undefined with CONFIG_NETFILTER_DEBUG
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Apparently introduced in the latest stable set; I am not sure if this is a
right fix but given that bridge parent already exists at this point it was
rather silly to fetch it again.
- -regards
- -andrey
Subject: [PATCH] [2.6.15.4] Fix has_bridge_parent undefined with
CONFIG_NETFILTER_DEBUG
This changes br_nf_post_routing to use realoutdev in
2013 Apr 30
6
[Bridge] [PATCHv4 net-next 0/2] Add two new flags to bridge.
The following series adds 2 new flags to bridge. One flag allows
the user to control whether mac learning is performed on the interface
or not. By default mac learning is on.
The other flag allows the user to control whether unicast traffic
is flooded (send without an fdb) to a given unicast port. Default is
on.
Changes since v4:
- Implemented Stephen's suggestions.
Changes since v2:
-
2006 Apr 19
1
kernel 2.6.16.* with xen 3.0.2?
Hi,
are there any patches for getting
linux kernel 2.6.16.* working with xen 3.0.2.
A friend told me .1 works fine, and .5 does
not work at all, but maybe that information
is outdated? Also there seem to be a number
of security issues (2.6.16.9 was released
today), so it would be nice if we could use
the latest stable kernel with these fixes.
are there patches to fix any problem with
xen