Server not found in Kerberos database
I can track what has been updated but the list is too long... I'd
appreciate any thoughts on this issue.
Regards,
Vlad.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kern
ld give a heads-up to the 0.001% of people who still use
atime so that they know to customize this option or start using modern
file-monitoring techniques like inotify.
Vlad
Pinpoint customers who are l
especially if they can't see any output on
the screen. I think it would be a shame to prevent Linux from running
on these machines.
Vlad
__
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
-
T
--- Rene Herman <[EMAIL PROTECTED]> wrote:
> On 05/02/2007 12:41 AM, Vlad wrote:
>
> > H. Peter Anvin wrote:
>
> >> I'm rewriting the i386 setup code in C, instead of assembly,
> >> and before I spend a very large amount of time translating
> >
d from BH)
If anything, this should probably be done like this:
rcu_read_lock();
read_lock_bh(&head->lock)
...
read_unlock_bh(&head->lock)
rcu_read_unlock();
-vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majo
On 03/18/2013 04:32 PM, Neil Horman wrote:
On Mon, Mar 18, 2013 at 11:31:06AM -0400, Vlad Yasevich wrote:
On 03/18/2013 11:25 AM, Eric Dumazet wrote:
On Mon, 2013-03-18 at 07:04 -0400, Neil Horman wrote:
I'm not sure why the process would never get back to the schedule, but looking
a
On 02/02/2013 08:21 PM, Tejun Heo wrote:
Convert to the much saner new idr interface.
Only compile tested.
Signed-off-by: Tejun Heo
Cc: Vlad Yasevich
Cc: Sridhar Samudrala
Cc: Neil Horman
Cc: linux-s...@vger.kernel.org
---
This patch depends on an earlier idr changes and I think it would
comes zero.
Signed-off-by: Tejun Heo
Acked-by: Neil Horman
Cc: Vlad Yasevich
Acked-by: Vlad Yasevich
-vlad
Cc: Sridhar Samudrala
Cc: linux-s...@vger.kernel.org
---
net/sctp/associola.c | 31 +++
1 file changed, 15 insertions(+), 16 deletions(-)
diff --git
ndled
with DATA chunks.
Signed-off-by: Xufeng Zhang
Acked-by: Vlad Yasevich
-vlad
---
v2:
- Put the SCTP_CMD_NEW_STATE command before SCTP_CMD_REPLY and after
SCTP_CMD_EVENT_ULP
suggested by Vlad and Neil
- Improve the last paragraph of the commit header
net/sctp/sm_statefuns.c |
renege all applicable TSNs. */
+ __skb_unlink(skb, list);
+ freed += skb_headlen(skb);
This is no longer correct. You are actually freeing more space if you
are reneging a reassembled event from the the ordered queue.
Please separate the 2 patches since they fix 2 d
for the current chunk because
of how renege is called, but you still don't do the checks for
subsequent chunks in the queue as I stated above, so you are still
subject to possible hangs.
-vlad
sk_mem_reclaim(asoc->base.sk);
N�r��y���b�X��ǧv�^�){.n�+{���i�{ay�ʇڙ�,j��f��
On 02/20/2013 02:24 PM, Roberts, Lee A. wrote:
Vlad,
-Original Message-
From: Vlad Yasevich [mailto:vyasev...@gmail.com]
Sent: Wednesday, February 20, 2013 11:06 AM
To: Roberts, Lee A.
Cc: linux-s...@vger.kernel.org; net...@vger.kernel.org; linux-
ker...@vger.kernel.org
Subject: Re
p->max_tsn_seen - map->base_tsn);
+ bitmap_copy(new, map->tsn_map, map->max_tsn_seen - map->base_tsn + 1);
Can simplify that this by using map->cumulative_tsn_ack_point instead of
base_tsn.
-vlad
kfree(map->tsn_map);
map->tsn_map = new;
map->
reassembly queue shows
missing packets.
In sctp_ulpq_renege_list(), do not renege packets below the
cumulative TSN ACK point.
Patch applies to linux-3.8 kernel.
Signed-off-by: Lee A. Roberts
Acked-by: Vlad Yasevich
-vlad
---
net/sctp/ulpqueue.c |9 +++--
1 file changed, 7
: Vlad Yasevich
-vlad
---
net/sctp/ulpqueue.c | 26 ++
1 file changed, 22 insertions(+), 4 deletions(-)
diff -uprN -X linux-3.8-vanilla/Documentation/dontdiff
linux-3.8-SCTP+2/net/sctp/ulpqueue.c linux-3.8-SCTP+3/net/sctp/ulpqueue.c
--- linux-3.8-SCTP+2/net/sctp
ery(ulpq, chunk, gfp);
else if (retval > 0)
sctp_ulpq_reasm_drain(ulpq);
Just a suggestion.
-vlad
---
net/sctp/ulpqueue.c | 53 +++---
1 file changed, 45 insertions(+), 8 deletions(-)
diff -uprN -X linux-3.8-vanilla/Documentation/dontdiff
lin
e.
*
*/
Neil, active_patch != primary_path all the time. In fact, when you have
path primary path failure, active path will change while primary
may only change when the user says so.
So, you may still get into a situation where primary and active paths
are differe
On 03/12/2013 11:44 AM, Neil Horman wrote:
On Tue, Mar 12, 2013 at 08:11:34AM -0400, Vlad Yasevich wrote:
On 03/11/2013 09:31 AM, Neil Horman wrote:
On Mon, Mar 11, 2013 at 10:14:50AM +0800, Xufeng Zhang wrote:
On 3/8/13, Neil Horman wrote:
On Fri, Mar 08, 2013 at 03:39:37PM +0800, Xufeng
entry(chunk, &transport->transmitted,
transmitted_list) {
if (key == chunk->subh.data_hdr->tsn) {
Acked-by: Vlad Yasevich
-vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the
On 10/23/2012 04:04 PM, Kees Cook wrote:
This config item has not carried much meaning for a while now and is
almost always enabled by default. As agreed during the Linux kernel
summit, remove it.
CC: Vlad Yasevich
CC: Sridhar Samudrala
CC: "David S. Miller"
Signed-off-by: Kees Coo
here is an untested prototype of what I was talking about. This should
handle multiple data chunks.
-vlad
---
include/net/sctp/command.h |1 +
net/sctp/sm_sideeffect.c | 22 ++
net/sctp/sm_statefuns.c| 18 ++
3 files changed, 33 insertions
match new function.
-vlad
+void skb_tx_error(struct sk_buff *skb, int err)
+{
+ if (skb_shinfo(skb)->tx_flags & SKBTX_DEV_ZEROCOPY) {
+ struct ubuf_info *uarg;
+
+ uarg = skb_shinfo(skb)->destructor_arg;
+ if (uarg->callback)
+
* in this case, the refcount after decrement will eventually reach 1
+* so here it is 2.
+* We also trigger polling periodically after each 16 packets.
+*/
+ if (cnt <= 2 || !(cnt % 16))
Why 16? Does it make sense to make it configurable?
-vlad
+
is as unnecessary as
using auto to declare automatic/local variables in a block.
Signed-off-by: Joe Perches
looks simple enough.
Acked-by: Vlad Yasevich
-vlad
---
include/net/sctp/sctp.h | 13 ++---
1 file changed, 6 insertions(+), 7 deletions(-)
diff --git a/include/net/sctp/sct
On 10/05/2012 10:50 AM, Masanari Iida wrote:
Correct spelling typo in net/sctp/socket.c
Signed-off-by: Masanari Iida
Acked-by: Vlad Yasevich
-vlad
---
net/sctp/socket.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/sctp/socket.c b/net/sctp/socket.c
index
f-by: Yann Droneaud
Acked-by: Vlad Yasevich
-vlad
---
net/sctp/socket.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/sctp/socket.c b/net/sctp/socket.c
index 66fcdcf..caa5919 100644
--- a/net/sctp/socket.c
+++ b/net/sctp/socket.c
@@ -4320,7 +4320,7 @@
On 08/12/2013 12:30 PM, Asbjoern Sloth Toennesen wrote:
Fix the iproute2 command `bridge vlan show`, after switching from
rtgenmsg to ifinfomsg.
Signed-off-by: Asbjoern Sloth Toennesen
Thanks.. I've still been using an older iproute version and didn't see
this.
Reviewe
On 08/13/2013 06:54 PM, David Miller wrote:
From: Vlad Yasevich
Date: Mon, 12 Aug 2013 15:57:29 -0400
On 08/12/2013 12:30 PM, Asbjoern Sloth Toennesen wrote:
Fix the iproute2 command `bridge vlan show`, after switching from
rtgenmsg to ifinfomsg.
Signed-off-by: Asbjoern Sloth Toennesen
y the data queue.
BTW, the patch below doesn't include the code to queue the error chunk
onto the new error queue.
-vlad
Thanks,
Xufeng Zhang
---
include/net/sctp/command.h |1 +
include/net/sctp/structs.h |3 +++
net/sctp/outqueue.c|7 +++
net/sctp/sm_si
.
-vlad
So Jan I am going to send my patchset and hopefully you can rebase your
changes to make all of the tunables per network namespace on top of
mine.
Since my patchset is half the size of your I think that is the most
reasonable way to go.
Eric
--
To unsubscribe from this list: send
On 08/06/2012 03:50 PM, Eric W. Biederman wrote:
Vlad Yasevich writes:
Hi Eric
Associations are looked up by ports, but then verifyed by addresses.
Also, associations belong to sockets and simply validating the socket
namespace should be sufficient.
True. Your set of patches isn't
On 08/06/2012 04:47 PM, David Miller wrote:
From: ebied...@xmission.com (Eric W. Biederman)
Date: Mon, 06 Aug 2012 12:50:46 -0700
Vlad Yasevich writes:
Hi Eric
Associations are looked up by ports, but then verifyed by addresses.
Also, associations belong to sockets and simply validating
xchng instruction which invalidates the cache line "balancing"
belongs to and therefore creates an intensive cross-NUMA-nodes traffic.
The below patch will minimize the above phenomena to the time slots it's
really needed, namely when the "interval" time period has real
added to the common
parameter list a struct net pointer, that is never NULL.
I like Eric's patch set and I'd like to apply it to net-next.
Vlad?
I like these patches much more as well, but not done reviewing yet.
I'll try to finish the review tonight
-vlad
--
To unsubscribe
erformance regressions, but it looks like it
doesn't effect anything from the few quick runs I've made.
Since we are putting sctp_add_cmd_sf() on the call stack, we might
as well get rid of sctp_add_cmd() and reduce it a bit more.
-vlad
diff --git a/include/net/sctp/command.h b/includ
Ilpo Järvinen wrote:
On Wed, 20 Feb 2008, Vlad Yasevich wrote:
Ilpo Järvinen wrote:
I added inline to sctp_add_cmd and appropriate comment there to
avoid adding another call into the call chain. This works at least
with "gcc (GCC) 4.1.2 20070626 (Red Hat 4.1.2-13)". Alt
On 08/14/2012 05:14 PM, David Miller wrote:
Come on Vlad, please review this stuff some time this century. If you
want inclusion to be dependent upon your review, then the onus is on
you to review it in a timely manner. And you are not doing so here.
I'm not letting Eric's patc
these changes lookups in the port hash table becomes
safe to use in multiple network namespaces.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/sctp/sctp.h|4 ++--
include/net/sctp/structs.h |1 +
net/sctp/socket.c
On 08/06/2012 02:40 PM, Eric W. Biederman wrote:
- Use struct net in the hash calculation
- Use sock_net(endpoint.base.sk) in the endpoint lookups.
- On receive calculate the network namespace from skb->dev.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
the association lookup.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/sctp/sctp.h|6 ++--
include/net/sctp/structs.h |3 +-
net/sctp/associola.c |4 ++-
net/sctp/endpointola.c |6 +++-
net/sctp/input.c
struct net
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/net_namespace.h |4 +
include/net/netns/sctp.h| 21 +++
include/net/sctp/sctp.h |4 +-
include/net/sctp/structs.h | 22 +---
net/sctp/associola.c|
On 08/06/2012 02:43 PM, Eric W. Biederman wrote:
- Kill sctp_get_ctl_sock, it is useless now.
- Pass struct net where needed so net->sctp.ctl_sock is accessible.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/netns/sctp.h |8 +++
inc
On 08/06/2012 02:44 PM, Eric W. Biederman wrote:
The percpu sctp socket counter has nothing at all to do with the sctp
proc files, and having it in the wrong initialization is confusing,
and makes network namespace support a pain.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vla
twork namespace.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/netns/sctp.h |5 +++
include/net/sctp/sctp.h | 16 +-
net/sctp/proc.c | 59 +++
net/sctp/protoco
On 08/06/2012 02:46 PM, Eric W. Biederman wrote:
- Fix the sctp_af operations to work in all namespaces
- Enable sctp socket creation in all network namespaces.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
net/sctp/ipv6.c | 12 ++--
net/sctp/
On 08/06/2012 02:47 PM, Eric W. Biederman wrote:
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/netns/sctp.h |3 +
include/net/sctp/sctp.h |9 +--
net/sctp/associola.c |2 +-
net/sctp/chunk.c |2 +-
net/sctp/end
On 08/07/2012 01:23 PM, Eric W. Biederman wrote:
Start with an empty sctp_net_table that will be populated as the various
tunable sysctls are made per net.
Signed-off-by: "Eric W. Biederman"
Acked-by: Vlad Yasevich
---
include/net/netns/sctp.h |6 +-
include/net/s
sctp_verify_ext_param
sctp: Making sysctl tunables per net
Eric
Acked-by: Vlad Yasevich
To this entire follow-on series. This is much better.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More
On 08/13/2012 04:18 PM, Eric W. Biederman wrote:
From: "Eric W. Biederman"
Cc: David Miller
Cc: Alexey Kuznetsov
Cc: James Morris
Cc: Hideaki YOSHIFUJI
Cc: Patrick McHardy
Cc: Remi Denis-Courmont
Cc: Arnaldo Carvalho de Melo
Cc: Vlad Yasevich
Cc: Sridhar Samudrala
Acked
. The first five patches
enable netns handling of the protocol, procfs and sysfs.
Signed-off-by: Jan Ariyasu
---
NACK. Sorry Jan, but Eric's patches are much cleaner and do everything
that's needed.
-vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kern
appropriate here, especially considering
that SCTP_ASSERT compiles to nothing with debugging turned off.
-vlad
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.
ore creates an intensive cross-NUMA-nodes traffic.
The below patch will minimize the above phenomena to the time slots it's
really needed, namely when the "interval" has really passed.
Pls., comment.
thanks,
vlad
---
kernel/sched/fair.c | 20 +++-
1 file changed, 11
On Sun, 2012-07-22 at 19:23 +0300, Vlad Zolotarov wrote:
> Ingo, we've noticed that rebalance_domains() will try to take a lock
> every time it's called (every jiffy)
This is of course when NOHZ is off... ;)
> if SD_SERIALIZE is set (which is a
> default configuration). T
On Mon, 2012-07-23 at 11:25 +0900, Namhyung Kim wrote:
> Hi, Vlad
>
> On Sun, 22 Jul 2012 19:23:55 +0300, Vlad Zolotarov wrote:
> > Ingo, we've noticed that rebalance_domains() will try to take a lock
> > every time it's called (every jiffy) if SD_SERIALIZE
t; +else {
>> +lchunk = list_first_entry(&packet->chunk_list,
>> + struct sctp_chunk, list);
>> +list_add(&chunk->list,&lchunk->list);
xufeng zhang wrote:
>On 07/24/2012 10:27 AM, Vlad Yasevich wrote:
>> xufeng zhang wrote:
>>
>>
>>> On 07/19/2012 01:57 PM, xufengzhang.m...@gmail.com wrote:
>>>
>>>> When "Invalid Stream Identifier" ERROR happens aft
Xufeng Zhang wrote:
>On 7/24/12, Vlad Yasevich wrote:
>>>>> And I should clarify the above judgment code.
>>>>> AFAIK, there should be two cases for the bundling when invalid
>>>stream
>>>>> identifier error happens:
>>>>>
On 07/25/2012 05:22 AM, Xufeng Zhang wrote:
On 7/25/12, Xufeng Zhang wrote:
On 7/25/12, Vlad Yasevich wrote:
Actually not true. AUTH can be before SACK. So can any addip chunks
that
aid in locating an association.
Now AUTH isn't a big issue since its autogenerated to the packet but
Xufeng Zhang wrote:
>On 7/25/12, Vlad Yasevich wrote:
>>> And after take a moment to look into the relative codes, I think we
>>> can implement it
>>> by below way:
>>> 1). Add a flag(isi_err_needed) in the embedded struct peer of struct
>>> s
Xufeng Zhang wrote:
>On 7/26/12, Xufeng Zhang wrote:
>> On 7/25/12, Vlad Yasevich wrote:
>>>> And after take a moment to look into the relative codes, I think we
>>>> can implement it
>>>> by below way:
>>>> 1). Add a flag(isi_err_n
ING
state.
I would be more correct (and would match sctp_sf_do_5_1D_ce) to
do it in this order:
UPDATE_ASSOC - resets all the congestion/association variables
EVENT_UP - send RESTART to USER
NEW_STATE - set ESTABLISHED state (as per spec)
REPLY - Send cookie-ack along with any pending da
On 12/16/2012 11:47 AM, Simon Arlott wrote:
The following commit breaks IPv6 TCP transmission for me:
Commit 75fe83c32248d99e6d5fe64155e519b78bb90481
Author: Vlad Yasevich
Date: Fri Nov 16 09:41:21 2012 +
ipv6: Preserve ipv6 functionality needed by NET
)
keepsettings = 0 (off)
nowerr = 0 (off)
readonly = 0 (off)
readahead= 8 (on)
2.4.0 and 2.4.0-test7 were compiled with one .config via "make oldconfig".
.config
and dmesg you can find in the attachment.
Any comments?
Regards,
Vlad
#
# Automatically generate
Tiotest/tiobench a new disk benchmark program written by a group of people led
by Mika Kuoppala. AFAIK, it is the only disk IO test, which is able to use
mmap(). You can find it on http://tiobench.sourceforge.net/ or
http://www.icon.fi/~mak/tiotest/tiobench-0.3.1.tar.gz.
Regards,
Vlad
Ray
_MINUTES_!
Problem one (impossible to run tiobench without swap) is still here with the
only difference that tiobench gets killed faster (just after start).
Regards,
Vlad
P.S. Sorry for overquoting, I hope it could be helpful for linux-mm subscribers.
Vlad Bolkhovitine wrote:
>
> After upgrade
Mike Galbraith wrote:
>
> On 15 Jan 2001, Zlatko Calusic wrote:
>
> > "Vlad Bolkhovitine" <[EMAIL PROTECTED]> writes:
> >
> > > Here is updated info for 2.4.1pre3:
> > >
> > > Size is MB, BlkSz is Bytes, Read, Write, and Seeks a
ncept, but the pieces
needed to make it happen already exist - they just
need to be integrated into the kernel, perhaps as a
ReiserFS 4 plugin or by another method. I welcome your
suggestions!
Cheers,
Vlad
Sell on Yahoo! Auction
envisioned
LODNA doing. Therefore, I realize that there's
probably no need for yet another VFS framework ;)
Nevertheless, I think there is room for improvement
when it comes to giving users more flexibility in
mounting network locations (as described above).
Thanks,
Vlad
--- Peter Staubach <[EMAIL PROTECTED]> wrote:
> Vlad C. wrote:
>
> >--- Hans Reiser <[EMAIL PROTECTED]> wrote:
> >
> >
> >>Please treat at greater length how your proposal
> >>differs from NFS.
> >>
> >>
&
with symlinks).
Best regards,
Vlad
Start your day with Yahoo! - make it your home page
http://www.yahoo.com/r/hs
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
ession over v2.6.23. config attached.
the patch below fix it (or rather, works it around).
The patch is an OK workaround, but may not yield a working SCTP.
Let me see if I can do better..
-vlad
Ingo
->
Subject: SCTP: fix build bug
From: Ingo Molnar <[EMAIL PROTECTE
Ingo Molnar wrote:
* Vlad Yasevich <[EMAIL PROTECTED]> wrote:
this is a build regression over v2.6.23. config attached.
the patch below fix it (or rather, works it around).
The patch is an OK workaround, but may not yield a working SCTP.
Let me see if I can do better..
i'd
. Before that, it was
a linear list traversal which sucked.
I need to take a look at the locking to see if we can further reduce
the time that bottom half is disabled.
-vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL P
Joe Perches wrote:
> Signed-off-by: Joe Perches <[EMAIL PROTECTED]>
Thanks... I am surprised this is all you found :)
ACK.
-vlad
> ---
> net/sctp/sm_make_chunk.c |8
> 1 files changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/net/sctp/sm
label. This way we don't
> even have to allocate the memory at all in the problem case.
>
>
> Signed-off-by: Jesper Juhl <[EMAIL PROTECTED]>
Thanks. I've applied this to my tree.
-vlad
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
th
Crypto now uses SG helper functions. Fix hmac_digest to use those
functions correctly and fix the oops associated with it.
Signed-off-by: Vlad Yasevich <[EMAIL PROTECTED]>
---
crypto/hmac.c |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/crypto/hmac.c b/
David Miller wrote:
> From: Vlad Yasevich <[EMAIL PROTECTED]>
> Date: Thu, 25 Oct 2007 16:07:17 -0400
>
>> Crypto now uses SG helper functions. Fix hmac_digest to use those
>> functions correctly and fix the oops associated with it.
>>
>> Signed-
c |6 +--
> net/sunrpc/auth_gss/gss_krb5_crypto.c | 34 +
> net/sunrpc/auth_gss/gss_spkm3_seal.c |2 -
> net/sunrpc/xdr.c |2 +
> 13 files changed, 93 insertions(+), 58 deletions(-)
>
Ack SCTP pieces. I had those qu
Please don't remove module_exit point for SCTP. Simply removing the __unsafe()
call will
be sufficient.
The code has recently been cleaned up to allow safe unloading and I working on
final
cleanups. It currently works correctly with forced unloading.
Thanks
-vlad
-
To unsubscribe fr
Rusty Russell wrote:
> On Tue, 2007-07-24 at 09:05 -0400, Vlad Yasevich wrote:
>> Please don't remove module_exit point for SCTP. Simply removing the
>> __unsafe() call will
>> be sufficient.
>>
>> The code has recently been cleaned up to allow saf
Dave Johnson wrote:
> Vlad Yasevich writes:
>> Can you explain why the sctp_v4 changes are need for the this case?
>> I don't see how the code in sctp/protocol.c comes into play for this
>> particular bug.
>
> connect() on v6 socket to v4 mapped address wi
Dave Johnson wrote:
> Vlad Yasevich writes:
>> Ok. First, this is a different bug, so I would prefer a separate patch.
>> Also, I see the problem and it's ugly, but this solution is not really
>> correct,
>> both conceptually and code wise.
>>
>>
See this message
http://marc.info/?l=linux-netdev&m=118492205915816&w=2
-vlad
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
alize a sctp_addr from an address parameter. */
> @@ -557,6 +572,8 @@
> newsk->sk_protocol = IPPROTO_SCTP;
> newsk->sk_backlog_rcv = sk->sk_prot->backlog_rcv;
> sock_reset_flag(newsk, SOCK_ZAPPED);
> +
> + sctp_sk(newsk)->v4mapped = sctp_sk(sk)->
Dave Johnson wrote:
> Simon Arlott writes:
>> But ULA's scope isn't global, shouldn't it be IPV6_ADDR_SCOPE_ORGLOCAL ?
>
> Isn't ORGLOCAL defined for multicast only?
Yes, it's only for multicast. Unicast addresses only have
2 scopes any more: Global and
Dave Johnson wrote:
> Vlad Yasevich writes:
>> Ok. First, this is a different bug, so I would prefer a separate patch.
>> Also, I see the problem and it's ugly, but this solution is not really
>> correct,
>> both conceptually and code wise.
>>
>>
David Miller wrote:
> From: Vlad Yasevich <[EMAIL PROTECTED]>
> Date: Thu, 26 Jul 2007 16:49:40 -0400
>
>> Feel free to clean it up and submit both patches.
>
> Ping? Somebody?
>
I am head deep in an ugly bug. I might take a break
and do this mindless excercise
[EMAIL PROTECTED] wrote:
> Add file pattern to MAINTAINER entry
>
> Signed-off-by: Joe Perches <[EMAIL PROTECTED]>
>
Acked-by: Vlad Yasevich <[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message t
> send one to the offending host for some of the cases.
>
> I haven't seen any ICMP-relevant stats correctly referenced in
> these yet.
>
> I don't want to patch them directly, since I can't easily test them;
> if someone who works with DCCP and SCTP wou
Adrian Bunk wrote:
> This patch makes three needlessly global functions static.
>
> Signed-off-by: Adrian Bunk <[EMAIL PROTECTED]>
ACK. Thanks for catching these..
-vlad
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message
Adrian Bunk wrote:
> sctp_update_copy_cksum() is no longer used.
>
> Signed-off-by: Adrian Bunk <[EMAIL PROTECTED]>
ACK.
-vlad
>
> ---
>
> include/net/sctp/sctp.h |1 -
> net/sctp/crc32c.c |2 ++
> 2 files cha
be calling icmp_send() to
> send one to the offending host for some of the cases.
I'll skip the insufficient buffer space statistic yet, since, per above,
it's not clear which one should be used.
Others, I agree are move ULP errors, but the mibs don't account for those
yet.
-vlad
-
T
David Stevens wrote:
> My bad -- I see what it's doing, and it looks ok after all.
>
jinx, crossed in flight. ;)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.ht
ike all ULPs treat socket lookup error as ICMP_MIB_INERRORS
(tcp, udp, sctp, dccp).
SCTP is a little special in that in needs to check one one piece
of data (the 'vtag') to correctly identify the connection.
If that piece doesn't match, we treat that as the same error.
-vlad
-
To un
Hi,
Could you also add the id strings for the device to
drivers/ata/pata_pcmcia.c?
Thanks,
Vlad
Boardwalk for $500? In 2007? Ha! Play Monopoly Here and Now (it's updated for
today's economy
eds to be a mechanism by which protocol parameters may be
changed on the interface bases before the interface is up/running.
This has been bugging me for while too.
-vlad
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL
structure appears when the
interface is marked UP. At this point, if protocol modules are already
loaded, your configuration parameters are already set.
I was going to ask.. How are you testing Optimistic DAD patch. The
only way I could do it was to set /proc/sys/conf/default/ipv6 entry.
-vla
t; lost (i.e. the INIT_ACK from the peer in this particular case).
>
Can you give this patch a try and let me know if this fixes your issue?
Thanks
-vlad
diff --git a/include/net/sctp/command.h b/include/net/sctp/command.h
index 4e0e224..7a426d3 100644
--- a/include/net/sctp/command.h
+
On 10/05/15 11:01, Greg KH wrote:
On Mon, Oct 05, 2015 at 10:33:20AM +0300, Vlad Zolotarov wrote:
On 10/05/15 06:03, Greg KH wrote:
On Sun, Oct 04, 2015 at 11:43:16PM +0300, Vlad Zolotarov wrote:
Signed-off-by: Vlad Zolotarov
---
drivers/uio/uio.c | 15 +++
include
On 10/05/15 10:56, Greg KH wrote:
On Mon, Oct 05, 2015 at 10:41:39AM +0300, Vlad Zolotarov wrote:
+struct msix_info {
+ int num_irqs;
+ struct msix_entry *table;
+ struct uio_msix_irq_ctx {
+ struct eventfd_ctx *trigger;/* MSI-x vector to eventfd */
Why
1 - 100 of 344 matches
Mail list logo