Hi,
2018年10月3日(水) 16:57 Mike Manning :
>
> On 02/10/2018 19:26, David Miller wrote:
> > From: Mike Manning
> > Date: Tue, 2 Oct 2018 12:40:30 +0100
> >
> >> This reverts commit 0ed4229b08c1 ("ipv6: defrag: drop non-last frags
> >> smaller than min mtu"). While one should not get fragments
Hi,
2018-07-13 20:02 GMT+09:00 Ka-Cheong Poon :
> There are many data structures (RDS socket options) used by RDS apps
> which use a 32 bit integer to store IP address. To support IPv6,
> struct in6_addr needs to be used. To ensure backward compatibility, a
> new data structure is introduced for
Hi,
2018-06-28 15:40 GMT+09:00 Xin Long :
> On Tue, Jun 26, 2018 at 8:02 PM, 吉藤英明
> wrote:
>> 2018-06-26 13:33 GMT+09:00 Xin Long :
>>> On Tue, Jun 26, 2018 at 12:31 AM, Marcelo Ricardo Leitner
>>> wrote:
>>>> Hi,
>>>>
>>>&
2018-06-26 13:33 GMT+09:00 Xin Long :
> On Tue, Jun 26, 2018 at 12:31 AM, Marcelo Ricardo Leitner
> wrote:
>> Hi,
>>
>> On Tue, Jun 26, 2018 at 01:12:00AM +0900, 吉藤英明 wrote:
>>> Hi,
>>>
>>> 2018-06-25 22:03 GMT+09:00 Marcelo Ricardo Leitner
&
Hi,
2018-06-25 22:03 GMT+09:00 Marcelo Ricardo Leitner :
> On Mon, Jun 25, 2018 at 07:28:47AM -0400, Neil Horman wrote:
>> On Mon, Jun 25, 2018 at 04:31:26PM +0900, David Miller wrote:
>> > From: Xin Long
>> > Date: Mon, 25 Jun 2018 10:14:35 +0800
>> >
>> > > struct sctp_paddrparams {
>> > > @@
Hello,
2018-06-04 6:54 GMT+09:00 Subash Abhinov Kasiviswanathan
:
> RAWIP devices such as rmnet do not have a hardware address and
> instead require the kernel to generate a random IID for the
> temporary addresses. For permanent addresses, the device IID is
> used along with prefix received.
>
>
Hi,
2018-05-08 15:41 GMT+09:00 Andre Naujoks <nauts...@gmail.com>:
> On 08.05.2018 08:31, 吉藤英明 wrote:
>> Hi,
>>
>> 2018-05-08 15:03 GMT+09:00 Andre Naujoks <nauts...@gmail.com>:
>>> On 11.04.2018 13:02, Andre Naujoks wrote:
>>>> Hi.
>&g
Hi,
2018-05-08 15:03 GMT+09:00 Andre Naujoks :
> On 11.04.2018 13:02, Andre Naujoks wrote:
>> Hi.
>
> Hi again.
>
> Since it has been a month now, I'd like to send a little "ping" on this
> subject.
>
> Is anything wrong with this? Or was it just bad timing?
I'm just
Hi,
2017-10-07 8:49 GMT+09:00 Eric Dumazet :
> On Fri, 2017-10-06 at 12:05 -0700, Wei Wang wrote:
>> From: Wei Wang
>>
>> Currently, fib6 table is protected by rwlock. During route lookup,
>> reader lock is taken and during route insertion, deletion or
Hi,
2017-10-07 4:06 GMT+09:00 Wei Wang :
> diff --git a/net/ipv6/route.c b/net/ipv6/route.c
> index 941c062389d2..aeb349aea429 100644
> --- a/net/ipv6/route.c
> +++ b/net/ipv6/route.c
:
> @@ -1625,12 +1643,17 @@ struct rt6_info *ip6_pol_route(struct net *net,
> struct
Hi,
2017-08-17 9:02 GMT+09:00 Mahesh Bandewar :
> From: Mahesh Bandewar
>
> If the ARP processing creates a neigh entry, it's immediately marked
> as STALE without timer and stays that way in that state as long as
> host do not send traffic to that
Hi,
2017-08-15 3:43 GMT+09:00 Alexander Potapenko :
> KMSAN reported use of uninitialized sctp_addr->v4.sin_addr.s_addr and
> sctp_addr->v6.sin6_scope_id in sctp_v6_cmp_addr() (see below).
> Make sure all fields of an IPv6 address are initialized, which
> guarantees that the
2017-08-09 19:42 GMT+09:00 Vitaly Kuznetsov :
> What happens is: __netvsc_vf_setup() does dev_open() for the VF device and
> the consecutive dev_change_name() fails with -EBUSY because of the
> (dev->flags & IFF_UP) check. The history of this code predates git so I
> wasn't
Hi,
2017-05-26 22:55 GMT+09:00 yuan linyu <cug...@163.com>:
> On 五, 2017-05-26 at 22:45 +0900, 吉藤英明 wrote:
>> Hi,
>>
>> 2017-05-26 22:23 GMT+09:00 yuan linyu <cug...@163.com>:
>> >
>> > From: yuan linyu <linyu.y...@alcatel-sbell.com.cn>
Hi,
2017-05-26 22:23 GMT+09:00 yuan linyu :
> From: yuan linyu
>
> Signed-off-by: yuan linyu
> ---
> net/ipv6/ndisc.c | 109
> ---
> 1 file changed, 55
Hi,
2016-08-29 22:00 GMT+09:00 Sergei Shtylyov :
> Hello.
>
> On 8/29/2016 1:05 PM, Nicolas Dichtel wrote:
>
>> The 'default' value was not advertised.
>>
>> Fixes: f3a1bfb11ccb ("rtnl/ipv6: use netconf msg to advertise forwarding
>> status")
>> Signed-off-by:
Hi,
2016-08-08 23:45 GMT+09:00 Lorenzo Colitti :
> On Mon, Aug 8, 2016 at 11:26 PM, Hannes Frederic Sowa
> wrote:
>>> - if (sk->sk_bound_dev_if &&
>>> - sk->sk_bound_dev_if != u->sin6_scope_id) {
>>> -
Hi,
2016-07-25 17:13 GMT+09:00 Chunhui He :
>>> The NEIGH_UPDATE_F_WEAK_OVERRIDE is confusing to me, so I choose not to deal
>>> with the flag.
>>
>> IPv6 depends on WEAK_OVERRIDE. Please do not change.
>>
>
> It seems like IPv6 always sets WEAK_OVERRIDE.
>
Yes.
> As
k:
>>
>> diff --git a/net/core/neighbour.c b/net/core/neighbour.c
>> index 5cdc62a..2b1cb91 100644
>> --- a/net/core/neighbour.c
>> +++ b/net/core/neighbour.c
>> @@ -1151,10 +1151,8 @@ int neigh_update(struct neighbour *neigh, const u8
>> *lladdr, u8 new,
>> goto out;
>> } else {
>> if (lladdr == neigh->ha && new == NUD_STALE &&
>> -((flags & NEIGH_UPDATE_F_WEAK_OVERRIDE) ||
>> - (old & NUD_CONNECTED))
>> -)
>> -new = old;
>> +!(flags & NEIGH_UPDATE_F_ADMIN))
>> +goto out;
>> }
>> }
>>
>> Any thoughts?
>>
>> Regards
>>
>> --
>> Julian Anastasov <j...@ssi.bg>
>
> Regards,
> Chunhui He
>
--
吉藤英明 <hideaki.yoshif...@miraclelinux.com>
ミラクル・リナックス株式会社 技術本部 サポート部
(struct sk_buff *skb, const
> struct in6_addr *target)
> struct dst_entry *dst;
> struct flowi6 fl6;
> int rd_len;
> - u8 ha_buf[MAX_ADDR_LEN], *ha = NULL;
> + u8 ha_buf[MAX_ADDR_LEN], *ha = NULL,
> +ops_data_buf[NDISC_OPS_REDIRECT_DATA_SPACE], *ops_data = NULL;
> int oif = l3mdev_fib_oif(dev);
> bool ret;
>
> @@ -1569,7 +1604,9 @@ void ndisc_send_redirect(struct sk_buff *skb, const
> struct in6_addr *target)
> memcpy(ha_buf, neigh->ha, dev->addr_len);
> read_unlock_bh(>lock);
> ha = ha_buf;
> - optlen += ndisc_opt_addr_space(dev);
> + optlen += ndisc_redirect_opt_addr_space(dev, neigh,
> + ops_data_buf,
> + _data);
> } else
> read_unlock_bh(>lock);
>
> @@ -1600,7 +1637,7 @@ void ndisc_send_redirect(struct sk_buff *skb, const
> struct in6_addr *target)
>*/
>
> if (ha)
> - ndisc_fill_addr_option(buff, ND_OPT_TARGET_LL_ADDR, ha);
> + ndisc_fill_redirect_addr_option(buff, ha, ops_data);
>
> /*
>* build redirect option and copy skb over to the new packet.
> diff --git a/net/ipv6/route.c b/net/ipv6/route.c
> index c6ae6f9..af6f711 100644
> --- a/net/ipv6/route.c
> +++ b/net/ipv6/route.c
> @@ -2200,7 +2200,7 @@ static void rt6_do_redirect(struct dst_entry *dst,
> struct sock *sk, struct sk_bu
>* first-hop router for the specified ICMP Destination Address.
>*/
>
> - if (!ndisc_parse_options(msg->opt, optlen, )) {
> + if (!ndisc_parse_options(skb->dev, msg->opt, optlen, )) {
> net_dbg_ratelimited("rt6_redirect: invalid ND options\n");
> return;
> }
> @@ -2235,12 +2235,12 @@ static void rt6_do_redirect(struct dst_entry *dst,
> struct sock *sk, struct sk_bu
>* We have finally decided to accept it.
>*/
>
> - neigh_update(neigh, lladdr, NUD_STALE,
> + ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
>NEIGH_UPDATE_F_WEAK_OVERRIDE|
>NEIGH_UPDATE_F_OVERRIDE|
>(on_link ? 0 : (NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
> - NEIGH_UPDATE_F_ISROUTER))
> - );
> + NEIGH_UPDATE_F_ISROUTER)),
> + NDISC_REDIRECT, );
>
> nrt = ip6_rt_cache_alloc(rt, >dest, NULL);
> if (!nrt)
>
--
吉藤英明 <hideaki.yoshif...@miraclelinux.com>
ミラクル・リナックス株式会社 技術本部 サポート部
Hi,
2016-04-13 2:52 GMT+09:00 Daniele Orlandi :
>
> Hello,
>
> More than one year ago I posted the following message but it hasn't
> received a reply, now I've been stung by a similar issue, you may want
> to investigate:
>
>
> I noticed that when ping receives ICMP messages
Hi,
Deepa Dinamani wrote:
>>> include/linux/ip.h | 2 ++
>>> include/linux/time64.h | 3 +++
>>> kernel/time/time.c | 26 ++
>>> 3 files changed, 31 insertions(+)
>>>
>> Since net/ipv4/* are the only users, it is enough to put
>> it in under net/ipv4/.
>
>
amp; 0x7;
>> +
>> + memcpy(addr->s6_addr, pfx, o);
>> + if (b != 0) {
>> + addr->s6_addr[o] &= ~(0xff00 >> b);
>> + addr->s6_addr[o] |= (pfx->s6_addr[o] & (0xff00 >> b));
>> + }
>&
Hi,
2015-11-30 20:55 GMT+09:00 Bjørn Mork :
> Generating a random ifid for devices with no L2 header
> at all, allowing such devices to take part in IPv6
> autoconfiguration. The tuntap driver is one example of
> a driver where such an ifid would be useful.
>
> Note that as there
return -EPFNOSUPPORT;
> +
> + remote.sa.sa_family = AF_INET6;
> + remote.sin6.sin6_addr =
> + nla_get_in6_addr(data[IFLA_GENEVE_REMOTE6]);
> + }
>
> if (data[IFLA_GENEVE_TTL])
> ttl = nla_get_u8(data[IFLA_G
, rt6_probe_deferred);
+ work-target = rt-rt6i_gateway;
+ dev_hold(rt-dst.dev);
+ work-dev = rt-dst.dev;
+ schedule_work(work-work);
}
+
rcu_read_unlock_bh();
}
#else
--
吉藤英明 hideaki.yoshif...@miraclelinux.com
ミラクル・リナックス株式会社 技術本部
);
+ break;
}
if (rt)
dst_metric_set(rt-dst, RTAX_HOPLIMIT,
--
吉藤英明 hideaki.yoshif...@miraclelinux.com
ミラクル・リナックス株式会社 技術本部 サポート部
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message
, gfp_mask);
@@ -933,7 +936,6 @@ static int tcp_transmit_skb(struct sock *sk, struct
sk_buff *skb, int clone_it,
}
inet = inet_sk(sk);
- tp = tcp_sk(sk);
tcb = TCP_SKB_CB(skb);
memset(opts, 0, sizeof(opts));
--
吉藤英明 hideaki.yoshif...@miraclelinux.com
ミラクル
);
+ __ipv6_dev_get_saddr(net, dst, prefs, saddr,
idev, score, hiscore);
}
}
rcu_read_unlock();
On Mon, Jul 13, 2015 at 7:28 AM, YOSHIFUJI Hideaki/吉藤英明
hideaki.yoshif...@miraclelinux.com wrote:
Commit 9131f3de2 (ipv6: Do not iterate over all
Commit 9131f3de2 (ipv6: Do not iterate over all interfaces when
finding source address on specific interface.) did not properly
update best source address available. Plus, it introduced
possible NULL pointer dereference.
Bug was reported by Erik Kline e...@google.com.
Based on patch proposed by
If outgoing interface is specified and the candidate addresses
are restricted to the outgoing interface, it is enough to iterate
over that given interface only.
Signed-off-by: YOSHIFUJI Hideaki hideaki.yoshif...@miraclelinux.com
---
net/ipv6/addrconf.c | 201
If outgoing interface is specified and the candidate address is
restricted to the outgoing interface, it is enough to iterate
over that given interface only.
Signed-off-by: YOSHIFUJI Hideaki hideaki.yoshif...@miraclelinux.com
Acked-by: Erik Kline e...@google.com
---
net/ipv6/addrconf.c | 197
?
Cheers,
Steven
Thanks for the explanation,
Matthias
--
吉藤英明 hideaki.yoshif...@miraclelinux.com
ミラクル・リナックス株式会社 技術本部 サポート部
--
To unsubscribe from this list: send the line unsubscribe netdev in
Nicholas Krause wrote:
This converts the if statement for dumping the stack into a
WARN_ON in order to make this function's debugging check
simpler and have a cleaner output when this condition
occurs inside this function for when bugs related to
adding a duplicate neighbour table timer
In article [EMAIL PROTECTED] (at Thu, 14 Feb 2008 20:55:40 +0900), Kazunori
MIYAZAWA [EMAIL PROTECTED] says:
This patch fix a BUG when adding spds which have
same selector.
Signed-off-by: Kazunori MIYAZAWA [EMAIL PROTECTED]
I think we need to fix xfrm_user side as well.
---
[PATCH]
Keep ordering of policy entries with same selector in xfrm_dst_hash_transfer().
Issue should not appear in usual cases because multiple policy entries with
same selector are basically not allowed so far.
Bug was pointed out by Sebastien Decugis [EMAIL PROTECTED].
We could convert bydst from
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
diff --git a/ip/Makefile b/ip/Makefile
index b427d58..d908817 100644
--- a/ip/Makefile
+++ b/ip/Makefile
@@ -1,4 +1,4 @@
-IPOBJ=ip.o ipaddress.o iproute.o iprule.o \
+IPOBJ=ip.o ipaddress.o ipaddrlabel.o iproute.o iprule.o \
rtm_map.o
In article [EMAIL PROTECTED] (at Thu, 07 Feb 2008 10:40:19 +0100), Eric
Dumazet [EMAIL PROTECTED] says:
[NET] IPV4: lower stack usage in cookie_hash() function
400 bytes allocated on stack might be a litle bit too much. Using a
per_cpu var is more friendly.
Signed-off-by: Eric Dumazet
In article [EMAIL PROTECTED] (at Thu, 7 Feb 2008 21:49:26 -0800), Glenn
Griffin [EMAIL PROTECTED] says:
Updated to incorporate Eric's suggestion of using a per cpu buffer
rather than allocating on the stack. Just a two line change, but will
resend in it's entirety.
Signed-off-by: Glenn
In article [EMAIL PROTECTED] (at Wed, 06 Feb 2008 10:14:19 +0100), Daniel
Lezcano [EMAIL PROTECTED] says:
replace __inline__ by inline in include/linux (net related)
Signed-off-by: Daniel Lezcano [EMAIL PROTECTED]
---
include/linux/atm.h|4 ++--
include/linux/atmsap.h |
In article [EMAIL PROTECTED] (at Thu, 31 Jan 2008 15:41:58 +0300), Pavel
Emelyanov [EMAIL PROTECTED] says:
Add the net parameter to udp_get_port family of calls and
udp_lookup one and use it to filter sockets.
I may miss something, but I'm afraid that I have to disagree.
Port is identified
In article [EMAIL PROTECTED] (at Thu, 31 Jan 2008 05:20:07 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
The networking devices are even per-namespace already,
so you can even say that each namespace is even
physically different.
Ah, okay, we are splitting weak domains...
--yoshfuji
--
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
include/linux/if_addrlabel.h | 32 +
ip/Makefile |2 +-
ip/ip.c |5 +-
ip/ip_common.h |4 +
ip/ipaddrlabel.c | 260 ++
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
include/linux/if_addrlabel.h | 32 +
ip/Makefile |2 +-
ip/ip.c |5 +-
ip/ip_common.h |4 +
ip/ipaddrlabel.c | 260 ++
In article [EMAIL PROTECTED] (at Fri, 01 Feb 2008 06:56:10 +1100 (EST)),
YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED] says:
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
include/linux/if_addrlabel.h | 32 +
ip/Makefile |2 +-
ip/ip.c
If an entry is being deleted because it has only one reference,
we immediately delete it and blindly register the rcu handler for it,
This results in oops by double freeing that object.
This patch fixes it by consolidating the code paths for the deletion;
let its rcu handler delete the object if
In article [EMAIL PROTECTED] (at Fri, 25 Jan 2008 14:32:23 +0100), Daniel
Lezcano [EMAIL PROTECTED] says:
Move ipv6_icmp_sysctl_init and ipv6_route_sysctl_init into
the right ifdef section otherwise that does not compile when
CONFIG_SYSCTL=yes and CONFIG_PROC_FS=no
Signed-off-by: Daniel
In article [EMAIL PROTECTED] (at Wed, 23 Jan 2008 10:16:29 +0100), Mathieu
Lacage [EMAIL PROTECTED] says:
I have been following the netns patches on this ML for a while but I
still have not figured out in which tree the patches fed to David Miller
are applied. I have attempted to grep the
Dave, please consider pulling following changes on top of net-2.6.25 tree:
git://git.linux-ipv6.org/gitroot/yoshfuji/linux-2.6-dev.git
net-2.6-dev-20080122
Thank you.
HEADLINES
-
[IPV4] UDP,UDPLITE: Sparse: {__udp4_lib,udp,udplite}_err() are of void.
[IPV6] UDP,UDPLITE:
In article [EMAIL PROTECTED] (at Mon, 21 Jan 2008 17:46:32 +0800), Wang Chen
[EMAIL PROTECTED] says:
[IPV6]: ICMP6_MIB_OUTMSGS increment duplicated
icmpv6_send() calls ip6_push_pending_frames() indirectly.
Both ip6_push_pending_frames() and icmpv6_send() increment
counter
In article [EMAIL PROTECTED] (at Mon, 21 Jan 2008 17:46:44 +0800), Wang Chen
[EMAIL PROTECTED] says:
The snmp6 entry name was changed, and it broke compatibility
to RFC 2011.
Signed-off-by: Wang Chen [EMAIL PROTECTED]
Acked-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
--yoshfuji
--
To
In article [EMAIL PROTECTED] (at Sat, 19 Jan 2008 14:44:13 +0100 (CET)), Jan
Engelhardt [EMAIL PROTECTED] says:
From 84bccef295aa9754ee662191e32ba1d64edce2ba Mon Sep 17 00:00:00 2001
From: Jan Engelhardt [EMAIL PROTECTED]
Date: Fri, 18 Jan 2008 02:10:44 +0100
Subject: [PATCH] IPv4: enable
We omit (or delay) sending NSes for known-to-unreachable routers
(in NUD_FAILED state) according to RFC 4191 (Default Router Preferences
and More-Specific Routes).
But this is not fully compatible with RFC 4861 (Neighbor Discovery Protocol
for IPv6), which does not remember unreachability of
In article [EMAIL PROTECTED] (at Fri, 18 Jan 2008 02:13:52 +0100 (CET)), Jan
Engelhardt [EMAIL PROTECTED] says:
diff --git a/include/linux/in.h b/include/linux/in.h
index 27d8a5a..b01bf75 100644
--- a/include/linux/in.h
+++ b/include/linux/in.h
@@ -216,9 +216,6 @@ struct sockaddr_in {
In article [EMAIL PROTECTED] (at Fri, 18 Jan 2008 02:52:08 +0100 (CET)), Jan
Engelhardt [EMAIL PROTECTED] says:
On Jan 18 2008 10:26, YOSHIFUJI Hideaki / 吉藤英明 wrote:
-#define IN_EXPERIMENTAL(a) long int) (a)) 0xf000) ==
0xf000)
-#define IN_BADCLASS
In article [EMAIL PROTECTED] (at Fri, 18 Jan 2008 11:13:19 +0900 (JST)),
YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED] says:
Assuming IN_BADCLASS() is still there, we should not reuse the name
of ipv6_is_badclass because the their meanings are different.
Again, ipv4_is_badclass()
My hands
In article [EMAIL PROTECTED] (at Sun, 13 Jan 2008 19:17:51 +0100), martin f
krafft [EMAIL PROTECTED] says:
also sprach Andy Johnson [EMAIL PROTECTED] [2008.01.12.0752 +0100]:
I saw somewhere (maybe in this mailing list a while ago) that
there might be a Linux Kernel Developers' Netconf
In article [EMAIL PROTECTED] (at Fri, 11 Jan 2008 12:17:02 +0100), Andi Kleen
[EMAIL PROTECTED] says:
Vince Fuller [EMAIL PROTECTED] writes:
from Vince Fuller [EMAIL PROTECTED]
This set of diffs modify the 2.6.20 kernel to enable use of the 240/4
(aka class-E) address space as
In article [EMAIL PROTECTED] (at Fri, 11 Jan 2008 17:48:57 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
From: YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED]
Date: Fri, 11 Jan 2008 21:41:20 +0900 (JST)
There is no positive consesus on this draft
at the intarea meeting in Vancouver
Hello.
In article [EMAIL PROTECTED] (at Mon, 7 Jan 2008 17:10:57 -0800), Vince
Fuller [EMAIL PROTECTED] says:
#define IN_MULTICAST_NET 0xF000
+#define IN_CLASSE(a) long int) (a)) 0xf000) == 0xf000)
+#define IN_CLASSE_NET 0xff00
+#define
In article [EMAIL PROTECTED] (at Wed, 9 Jan 2008 16:36:56 +0100), Karsten
Keil [EMAIL PROTECTED] says:
So I think we should disable the interface now, if DAD fails on a
hardware based LLA.
I don't want to do this, at least, unconditionally.
Options (not exclusive):
- we could have
In article [EMAIL PROTECTED] (at Thu, 10 Jan 2008 01:38:57 +0900 (JST)),
YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED] says:
- we could have dad_reaction interface variable and
1: disable interface
= 1: disable IPv6
0: ignore (as we do now)
Argh, 0, 0 and 0, maybe.
--yoshfuji
In article [EMAIL PROTECTED] (at Wed, 09 Jan 2008 15:32:12 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
I question any RFC mandate that shuts down IP communication on a node
because of packets received from remote systems.
RFC4862 tell us that we SHOULD disable IP communication.
(IP
In article [EMAIL PROTECTED] (at Wed, 09 Jan 2008 15:55:44 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
Because of the above, the existing behavior must still stay the
default. I hope this is your plan.
By default Linux will not implement this SHOULD, it's a security
issue.
Yes so
In article [EMAIL PROTECTED] (at Sun, 23 Dec 2007 13:41:36 +0200), David
Shwatrz [EMAIL PROTECTED] says:
I had written a small patch to neigh_changeaddr() in net/core/neighbour.c
against the 2.6 git net tree, which sends a gratuitous ARP to update
the list of
all the involved neighbours with
In article [EMAIL PROTECTED] (at Sun, 23 Dec 2007 14:24:00 +0200), David
Shwatrz [EMAIL PROTECTED] says:
Regarding your answer; I accept it and I will soon send a revised
version of this patch (making changes to
arp_netdev_event() and ndisc_netdev_event().)
I had IPv4 in mind, there is no
In article [EMAIL PROTECTED] (at Sun, 23 Dec 2007 07:46:15 -0500), jamal
[EMAIL PROTECTED] says:
On Sun, 2007-23-12 at 21:38 +0900, YOSHIFUJI Hideaki / 吉藤英明 wrote:
In article [EMAIL PROTECTED] (at Sun, 23 Dec 2007 14:24:00 +0200), David
Shwatrz [EMAIL PROTECTED] says:
Regarding your
In article [EMAIL PROTECTED] (at Sun, 23 Dec 2007 15:04:37 +0200), David
Shwatrz [EMAIL PROTECTED] says:
Hello,
You should iterate all of ifa_list (for IPv4) / addr_list (for IPv6).
For IPv6, we also have anycast (maintained by ac_list) as well.
I am not sure that we need to iterate
In article [EMAIL PROTECTED] (at Fri, 21 Dec 2007 11:24:54 +0900), Satoru
SATOH [EMAIL PROTECTED] says:
2007/12/21, Jarek Poplawski [EMAIL PROTECTED]:
Jarek Poplawski wrote, On 12/20/2007 09:24 PM:
...
but since it's your patch, I hope you do some additional checking
if it's always
In article [EMAIL PROTECTED] (at Fri, 21 Dec 2007 22:49:59 +0900), Satoru
SATOH [EMAIL PROTECTED] says:
I agree.
I mistakenly thought hz in that context must be larger than 1000..
As it's uncertain, your's looks much simpler and better.
(btw, the lines else div = 1 is not needed, is
In article [EMAIL PROTECTED] (at Thu, 20 Dec 2007 12:31:27 +0900), Satoru
SATOH [EMAIL PROTECTED] says:
diff --git a/ip/iproute.c b/ip/iproute.c
index f4200ae..fa722c6 100644
--- a/ip/iproute.c
+++ b/ip/iproute.c
@@ -510,16 +510,16 @@ int print_route(const struct sockaddr_nl *who,
struct
In article [EMAIL PROTECTED] (at Fri, 21 Dec 2007 07:03:58 +0100), Eric
Dumazet [EMAIL PROTECTED] says:
Because tot_len is signed in tcp_v6_send_ack(), tot_len/4 forces compiler
to emit an integer divide, while we can help it to use a right shift,
less expensive.
Are you really sure?
At
In article [EMAIL PROTECTED] (at Fri, 21 Dec 2007 08:39:24 +0100), Eric
Dumazet [EMAIL PROTECTED] says:
Okay, anyway, I'll convert them to unsigned int, which is more
appropriate.
I didnt chose this path, because David was against changing some fields from
'int' to 'unsigned'. If you
Several length variables cannot be negative, so convert int to
unsigned int. This also allows us to do sane shift operations
on those variables.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
--
diff --git a/include/net/tcp.h b/include/net/tcp.h
index cb5b033..f663a85 100644
---
Hello.
Please consider pulling the following changes from the branch
net-2.6-dev-20071214
available at
git://git.linux-ipv6.org/gitroot/yoshfuji/linux-2.6-dev.git
which is on top of your net-2.6-devel tree.
Regards,
---
HEADLINES
-
[BRIDGE]: Use cpu_to_be16() where
In article [EMAIL PROTECTED] (at Wed, 12 Dec 2007 15:57:08 -0600), Chris
Friesen [EMAIL PROTECTED] says:
You may try other versions of this command
http://devresources.linux-foundation.org/dev/iproute2/download/
They appear to be numbered by kernel version, and the above version is
In article [EMAIL PROTECTED] (at Tue, 11 Dec 2007 11:30:19 -0500), Paul Moore
[EMAIL PROTECTED] says:
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
index 5b860b6..e2a3dd1 100644
--- a/net/xfrm/xfrm_state.c
+++ b/net/xfrm/xfrm_state.c
:
@@ -1994,67 +1995,59 @@ void __init
In article [EMAIL PROTECTED] (at Tue, 11 Dec 2007 19:00:08 +0100), Aurélien
Charbon [EMAIL PROTECTED] says:
--- linux-2.6.24-rc4/include/net/ipv6.h 2007-12-10 16:11:38.0
+0100
+++ linux-2.6.24-rc4-IPv6-cache-based/include/net/ipv6.h 2007-12-11
17:52:39.0 +0100
In article [EMAIL PROTECTED] (at Tue, 11 Dec 2007 06:40:18 +0100), Eric
Dumazet [EMAIL PROTECTED] says:
nl_pid_hash_alloc() is renamed to nl_pid_hash_zalloc().
It is now returning zeroed memory to its callers.
I do think you do not need (and you should not) rename it
because XXX_zalloc()
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
diff --git a/include/net/ip.h b/include/net/ip.h
index 840dd91..7f18819 100644
--- a/include/net/ip.h
+++ b/include/net/ip.h
@@ -169,7 +169,7 @@ DECLARE_SNMP_STAT(struct linux_mib, net_statistics);
#define NET_ADD_STATS_USER(field, adnd)
In article [EMAIL PROTECTED] (at Sat, 08 Dec 2007 00:04:29 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
Herbert, Yoshifuji and I were just discussing the
sysfs device attribute issue.
It's seems sane to me that if we had some kind of
'dirty' bit per attribute we could propagate
Hello.
In article [EMAIL PROTECTED] (at Sat, 8 Dec 2007 15:55:34 -0200), Arnaldo
Carvalho de Melo [EMAIL PROTECTED] says:
Signed-off-by: Arnaldo Carvalho de Melo [EMAIL PROTECTED]
diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c
index 5ab8ba7..90d2f72 100644
---
In article [EMAIL PROTECTED] (at Fri, 07 Dec 2007 14:13:25 +0100), Daniel
Lezcano [EMAIL PROTECTED] says:
The route6 init function is a little difficult to read because it contains
a lot of ifdef. The patchset redefines the usual static inline functions when
the code is to be disabled by
RTCF_xxx flags, defined in include/linux/in_route.h) are available for
IPv4 route (rtable) entries only. Use RTF_xxx flags instead,
defined in include/linux/ipv6_route.h, for IPv6 route entries (rt6_info).
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
--
diff --git
Hello.
In article [EMAIL PROTECTED] (at Tue, 4 Dec 2007 16:27:50 +0100), Hugo
Santos [EMAIL PROTECTED] says:
The behavior is the same as in UDP, but ipv6_pinfo-saddr is not
usually set for these kind of sockets. I would say that if fl6_src is
any, it should be copied from the ipv6 header.
Hello.
In article [EMAIL PROTECTED] (at Tue, 4 Dec 2007 17:01:43 +0100), Hugo
Santos [EMAIL PROTECTED] says:
If we do really support it, if hdcincl is set, XFRM and other
all extension header processes should be skipped, but they are
not very clear at all so far.
I understand how
In article [EMAIL PROTECTED] (at Thu, 29 Nov 2007 21:29:40 +1100), Herbert Xu
[EMAIL PROTECTED] says:
On Mon, Nov 26, 2007 at 05:16:16PM +, Templin, Fred L wrote:
From: Fred L. Templin [EMAIL PROTECTED]
This patch includes support for the Intra-Site Automatic Tunnel
Addressing
In article [EMAIL PROTECTED] (at Mon, 26 Nov 2007 09:16:16 -0800), Templin,
Fred L [EMAIL PROTECTED] says:
From: Fred L. Templin [EMAIL PROTECTED]
This patch includes support for the Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP) per RFC4214. It uses the SIT
module, and is
In article [EMAIL PROTECTED] (at Wed, 21 Nov 2007 07:45:32 -0500), Jeff
Garzik [EMAIL PROTECTED] says:
SO_NO_CHECK support for IPv6 appeared to be missing. This is presented,
based on a reading of net/ipv4/udp.c.
Disagree. UDP checksum is mandatory in IPv6.
--yoshfuji
-
To unsubscribe from
In article [EMAIL PROTECTED] (at Thu, 22 Nov 2007 10:34:03 +0800), Herbert Xu
[EMAIL PROTECTED] says:
On Wed, Nov 21, 2007 at 07:17:40PM -0500, Jeff Garzik wrote:
For those interested, I am dealing with a UDP app that already does very
strong checksumming and encryption, so additional
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv4/tcp_ipv4.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
index e566f3c..ff36096 100644
--- a/net/ipv4/tcp_ipv4.c
+++ b/net/ipv4/tcp_ipv4.c
@@ -900,8 +900,7 @@ int
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv4/tcp_ipv4.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
index ff36096..652c323 100644
--- a/net/ipv4/tcp_ipv4.c
+++ b/net/ipv4/tcp_ipv4.c
@@ -938,10 +938,10
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv6/tcp_ipv6.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c
index 3aad861..b1bfbdd 100644
--- a/net/ipv6/tcp_ipv6.c
+++ b/net/ipv6/tcp_ipv6.c
@@ -581,7 +581,10 @@
Due to the bug, refcnt for md5sig pool was leaked when
an user try to delete a key if we have more than one key.
In addition to the leakage, we returned incorrect return
result value for userspace.
This fix should close Bug #9418, reported by [EMAIL PROTECTED].
Signed-off-by: YOSHIFUJI Hideaki
Hello.
I'll take care of this.
Regards,
--yoshfuji
In article [EMAIL PROTECTED] (at Tue, 20 Nov 2007 09:36:26 -0800), Templin,
Fred L [EMAIL PROTECTED] says:
From: Fred L. Templin [EMAIL PROTECTED]
This patch includes support for the Intra-Site Automatic Tunnel
Addressing Protocol
NAK.
In article [EMAIL PROTECTED] (at Fri, 16 Nov 2007 17:19:27 +0300), Pavel
Emelyanov [EMAIL PROTECTED] says:
@@ -858,7 +852,7 @@ static struct sock *raw_get_first(struct seq_file *seq)
++state-bucket) {
struct hlist_node *node;
-
In article [EMAIL PROTECTED] (at Wed, 14 Nov 2007 22:44:17 -0800), Templin,
Fred L [EMAIL PROTECTED] says:
--- linux-2.6.24-rc2/net/ipv6/addrconf.c.orig 2007-11-08 11:59:35.0
-0800
+++ linux-2.6.24-rc2/net/ipv6/addrconf.c 2007-11-14 22:17:28.0
-0800
@@ -1424,6
In article [EMAIL PROTECTED] (at Wed, 14 Nov 2007 22:44:17 -0800), Templin,
Fred L [EMAIL PROTECTED] says:
From: Fred L. Templin [EMAIL PROTECTED]
This patch includes support for the Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP) per RFC4214. It uses the SIT
module, and is
In article [EMAIL PROTECTED] (at Thu, 15 Nov 2007 10:11:16 -0800), Templin,
Fred L [EMAIL PROTECTED] says:
Yoshifuji,
-Original Message-
From: YOSHIFUJI Hideaki / 吉藤英明 [mailto:[EMAIL PROTECTED]
Sent: Thursday, November 15, 2007 3:48 AM
To: Templin, Fred L
Cc: netdev
In article [EMAIL PROTECTED] (at Tue, 13 Nov 2007 13:31:27 -0500), Chuck
Lever [EMAIL PROTECTED] says:
clp-rpc_ops-version,
-NIPQUAD(clp-cl_addr.sin_addr),
-ntohs(clp-cl_addr.sin_port),
+rpc_peeraddr2str(clp-cl_rpcclient,
1 - 100 of 483 matches
Mail list logo