On Thu, Nov 02, 2006 at 05:45:50PM -0800, Kevin Sanders wrote:
> I've written a kernel module that has pfil_add_hook'ed into the pfil
> framework. When my input packet filter function is called, I can
> mtod(*m, struct IP *) to the IP header, but haven't found a way to
> find the original ethernet
I've written a kernel module that has pfil_add_hook'ed into the pfil
framework. When my input packet filter function is called, I can
mtod(*m, struct IP *) to the IP header, but haven't found a way to
find the original ethernet header. (*m)->m_pkthdr.header always seems
to be NULL (I'm not even
On Thu, Nov 02, 2006 at 06:12:22PM +0100, 'Jeremie Le Hen' wrote:
> Hi Raymond,
>
> On Tue, Oct 31, 2006 at 11:10:47AM -0500, Raymond Wagner wrote:
> > Your other method is that I keep NAT on the internal interface as normal,
> > and then create VLANs, bridged to the external interface, to each co
Hi Raymond,
On Tue, Oct 31, 2006 at 11:10:47AM -0500, Raymond Wagner wrote:
> Your other method is that I keep NAT on the internal interface as normal,
> and then create VLANs, bridged to the external interface, to each computer
> with an external IP. Those machines would communicate as normal on
On Thu, Nov 02, 2006 at 08:26:27AM +, . wrote:
> Hi,
>
> I am confused by the use of inet_ntoa function in the kernel.
>
> The function inet_ntoa in the /sys/libkern/inet_ntoa.c uses a static array
> static char buf[4 * sizeof "123"];
> to store the result. And it returns the address of the a
Hi,
I have a script where we start a nttcp for some 500 nttcp client in back
ground. After some time I could see the nttcp clients are listed in the
TOP command as "Zoneli" state. Can any one please let me know what is
meant by Zoneli state?
Test Script:
=
count=1
while [ $count -le 2000
On Thursday 02 November 2006 11:32, LI Xin wrote:
> VANHULLEBUS Yvan wrote:
> > On Thu, Nov 02, 2006 at 06:19:43PM +0800, LI Xin wrote:
> > [.]
> >
> >> Sounds like a workaround to me and in theory that is insufficient
> >> for a MPSAFE protection. Here is a patch which reduces the chance
> >>
VANHULLEBUS Yvan wrote:
> On Thu, Nov 02, 2006 at 06:19:43PM +0800, LI Xin wrote:
> [.]
>> Sounds like a workaround to me and in theory that is insufficient for a
>> MPSAFE protection. Here is a patch which reduces the chance where we
>> get a race.
>
> Hi.
>
> This patch will allow multiple
On Thu, Nov 02, 2006 at 06:19:43PM +0800, LI Xin wrote:
[.]
> Sounds like a workaround to me and in theory that is insufficient for a
> MPSAFE protection. Here is a patch which reduces the chance where we
> get a race.
Hi.
This patch will allow multiple calls to inet_ntoa int the same
functi
Max Laier wrote:
> On Thursday 02 November 2006 09:26, . wrote:
>> Hi,
>>
>> I am confused by the use of inet_ntoa function in the kernel.
>>
>> The function inet_ntoa in the /sys/libkern/inet_ntoa.c uses a static
>> array static char buf[4 * sizeof "123"];
>> to store the result. And it returns th
On Thursday 02 November 2006 09:26, . wrote:
> Hi,
>
> I am confused by the use of inet_ntoa function in the kernel.
>
> The function inet_ntoa in the /sys/libkern/inet_ntoa.c uses a static
> array static char buf[4 * sizeof "123"];
> to store the result. And it returns the address of the array to
Hi,
I am confused by the use of inet_ntoa function in the kernel.
The function inet_ntoa in the /sys/libkern/inet_ntoa.c uses a static array
static char buf[4 * sizeof "123"];
to store the result. And it returns the address of the array to the caller.
I think this inet_ntoa is not reentrant, th
12 matches
Mail list logo