Mayuresh,
On Fri, 14 Jul 2006, Mayuresh Chitale wrote:
>
> If anyone has solved similar problem or knows what causes this
> problem, please let me know.
>
> Any suggestion is welcome.
Configure a static arp entry for the tester on the unit under test.
(Or configure the tester to respond to ARP
Daniel,
On Wed, 14 Jun 2006, Daniel Phillips wrote:
>
> Speaking as a former member of a "grey market" binary module vendor that
> came in from the cold I can assure you that the distinction between EXPORT
> and EXPORT_GPL _is_ meaningful. That tainted flag makes it extremely
> difficult to do d
Alan,
On Wed, 14 Jun 2006, Alan Cox wrote:
> It isn't "policy" its called copyright law.
I know that I said I'd shut up, but I missed in TRIPS where it said
that symbols must be EXPORT_SYMBOL_GPL... Could you point that out?
(Just kidding.)
> You don't seem to understand copyright law either.
Chase,
On Wed, 14 Jun 2006, Chase Venters wrote:
>
> One point I remember coming up in the discussion was that the
> EXPORT_SYMBOL()/EXPORT_SYMBOL_GPL() split was a compromise of sorts.
> Interfaces that were needed to support users would reasonably be placed under
> EXPORT_SYMBOL(). By contra
Chase,
On Tue, 13 Jun 2006, Chase Venters wrote:
>
> > I don't think that it is fair to say that an unstable API/ABI, in of
> > itself, provides an incentive to open an existing proprietary driver.
>
> Sure it does, depending on your perspective and what you're willing to
> consider. The lack o
Chase,
On Tue, 13 Jun 2006, Chase Venters wrote:
>
> But I did ask for examples...
Perhaps the license isn't a good example, but there are other RTP
stacks that are non-GPL compatible. Also, if it includes SSL code
for SRTP, SSL license happens to be non-GPL compatible.
-
To unsubscribe from th
Ben,
On Tue, 13 Jun 2006, Ben Greear wrote:
>
> I got to the flame war late
...
I think we're trying to have an honest open discussion here. I certainly
don't mean to flame anyone and apologize if my remarks have been taken so.
-
To unsubscribe from this list: send the line "unsubscribe netdev"
Chase,
On Tue, 13 Jun 2006, Chase Venters wrote:
>
> It depends on what you mean by "pure-BSD". If you're talking about the
> 4-clause license with the advertising clause, then you are correct. Otherwise
> (IANAL) but my understanding is that BSD code can even be relicensed GPL by a
> third pa
Chase,
On Tue, 13 Jun 2006, Chase Venters wrote:
> I'm trying to imagine what kind of legitimate non-GPL modules might
> use them.
Example: in-kernel RTP implementation derived from AT&T rtp-lib
implementation (non-GPL compatible license) utilizing this kernel
interface for UDP socket access.
-
Daniel,
On Tue, 13 Jun 2006, Daniel Phillips wrote:
>
> You probably meant "non-GPL-compatible non-proprietary". If so, then by
> definition there are none.
Well, being GPL compatible is not a requirement for an open source license.
IANAL, but last I checked, pure-BSD is not compatible with GP
Chase,
On Tue, 13 Jun 2006, Chase Venters wrote:
>
> Look out for that word (stable). Judging from history (and sanity),
> arguing /in favor of/ any kind of stable module API is asking for it.
I was really just using Daniel's words. I am all too aware that kernel
APIs are unstable. To some it
Daniel,
On Tue, 13 Jun 2006, Daniel Phillips wrote:
>
> This has the makings of a nice stable internal kernel api. Why do we want
> to provide this nice stable internal api to proprietary modules?
Why not? Not all non-GPL modules are proprietary. Do we lose
something by making a nice stable a
Stephen,
On Tue, 13 Jun 2006, Stephen Hemminger wrote:
> > @@ -2176,3 +2279,13 @@ EXPORT_SYMBOL(sock_wake_async);
> > EXPORT_SYMBOL(sockfd_lookup);
> > EXPORT_SYMBOL(kernel_sendmsg);
> > EXPORT_SYMBOL(kernel_recvmsg);
> > +EXPORT_SYMBOL(kernel_bind);
> > +EXPORT_SYMBOL(kernel_listen);
> > +EXP
Florian,
On Fri, 02 Jun 2006, Florian Weimer wrote:
>
> I see them now. Hmm. Is there a theoretical explanation for them?
Jenkins is an ad hoc function that is far from ideal. As you know,
the ideal hash changes 1/2 the bits in the output value for each one
bit change in the input value(s).
Evgeniy,
I agree, even with constant source IP, the hash still should have
performed better (but didn't). Constant source IP and varying
port is a realistic data set for a port proxy.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
Evgeniy,
On Thu, 01 Jun 2006, Evgeniy Polyakov wrote:
I think the sun shines more in Moscow than in Edmonton, so it is not
so random. ;)
>
> Specially for you :)
Thank you for being so gracious and patient with me.
> It does not have artifacts, but it's dispersion is wider than XOR one.
> _Mu
Evgeniy,
On Thu, 01 Jun 2006, Evgeniy Polyakov wrote:
For purely random numbers you could amplify thermal noise off an
open transitor junction (the audiofile's white noise generator)
and feed it into an analog to digital converter.
>
> I've run it with following source ip/port selection algo:
>
Evgeniy,
On Thu, 01 Jun 2006, Evgeniy Polyakov wrote:
> On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL
> PROTECTED]) wrote:
> > > Since pseudo-randomness affects both folded and not folded hash
> > > distribution, it can not end up in different
Evgeniy,
On Thu, 01 Jun 2006, Evgeniy Polyakov wrote:
>
> Since pseudo-randomness affects both folded and not folded hash
> distribution, it can not end up in different results.
Yes it would, so to rule out pseudo-random effects the pseudo-
random number generator must be removed.
>
> You are
David,
On Wed, 31 May 2006, David Miller wrote:
>
> Ok I believe you now :)
>
I'll believe it if he interates through a subset and gets the
same results instead of using a pseudo-random number generator.
I thought you said you were considering jenkins_3word(), not
jenkins_2word()?
-
To unsubs
Evgeniy,
On Thu, 01 Jun 2006, Evgeniy Polyakov wrote:
>
> for (i=0; i saddr = num2ip(get_random_byte(), get_random_byte(),
> get_random_byte(), get_random_byte());
> sport = get_random_word();
You still have a problem: you cannot use a pseudo-random numbe
Evgeniy,
On Wed, 31 May 2006, Evgeniy Polyakov wrote:
> > > > Worse: he folded the jenkins algorith result with
> > > >
> > > >h ^= h >> 16;
> > > >h ^= h >> 8;
> > > >
> > > > Destroying the coverage of the function.
> > >
> > > It was done to simulate socket code which uses the sa
Evgeniy,
On Wed, 31 May 2006, Evgeniy Polyakov wrote:
>
> 1. Netchannel.
> http://tservice.net.ru/~s0mbre/old/?section=projects&item=netchannel
This one refers to the erroneous result below.
>
> 2. Compared Jenkins hash with XOR hash used in TCP socket selection
> code.
> http://tservice.net.r
Evgeniy,
On Wed, 31 May 2006, Evgeniy Polyakov wrote:
> 2. Compared Jenkins hash with XOR hash used in TCP socket selection code.
> http://tservice.net.ru/~s0mbre/blog/2006/05/14#2006_05_14
Two problems with the comparison:
Port numbers can be collected into a 32 bit register in network
byte
David,
On Wed, 31 May 2006, David Miller wrote:
>
> I don't know how practical this is. The 4GB sequence space
> wraps very fast on 10 gigabit, so we'd be rehashing a bit
> and 100 gigabit would make things worse whenever that shows
> up.
It works better for SCTP, because the vtags are constant
David,
On Wed, 31 May 2006, David Miller wrote:
>
> For sure and there are plans afoot to move over to
> dynamic table sizing and the Jenkins hash function.
Just a suggestion, but I have an approach that stands to be
faster than Jenkins deriving from the verification tag approach
that I took for
David,
On Wed, 31 May 2006, David Miller wrote:
>
> For sure and there are plans afoot to move over to
> dynamic table sizing and the Jenkins hash function.
Yes, that could be far more efficient.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EM
David,
On Wed, 31 May 2006, David Miller wrote:
> From: "Brian F. G. Bidulock" <[EMAIL PROTECTED]>
> Date: Tue, 30 May 2006 23:55:26 -0600
>
> > For example, it goes to great pains to permute upper order bits in
> > the local address, which for most con
28 matches
Mail list logo