WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] XEN Bridged Network and NAT

To: Michael Grosseck <liox@xxxxxxxxxxxx>
Subject: Re: [Xen-users] XEN Bridged Network and NAT
From: Christophe Saout <christophe@xxxxxxxx>
Date: Sat, 25 Sep 2010 20:01:07 +0200
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sat, 25 Sep 2010 11:02:31 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=saout.de; s=default; t=1285437662; bh=/h/Utqzyoz6u0ee/WAnqkLTj764157bywkrofgj5NpM=; h=Subject:From:In-Reply-To:References:Date:Message-ID; b=RCzJWEoHSLtz6WEnItk+QKXmz0tsKJQTUYK5ARRirWglB+aJK1v2UjeLARhrYJD6M iOLvbY1BMyS7xJ0YNO7gcDSXCYBXJ1EldeMGCWjoO0mAkPs0Swcl+m3Q2upOo2W8HK urKPSriNz2S/3WOcvnqhtMMlzDBUuRVXcRwrSvt4=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4C9E2992.3020003@xxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <4C9E01A0.1030601@xxxxxxxxxxxx> <1285424126.20282.4.camel@xxxxxxxxxxxxxxxxxxxx> <4C9E2992.3020003@xxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
Hey Michael,

> thanks for your reply. I'm using the standard xen kernel which comes 
> with debian lenny on dom0 and domu.
> Its 2.6.26-2-xen-amd64 #1 SMP in the moment.
> I don't know if this version applies to the hacks you mentioned.

I just checked and I would assume that it does, since that kernel still
uses the "proto_data_valid"/"proto_csum_blank" hack in the networking
stack.

If I ported my patch to that version, would that help you? (I currently
have it for 2.6.19) I mean, you could add it to the debian source
package and rebuild the packages (which you would need to repeat every
time you update the kernel, unless at some point Debian switches to the
new pvops Dom0 kernels)

Cheers,
        Christohe



_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>