The fix for emerging security threats was overkill and it broke
basic semantic of IPv6 routing header processing. We should assume
RT0 (or even RT2, depends on configuration) as unknown RH type so
that we
- silently ignore the routing header if segleft == 0
- or, send ICMPv6 Parameter Problem
The fix for emerging security threats was overkill and it broke
basic semantic of IPv6 routing header processing. We should assume
RT0 (or even RT2, depends on configuration) as unknown RH type so
that we
- silently ignore the routing header if segleft == 0,
- or, send ICMPv6 Parameter Problem
The fix for emerging security threats was overkill and it broke
basic semantic of IPv6 routing header processing. We should assume
RT0 as unknown RH type so that we
- silently ignore the routing header if segleft == 0
- or, send ICMPv6 Parameter Problem message back to the sender,
otherwise.
In article [EMAIL PROTECTED] (at Sat, 12 May 2007 01:10:04 +0900), Mitsuru
Chinen [EMAIL PROTECTED] says:
[IPV4] SNMP: Display new statistics at /proc/net/netstat
This displays the statistics specified in the updated IP-MIB RFC
(RFC4293) in /proc/net/netstat. The reason why these are not
In article [EMAIL PROTECTED] (at Fri, 11 May 2007 09:22:43 -0700), Chris
Wright [EMAIL PROTECTED] says:
* YOSHIFUJI Hideaki / 吉藤英明 ([EMAIL PROTECTED]) wrote:
The fix for emerging security threats was overkill and it broke
basic semantic of IPv6 routing header processing. We should assume
In article [EMAIL PROTECTED] (at Thu, 17 May 2007 18:53:03 +0200), Oliver
Hartkopp [EMAIL PROTECTED] says:
+static int ipv6_hwtype(struct net_device *dev)
+{
+if ((dev-type == ARPHRD_ETHER) ||
+(dev-type == ARPHRD_LOOPBACK) ||
+#if defined(CONFIG_IPV6_SIT) ||
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
--
diff --git a/include/linux/ipv6.h b/include/linux/ipv6.h
index 09ea01a..648bd1f 100644
--- a/include/linux/ipv6.h
+++ b/include/linux/ipv6.h
@@ -209,9 +209,8 @@ enum {
DEVCONF_RTR_PROBE_INTERVAL,
In article [EMAIL PROTECTED] (at Tue, 22 May 2007 10:57:38 +0200), Eric
Dumazet [EMAIL PROTECTED] says:
I have tried to set up quagga with tcp-md5 support from kernel. All seems ok
with a intel e100 NIC, but as i testetd with a intel e1000 NIC the tcp
packets have an invalid md5 digest.
In article [EMAIL PROTECTED] (at Fri, 25 May 2007 15:32:20 +1000), Herbert Xu
[EMAIL PROTECTED] says:
On Fri, May 25, 2007 at 01:23:23PM +0900, [EMAIL PROTECTED] wrote:
diff --git a/include/net/xfrm.h b/include/net/xfrm.h
index 1e53520..c9f895f 100644
--- a/include/net/xfrm.h
+++
Hello.
I think the IETF community is reaching consensus on deprecation of
RH0 (Routing Header Type 0). RH0 is now handled as unknown RH type,
e.g, accept it if segleft == 0, or send ICMPv6 Parameter Problem to
the sender.
[PATCH 1/3] [IPV6]: Restore semantics of Routing Header processing.
The fix for emerging security threat was overkill and it broke
basic semantic of IPv6 routing header processing. We should assume
RT0 (or even RT2, depends on configuration) as unknown RH type so
that we
- silently ignore the routing header if segleft == 0
- send ICMPv6 Parameter Problem message
Based on draft-ietf-ipv6-deprecate-rh0-00.txt.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
Documentation/networking/ip-sysctl.txt |3 +-
include/linux/ipv6.h |4 +-
net/ipv6/datagram.c|3 +-
net/ipv6/exthdrs.c |
Because reversing RH0 is no longer supported by deprecation
of RH0, let's make IPV6_{RECV,2292}RTHDR boolean options.
Boolean are more appropriate from standard POV.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
include/linux/ipv6.h |4 ++--
net/ipv6/ipv6_sockglue.c |8
In article [EMAIL PROTECTED] (at Sun, 17 Jun 2007 23:17:49 -0700 (PDT)),
David Miller [EMAIL PROTECTED] says:
[PATCH 1/3] [IPV6]: Restore semantics of Routing Header processing.
[PATCH 2/3] [IPV6]: Do not send RH0 anymore.
[PATCH 3/3] [IPV6]: Make IPV6_{RECV,2292}RTHDR boolean options.
Bug reported by Haruhito Watanabe [EMAIL PROTECTED].
This is also appropriate for -stable releases.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv6/ndisc.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/net/ipv6/ndisc.c b/net/ipv6/ndisc.c
index
In article [EMAIL PROTECTED] (at Mon, 25 Jun 2007 10:28:38 +0530), Varun
Chandramohan [EMAIL PROTECTED] says:
According to the RFC 4292 (IP Forwarding Table MIB) there is a need for an
age entry for all the routes in the routing table. The entry in the RFC is
inetCidrRouteAge and oid is
In article [EMAIL PROTECTED] (at Mon, 25 Jun 2007 22:09:39 +0900 (JST)),
OBATA Noboru [EMAIL PROTECTED] says:
Please note that this is effective in IPv6 as well.
Of course, I'm happy with this.
--yoshfuji
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a
In article [EMAIL PROTECTED] (at Sat, 7 Jul 2007 17:34:59 +0300), Rémi
Denis-Courmont [EMAIL PROTECTED] says:
Fix handling of IPv6 Routing Headers with zero segments left.
In that case, we should ignore the extension header and continue with
the next one, rather than return a Paramater
Hello.
This is take 2 of updates for deprecating RH0 for
linux-2.6.22 (or net-2.6.23).
Note: sorry, previous patches introduced a linkage error.
Though it is not a good idea to disable RH2, we retain
the knob for it so far for backward compatibility.
Changesets are available at
In article [EMAIL PROTECTED] (at Thu, 21 Jul 2005 21:44:43 +0100), Andrew
McDonald [EMAIL PROTECTED] says:
I guess the fix would be a matter of changing:
if (sk ra-sel == sel) {
to:
if (sk ra-sel == sel
(!sk-sk_bound_dev_if ||
sk-sk_bound_dev_if == skb-dev-ifindex)) {
I
In article [EMAIL PROTECTED] (at Sun, 07 Aug 2005 20:33:38 +0200), Balazs
Scheidler [EMAIL PROTECTED] says:
Commit log says it all.
+ xfrm_state_bydst = (struct list_head *) __get_free_pages(GFP_KERNEL,
get_order(sizeof(struct list_head) * XFRM_DST_HSIZE * 2));
Please check the
In article [EMAIL PROTECTED] (at Tue, 16 Aug 2005 21:58:36 -0700 (PDT)),
David S. Miller [EMAIL PROTECTED] says:
It also is a preferred change than your minimal version
because it makes the ip6 input path very similar to
the ipv4 variant, so it's easier to verify the two pieces
of code doing
In article [EMAIL PROTECTED] (at Mon, 22 Aug 2005 13:08:28 +0200), Thomas
Graf [EMAIL PROTECTED] says:
Collection of cleanups for fib6_lookup() that used to live in my tree
for a while now.
Yoshfuji-san, what's the plan for CONFIG_IPV6_SUBTREES? Is MIPL
going to use it or can we remove it?
In article [EMAIL PROTECTED] (at Sat, 3 Sep 2005 11:27:56 +0100), Russell
King [EMAIL PROTECTED] says:
While trying to build a kernel with CONFIG_SYSCTL disabled, the following
error occurs:
CC net/ipv4/ip_sockglue.o
net/ipv4/ip_sockglue.c: In function `ip_setsockopt':
In article [EMAIL PROTECTED] (at Tue, 06 Sep 2005 13:05:16 -0700), Ben Greear
[EMAIL PROTECTED] says:
neigh-nud_state = NUD_INCOMPLETE;
*** neigh_hold(neigh, NDRK_NEIGH_TIMER);
neigh-timer.expires = now + 1;
Subject: [PATCH 2/2] [IPV6]: Support IPV6_{RECV,}TCLASS socket options /
ancillary data.
Based on patch from David L Stevens [EMAIL PROTECTED]
Signed-off-by: David L Stevens [EMAIL PROTECTED]
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
include/linux/in6.h |2 --
Hello.
David, this is what I promised before.
Please pull the following changesets, which implement
the source address selection algorythm described in RFC3484; e.g.:
- avoid using daprecated address
- prefer address in appropriate scope / on appropriate interface
- (minimum support of)
In article [EMAIL PROTECTED] (at Mon, 14 Nov 2005 18:42:30 +0800), Yan Zheng
[EMAIL PROTECTED] says:
The score.rule++ doesn't make any sense for me.
According to codes above, I think it should be hiscore.rule++; .
Oops, you're right.
Signed-off-by: Yan Zheng[EMAIL PROTECTED]
Acked-by:
In article [EMAIL PROTECTED] (at Tue, 15 Nov 2005 17:20:50 -0500), Vlad
Yasevich [EMAIL PROTECTED] says:
No, according to RFC 4007, loopback is considered a link-local
address.
Agreed. RFC3484 also explicitly says that loopback is treated as link-local.
--yoshfuji
-
To unsubscribe from this
In article [EMAIL PROTECTED] (at Fri, 18 Nov 2005 08:44:27 +0800), Yan Zheng
[EMAIL PROTECTED] says:
I get follow message when switch to single user mode and the kernel version
is 2.6.15-rc1-git5.
:
Nov 18 08:26:23 localhost kernel: Debug: sleeping function called from
invalid context at
Hello.
Following patch is for linux-2.6.
I think it is appropriate to push this to -stable.
---
[IPV6]: Fix tclass setting for raw sockets.
np-cork.tclass is used only in cork'ed context.
Otherwise, np-tclass should be used.
Bug#7096 reported by Remi Denis-Courmont [EMAIL PROTECTED].
In article [EMAIL PROTECTED] (at Sun, 3 Sep 2006 10:28:30 +0300), Rémi
Denis-Courmont [EMAIL PROTECTED] says:
This patch should add support for -1 as default IPv6 traffic class, as
specified in IETF RFC3542 §6.5. Within the kernel, it seems tclass 0
is already handled, but setsockopt,
Hello.
In article [EMAIL PROTECTED] (at Sun, 10 Sep 2006 20:10:06 +0300), Diego
Beltrami [EMAIL PROTECTED] says:
as part of this email you can find a patch which introduces the BEET mode
(Bound
End-to-End Tunnel) as specified by the ietf draft at the following link:
:
Signed-off-by: Diego
Hello.
Please pull the following changesets available at:
git://git.skbuff.net/gitroot/yoshfuji/net-2.6.19-20060918-net/
HEADLINES
-
[XFRM]: Do not add a state whose SPI is zero to the SPI hash.
[NET]: Move netlink interface bits to linux/if_link.h.
[NET]: Include
Hello.
Please pull the following changesets available at:
git://git.skbuff.net/gitroot/yoshfuji/net-2.6.19-20060918-inet6/
HEADLINES
-
[IPV6] NDISC: Handle NDP messages to proxied addresses.
[IPV6]: Don't forward packets to proxied link-local address.
[IPV6] NDISC:
In article [EMAIL PROTECTED] (at Tue, 19 Sep 2006 18:26:29 +0200), Nicolas
DICHTEL [EMAIL PROTECTED] says:
+ if (pneigh)
+ is_router = pneigh-flags NTF_ROUTER;
In function ndisc_send_na(), is_router must be 1 or 0, doesn't it ? Because,
icmph.icmp6_router is define as:
Hello.
Here is the update for IPv6 for net-2.6.19, take 2.
Changes:
- Fix IsRouter flag in NAs.
- Add HA/MN Support.
With these changesets, net-2.6.19 will be able to handle fundermental
not only CN (Correspondent Node) operation but also HA (Home Agent) /
MN (Mobile Node) operations.
Please
In article [EMAIL PROTECTED] (at Fri, 22 Sep 2006 02:31:59 -0500), William
Pitcock [EMAIL PROTECTED] says:
This patch allows for a user to disable the requirement to meet the
CAP_NET_BIND_SERVICE capability for a non-superuser. It is toggled by
the net.ipv4.allow_lowport_bind_nonsuperuser
In article [EMAIL PROTECTED] (at Thu, 5 Oct 2006 15:35:31 +1000), Herbert Xu
[EMAIL PROTECTED] says:
Are there any non-multicast interfaces that require addrconf?
In other words, what does the following patch break :)
Why do you want to do this? Xen issue?
As Alexey mentioned before,
In article [EMAIL PROTECTED] (at Thu, 5 Oct 2006 11:49:38 -0400 (EDT)), James
Morris [EMAIL PROTECTED] says:
On Thu, 5 Oct 2006, Joerg Roedel wrote:
Is there a reason why the tunnel driver for IPv6-in-IPv4 is currently
compiled into the ipv6 module? This driver is only needed in gateways
In article [EMAIL PROTECTED] (at Fri, 6 Oct 2006 11:34:02 +0200), Joerg
Roedel [EMAIL PROTECTED] says:
this is the submit of the patch discussed yesterday to compile the sit
driver as a seperate module.
changes to yesterday:
- default select changed to y in Kconfig
- added ifdefs to
In article [EMAIL PROTECTED] (at Fri, 6 Oct 2006 11:39:27 +0200), Joerg
Roedel [EMAIL PROTECTED] says:
This patch contains the changes to net/ipv6/addrconf.c to remove sit
specific code if the sit driver is not selected.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Signed-off-by:
In article [EMAIL PROTECTED] (at Tue, 10 Oct 2006 18:46:58 -0700), Ben
Woodard [EMAIL PROTECTED] says:
diff -ru linux-2.6.18/net/ipv4/tcp.c linux-2.6.18.new/net/ipv4/tcp.c
--- linux-2.6.18/net/ipv4/tcp.c 2006-09-19 20:42:06.0 -0700
+++ linux-2.6.18.new/net/ipv4/tcp.c
In article [EMAIL PROTECTED] (at Wed, 11 Oct 2006 17:51:24 -0700), Ben
Woodard [EMAIL PROTECTED] says:
diff -ru linux-2.6.18/net/ipv4/sysctl_net_ipv4.c
linux-2.6.18.new/net/ipv4/sysctl_net_ipv4.c
--- linux-2.6.18/net/ipv4/sysctl_net_ipv4.c 2006-09-19 20:42:06.0
-0700
+++
In article [EMAIL PROTECTED] (at Thu, 12 Oct 2006 11:41:24 +0200), Thomas
Graf [EMAIL PROTECTED] says:
Fixes rt6_lookup() to provide the source address in the flow
and sets RT6_LOOKUP_F_HAS_SADDR whenever it is present in
the flow.
Avoids unnecessary prefix comparisons by checking for a
[IPV6]: Remove bogus WARN_ON in Proxy-NA handling.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]c
---
diff --git a/net/ipv6/ndisc.c b/net/ipv6/ndisc.c
index 0304b5f..41a8a5f 100644
--- a/net/ipv6/ndisc.c
+++ b/net/ipv6/ndisc.c
@@ -967,8 +967,6 @@ static void ndisc_recv_na(struct sk_buff
In article [EMAIL PROTECTED] (at Tue, 17 Oct 2006 10:01:24 +0200),
Jean-Mickael Guerin [EMAIL PROTECTED] says:
Although this conversion is very clean and the next patch
is very logic, I'm going to hold on all patches from 7 onward
so there is some time for some discussion of the RFC'ness
In article [EMAIL PROTECTED] (at Tue, 17 Oct 2006 13:35:11 +0200), Thomas
Graf [EMAIL PROTECTED] says:
:
different logic. In order to solve this, rules must be restricted to
one of these paths, i.e. a rule intending to make certain prefixes
unreachable may not apply to the source selection
In article [EMAIL PROTECTED] (at Tue, 17 Oct 2006 14:34:15 +0200), Thomas
Graf [EMAIL PROTECTED] says:
Right, that works as well but duplicating the rule for every
interface is not very practical.
Though I think it is, but we could have non-local flag or such.
Anyways, the point is that the
In article [EMAIL PROTECTED] (at Wed, 18 Oct 2006 07:08:07 +0200), Eric
Dumazet [EMAIL PROTECTED] says:
+#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
struct {
struct in6_addr daddr;
struct in6_addr
In article [EMAIL PROTECTED] (at Wed, 20 Dec 2006 10:00:32 -0500), Mike
Frysinger [EMAIL PROTECTED] says:
a bunch of places in iputils utilize int lengths when in reality they
should
be using socklen_t
Patch applied. Thanks.
Please add some prefix in subject, please;
e.g. Subject:
In article [EMAIL PROTECTED] (at Wed, 20 Dec 2006 10:09:03 -0500), Mike
Frysinger [EMAIL PROTECTED] says:
the ipg script only works with the old pg3 module and not the new pktgen
module ... attached patch updates the ipg script to support both
Applied. Thanks.
--yoshfuji
-
To unsubscribe
Happy Holidays!
In article [EMAIL PROTECTED] (at Sun, 10 Dec 2006 22:50:55 -0800 (PST)),
David Miller [EMAIL PROTECTED] says:
From: YOSHIFUJI Hideaki [EMAIL PROTECTED]
Date: Tue, 05 Dec 2006 20:02:42 +0900 (JST)
In article [EMAIL PROTECTED] (at Tue, 5 Dec 2006 19:03:27 +0900),
In article [EMAIL PROTECTED] (at Sat, 30 Dec 2006 18:50:43 +0900), Komuro
[EMAIL PROTECTED] says:
I investigated the ftp-file-transfer-stop problem by git-bisect method,
and found this problem was introduced by
[TCP]: MD5 Signature Option (RFC2385) support patch.
Mr.YOSHIFUJI san, please
In article [EMAIL PROTECTED] (at Sat, 30 Dec 2006 20:59:31 +0900), Komuro
[EMAIL PROTECTED] says:
Do you see similar issue with other simple application?
sorry, I don't reproduce this problem on other application.
Can you reproduce it with other ftp client and/or server?
Anyway...
In article [EMAIL PROTECTED] (at Thu, 4 Jan 2007 14:23:30 +0200), Craig
Schlenter [EMAIL PROTECTED] says:
On Fri, Jan 05, 2007 at 05:45:46AM +0900, Komuro wrote:
Hi,
I made a patch below.
With this patch, the ftp-transfer-stop problem does not happen.
Therefore, I think this is not a
Dave, please apply. Thank you.
In article [EMAIL PROTECTED] (at Tue, 9 Jan 2007 07:11:39 +0200), Craig
Schlenter [EMAIL PROTECTED] says:
All credit goes to Komuro [EMAIL PROTECTED] for tracking
this down. The patch is untested but it looks *cough* obviously
correct.
Signed-off-by: Craig
In article [EMAIL PROTECTED] (at Sat, 13 Jan 2007 17:12:40 +0800), Li Yewang
[EMAIL PROTECTED] says:
When I tested IPv6 redirect function about kernel 2.6.19.1, and found
that the kernel can send redirect packets whose target address is global
address, and the target is not the actual
[IPV6] MCAST: Fix joining all-node multicast group on device initialization.
Join all-node multicast group after assignment of dev-ip6_ptr
because it must be assigned when ipv6_dev_mc_inc() is called.
This fixes Bug#7817, reported by [EMAIL PROTECTED].
Closes: 7817
Signed-off-by: YOSHIFUJI
In article [EMAIL PROTECTED] (at Wed, 17 Jan 2007 18:51:14 +0300), Dmitry
Mishin [EMAIL PROTECTED] says:
===
L2 network namespaces
The most straightforward concept of network virtualization is complete
separation of namespaces, covering device list, routing
In article [EMAIL PROTECTED] (at Fri, 19 Jan 2007 01:31:08 +0900 (JST)),
Noriaki TAKAMIYA [EMAIL PROTECTED] says:
Wed, 17 Jan 2007 13:33:22 +0100
[Subject: Re: [PATCH] [IPV6] fixed the size of the netlink message
notified by inet6_rt_notify().]
Patrick McHardy [EMAIL PROTECTED] wrote...
Hello.
In article [EMAIL PROTECTED] (at Fri, 19 Jan 2007 16:23:14 -0500), Neil
Horman [EMAIL PROTECTED] says:
Patch to Implement IPv6 RFC 4429 (Optimistic Duplicate Address Detection). In
Good work. We will see if this would break core and basic ipv6 code.
Dave, please hold on.
Some quick
Hello.
In article [EMAIL PROTECTED] (at Mon, 22 Jan 2007 13:15:28 -0500), Neil
Horman [EMAIL PROTECTED] says:
Reposted patch, with your suggestions/corrections incorporated. The only
thing
I left alone was your last comment regarding the checking of saddr for being a
unicast address.
In article [EMAIL PROTECTED] (at Wed, 24 Jan 2007 15:31:47 +1100), Herbert Xu
[EMAIL PROTECTED] says:
Masayuki Nakagawa [EMAIL PROTECTED] wrote:
I suggest to use kfree_skb() instead of __kfree_skb().
I agree. In fact please do it for all paths in that function, i.e.,
just change
In article [EMAIL PROTECTED] (at Wed, 24 Jan 2007 17:56:23 +1100), Herbert Xu
[EMAIL PROTECTED] says:
David Miller [EMAIL PROTECTED] wrote:
Did a complete agreement occur that this patch is ok?
My only concern is that we're putting an arbitrary list of
protocols in the generic raw.c.
In article [EMAIL PROTECTED] (at Thu, 25 Jan 2007 14:45:00 -0500), Neil
Horman [EMAIL PROTECTED] says:
diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c
index 2a7e461..46f91ee 100644
--- a/net/ipv6/addrconf.c
+++ b/net/ipv6/addrconf.c
@@ -830,7 +830,8 @@ retry:
ift =
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
drivers/usb/net/asix.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/drivers/usb/net/asix.c b/drivers/usb/net/asix.c
index 896449f..4206df2 100644
--- a/drivers/usb/net/asix.c
+++ b/drivers/usb/net/asix.c
@@
s/FEter/FEther/.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
drivers/usb/net/pegasus.h |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/usb/net/pegasus.h b/drivers/usb/net/pegasus.h
index 98f6898..c746782 100644
--- a/drivers/usb/net/pegasus.h
+++
In article [EMAIL PROTECTED] (at Fri, 26 Jan 2007 09:27:30 -0500), Neil
Horman [EMAIL PROTECTED] says:
I'm looking for it at the moment, but I too had assumed that redirecting the
outgoing packet to the default router would happen automatically within the
routing code as a result of not
In article [EMAIL PROTECTED] (at Mon, 29 Jan 2007 16:30:13 -0500), Neil
Horman [EMAIL PROTECTED] says:
Quick reality check here. In thinking about how best to go about this
redirection of frames to the default router, based on Dave M.s input, I think
that the best solution would be in
Hello.
In article [EMAIL PROTECTED] (at Wed, 21 Feb 2007 02:24:26 -0500), weidong
[EMAIL PROTECTED] says:
eth0: fe80::20c:29ff:fe24:fa0a
| eth1: fe80::20c:29ff:fe24:fa14
| |
In article [EMAIL PROTECTED] (at Tue, 30 Jan 2007 16:55:12 +0900), Wei Dong
[EMAIL PROTECTED] says:
Hello, Mr yoshfuji
Take ping6 for example. Asumming there is a router which has 2 NICs.
eth0 on router has ipv6 addr fe80::20c:29ff:fe24:fa0a, eth1 on router has
ipv6 addr
In article [EMAIL PROTECTED] (at Tue, 30 Jan 2007 08:02:08 -0500), Neil
Horman [EMAIL PROTECTED] says:
I do not think we should copy neighbor information from (one of)
default routers, but use temporary neigh entry (or neigh in new state)
for such datagrams in stead. We should aware that:
In article [EMAIL PROTECTED] (at Wed, 21 Feb 2007 09:57:12 -0500), weidong
[EMAIL PROTECTED] says:
The following is the figure.
:
Host eth0: fe80::200:ff:fe00:100
Router eth0: fe80::20c:29ff:fe24:fa0a
Router eth1: fe80::20c:29ff:fe24:fa14
Other network
|
| eth1
+++
|
In article [EMAIL PROTECTED] (at Wed, 21 Feb 2007 23:51:45 -0500), weidong
[EMAIL PROTECTED] says:
Thanks for your patch. I think maybe we checking oif first is better,
and WARN_ON in function rt6_score_route().
Please remove WARN_ON. Otherwise, I'm fine with it.
--yoshfuji
-
To
[IPV6]: Clean up hop-by-hop options handler.
- Removed unused argument (nhoff) for ipv6_parse_hopopts().
- Make ipv6_parse_hopopts() to align with other extension header
handlers.
- Removed pointless assignment (hdr), which is not used afterwards.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL
Hello.
Following changesets fix several errors in extension header handling.
I'd propose to push them (except 4/4, maybe) to -stable.
[PATCH 1/4] [IPV6]: Ensure to have hop-by-hop options in our header of sk_buff.
[PATCH 2/4] [IPV6] XFRM: Don't use old copy of pointer after pskb_may_pull().
[IPV6]: Ensure to have hop-by-hop options in our header of sk_buff.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv6/exthdrs.c | 12
1 files changed, 12 insertions(+), 0 deletions(-)
7bcedcc73a45a5577103422c33e01f1633173984
diff --git a/net/ipv6/exthdrs.c
[IPV6] XFRM: Don't use old copy of pointer after pskb_may_pull().
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
---
net/ipv6/xfrm6_policy.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
83e25b9fb69b2c04ebfec2ee2b9fe95e5a7c0584
diff --git a/net/ipv6/xfrm6_policy.c
[IPV6] XFRM: Fix decoding session with preceding extension header(s).
We did not correctly decode session with preceding extension
header(s). This was because we had already pulled preceding
headers, skb-nh.raw + 40 + 1 - skb-data was minus, and
pskb_may_pull() failed.
We now have
In article [EMAIL PROTECTED] (at Tue, 18 Apr 2006 14:49:14 -0700 (PDT)),
David S. Miller [EMAIL PROTECTED] says:
All applied, and I agree with pushing 1-3 into -stable,
please send it.
Done. Thanks.
--yoshfuji
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a
Hello.
We eliminated rt6_dflt_lock (to protect default router pointer)
at 2.6.17-rc1, and introduced rt6_select() for general router selection.
The function is called in the context of rt6_lock read-lock held,
but this means, we have some race conditions when we do round-robin.
Am I correct?
If
In article [EMAIL PROTECTED] (at Wed, 3 May 2006 22:07:40 +0400), Evgeniy
Polyakov [EMAIL PROTECTED] says:
Even if the hardware cannot fully implement netfilter rules
there is still value in having an interface that documents
exactly how much filtering a given piece of hardware can do.
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
diff --git a/include/net/addrconf.h b/include/net/addrconf.h
index 750e250..74dca37 100644
--- a/include/net/addrconf.h
+++ b/include/net/addrconf.h
@@ -127,20 +127,18 @@ extern int unregister_inet6addr_notifier
static inline struct inet6_dev *
In article [EMAIL PROTECTED] (at Fri, 05 May 2006 22:00:32 +0100), David
Woodhouse [EMAIL PROTECTED] says:
Since updating the kernel to 2.6.16, I've got problems with external
connectivity to hosts which have both IPv4 and (Global) IPv6 addresses
in DNS. Glibc used to return the IPv4 address
In article [EMAIL PROTECTED] (at Fri, 05 May 2006 17:40:11 -0700 (PDT)),
David S. Miller [EMAIL PROTECTED] says:
From: YOSHIFUJI Hideaki [EMAIL PROTECTED]
Date: Fri, 05 May 2006 12:24:52 +0900 (JST)
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
It is critical that we free the inet6
In article [EMAIL PROTECTED] (at Sat, 06 May 2006 01:53:21 +0100), David
Woodhouse [EMAIL PROTECTED] says:
There is a default route, because I believe that's the only thing that
radvd can do. I cannot advertise a route to _only_ fec0::/16, can I?
Yes, you can, via Route Information option.
(=
In article [EMAIL PROTECTED] (at Sat, 06 May 2006 17:13:29 +0100), Simon
Kelley [EMAIL PROTECTED] says:
+void neigh_table_init(struct neigh_table *tbl)
+{
+ struct neigh_table *tmp;
+
+ neigh_table_init_no_netlink(tbl);
+ write_lock(neigh_tbl_lock);
+ for (tmp = neigh_tables; tmp; tmp
In article [EMAIL PROTECTED] (at Fri, 26 May 2006 02:24:19 +0300 (EEST)),
Meelis Roos [EMAIL PROTECTED] says:
(To YOSHIFUJI Hideaki: this is about the
http://comments.gmane.org/gmane.linux.network/35262 thread)
Tracked it down to IPV6 merge at 2006-03-21:
commit
In article [EMAIL PROTECTED] (at Fri, 26 May 2006 11:35:53 +0300 (EEST)),
Meelis Roos [EMAIL PROTECTED] says:
The unreachable route works now but LAN routing still does not work.
Locally generated ICMPv6 packets that should go to LAN interface still
go to tun6to4.
Please try this.
David,
In article [EMAIL PROTECTED] (at Fri, 26 May 2006 13:44:59 +0300 (EEST)),
Meelis Roos [EMAIL PROTECTED] says:
The unreachable route works now but LAN routing still does not work.
Locally generated ICMPv6 packets that should go to LAN interface still
go to tun6to4.
Please try
In article [EMAIL PROTECTED] (at Sat, 27 May 2006 21:33:45 +1000), Herbert Xu
[EMAIL PROTECTED] says:
As far as I can gather it's an attempt to guard against the removal of
the corresponding modules. Since neither module can be unloaded at all
we can leave it to whoever fixes up IPv6
In article [EMAIL PROTECTED] (at Sat, 27 May 2006 23:03:02 -0700 (PDT)),
David Miller [EMAIL PROTECTED] says:
Please don't get me wrong. What I removed here doesn't work at all to
begin with. I was just pointing out the possible reason why this code
existed in the first place.
Right
In article [EMAIL PROTECTED] (at Sat, 3 Jun 2006 19:54:42 +1000), Herbert Xu
[EMAIL PROTECTED] says:
[TCP]: Avoid skb_pull if possible when trimming head
Trimming the head of an skb by calling skb_pull can cause the packet
to become unaligned if the length pulled is odd. Since the length
In article [EMAIL PROTECTED] (at Thu, 8 Jun 2006 11:50:33 +0100), Gerrit
Renker [EMAIL PROTECTED] says:
+ UDP-Lite introduces a new socket type, the SOCK_LDGRAM (note the L) for
+ lightweight, connection-less services. These are the socket options:
I disagree. It should be SOCK_DGRAM.
--
In article [EMAIL PROTECTED] (at Thu, 08 Jun 2006 15:47:52 +0100), Alan Cox
[EMAIL PROTECTED] says:
Ar Iau, 2006-06-08 am 11:50 +0100, ysgrifennodd Gerrit Renker:
+ UDP-Lite introduces a new socket type, the SOCK_LDGRAM (note the L) for
+ lightweight, connection-less services. These are
Hello.
In article [EMAIL PROTECTED] (at Fri, 09 Jun 2006 00:56:46 +0200), Patrick
McHardy [EMAIL PROTECTED] says:
Okay, thanks.
I think it is better to eliminate these magic numbers.
How about this?
Signed-off-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
diff --git a/net/ipv6/addrconf.c
In article [EMAIL PROTECTED] (at Wed, 14 Jun 2006 00:44:00 +0900), Kazunori
MIYAZAWA [EMAIL PROTECTED] says:
This is preparation to introduce AES-XCBC-MAC.
- introducing common interface keyed hash
- making HMAC use the interface
Acked-by: YOSHIFUJI Hideaki [EMAIL PROTECTED]
BTW, why not
In article [EMAIL PROTECTED] (at Wed, 14 Jun 2006 00:44:06 +0900), Kazunori
MIYAZAWA [EMAIL PROTECTED] says:
This patch introduces AES-XCBC-MAC using the keyed hash interface.
It accordingly depends on the previous patch.
Signed-off-by: Kazunori MIYAZAWA [EMAIL PROTECTED]
Acked-by:
In article [EMAIL PROTECTED] (at Tue, 13 Jun 2006 18:03:22 +0200), Patrick
McHardy [EMAIL PROTECTED] says:
Yes, thats better. I also thing we shouldn't return -EINVAL but
-ENOSPC or something like that, -EINVAL usually indicated that
the user sent an invalid message, which isn't the case
1 - 100 of 463 matches
Mail list logo