reopen 517892 thanks On Thu, Mar 26, 2009 at 08:18:29PM +0000, Debian Bug Tracking System wrote: > This is an automatic notification regarding your Bug report > which was filed against the linux-image-2.6.26-1-openvz-amd64 package: > > #517892: linux-image-2.6.26-1-openvz-amd64: IPv6 tunnels through sit > v4tunnels not possible > > It has been closed by dann frazier <da...@debian.org>.
Sadly this is not fixed by the new kernel: tanaris:~# ifup sit0 ioctl: No buffer space available Failed to bring up sit0. There is no kernel backtrace anymore, though. The probably relevant part of the strace: [pid 7685] arch_prctl(ARCH_SET_FS, 0x7f051f8d16e0) = 0 [pid 7685] mprotect(0x7f051f29c000, 12288, PROT_READ) = 0 [pid 7685] munmap(0x7f051f8d3000, 11893) = 0 [pid 7685] socket(PF_NETLINK, SOCK_RAW, 0) = 3 [pid 7685] setsockopt(3, SOL_SOCKET, SO_SNDBUF, [32768], 4) = 0 [pid 7685] setsockopt(3, SOL_SOCKET, SO_RCVBUF, [32768], 4) = 0 [pid 7685] bind(3, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 0 [pid 7685] getsockname(3, {sa_family=AF_NETLINK, pid=7685, groups=00000000}, [18653764521033740]) = 0 [pid 7685] gettimeofday({1238875065, 527328}, NULL) = 0 [pid 7685] socket(PF_INET, SOCK_DGRAM, IPPROTO_IP) = 4 [pid 7685] ioctl(4, 0x89f1, 0x7fff278da380) = -1 ENOBUFS (No buffer space available) Kind regards, Philipp Kern
signature.asc
Description: Digital signature