On Wed, Mar 14, 2018 at 07:07:36PM +0000, csszep wrote:
> Hi!
> 
> Will this fix be commit before 6.3 release?
> 

Yes something like this will need to be put into 6.3 since this is
currently a regression from 6.2.

> David Gwynne <d...@openbsd.org> ezt írta (id??pont: 2018. márc. 13., K 23:41):
> 
> >
> > > On 10 Mar 2018, at 08:01, Remi Locherer <remi.loche...@relo.ch> wrote:
> > >
> > >
> > > With below diff the setup works as expected: tcpdump shows OSPF hellos
> > > on gif0 and ospfd sees the neighbour.
> > >
> > > I don't think it's the correct fix though.
> >
> > functionally it is the correct fix.
> >
> > when i reworked gif(4) in src/sys/net/if_gif.c r1.108, i merged the ipv4
> > and ipv6 input paths. the ipv6 input code had this check, but ipv4 did not.
> > now it is applied to ipv4, but it is obviously wrong for both address
> > families.
> >
> > please commit the removal of this check, ok by me.
> >
> > thank you to everyone for the but report and debugging. i'm sorry for
> > taking so long to figure this out.
> >
> > dlg
> >
> > >
> > >
> > > Index: if_gif.c
> > > ===================================================================
> > > RCS file: /cvs/src/sys/net/if_gif.c,v
> > > retrieving revision 1.112
> > > diff -u -p -r1.112 if_gif.c
> > > --- if_gif.c  28 Feb 2018 23:28:05 -0000      1.112
> > > +++ if_gif.c  9 Mar 2018 20:52:46 -0000
> > > @@ -745,8 +745,8 @@ gif_input(struct gif_tunnel *key, struct
> > >       }
> > >
> > >       /* XXX What if we run transport-mode IPsec to protect gif tunnel ?
> > */
> > > -     if (m->m_flags & (M_AUTH | M_CONF))
> > > -             return (-1);
> > > +     //if (m->m_flags & (M_AUTH | M_CONF))
> > > +     //      return (-1);
> > >
> > >       key->t_rtableid = m->m_pkthdr.ph_rtableid;
> >
> >

-- 
:wq Claudio

Reply via email to