On Fri, Apr 19, 2019 at 11:55:11AM -0700, David Miller wrote:
From: Sasha Levin
Date: Wed, 17 Apr 2019 16:53:17 -0400
On Wed, Apr 17, 2019 at 11:51:27AM -0600, Captain Wiggum wrote:
Hi All,
We have built 4.19 with Peter's patch, and now all TAHI IPv6 tests
pass, even another issue I reported
From: Sasha Levin
Date: Wed, 17 Apr 2019 16:53:17 -0400
> On Wed, Apr 17, 2019 at 11:51:27AM -0600, Captain Wiggum wrote:
>>Hi All,
>>
>>We have built 4.19 with Peter's patch, and now all TAHI IPv6 tests
>>pass, even another issue I reported is fixed!
>>This patch looks great from our testing. Pl
On Wed, Apr 17, 2019 at 11:51:27AM -0600, Captain Wiggum wrote:
Hi All,
We have built 4.19 with Peter's patch, and now all TAHI IPv6 tests
pass, even another issue I reported is fixed!
This patch looks great from our testing. Please accept this patch...
So that Peter can move on to 4.14.
Thank y
Hi All,
We have built 4.19 with Peter's patch, and now all TAHI IPv6 tests
pass, even another issue I reported is fixed!
This patch looks great from our testing. Please accept this patch...
So that Peter can move on to 4.14.
Thank you Peter and Google crew for this patch!
I look forward to the fix
Hi All,
I apologize for the delay, my lab was reserved for some other uses.
But we am going to run the full TAHI IPv6 test suite against this patch
on Tue, and I will reply with the results.
Thanks Peter and Google team for the patch!
--John Masinter
On Mon, Apr 8, 2019 at 6:10 PM Peter Oskolko
Currently, 4.19 and earlier stable kernels contain a security fix
that is not fully IPv6 standard compliant.
This patchset backports IPv6 defrag fixes from 5.1rc that restore
standard-compliance.
Original 5.1 patchet: https://patchwork.ozlabs.org/cover/1029418/
John Masinter (captwiggum), could