| To: | YOSHIFUJI Hideaki / 吉藤英明 <yoshfuji@xxxxxxxxxxxxxx>, Netdev <netdev@xxxxxxxxxxx> |
|---|---|
| Subject: | Re: IPv6 "badness" in recent releases |
| From: | Jeff Garzik <jgarzik@xxxxxxxxx> |
| Date: | Sun, 14 Nov 2004 14:37:43 -0500 |
| Cc: | Arnaldo Carvalho de Melo <acme@xxxxxxxxxxxxxxxx> |
| In-reply-to: | <4197AC20.6020707@xxxxxxxxx> |
| References: | <4197AC20.6020707@xxxxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.3) Gecko/20040922 |
Two additional data points... * I'm running -bk24 now, and trying to reproduce* the problem in the previous email was generated by an ssh connection from host A, through router B, to host C. router B is the Linux kernel that was emitting the "Badness in dst_release" messages. No obvious error messages on host A (2.6.10-rc1-bk22) or host C (UML).
Jeff
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | IPv6 "badness" in recent releases, Jeff Garzik |
|---|---|
| Next by Date: | Re: A case AGAINST checksum offload, Florian Weimer |
| Previous by Thread: | IPv6 "badness" in recent releases, Jeff Garzik |
| Next by Thread: | Re: IPv6 "badness" in recent releases, Herbert Xu |
| Indexes: | [Date] [Thread] [Top] [All Lists] |