lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGVrzcamm6bgTc_-1OZGD0L4DqQd5RfoVYftZic3MDvD8YMjxA@mail.gmail.com>
Date:	Wed, 30 Jul 2014 15:05:01 -0700
From:	Florian Fainelli <f.fainelli@...il.com>
To:	netdev <netdev@...r.kernel.org>,
	David Miller <davem@...emloft.net>,
	Cong Wang <xiyou.wangcong@...il.com>,
	Gregory Fong <gregory.0xf0@...il.com>, carlos@...hat.com
Cc:	eblake@...hat.com, Kumar Gala <galak@...eaurora.org>
Subject: linux/if_bridge.h no longer self contained (again)

Hi all,

Gregory and I bumped into the following issue:

http://linux-kernel.2935.n7.nabble.com/if-bridge-h-include-in6-h-for-struct-in6-addr-use-td580828.html

also reported here: https://bugzilla.redhat.com/show_bug.cgi?id=895141

We tracked down the following Linux changes:

ee262ad827f89e2dc7851ec2986953b5b125c6bc  inet: defines IPPROTO_*
needed for module alias generation
cfd280c91253cc28e4919e349fa7a813b63e71e8  net: sync some IP headers with glibc

and the following glibc change:

6c82a2f8d7c8e21e39237225c819f182ae438db3  Coordinate IPv6 definitions
for Linux and glibc

but as far as we could see and test it, this particular issue is still
present in the current Linux kernel.

What would be the recommended ways to move forward?

Should we keep a local change that includes netinet/in6.h and just
hope it does not cause any re-definitions?

Thanks!
-- 
Florian
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ