On Mon, Oct 18, 2010 at 10:37:40PM +0200, Patrick Ringl wrote: > > Anything else I could possibly provide? :-) Yes, testing :) First of all I'd like to rule out (or in) the IPv6 query code, which is clearly generating a bogus packet (wrong payload_len). So can you apply this patch and see if it makes the problem go away? Please take packet dumps so we know that the IPv6 query is no longer being sent. Thanks, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c index eb5b256..66f39d7 100644 --- a/net/bridge/br_multicast.c +++ b/net/bridge/br_multicast.c @@ -832,11 +832,6 @@ static void br_multicast_send_query(struct net_bridge *br, br_group.proto = htons(ETH_P_IP); __br_multicast_send_query(br, port, &br_group); -#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) - br_group.proto = htons(ETH_P_IPV6); - __br_multicast_send_query(br, port, &br_group); -#endif - time = jiffies; time += sent < br->multicast_startup_query_count ? br->multicast_startup_query_interval : _______________________________________________ Bridge mailing list Bridge@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/bridge