[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1027861: marked as done (linux: consider enabling CONFIG_IPV6_RPL_LWTUNNEL)



Your message dated Thu, 01 May 2025 17:20:54 +0200 (CEST)
with message-id <20250501152054.574BABE2DE0@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #1027861,
regarding linux: consider enabling CONFIG_IPV6_RPL_LWTUNNEL
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1027861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027861
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Severity: wishlist
Tags: ipv6
X-Debbugs-Cc: jerome.pouiller@gmail.com

Hi folks,

"RPL Source Routing Header" (CONFIG_IPV6_RPL_LWTUNNEL) is currently
disabled. It seems it is only an oversight since this option is not
explicitly mentioned in debian kernel config file (and features like
"Segment Routing Header encapsulation" are enabled while they are very
close of "RPL Source Routing Header").

We consider to use RPL Source Routing Header in our implementation of
border router for Low-Power and Lossy Networks[1]. So, I would be very
glad to see this option enabled on Debian.

FYI, I have build a custom kernel with this option enabled without any
pain. I could send a patch if you need.

Thank you,

[1]: https://github.com/SiliconLabs/wisun-br-linux

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing'), (300, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.10-custom (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_IE.utf8, LC_CTYPE=en_IE.utf8 (charmap=UTF-8), LANGUAGE=en_IE:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a (very) old kernel or the bug is old itself
without resolution. Maybe it was for a feature enablement which nobody
acted on. We are sorry we were not able to timely deal with this issue.
There are many open bugs for the src:linux package and thus we are
closing older bugs where it's unclear if they still occur in newer
versions and are still relevant to the reporter. For an overview see:
https://bugs.debian.org/src:linux .

If you can reproduce your issue with

- the current version in unstable/testing
- the latest kernel from backports

or, if it was a feature addition/wishlist and still consider it
relevant, then:

Please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Please try to provide as much fresh details including kernel logs where
relevant. In particular were an issue is coupled with specific hardware we
might ask you to do additional debugging on your side as the owner of the
hardware.

Regards,
Salvatore

--- End Message ---

Reply to: