Patchwork [1/1] runqemu-ifup: enable arp proxying

login
register
mail settings
Submitter Scott Garman
Date June 6, 2012, 4:41 p.m.
Message ID <0cfc78b03c6a0e2c21c6a82ab9e78aa4a8b74949.1339000756.git.scott.a.garman@intel.com>
Download mbox | patch
Permalink /patch/29327/
State Accepted
Commit d294b1bddece429f2639676ddc97d2896fc58916
Headers show

Comments

Scott Garman - June 6, 2012, 4:41 p.m.
This allows core-image-sato to access the WAN.

Thanks to Dexuan Cui for proposing this fix.

Fixes [YOCTO #2329]

Signed-off-by: Scott Garman <scott.a.garman@intel.com>
---
 scripts/runqemu-ifup |    1 +
 1 file changed, 1 insertion(+)
Elizabeth Flanagan - June 11, 2012, 5:38 p.m.
On Wed, Jun 6, 2012 at 9:41 AM, Scott Garman <scott.a.garman@intel.com> wrote:
> This allows core-image-sato to access the WAN.
>
> Thanks to Dexuan Cui for proposing this fix.
>
> Fixes [YOCTO #2329]
>
> Signed-off-by: Scott Garman <scott.a.garman@intel.com>
> ---
>  scripts/runqemu-ifup |    1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/scripts/runqemu-ifup b/scripts/runqemu-ifup
> index e4c3daf..0926faf 100755
> --- a/scripts/runqemu-ifup
> +++ b/scripts/runqemu-ifup
> @@ -109,6 +109,7 @@ $ROUTE add -host 192.168.7.$dest $TAP
>  $IPTABLES -A POSTROUTING -t nat -j MASQUERADE -s 192.168.7.$n/32
>  $IPTABLES -A POSTROUTING -t nat -j MASQUERADE -s 192.168.7.$dest/32
>  echo 1 > /proc/sys/net/ipv4/ip_forward
> +echo 1 > /proc/sys/net/ipv4/conf/$TAP/proxy_arp
>  $IPTABLES -P FORWARD ACCEPT
>
>  echo $TAP
> --
> 1.7.9.5
>
>
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/openembedded-core


Merged into OE-Core

Thanks

-b

Patch

diff --git a/scripts/runqemu-ifup b/scripts/runqemu-ifup
index e4c3daf..0926faf 100755
--- a/scripts/runqemu-ifup
+++ b/scripts/runqemu-ifup
@@ -109,6 +109,7 @@  $ROUTE add -host 192.168.7.$dest $TAP
 $IPTABLES -A POSTROUTING -t nat -j MASQUERADE -s 192.168.7.$n/32
 $IPTABLES -A POSTROUTING -t nat -j MASQUERADE -s 192.168.7.$dest/32
 echo 1 > /proc/sys/net/ipv4/ip_forward
+echo 1 > /proc/sys/net/ipv4/conf/$TAP/proxy_arp
 $IPTABLES -P FORWARD ACCEPT
 
 echo $TAP