From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.vyatta.com (mail.vyatta.com [76.74.103.46]) by huchra.bufferbloat.net (Postfix) with ESMTP id 28FDA20069D for ; Wed, 28 Sep 2011 10:02:33 -0700 (PDT) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.vyatta.com (Postfix) with ESMTP id 922B4141001F; Wed, 28 Sep 2011 10:02:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at tahiti.vyatta.com Received: from mail.vyatta.com ([127.0.0.1]) by localhost (mail.vyatta.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ml7ItsXTTA99; Wed, 28 Sep 2011 10:02:29 -0700 (PDT) Received: from nehalam.linuxnetplumber.net (static-50-53-80-93.bvtn.or.frontiernet.net [50.53.80.93]) by mail.vyatta.com (Postfix) with ESMTPSA id 6692D1410030; Wed, 28 Sep 2011 10:02:29 -0700 (PDT) Date: Wed, 28 Sep 2011 10:02:27 -0700 From: Stephen Hemminger To: Dave Taht Subject: Re: [PATCH] Set TOS (TCLASS) bits under ipv6 Message-ID: <20110928100227.6fb9f435@nehalam.linuxnetplumber.net> In-Reply-To: References: <20110928124750.GR1128@ucc.gu.uwa.edu.au> Organization: Vyatta X-Mailer: Claws Mail 3.7.10 (GTK+ 2.24.4; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: bloat-devel , dropbear@ucc.asn.au X-BeenThere: bloat-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: "Developers working on AQM, device drivers, and networking stacks" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Sep 2011 17:02:33 -0000 On Wed, 28 Sep 2011 06:03:01 -0700 Dave Taht wrote: > > I agree flags for SCP would make sense, I'll take a look > > where to do that. > > I think openssh does half the job (the scp side sets bulk), > I haven't looked at it yet (mostly working on cerowrt > right now) If you look at latest openssh source (5.6p1) then you will see that it has codt to DSCP bits the same for both IPv4 and IPv6. packet_set_tos(interactive ? qos_interactive : qos_bulk); static void packet_set_tos(int tos) { #ifndef IP_TOS_IS_BROKEN if (!packet_connection_is_on_socket()) return; switch (packet_connection_af()) { # ifdef IP_TOS case AF_INET: debug3("%s: set IP_TOS 0x%02x", __func__, tos); if (setsockopt(active_state->connection_in, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0) error("setsockopt IP_TOS %d: %.100s:", tos, strerror(errno)); break; # endif /* IP_TOS */ # ifdef IPV6_TCLASS case AF_INET6: debug3("%s: set IPV6_TCLASS 0x%02x", __func__, tos); if (setsockopt(active_state->connection_in, IPPROTO_IPV6, IPV6_TCLASS, &tos, sizeof(tos)) < 0) error("setsockopt IPV6_TCLASS %d: %.100s:", tos, strerror(errno)); break; # endif /* IPV6_TCLASS */ } #endif /* IP_TOS_IS_BROKEN */ } This version of openssh is in Debian testing (wheezy) and probably other bleeding edge distros.