On Mon, 2014-10-27 at 21:10 +0100, Julien Cristau wrote:
> On Mon, Oct 27, 2014 at 13:40:44 +0000, Ben Hutchings wrote:
> 
> > I've now written and tested patches for that remaining regression.
> > 
> > Source at:
> > https://people.debian.org/~benh/packages/linux_3.2.63-2+deb7u1.dsc
> > https://people.debian.org/~benh/packages/linux_3.2.63-2+deb7u1.debian.tar.xz
> > 
> > Binary at:
> > https://people.debian.org/~benh/packages/linux-image-3.2.0-4-amd64_3.2.63-2+deb7u1_amd64.deb
> > 
> > There's a signed .changes file there as well, for verification
> > (distribution=UNRELEASED in case you are wondering).
> > 
> > Additional testing would be appreciated.
> > 
> Installed your package on salieri.debian.org now.  Anything we should
> look out for?

1. It shouldn't crash, obviously.

2. You may see a one-time warning about using UFO when we don't claim to
support it, until you also upgrade the guest kernels.  I found that
libvirt+QEMU tells guests they can use UFO even if the host tap device
refuses to support it.

3. UDP packets from the guest that require fragmentation should each get
a different fragmentation ID, and if they are sent at a low rate, the
IDs should not be consecutive (that was the purpose of the change in
3.2.63).  You can check this by capturing and dumping IPv6 fragments on
a *remote* machine:

    tcpdump -i eth0 -v 'ip6[6]==44'

Example output:

21:33:12.522227 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag (0x0276214b:0|1448) 
32794 > discard: UDP, length 10240
21:33:12.522271 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:1448|1448)
21:33:12.522282 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:2896|1448)
21:33:12.522293 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:4344|1448)
21:33:12.522301 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:5792|1448)
21:33:12.522312 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:7240|1448)
21:33:12.522322 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:8688|1448)
21:33:12.522334 IP6 (hlim 64, next-header Fragment (44) payload length: 120) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276214b:10136|112)
21:33:13.231373 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag (0x0276218f:0|1448) 
59424 > discard: UDP, length 10240
21:33:13.231414 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:1448|1448)
21:33:13.231424 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:2896|1448)
21:33:13.231432 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:4344|1448)
21:33:13.231441 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:5792|1448)
21:33:13.231450 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:7240|1448)
21:33:13.231460 IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:8688|1448)
21:33:13.231472 IP6 (hlim 64, next-header Fragment (44) payload length: 120) 
fe80::5604:a6ff:fec4:8ddd > fe80::2a92:4aff:fe2f:b2d: frag 
(0x0276218f:10136|112)

The first number after 'frag' is the fragmentation ID; here there are
two sets of fragments from two original 10K packets.

This should work whether or not the guest kernel is upgraded.

Ben. 

-- 
Ben Hutchings
Theory and practice are closer in theory than in practice.
                                - John Levine, moderator of comp.compilers

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to