On 23.02.2016 13:21, Jiri Pirko wrote:
Tue, Feb 23, 2016 at 12:26:00PM CET, han...@stressinduktion.org wrote:
Hi Jiri,
On 22.02.2016 19:31, Jiri Pirko wrote:
From: Jiri Pirko
So far, there has been an mlx4-specific sysfs file allowing user to
change port type to either
Hi Jiri,
On 22.02.2016 19:31, Jiri Pirko wrote:
From: Jiri Pirko
So far, there has been an mlx4-specific sysfs file allowing user to
change port type to either Ethernet of InfiniBand. This is very
inconvenient.
Again, I want to express my concerns regarding all of this
On 22.02.2016 20:20, Marc Haber wrote:
On Mon, Feb 22, 2016 at 05:15:41PM +0100, Hannes Frederic Sowa wrote:
On 22.02.2016 16:47, Marc Haber wrote:
Can you reproduce the behavior with accept_ra_from_local =0 as well?
Unfortunately, the debugging VM I build works fine, it's just the
physical
iri Benc <jb...@redhat.com>
Reported-by: Wakko Warner <wa...@animx.eu.org>
Cc: Wakko Warner <wa...@animx.eu.org>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
net/ipv4/ip_output.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a
On 22.02.2016 16:47, Marc Haber wrote:
Can you reproduce the behavior with accept_ra_from_local =0 as well?
Unfortunately, the debugging VM I build works fine, it's just the
physical host showing this behavior. This is really strange.
Same here. Debugging VM didn't show this error at all and
c1a9a291cee0890eb0f435243f3fb84fefb04348
Author: Hannes Frederic Sowa <han...@stressinduktion.org>
Date: Wed Dec 23 22:44:37 2015 +0100
ipv6: honor ifindex in case we receive ll addresses in router
advertisements
$ git describe --contains c1a9a291cee0890eb0f435243f3fb84fefb04348
v4.4-rc8~5^2~10
?
If you don'
[full-quote for netdev]
Hello,
On 16.02.2016 01:08, Wakko Warner wrote:
Please keep me in CC.
I've been seeing the following on some of my VMs ran under qemu. The VMs do
not have internet connectivity. This happened when some files were accessed
via NFS to another VM (NOTE: Both VMs throw
tes the loop as the size is
zero without copying the credential information.
Just wondering if this might have been lost in the noise ...
I think the patch got lost, probably just resending is the easiest
solution. ;)
For the patch:
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Hi,
On 08.02.2016 11:55, Jiri Pirko wrote:
Mon, Feb 08, 2016 at 11:15:38AM CET, han...@stressinduktion.org wrote:
Hello,
On 06.02.2016 20:40, Jiri Pirko wrote:
Fri, Feb 05, 2016 at 06:38:42PM CET, alexei.starovoi...@gmail.com wrote:
On Fri, Feb 05, 2016 at 11:01:22AM +0100, Hannes Frederic
Hello,
On 06.02.2016 20:40, Jiri Pirko wrote:
Fri, Feb 05, 2016 at 06:38:42PM CET, alexei.starovoi...@gmail.com wrote:
On Fri, Feb 05, 2016 at 11:01:22AM +0100, Hannes Frederic Sowa wrote:
Okay. I see it more as changing mode of operation of hardware and thus has
not really anything to do
On 04.02.2016 14:26, Jiri Pirko wrote:
Thu, Feb 04, 2016 at 02:22:17PM CET, han...@stressinduktion.org wrote:
On 03.02.2016 16:17, Daniel Borkmann wrote:
On 02/03/2016 02:33 PM, Jiri Pirko wrote:
Wed, Feb 03, 2016 at 02:31:33PM CET, bro...@redhat.com wrote:
On Wed, 3 Feb 2016 11:47:56 +0100
On 03.02.2016 16:17, Daniel Borkmann wrote:
On 02/03/2016 02:33 PM, Jiri Pirko wrote:
Wed, Feb 03, 2016 at 02:31:33PM CET, bro...@redhat.com wrote:
On Wed, 3 Feb 2016 11:47:56 +0100
Jiri Pirko wrote:
From: Jiri Pirko
[...]
It is available here:
signation, as no barrier is needed.
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
On 03.02.2016 12:25, Herbert Xu wrote:
On Wed, Feb 03, 2016 at 09:26:57AM +0100, Hans Westgaard Ry wrote:
Devices may have limits on the number of fragments in an skb they support.
Current codebase uses a constant as maximum for number of fragments one
skb can hold and use.
When enabling
On 03.02.2016 12:36, Simon McVittie wrote:
On 02/02/16 17:34, David Herrmann wrote:
Furthermore, with this patch in place, a process better not pass any
file-descriptors to an untrusted process.
...
Did anyone notify the dbus maintainers of this? They
might wanna document this, if not already
On 03.02.2016 12:56, David Herrmann wrote:
However, with Hannes' revised patch, a different DoS attack against
dbus-daemon is possible. Imagine a peer that receives batches of FDs,
but never dequeues them. They will be accounted on the inflight-limit
of dbus-daemon, as such causing messages of
On 03.02.2016 13:20, Herbert Xu wrote:
On Wed, Feb 03, 2016 at 12:36:21PM +0100, Hannes Frederic Sowa wrote:
Agreed that it feels like a hack, but a rather simple one. I would
consider this to be just a performance improvement. We certainly need
a slow-path when virtio drivers submit gso
;
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Signed-off-by: Willy Tarreau <w...@1wt.eu>
---
v2: add reported-by, mitigates and acked-by.
It would be nice if (if accepted) it would be backported to -stable as the
issue is currently exploitable.
---
include/linux/sched
On 02.02.2016 20:29, Linus Torvalds wrote:
On Tue, Feb 2, 2016 at 10:29 AM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
Anyway, can someone provide a high-level description of what exactly
this patch is supposed to do? Which operation should be limited, who
should inflig
On 02.02.2016 21:44, Linus Torvalds wrote:
On Tue, Feb 2, 2016 at 12:32 PM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
Unfortunately we never transfer a scm_cookie via the skbs but merely use it
to initialize unix_skb_parms structure in skb->cb and destroy it afterwards
Hi Willy,
On 02.02.2016 21:39, Willy Tarreau wrote:
On Tue, Feb 02, 2016 at 09:32:56PM +0100, Hannes Frederic Sowa wrote:
But "struct pid *" in unix_skb_parms should be enough to get us to
corresponding "struct cred *" so we can decrement the correct counter
during skb d
+0100
unix: properly account for FDs passed over unix sockets
Signed-off-by: David Herrmann <dh.herrm...@gmail.com>
I don't think this specifically needs a Fixes tag. Seems more like a
clean-up.
Anyway, I also noticed this during review and it can be removed safely.
Acked-by: Hannes F
On 03.02.2016 01:57, Hannes Frederic Sowa wrote:
On 02.02.2016 23:11, Linus Torvalds wrote:
But I'm OK with that patch as is if you prefer it that way (maybe you
want
to use the cred to then test for root separately etc, out maybe there
already was done use of cred as cred that I just missed
On 02.02.2016 23:11, Linus Torvalds wrote:
[ sorry for the html mail, I'm out grocery shopping ]
On Feb 2, 2016 13:55, "Hannes Frederic Sowa" <han...@stressinduktion.org>
wrote:
I slightly tested the attached patch.
Looks fine. I do wonder: if the only thing we use t
-by: David Herrmann <dh.herrm...@gmail.com>
Cc: David Herrmann <dh.herrm...@gmail.com>
Cc: Willy Tarreau <w...@1wt.eu>
Cc: Linus Torvalds <torva...@linux-foundation.org>
Suggested-by: Linus Torvalds <torva...@linux-foundation.org>
Signed-off-by: Hannes Frederic Sowa &
On 02.02.2016 04:56, Alexander Duyck wrote:
@@ -394,7 +407,7 @@ ip_proto_again:
data, hlen, &_eth);
if (!eth)
goto out_bad;
- proto = eth->h_proto;
+
c
addresses useful candidates")
Cc: Eric Dumazet <eduma...@google.com>
Cc: Erik Kline <e...@google.com>
Cc: Hannes Frederic Sowa <han...@stressinduktion.org>
Signed-off-by: Subash Abhinov Kasiviswanathan <subas...@codeaurora.org>
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Definitely a stable candidate, thanks!
flowi6_oif in connect() before
performing the route lookup.
Signed-off-by: Paolo Abeni <pab...@redhat.com>
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
ctionality.
Signed-off-by: Paolo Abeni <pab...@redhat.com>
--
v1 -> v2 move the ip6_route_output() implementation into the header
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
On 29.01.2016 12:30, Paolo Abeni wrote:
The kernel has never enforced the egress interface specified
via the sticky pktinfo, except briefly between the commits
741a11d9e410 ("net: ipv6: Add RT6_LOOKUP_F_IFACE flag if oif is set")
and
d46a9d678e4c ("net: ipv6: Dont add RT6_LOOKUP_F_IFACE flag if
On 28.01.2016 13:27, Paolo Abeni wrote:
On Wed, 2016-01-27 at 19:38 +0100, Hannes Frederic Sowa wrote:
On 27.01.2016 14:45, Paolo Abeni wrote:
diff --git a/net/ipv6/route.c b/net/ipv6/route.c
index 3c8834b..973cb73 100644
--- a/net/ipv6/route.c
+++ b/net/ipv6/route.c
@@ -1183,11 +1183,10
On 27.01.2016 16:15, Eric Dumazet wrote:
On Wed, 2016-01-27 at 14:20 +0100, Hans Westgaard Ry wrote:
Devices may have limits on the number of fragments in an skb they support.
Current codebase uses a constant as maximum for number of fragments one
skb can hold and use.
When enabling
On 27.01.2016 14:45, Paolo Abeni wrote:
diff --git a/net/ipv6/route.c b/net/ipv6/route.c
index 3c8834b..973cb73 100644
--- a/net/ipv6/route.c
+++ b/net/ipv6/route.c
@@ -1183,11 +1183,10 @@ static struct rt6_info *ip6_pol_route_output(struct net
*net, struct fib6_table
return
Hi,
On 22.01.2016 20:50, Tom Herbert wrote:
Found it: tcp_mtu_probing
Exactly.
On Fri, Jan 22, 2016 at 11:39 AM, Tom Herbert wrote:
This came up on in one of the IETF mailing lists in the context that
PMTUD doesn't really work on the Internet so PLPMTUD is the way
y.org.uk>
Reported-by: Dave Jones <da...@codemonkey.org.uk>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/ppp/pptp.c | 34 --
1 file changed, 24 insertions(+), 10 deletions(-)
diff --git a/drivers/net/ppp/pptp.c b/drivers
Hi Daniel and Alexei,
On 07.01.2016 04:53, Alexei Starovoitov wrote:
On Wed, Jan 06, 2016 at 02:00:56AM +0100, Daniel Borkmann wrote:
I decided to extend the sch_ingress module with clsact functionality so
that commonly used code can be reused, the module is being aliased with
sch_clsact so
Device drivers which support geneve or vxlan offloading have a dependency
on the correlating kernel modules. Thus those drivers automatically loaded
the geneve or vxlan modules. Break this dependency with this small series.
Hannes Frederic Sowa (2):
vxlan: break dependency to network drivers
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/geneve.c | 30 +++---
include/linux/netdevice.h | 1 +
include/net/geneve.h | 7 +++
3 files changed, 31 insertions(+), 7 deletions(-)
diff --git a/drivers/net/gene
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/vxlan.c | 17 +++--
include/linux/netdevice.h | 1 +
include/net/vxlan.h | 5 +
3 files changed, 13 insertions(+), 10 deletions(-)
diff --git a/drivers/net/vxlan.c b/drivers/net/v
On 06.01.2016 19:00, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 7:41 AM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
diff --git a/drivers/net/geneve.c b/drivers/net/geneve.c
index 24b077a32c1c9c..548925d1571cb1 100644
--- a/drivers/net/geneve.c
+++ b/drivers/net/geneve.c
+stat
I don't really understand the use of the state_lock. Can't it be simply
replaced by rtnl_lock? It seems a lot of current users depend on
rtnl_lock anyway.
Anyway, fix this up for the moment.
Cc: Eugenia Emantayev <euge...@mellanox.com>
Signed-off-by: Hannes Frederic Sow
ely NETDEV_REFRESH_OFFLOADS. Otherwise this
series is very much the same as v1.
Hannes Frederic Sowa (8):
qlcnic: protect qlcnic_82xx_io_slot_reset with rtnl lock
mlx4: add rtnl lock protection in mlx4_en_restart
ixgbe: add rtnl locking in service task around vxlan_get_rx_port
benet: add r
Hi,
On 07.01.2016 00:57, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 3:25 PM, David Wragg wrote:
David Miller writes:
Prior to 4.3, openvswitch vxlan vports could transmit vxlan packets of
any size, constrained only by the ability to transmit the
Hi Jesse,
On 07.01.2016 01:18, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 3:39 PM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/geneve.c | 30 +++---
include/net/g
Cc: Sathya Perla <sathya.pe...@avagotech.com>
Cc: Ajit Khaparde <ajit.khapa...@avagotech.com>
Cc: Padmanabh Ratnakar <padmanabh.ratna...@avagotech.com>
Cc: Sriharsha Basavapatna <sriharsha.basavapa...@avagotech.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressindu
Cc: dept-gelinuxnic...@qlogic.com
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c
b/drive
Cc: Jeff Kirsher <jeffrey.t.kirs...@intel.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/ethernet/intel/fm10k/fm10k_pci.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/net/ethernet/intel/fm10k/fm10k_pci.c
b/drivers/net/ethernet
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/geneve.c | 30 +++---
include/net/geneve.h | 7 +++
2 files changed, 30 insertions(+), 7 deletions(-)
diff --git a/drivers/net/geneve.c b/drivers/net/geneve.c
index 24b077a3
Protect IXGBE_FLAG2_VXLAN_REREG_NEEDED flag with rtnl_lock as it seems
it could be concurrently modified by ixgbe_set_features and
ixgbe_del_vxlan_port.
Cc: Jeff Kirsher <jeffrey.t.kirs...@intel.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/et
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/vxlan.c | 17 +++--
include/net/vxlan.h | 5 +
2 files changed, 12 insertions(+), 10 deletions(-)
diff --git a/drivers/net/vxlan.c b/drivers/net/vxlan.c
index fecf7b6c732e96..10f1304d58e1ea
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
include/linux/netdevice.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h
index 8d8e5ca951b493..9750e46760695d 100644
--- a/include/linux/netdevice.h
+++ b/include
Hi Tom,
On 05.01.2016 19:41, Tom Herbert wrote:
--- /dev/null
+++ b/arch/x86/lib/csum-partial_64.S
@@ -0,0 +1,147 @@
+/* Copyright 2016 Tom Herbert
+ *
+ * Checksum partial calculation
+ *
+ * __wsum csum_partial(const void *buff, int len, __wsum sum)
+ *
+ * Computes the
On 07.01.2016 02:01, Daniel Borkmann wrote:
+static inline void skb_postpush_rcsum(struct sk_buff *skb,
+ const void *start, unsigned int len)
+{
+ if (skb->ip_summed == CHECKSUM_COMPLETE)
+ skb->csum = csum_add(skb->csum,
On 07.01.2016 03:36, Tom Herbert wrote:
On Wed, Jan 6, 2016 at 5:52 PM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
Hi Tom,
On 05.01.2016 19:41, Tom Herbert wrote:
--- /dev/null
+++ b/arch/x86/lib/csum-partial_64.S
@@ -0,0 +1,147 @@
+/* Copyright 2016 Tom Herb
On 15.12.2015 02:35, Nelson, Shannon wrote:
Using a slightly modified version of udpspam (see diff below - hopefully not mangled by
corporate email servers), where I set the SO_NO_CHECK socket option and can specify a large
buffer size, I can reliably get the following WARN trace. I have
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/vxlan.c | 35 ++-
include/linux/netdevice.h | 2 +-
include/net/vxlan.h | 6 ++
3 files changed, 33 insertions(+), 10 deletions(-)
diff --git a/drivers/net/vxl
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/geneve.c | 30 +++---
include/linux/netdevice.h | 1 +
include/net/geneve.h | 6 ++
3 files changed, 30 insertions(+), 7 deletions(-)
diff --git a/drivers/net/gene
This atomic notifier is later used by drivers to deliver callbacks to
the core network stack without requireing rtnl lock to be held.
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
include/linux/netdevice.h | 9 +
net/core/dev.c
:.*(vxlan|geneve)' |
wc -l
0
Hannes Frederic Sowa (3):
netdev: add atomic netdev callback chain
vxlan: use netdev_atomic notifier chain to remove dependency from
drivers
geneve: use netdev_atomic notifier chain to remove dependency from
drivers
drivers/net/geneve.c | 30
Hi Jesse,
hmpf, I saw your mail too late and send out another series just now.
On 06.01.2016 20:52, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 10:48 AM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
On 06.01.2016 19:00, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 7:41 AM,
On 06.01.2016 22:01, Jesse Gross wrote:
On Wed, Jan 6, 2016 at 12:25 PM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
The refreshes from each module are completely synchronous and don't get
interleaved, so as long as the driver is correctly handling the locking
internally rtn
n <ebied...@xmission.com>
Signed-off-by: Eric W. Biederman <ebied...@xmission.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
net/bridge/br_stp_if.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/net/bridge/br_stp_if.c b/n
Also,
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Tested with the same test cases as the old patch and showed no problems
and same improvements.
Tom, did you have a look if it makes sense to add a second carry
addition train with the adcx instruction, which does not signa
Hello,
On Sun, Jan 3, 2016, at 19:03, Rainer Weikusat wrote:
> Rainer Weikusat <r...@doppelsaurus.mobileactivedefense.com> writes:
>
> > Hannes Frederic Sowa <han...@stressinduktion.org> writes:
> >> On 27.12.2015 21:13, Rainer Weikusat wrote:
> >>>
On 05.01.2016 00:34, Tom Herbert wrote:
On Mon, Jan 4, 2016 at 2:36 PM, Eric Dumazet wrote:
On Sun, 2016-01-03 at 15:22 -0800, Tom Herbert wrote:
\...
+402: /* Length 2, align is 1, 3, or 5 */
+ movb(%rdi), %al
+ movb1(%rdi), %ah
Looks like a movw
nately _addcarry_u64 intrinsics and __int128
for letting the compiler use adc instructions generated even worse code
as the current implementation.
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Thanks Tom!
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
On 29.12.2015 21:35, Willy Tarreau wrote:
On Tue, Dec 29, 2015 at 03:48:45PM +0100, Hannes Frederic Sowa wrote:
On 28.12.2015 15:14, Willy Tarreau wrote:
It is possible for a process to allocate and accumulate far more FDs than
the process' limit by sending them over a unix socket then closing
Hello Rainer,
On 27.12.2015 21:13, Rainer Weikusat wrote:
-static int unix_mknod(const char *sun_path, umode_t mode, struct path *res)
+static int unix_mknod(struct dentry *dentry, struct path *path, umode_t mode,
+ struct path *res)
{
- struct dentry *dentry;
-
On 29.12.2015 00:21, Cong Wang wrote:
On Thu, Dec 24, 2015 at 2:25 AM, Hannes Frederic Sowa
<han...@stressinduktion.org> wrote:
Hi,
On 24.12.2015 00:03, Calvin Owens wrote:
This patch addresses the issue cited in 7332a13b038be05c by making vxlan
actually check if ipv6 is loaded, and r
On 28.12.2015 15:14, Willy Tarreau wrote:
It is possible for a process to allocate and accumulate far more FDs than
the process' limit by sending them over a unix socket then closing them
to keep the process' fd count low.
This change addresses this problem by keeping track of the number of FDs
On 28.12.2015 15:14, Willy Tarreau wrote:
@@ -1528,10 +1546,8 @@ static int unix_attach_fds(struct scm_cookie *scm,
struct sk_buff *skb)
if (!UNIXCB(skb).fp)
return -ENOMEM;
- if (unix_sock_count) {
- for (i = scm->fp->count - 1; i >= 0; i--)
-
Hi,
On 24.12.2015 00:03, Calvin Owens wrote:
> On Thursday 12/17 at 17:46 -0800, Calvin Owens wrote:
>> On Thursday 12/17 at 17:08 -0800, Eric Dumazet wrote:
>>> On Thu, 2015-12-17 at 15:52 -0800, Calvin Owens wrote:
With built-in netconsole and IXGBE, configuring netconsole via the kernel
his give a 6% speedup for unsegment traffic on geneve tunnel.
>
> Signed-off-by: Paolo Abeni <pab...@redhat.com>
> Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
(Sorry, just saw this.)
> ---
> drivers/net/geneve.c | 10 +-
> 1 file changed, 9 inserti
configuration change.
Link: <http://permalink.gmane.org/gmane.linux.network/391348>
Reported-by: Marc Haber <mh+net...@zugschlus.de>
Cc: Marc Haber <mh+net...@zugschlus.de>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
net/ipv6/ndisc.c | 4 ++--
1 fi
On 12.12.2015 20:58, Marc Haber wrote:
> Any hints would be appreciated.
This sysctl should help:
accept_ra_from_local - BOOLEAN
Accept RA with source-address that is found on local machine
if the RA is otherwise proper and able to be accepted.
Default is to NOT accept
.210 > F. 1:1(0) ack 1 win 29200
> 0.300 < . 1:1(0) ack 2 win 46
>
> // more data while in FIN_WAIT2, expect RST
> 1.300 < P. 1:1001(1000) ack 1 win 46
>
> // fails without this change -- default route is used
> 1.301 > R 1:1(0) win 0
>
> Reported-by: Hannes Fre
On 22.12.2015 17:59, Huw Davies wrote:
> On Tue, Dec 22, 2015 at 02:50:20PM +0100, Hannes Frederic Sowa wrote:
>> On 22.12.2015 12:46, Huw Davies wrote:
>>>
>>> +/* CALIPSO RFC 5570 */
>>> +
>>> +static bool ipv6_hop_calipso(struct sk_buff *skb, int o
k_fullsock(sk)) && hash_location) {
> ...
> } else {
> (sk && sk_fullsock(sk)) tcp_md5_do_lookup()
> }
>
> Switch the two branches: check if we have a socket first, then
> fall back to a listener lookup if we saw a md5 option (hash_location).
>
> Signed-off
On 21.12.2015 21:29, Florian Westphal wrote:
> Avoids cluttering tcp_v4_send_reset when followup patch extends
> it to deal with timewait sockets.
>
> Suggested-by: Eric Dumazet <eduma...@google.com>
> Signed-off-by: Florian Westphal <f...@strlen.de>
Acked-by
Hi Marc,
On 22.12.2015 22:28, Marc Haber wrote:
> Hi Hannes,
>
> thanks for your mail.
>
> On Tue, Dec 22, 2015 at 04:15:14PM +0100, Hannes Frederic Sowa wrote:
>> On 12.12.2015 20:58, Marc Haber wrote:
>>> Any hints would be appreciated.
On 22.12.2015 12:46, Huw Davies wrote:
> The functionality is equivalent to ipv6_renew_options() except
> that the newopt pointer is in kernel, not user, memory
>
> The kernel memory implementation will be used by the CALIPSO network
> labelling engine, which needs to be able to set IPv6
On 22.12.2015 12:46, Huw Davies wrote:
>
> +/* CALIPSO RFC 5570 */
> +
> +static bool ipv6_hop_calipso(struct sk_buff *skb, int optoff)
> +{
> + const unsigned char *nh = skb_network_header(skb);
> +
> + if (nh[optoff + 1] < 8)
> + goto drop;
> +
> + if (nh[optoff + 6] *
On 22.12.2015 12:46, Huw Davies wrote:
> tot_len += sizeof(*opt2);
> - opt2 = sock_kmalloc(sk, tot_len, GFP_ATOMIC);
> + if (sk)
> + opt2 = sock_kmalloc(sk, tot_len, GFP_ATOMIC);
> + else
> + opt2 = kmalloc(tot_len, GFP_ATOMIC);
> if (!opt2)
>
/ipv6/addrconf.c:5395)
>
> Looks like we don't initialize the array on stack for write case.
> At least other callers always initialize the data for both read
> and write.
>
> Please try the attached patch.
Your patch is right. I am surprised you need to initialize the buffer
passed
Hi all,
On 17.12.2015 01:04, David Miller wrote:
> From: Hannes Frederic Sowa <han...@stressinduktion.org>
> Date: Tue, 15 Dec 2015 21:01:54 +0100
>
>> udp tunnel offloads tend to aggregate datagrams based on inner
>> headers. gro engine gets notified by tunnel implem
On 16.12.2015 21:09, Rainer Weikusat wrote:
> With b3ca9b02b00704053a38bfe4c31dbbb9c13595d0, the AF_UNIX SOCK_STREAM
> receive code was changed from using mutex_lock(>readlock) to
> mutex_lock_interruptible(>readlock) to prevent signals from being
> delayed for an indefinite time if a thread
On 17.12.2015 16:28, Rainer Weikusat wrote:
> Hannes Frederic Sowa <han...@stressinduktion.org> writes:
>> On 16.12.2015 21:09, Rainer Weikusat wrote:
>>> With b3ca9b02b00704053a38bfe4c31dbbb9c13595d0, the AF_UNIX SOCK_STREAM
>>> receive code was change
On 17.12.2015 18:32, Tom Herbert wrote:
> On Thu, Dec 17, 2015 at 12:49 AM, Hannes Frederic Sowa
> <han...@stressinduktion.org> wrote:
>> With user namespaces a normal user can start a new network namespace
>> with all privileges and thus add new offloads, letting the
On 17.12.2015 21:23, Dan Williams wrote:
> On Thu, 2015-12-17 at 15:08 -0500, David Miller wrote:
>> From: Dan Williams
>> Date: Wed, 16 Dec 2015 11:03:52 -0600
>>
>>> On Wed, 2015-12-16 at 17:50 +0800, Xin Long wrote:
Add the support for adding expire value to routes,
On 17.12.2015 19:10, Tom Herbert wrote:
> On Thu, Dec 17, 2015 at 9:40 AM, Hannes Frederic Sowa
> <han...@stressinduktion.org> wrote:
>> On 17.12.2015 18:32, Tom Herbert wrote:
>>> On Thu, Dec 17, 2015 at 12:49 AM, Hannes Frederic Sowa
>>> <han...@str
ode is kept unchanged. If
> a known secret is available when the device is created, then the mode
> will default to 'stable-privacy' as before. The mode can be manually
> set to 'random' but it will behave exactly like 'stable-privacy' in
> this case. The secret will not change.
>
> Cc:
On 16.12.2015 17:56, Bjørn Mork wrote:
>
>
> On December 16, 2015 12:30:08 PM CET, Hannes Frederic Sowa
> <han...@stressinduktion.org> wrote:
>> Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
>> ---
>> ip/iplink.c | 4 +++-
>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
ip/iplink.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/ip/iplink.c b/ip/iplink.c
index f30de86d1858a0..e824082f7d8149 100644
--- a/ip/iplink.c
+++ b/ip/iplink.c
@@ -84,7 +84,7 @@ void iplink
ed-off-by: Xin Long <lucien....@gmail.com>
Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org>
Thanks, Xin Long!
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Same as in Windows, we miss IPV6_HDRINCL for SOL_IPV6 and SOL_RAW.
The SOL_IP/IP_HDRINCL is not available for IPv6 sockets.
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
include/uapi/linux/in6.h | 1 +
net/ipv6/raw.c | 20
2 files c
On 15.12.2015 23:39, Tom Herbert wrote:
> On Tue, Dec 15, 2015 at 12:46 PM, Hannes Frederic Sowa
> <han...@stressinduktion.org> wrote:
>> On 15.12.2015 21:26, Tom Herbert wrote:
>>> On Tue, Dec 15, 2015 at 12:01 PM, Hannes Frederic Sowa
>>> <han...@stre
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
ip/ipaddress.c | 9 -
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/ip/ipaddress.c b/ip/ipaddress.c
index bc8359eb9fad6c..a495a391a0ecdb 100644
--- a/ip/ipaddress.c
+++ b/ip/ipaddress.c
@@ -285,13 +
space socket is bound
to the same address it will conflict.
Cc: Tom Herbert <t...@herbertland.com>
Cc: Eric Dumazet <eduma...@google.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
drivers/net/geneve.c | 2 +-
drivers/net/vxlan.c| 2 +-
incl
eve.
Fixes: 23461551c00628c ("fou: Support for foo-over-udp RX path")
Cc: Tom Herbert <t...@herbertland.com>
Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org>
---
net/ipv4/fou.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/net/ipv4/fou
On 15.12.2015 21:26, Tom Herbert wrote:
> On Tue, Dec 15, 2015 at 12:01 PM, Hannes Frederic Sowa
> <han...@stressinduktion.org> wrote:
>> udp tunnel offloads tend to aggregate datagrams based on inner
>> headers. gro engine gets notified by tunnel implementations ab
501 - 600 of 899 matches
Mail list logo