lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 11 Jun 2010 19:43:30 +0200
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	Stephen Hemminger <shemminger@...tta.com>
Cc:	David Miller <davem@...emloft.net>, netdev@...r.kernel.org
Subject: Re: Fw: [Bug 16183] New: sch_teql no longer works post 2.6.30

Le vendredi 11 juin 2010 à 09:08 -0700, Stephen Hemminger a écrit :
> 
> Begin forwarded message:
> 
> Date: Fri, 11 Jun 2010 15:56:44 GMT
> From: bugzilla-daemon@...zilla.kernel.org
> To: shemminger@...ux-foundation.org
> Subject: [Bug 16183] New: sch_teql no longer works post 2.6.30
> 
> 
> https://bugzilla.kernel.org/show_bug.cgi?id=16183
> 
>            Summary: sch_teql no longer works post 2.6.30
>            Product: Networking
>            Version: 2.5
>     Kernel Version: 2.6.31 through 2.6.34
>           Platform: All
>         OS/Version: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: IPV4
>         AssignedTo: shemminger@...ux-foundation.org
>         ReportedBy: tom@...pton.nu
>         Regression: Yes
> 
> 
> Created an attachment (id=26729)
>  --> (https://bugzilla.kernel.org/attachment.cgi?id=26729)
> Patch to fix sch_teql
> 
> The sch_teql module, which can be used to load balance over a set of underlying
> interfaces, stopped working after 2.6.30 and has been broken in all kernels
> since then.
> 
> The problem is that the transmit routine relies on being able to access the
> destination address in the skb in order to do ARP resolution once it has
> decided which underlying interface it is going to transmit through.
> 
> In 2.6.31 the IFF_XMIT_DST_RELEASE flag was introduced, and set by default for
> all interfaces, which causes the destination address to be release before the
> transmit routine for the interface is called.
> 
> The solution (implemented in the attached patch) is to clear that flag for teql
> interfaces.
> 
> -- 
> Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
> ------- You are receiving this mail because: -------
> You are the assignee for the bug.
> 
> 

Acked-by: Eric Dumazet <eric.dumazet@...il.com>

Please note my old email address no longer works ;)

Thanks


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ