lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4A4AA03D.5090808@itcare.pl>
Date:	Wed, 01 Jul 2009 01:31:09 +0200
From:	Paweł Staszewski <pstaszewski@...are.pl>
To:	Jarek Poplawski <jarkao2@...il.com>,
	Linux Network Development list <netdev@...r.kernel.org>
Subject: Re: [PATCH net-2.6] Re: rib_trie / Fix inflate_threshold_root.	Now=15
 size=11 bits

Jarek Poplawski pisze:
> On Tue, Jun 30, 2009 at 10:16:57PM +0200, Paweł Staszewski wrote:
>   
>> Jarek Poplawski pisze:
>>     
>>> On Mon, Jun 29, 2009 at 10:47:03AM +0000, Jarek Poplawski wrote:
>>>   
>>>       
>>>> On Mon, Jun 29, 2009 at 11:51:52AM +0200, Paweł Staszewski wrote:
>>>>     
>>>>         
>>>>> I apply this patch
>>>>>
>>>>> fib_triestats in attached file :)
>>>>>       
>>>>>           
>>>> Great! But it would be nice to check if this (accidentally ;-) might
>>>> fix the previous problem, so I attach below the patch with "manual
>>>> RCU", which btw. (or even more important) should verify RCU use here.
>>>>
>>>> It should be applied on top of this last "Fix..., part3". And
>>>> again: it's quite probable it can fail, so with caution, no hurry
>>>> (it can wait for quiet time)...
>>>>     
>>>>         
>>> Pawel, here is another try to check what's going on here, so just
>>> like before, but this one on top of these 2 last working patches,
>>> plus quite time... (Stats aren't necessary; if these are some doubts
>>> let me know.)
>>>
>>> Thanks,
>>> Jarek P.
>>> --------------------> (synchronize_rcu take 5)
>>>
>>> diff -Nurp a/net/ipv4/fib_trie.c b/net/ipv4/fib_trie.c
>>> --- a/net/ipv4/fib_trie.c	2009-06-29 10:00:14.000000000 +0000
>>> +++ b/net/ipv4/fib_trie.c	2009-06-30 06:50:35.000000000 +0000
>>> @@ -1036,6 +1036,7 @@ static void trie_rebalance(struct trie *
>>>   	rcu_assign_pointer(t->trie, (struct node *)tn);
>>>  	tnode_free_flush();
>>> +	synchronize_rcu();
>>>   	return;
>>>  }
>>>   
>>>       
>> Apply and tested
>>
>> Traffic is not forwarded after apply this patch.:)
>>     
>
> A little comment: these last 2 patches weren't exactly to fix the
> problem you reported, which should be mostly fixed by the earlier
> patch.
>
> There is some other bug, which you omit with CONFIG_PREEMPT_NONE
> (but it's not for sure there is no by effects). So, I'd like to be
> sure you are willing and can (without too much risk) to do more such
> tests. Alas I've no way to generate similar conditions so it would
> simply have to wait for somebody else.
>
>   
Yes i can make tests like this.
My network is splited to test clients and other normal clients
so it's really no problem to make testing. - if testing clients working 
then traffic from normal clients is also switched to this router (but if 
traffic is not forwarded "like in this case" for testing clients then 
failover switching them to working router )

and other point to make this tests - is that - it is good to have all in 
linux kernel networking working well :)

Regards
Paweł Staszewski

> Many thanks again,
> Jarek P.
>
>
>   

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ