lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20101009.092043.58419374.davem@davemloft.net> Date: Sat, 09 Oct 2010 09:20:43 -0700 (PDT) From: David Miller <davem@...emloft.net> To: eric.dumazet@...il.com Cc: leitao@...ux.vnet.ibm.com, netdev@...r.kernel.org, fubar@...ibm.com Subject: Re: [PATCH] ehea: Fix a checksum issue on the receive path From: Eric Dumazet <eric.dumazet@...il.com> Date: Fri, 08 Oct 2010 16:36:17 +0200 > I am pretty sure most (if not all) netdev drivers pass the packet with > invalid checksum to upper stack, so that we can increment appropriate > SNMP counters, in IP stack or UDP/TCP/whatever stack. > > tg3, bnx2, e1000, skge, sky2, bnx2x, niu, r8169, igb, ... seems to do > that. Drivers _must_ send up all packets, even those with bad checksums, without exception. Otherwise protocol statistics get lost, netfilter log entries go missing, etc. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists