lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51DEF24D.4020101@intel.com>
Date:	Thu, 11 Jul 2013 10:58:37 -0700
From:	Alexander Duyck <alexander.h.duyck@...el.com>
To:	Eric Dumazet <eric.dumazet@...il.com>
CC:	Pravin Shelar <pshelar@...ira.com>, netdev@...r.kernel.org,
	stephen@...workplumber.org, joseph.gasparakis@...el.com,
	jesse@...ira.com
Subject: Re: [PATCH net v2] gso: Update tunnel segmentation to support Tx
 checksum offload

On 07/11/2013 06:51 AM, Eric Dumazet wrote:
> On Thu, 2013-07-11 at 00:45 -0700, Pravin Shelar wrote:
>
>> Nice speculation ;)
> Indeed ;) Sorry Pravin !
>
>> I did some digging and found following commit causing problem with GRE
>> TSO on bnx setup.
> Thanks for taking care of this problem.
>
>

I may have found another issue, but I don't think it is related to my
patch.  Specifically it seems like there is some MTU calculation
somewhere that is is off by 14 bytes when using gretap.

I'm just setting up an endpoint and using it back to back with the
following commands:
 ip link add tun0 type gretap remote 192.168.11.129 local 192.168.11.1
 ifconfig tun0 192.168.100.1/24

When I try to ping with a size of 1421 or more, it is being dropped and
being counted as a tx error for the tunnel.  It looks like 3.9 doesn't
have this issue.  I'll try to figure out the root cause before the end
of today.

Thanks,

Alex
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ