lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 27 Oct 2014 00:23:14 +0200 From: Or Gerlitz <gerlitz.or@...il.com> To: Tom Herbert <therbert@...gle.com> Cc: Or Gerlitz <ogerlitz@...lanox.com>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, John Fastabend <john.r.fastabend@...el.com>, Jeff Kirsher <jeffrey.t.kirsher@...el.com> Subject: Re: some failures with vxlan offloads.. On Sun, Oct 26, 2014 at 5:29 PM, Tom Herbert <therbert@...gle.com> wrote: > On Sun, Oct 26, 2014 at 6:36 AM, Or Gerlitz <ogerlitz@...lanox.com> wrote: >> In the cases where it breaks I can see >> UDP: bad checksum. From 192.168.31.18:54748 to 192.168.31.17:4789 >> ulen 726 >> prints from __udp4_lib_rcv() in the kernel log of the node where offloads >> are OFF, where the bad packet is sent from the host where offloading is >> enabled. I guess the packet is just dropped: > Can you determine what the TSO HW engine is setting in UDP checksum > field? tcpdump -vv might be able to show this. The symptoms seem to > indicate that it may not be zero. Thanks for the quick response. I'll check what is placed in the UDP checksum field for packets that went through the offloading HW and let you know. BTW, if following the direction you proposed, I wonder why this works (e.g the kernel doesn't drops the encapsulated TCP packets) when both sides are offloaded? Tomorrow (Monday) I am OOO so will be able to do these further tests Tuesday. Or. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists