lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJ3xEMgN2GFHFtKm6_gp_SpqMSXk2hKmy4OzWYc6A811cRfevw@mail.gmail.com> Date: Thu, 6 Nov 2014 09:53:26 +0200 From: Or Gerlitz <gerlitz.or@...il.com> To: Sathya Perla <Sathya.Perla@...lex.com> Cc: Or Gerlitz <ogerlitz@...lanox.com>, Florian Westphal <fw@...len.de>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, Tom Herbert <therbert@...gle.com>, Jesse Gross <jesse@...ira.com>, "amirv@...lanox.com" <amirv@...lanox.com> Subject: Re: mlx4+vxlan offload breaks gre tunnels On Thu, Nov 6, 2014 at 9:21 AM, Sathya Perla <Sathya.Perla@...lex.com> wrote: >> I think the best effort we can do now is >> >> 1. come up with something such as the below patch for 3.18 which is >> back-ward portable for -stable kernels, it will only arm the hw offloads >> if the OS tells us there's VXLAN in action > Or, wouldn't the patch below not work (i.e., the same issue would persist) > when there is both VXLAN and some other (say GRE) tunnel in the system > and the NIC HW is capable of supporting checksum offload only on VxLAN. Indeed, this would be the case. But the patch below will make things to work when only GRE is used (or when only VXLAN is used). So we're making progress vs. the current situation where GRE breaks over a HW which is capable to do VXLAN offloads even if there's no VXLAN tunnel around. Or. >> 2. come up with proper kernel APIs to let NICs advertize which encap >> schemes they can actually offload the inner checksum, Tom... your work >> which now runs over netdev. >> tested to work with the following which is a bit different, tell me if >> it works for you >> >> # node A - with mlx4_en address192.168.31.18 >> ip tunnel add gre1 mode gre local 192.168.31.18 remote 192.168.31.17 ttl 255 >> ifconfig gre1 10.10.10.18/24 up >> ifconfig gre1 mtu 1450 >> >> # node B - with mlx4_en address192.168.31.17 >> ip tunnel add gre1 mode gre local 192.168.31.17 remote 192.168.31.18 ttl 255 >> ifconfig gre1 10.10.10.17/24 up >> ifconfig gre1 mtu 1450 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists