lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 30 May 2015 13:29:14 -0400
From:	Neal Cardwell <>
To:	Grant Zhang <>
Cc:	Netdev <>, Yuchung Cheng <>,
	Eric Dumazet <>
Subject: Re: Recurring trace from tcp_fragment()

On Fri, May 29, 2015 at 3:53 PM, Grant Zhang <> wrote:
> Hi Neal,
> I will be more happy to test the patch. Please send it my way.

Great. Thank you so much for being willing to do this. Attached is a
patch for testing. I generated it and tested it relative to Linux
v3.14.39, since your stack trace seemed to suggest that you were
seeing this on some variant of v3.14.39. (Newer kernels would need a
slightly different patch, since the reneging code path has changed a
little since 3.14.)

Can you please try it out and see if it makes that warning go away?

Also, I would be interested in seeing the value of your
TcpExtTCPSACKReneging counter, and some sense of how fast that value
is increasing, on a machine that's seeing this issue:
  nstat -z -a | grep Reneg



Download attachment "0001-RFC-for-tests-on-v3.14.39-tcp-resegment-skbs-that-we.patch" of type "application/octet-stream" (4569 bytes)

Powered by blists - more mailing lists