lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 30 May 2015 11:52:55 -0700
From:	Grant Zhang <>
To:	Neal Cardwell <>
Cc:	Netdev <>, Yuchung Cheng <>,
	Eric Dumazet <>
Subject: Re: Recurring trace from tcp_fragment()

Thank you Neal. Most likely I will test the patch on Monday and report
back the result.

As for the TcpExtTCPSACKReneging counter, attached is the captured
counter value on a 1-second interval for 10 minutes.



Download attachment "reneg.log" of type "application/octet-stream" (33055 bytes)

> On May 30, 2015, at 10:29 AM, Neal Cardwell <> wrote:
> On Fri, May 29, 2015 at 3:53 PM, Grant Zhang <> wrote:
>> Hi Neal,
>> I will be more happy to test the patch. Please send it my way.
> Great. Thank you so much for being willing to do this. Attached is a
> patch for testing. I generated it and tested it relative to Linux
> v3.14.39, since your stack trace seemed to suggest that you were
> seeing this on some variant of v3.14.39. (Newer kernels would need a
> slightly different patch, since the reneging code path has changed a
> little since 3.14.)
> Can you please try it out and see if it makes that warning go away?
> Also, I would be interested in seeing the value of your
> TcpExtTCPSACKReneging counter, and some sense of how fast that value
> is increasing, on a machine that's seeing this issue:
>  nstat -z -a | grep Reneg
> Thanks!
> neal
> <0001-RFC-for-tests-on-v3.14.39-tcp-resegment-skbs-that-we.patch>

Powered by blists - more mailing lists