lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <82084f2b-f8b4-eccd-d288-976afeed6a83@cumulusnetworks.com>
Date:   Mon, 29 Aug 2016 08:12:28 -0600
From:   David Ahern <dsa@...ulusnetworks.com>
To:     Simon Horman <simon.horman@...ronome.com>,
        David Miller <davem@...emloft.net>
Cc:     netdev@...r.kernel.org, buytenh@...tstofly.org,
        ebiederm@...ssion.com, rshearma@...cade.com, tom@...bertland.com,
        tgraf@...g.ch, olivier.dugeon@...nge.com,
        alexander.duyck@...il.com, roopa@...ulusnetworks.com
Subject: Re: [PATCH net-next v4 0/3] net: mpls: fragmentation and gso fixes
 for locally originated traffic

On 8/29/16 6:29 AM, Simon Horman wrote: 
> I have tested this series for both of the following:
> * IPv4 in MPLS (just after the ethernet header)
> * IPv4 in MPLS in GRE (TEB)
> 
> Things seem to work fine.
> 
> Tested-by: Simon Horman <simon.horman@...ronome.com>
> 
> Expanding a little on the above:
> 
> * I tested this using the test cases I have been working on for OvS here:
>   http://www.spinics.net/lists/netdev/msg391755.html
> 
>   Those test make use of namespaces connected using veth and
>   push/pop_mpls actions.

The 3rd patch in this set enables GSO for MPLS in veth meaning no software segmentation is done by default.

> 
> * As the above is quite new I also tested the patchset using my somewhat
>   more clumsy local test environment which uses KVM, virtio net and
>   push/pop_mpls actions.
> 

Awesome. Thanks for confirming.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ