lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 11 May 2017 15:46:26 +0200 From: Fredrik Markstrom <fredrik.markstrom@...il.com> To: Eric Dumazet <eric.dumazet@...il.com> Cc: "David S. Miller" <davem@...emloft.net>, Stephen Hemminger <stephen@...workplumber.org>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, bridge@...ts.linux-foundation.org, Fredrik Markstrom <fredrik.markstrom@...il.com> Subject: [PATCH v2 0/2] net: Set maximum receive packet size on veth interfaces Currently veth drops all packets larger then the mtu set on the receiving end of the pair. This is inconsistent with most hardware ethernet drivers that happily receives packets up the the ethernet MTU independent of the configured MTU. This patch set adds a new driver attribute to set the maximum size of received packet to make it possible to create configurations similar to those possible with (most) hardware ethernet interfaces. The set consists of two patches. The first one adding a parameter do the dev_forward_skb functions to specify the maximum packet size, the second one implents a new attribute (VETH_MRU) in the veth driver. Fredrik Markstrom (1): veth: Added attribute to set maximum receive size on veth interfaces Fredrik Markström (1): net: Added mtu parameter to dev_forward_skb calls drivers/net/ipvlan/ipvlan_core.c | 7 ++++--- drivers/net/macvlan.c | 4 ++-- drivers/net/veth.c | 45 +++++++++++++++++++++++++++++++++++++++- include/linux/netdevice.h | 10 ++++----- include/uapi/linux/veth.h | 1 + net/bridge/br_forward.c | 4 ++-- net/core/dev.c | 17 +++++++++------ net/core/filter.c | 4 ++-- net/l2tp/l2tp_eth.c | 2 +- 9 files changed, 72 insertions(+), 22 deletions(-) v2 - Updated description and fixed compile error in net/bridge/br_forward.c -- 2.11.0
Powered by blists - more mailing lists