lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20180829.195004.204544163452787743.davem@davemloft.net> Date: Wed, 29 Aug 2018 19:50:04 -0700 (PDT) From: David Miller <davem@...emloft.net> To: posk@...gle.com Cc: netdev@...r.kernel.org Subject: Re: [PATCH net-next 2/2] selftests/net: add ip_defrag selftest From: Peter Oskolkov <posk@...gle.com> Date: Tue, 28 Aug 2018 11:36:20 -0700 > This test creates a raw IPv4 socket, fragments a largish UDP > datagram and sends the fragments out of order. > > Then repeats in a loop with different message and fragment lengths. > > Then does the same with overlapping fragments (with overlapping > fragments the expectation is that the recv times out). > > Tested: > > root@<host># time ./ip_defrag.sh > ipv4 defrag > PASS > ipv4 defrag with overlaps > PASS > > real 1m7.679s > user 0m0.628s > sys 0m2.242s > > A similar test for IPv6 is to follow. > > Signed-off-by: Peter Oskolkov <posk@...gle.com> > Reviewed-by: Willem de Bruijn <willemb@...gle.com> Applied.
Powered by blists - more mailing lists