lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Mar 2024 16:02:49 -0700
From: Stephen Hemminger <stephen@...workplumber.org>
To: netdev@...r.kernel.org
Subject: Fw: [Bug 218629] New: tc-vlan push vlan is regression from the lab



Begin forwarded message:

Date: Fri, 22 Mar 2024 19:00:46 +0000
From: bugzilla-daemon@...nel.org
To: stephen@...workplumber.org
Subject: [Bug 218629] New: tc-vlan push vlan is regression from the lab


https://bugzilla.kernel.org/show_bug.cgi?id=218629

            Bug ID: 218629
           Summary: tc-vlan push vlan is regression from the lab
           Product: Networking
           Version: 2.5
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P3
         Component: Other
          Assignee: stephen@...workplumber.org
          Reporter: ne-vlezay80@...dex.ru
        Regression: No

Created attachment 306027
  --> https://bugzilla.kernel.org/attachment.cgi?id=306027&action=edit  
lab for reproducte the bug

Exec: netns.sh - create test namespaces
Exec: switch.sh - load tc-vlan rule per the namespace
Problem:
tc-vlan regression

Example:
[root@...h user]# ip netns exec host1 iperf3 -c 192.168.1.16
Connecting to host 192.168.1.16, port 5201
[  5] local 192.168.1.2 port 47824 connected to 192.168.1.16 port 5201
[ ID] Interval           Transfer     Bitrate         Retr  Cwnd
[  5]   0.00-1.00   sec   717 MBytes  6.01 Gbits/sec   30   9.97 MBytes       
[  5]   1.00-2.00   sec   736 MBytes  6.17 Gbits/sec    2   9.97 MBytes       
[  5]   2.00-3.00   sec   574 MBytes  4.81 Gbits/sec    0   9.97 MBytes       
[  5]   3.00-4.00   sec   582 MBytes  4.88 Gbits/sec    0   9.97 MBytes       
[  5]   4.00-5.00   sec   687 MBytes  5.76 Gbits/sec    0   9.97 MBytes       
[  5]   5.00-6.00   sec   737 MBytes  6.16 Gbits/sec    3   6.98 MBytes       
[  5]   6.00-7.00   sec   716 MBytes  6.03 Gbits/sec    0   6.98 MBytes       
[  5]   7.00-8.00   sec   705 MBytes  5.92 Gbits/sec    3   4.88 MBytes       
[  5]   8.00-9.00   sec   645 MBytes  5.39 Gbits/sec    0   4.88 MBytes       
[  5]   9.00-10.00  sec   705 MBytes  5.92 Gbits/sec    1   4.88 MBytes       
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.00  sec  7.01 GBytes  6.02 Gbits/sec   39             sender
[  5]   0.00-10.00  sec  7.01 GBytes  6.02 Gbits/sec                  receiver

iperf Done.
[root@...h user]# ip netns exec host1 iperf3 -c 192.168.1.16 -R
Connecting to host 192.168.1.16, port 5201
Reverse mode, remote host 192.168.1.16 is sending
[  5] local 192.168.1.2 port 60818 connected to 192.168.1.16 port 5201
[ ID] Interval           Transfer     Bitrate
[  5]   0.00-1.00   sec  1.35 GBytes  11.6 Gbits/sec                  
[  5]   1.00-2.00   sec  1.42 GBytes  12.2 Gbits/sec                  
[  5]   2.00-3.00   sec  1.44 GBytes  12.3 Gbits/sec                  
[  5]   3.00-4.00   sec  1.41 GBytes  12.1 Gbits/sec                  
[  5]   4.00-5.00   sec  1.40 GBytes  12.0 Gbits/sec                  
[  5]   5.00-6.00   sec  1.38 GBytes  11.8 Gbits/sec                  
[  5]   6.00-7.00   sec  1.41 GBytes  12.1 Gbits/sec                  
[  5]   7.00-8.00   sec  1.41 GBytes  12.1 Gbits/sec                  
[  5]   8.00-9.00   sec  1.39 GBytes  12.0 Gbits/sec                  
[  5]   9.00-10.00  sec  1.42 GBytes  12.2 Gbits/sec                  
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate         Retr
[  5]   0.00-10.00  sec  14.0 GBytes  12.0 Gbits/sec  306             sender
[  5]   0.00-10.00  sec  14.0 GBytes  12.0 Gbits/sec                  receiver

iperf Done.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are the assignee for the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ