expected 10 second timeout:
1st retransmit:
01:37:59.022555 IP host1.49310 > host2.search-agent: Flags [.]
Last retransmit:
01:38:06.486558 IP host1.49310 > host2.search-agent: Flags [.]
Timeout:
send: Connection timed out
Mon Jul 2 01:38:09 EDT 2018
Signed-off-by: Jon Maxwell
---
Fixup the checksum for CHECKSUM_COMPLETE when pulling skbs on RX path.
Otherwise we get splats when tc mirred is used to redirect packets to ifb.
Before fix:
nic: hw csum failure
Signed-off-by: Jon Maxwell
---
drivers/net/ifb.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
ginal sk->sk_mark in __inet_twsk_hashdance() to the new tw->tw_mark
location.
Then progate this so that the skb gets sent with the correct mark. Do the same
for resets. Give the "fwmark_reflect" sysctl precedence over sk->sk_mark so that
netfilter rules are still honored.
Sign
tw->tw_mark
location.
Then progate this so that the skb gets sent with the correct mark. Do the same
for resets. Give the "fwmark_reflect" sysctl precedence over sk->sk_mark so that
netfilter rules are still honored.
Signed-off-by: Jon Maxwell
---
include/net/inet_timewait_sock
k_mark so that netfilter rules are still honored.
Signed-off-by: Jon Maxwell
---
include/net/inet_timewait_sock.h | 1 +
net/ipv4/ip_output.c | 3 ++-
net/ipv4/tcp_ipv4.c | 18 --
net/ipv4/tcp_minisocks.c | 1 +
net/ipv6/tcp_ipv6.c
Make the cryptd queue length configurable. We recently had customer where this
needed to be tuned to accommodate the aesni_intel module and prevent packet
drop.
Signed-off-by: Jon Maxwell
---
crypto/cryptd.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/crypto
utes. Which
can set the dst->obsolete flag so that ipv4_dst_check() returns null and
triggers the dst_release().
Fixes: ceb3320610d6 ("ipv4: Kill routes during PMTU/redirect updates.")
Cc: Eric Garver
Cc: Hannes Sowa
Signed-off-by: Jon Maxwell
---
net/dccp/ipv4.c | 3 ++-
ne
s. Which
can set the dst->obsolete flag so that ipv4_dst_check() returns null and
triggers the dst_release().
Fixes: ceb3320610d6 ("ipv4: Kill routes during PMTU/redirect updates.")
Cc: Eric Garver
Cc: Hannes Sowa
Signed-off-by: Jon Maxwell
---
net/dccp/ipv4.c | 3 ++
_release().
Fixes: ceb3320610d6 ("ipv4: Kill routes during PMTU/redirect updates.")
Cc: Eric Garver
Cc: Hannes Sowa
Signed-off-by: Jon Maxwell
---
net/dccp/ipv4.c | 3 ++-
net/ipv4/tcp_ipv4.c | 3 ++-
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/net/dccp/ipv4.c b/net/d
able to reproduce this and worked with IBM to fix this. Thanks Tom
and Marcelo for all your help and review on this.
The patch fixes both our internal reproduction tests and our customers tests.
Signed-off-by: Jon Maxwell
---
drivers/net/ethernet/ibm/ibmveth.c | 20
1 file
able to reproduce this and worked with IBM to fix this. Thanks Tom
and Marcelo for all your help and review on this.
The patch fixes both our internal reproduction tests and our customers tests.
Signed-off-by: Jon Maxwell
---
drivers/net/ethernet/ibm/ibmveth.c | 19 +++
1 file
nic_cm_alloc_mem()s return
code.
# ip link set dev enpX down
# ip link set dev enpX up <--- hit's allocation failure
# ip link set dev enpX down <--- crashes here
With this patch I confirmed there was no crash in the reproducer.
Signed-off-by: Jon Maxwell
---
drivers/net/ethern
the igbvf driver and downing the adapter with the PF
entity on the host where the VM has this patch. When I bring it back up again
connectivity is restored as expected. Therefore I request that this patch gets
submitted.
Signed-off-by: Jon Maxwell
---
drivers/net/ethernet/intel/igbvf/netdev.c | 1
and the
crash is avoided. When the adapter is back online and carrier is
reasserted netconsole will succeed again.
Signed-off-by: Jon Maxwell
---
drivers/net/netconsole.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/net/netconsole.c b/drivers/net/netconsole.c
in
utine which ensures that a quickack is
always sent when the quickack knob is enabled for that dst.
Signed-off-by: Jon Maxwell
---
net/ipv4/tcp_input.c | 11 +--
net/ipv4/tcp_output.c | 6 ++
2 files changed, 7 insertions(+), 10 deletions(-)
diff --git a/net/ipv4/tcp_input.c b/net/i
When
that occurs the icsk_ack.pingpong value is ignored and a delayed
ACK is sent regardless.
This patch moves the RTAX_QUICKACK per dst check into the
__tcp_ack_snd_check() routine which ensures that a quickack is
always sent when the quickack knob is enabled for that dst.
Signed-off-by: Jon
p ports are in use
for connection from IP Address (1). Connecting to the same ports
via IP Address (2) should work based on the 4 tuple rule. But it
fails under this condition.
To fix this make __inet_hash_connect() honour inet_csk_get_port()'s
tb->fastreuse* variables.
Signed-off-by:
s ARP cache. This patch
will notify the bridge command, after a fdb has been updated to identify such
port toggling.
Signed-off-by: Jon Maxwell
---
net/bridge/br_fdb.c | 8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
index 92
s ARP cache. This patch
will notify the bridge command, after a fdb has been updated to identify such
port toggling.
Signed-off-by: Jon Maxwell
---
net/bridge/br_fdb.c | 8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
index 92
> I have no more comments except for style problems (bracket position,
> indentation, type mismatch).
> thank you for rewriting :)
np, yes this is a draft but I will make sure complies with checkpatch.pl
before submitting it.
Regards
Jon
>
> Thanks,
> Toshiaki Makita
>
> >
> > $ diff -Naur
> - Original Message -
> > From: "Toshiaki Makita"
> > To: "Jon Maxwell" , step...@networkplumber.org
> > Cc: da...@davemloft.net, vyase...@redhat.com,
> > bri...@lists.linux-foundation.org, net...@vger.kernel.org,
> > linux-kernel@vg
- Original Message -
> From: "Jon Maxwell"
> To: step...@networkplumber.org
> Cc: da...@davemloft.net, "makita toshiaki" ,
> vyase...@redhat.com,
> bri...@lists.linux-foundation.org, net...@vger.kernel.org,
> linux-kernel@vger.kernel.org, jpi...@r
Please use this patch. My bad, the previous one
incorrectly did the notify before fdb->added_by_user = 1.
- Original Message -
> From: "Jon Maxwell"
> To: step...@networkplumber.org
> Cc: da...@davemloft.net, "makita toshiaki" ,
> vyase.
From: Jon Maxwell
There has been a number incidents recently where customers running KVM have
reported that VM hosts on different Hypervisors are unreachable. Based on
pcap traces we found that the bridge was broadcasting the ARP request out
onto the network. However some NICs have an inbuilt
From: Jon Maxwell
There has been a number incidents recently where customers running KVM have
reported that VM hosts on different Hypervisors are unreachable. Based on
pcap traces we found that the bridge was broadcasting the ARP request out
onto the network. However some NICs have an inbuilt
- Original Message -
> From: "Toshiaki Makita"
> To: "Jon Maxwell" , step...@networkplumber.org
> Cc: da...@davemloft.net, vyase...@redhat.com,
> bri...@lists.linux-foundation.org, net...@vger.kernel.org,
> linux-kernel@vger.kernel.org, jpi...@red
From: Jon Maxwell
There has been a number incidents recently where customers running KVM have
reported that VM hosts on different Hypervisors are unreachable. Based on
pcap traces we found that the bridge was broadcasting the ARP request out
onto the network. However some NICs have an inbuilt
e dev = %s mac = %pM, port_no = %d,
existing dev = %s mac = %pM, port_no = %d\n",
- Original Message -
From: "Alexei Starovoitov"
To: "Stephen Hemminger"
Cc: "Jon Maxwell" , net...@vger.kernel.org, "David S.
Miller" , "makita toshiaki"
x27;s ARP cache. This patch
will detect port flapping and log a message so that this condition can be
detected earlier.
Signed-off-by: Jon Maxwell
---
net/bridge/br_fdb.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
index 9203d5a..c0
29 matches
Mail list logo