[PATCH net v2] crypto/chtls: fix tls alert messages corrupted by tls data

2020-07-17 Thread Vinay Kumar Yadav
When tls data skb is pending for Tx and tls alert comes , It is wrongly overwrite the record type of tls data to tls alert record type. fix the issue correcting it. v1->v2: - Correct submission tree. - Add fixes tag. Fixes: 6919a8264a32 ("Crypto/chtls: add/delete TLS header in driver&

[PATCH net-next 2/3] crypto/chtls: fix tls alert messages

2020-07-13 Thread Vinay Kumar Yadav
When tls data skb is pending for Tx and tls alert comes , It is wrongly overwrite the record type of tls data to tls alert record type. fix the issue correcting it. Signed-off-by: Vinay Kumar Yadav --- drivers/crypto/chelsio/chtls/chtls_io.c | 7 --- 1 file changed, 4 insertions(+), 3

[PATCH net-next v3 05/16] drop_monitor: Add support for packet alert mode for hardware drops

2019-08-17 Thread Ido Schimmel
From: Ido Schimmel In a similar fashion to software drops, extend drop monitor to send netlink events when packets are dropped by the underlying hardware. The main difference is that instead of encoding the program counter (PC) from which kfree_skb() was called in the netlink message, we encode

[PATCH net-next v3 06/16] drop_monitor: Add support for summary alert mode for hardware drops

2019-08-17 Thread Ido Schimmel
From: Ido Schimmel In summary alert mode a notification is sent with a list of recent drop reasons and a count of how many packets were dropped due to this reason. To avoid expensive operations in the context in which packets are dropped, each CPU holds an array whose number of entries is the

[PATCH net-next v2 05/14] drop_monitor: Add support for packet alert mode for hardware drops

2019-08-13 Thread Ido Schimmel
From: Ido Schimmel In a similar fashion to software drops, extend drop monitor to send netlink events when packets are dropped by the underlying hardware. The main difference is that instead of encoding the program counter (PC) from which kfree_skb() was called in the netlink message, we encode

[PATCH net-next v2 06/14] drop_monitor: Add support for summary alert mode for hardware drops

2019-08-13 Thread Ido Schimmel
From: Ido Schimmel In summary alert mode a notification is sent with a list of recent drop reasons and a count of how many packets were dropped due to this reason. To avoid expensive operations in the context in which packets are dropped, each CPU holds an array whose number of entries is the

[PATCH net-next v2 06/10] drop_monitor: Add packet alert mode

2019-08-11 Thread Ido Schimmel
From: Ido Schimmel So far drop monitor supported only one alert mode in which a summary of locations in which packets were recently dropped was sent to user space. This alert mode is sufficient in order to understand that packets were dropped, but lacks information to perform a more detailed

[PATCH net-next v2 05/10] drop_monitor: Add alert mode operations

2019-08-11 Thread Ido Schimmel
From: Ido Schimmel The next patch is going to add another alert mode in which the dropped packet is notified to user space, instead of only a summary of recent drops. Abstract the differences between the modes by adding alert mode operations. The operations are selected based on the currently

[PATCH net-next 06/10] drop_monitor: Add packet alert mode

2019-08-07 Thread Ido Schimmel
From: Ido Schimmel So far drop monitor supported only one alert mode in which a summary of locations in which packets were recently dropped was sent to user space. This alert mode is sufficient in order to understand that packets were dropped, but lacks information to perform a more detailed

[PATCH net-next 05/10] drop_monitor: Add alert mode operations

2019-08-07 Thread Ido Schimmel
From: Ido Schimmel The next patch is going to add another alert mode in which the dropped packet is notified to user space, instead of only a summary of recent drops. Abstract the differences between the modes by adding alert mode operations. The operations are selected based on the currently

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-24 Thread Ido Schimmel
gt;+{ > >+struct netlink_ext_ack *extack = info->extack; > >+enum net_dm_alert_mode alert_mode; > >+int rc; > >+ > >+if (!info->attrs[NET_DM_ATTR_ALERT_MODE]) > >+return 0; > >+ > >+rc = net_dm_alert_mode_g

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-24 Thread Jiri Pirko
Mon, Jul 22, 2019 at 08:31:32PM CEST, ido...@idosch.org wrote: >From: Ido Schimmel > >So far drop monitor supported only one alert mode in which a summary of >locations in which packets were recently dropped was sent to user space. > >This alert mode is sufficient in order

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-24 Thread Ido Schimmel
On Tue, Jul 23, 2019 at 11:14:31AM -0400, Neil Horman wrote: > On Tue, Jul 23, 2019 at 05:16:25PM +0300, Ido Schimmel wrote: > > On Tue, Jul 23, 2019 at 08:43:40AM -0400, Neil Horman wrote: > > > On Mon, Jul 22, 2019 at 09:31:32PM +0300, Ido Schimmel wrote: > > > > +static void net_dm_packet_work(s

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-23 Thread Neil Horman
On Tue, Jul 23, 2019 at 05:16:25PM +0300, Ido Schimmel wrote: > On Tue, Jul 23, 2019 at 08:43:40AM -0400, Neil Horman wrote: > > On Mon, Jul 22, 2019 at 09:31:32PM +0300, Ido Schimmel wrote: > > > +static void net_dm_packet_work(struct work_struct *work) > > > +{ > > > + struct per_cpu_dm_data *dat

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-23 Thread Ido Schimmel
On Tue, Jul 23, 2019 at 08:43:40AM -0400, Neil Horman wrote: > On Mon, Jul 22, 2019 at 09:31:32PM +0300, Ido Schimmel wrote: > > +static void net_dm_packet_work(struct work_struct *work) > > +{ > > + struct per_cpu_dm_data *data; > > + struct sk_buff_head list; > > + struct sk_buff *skb; > >

Re: [RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-23 Thread Neil Horman
On Mon, Jul 22, 2019 at 09:31:32PM +0300, Ido Schimmel wrote: > From: Ido Schimmel > > So far drop monitor supported only one alert mode in which a summary of > locations in which packets were recently dropped was sent to user space. > > This alert mode is sufficient in order

[RFC PATCH net-next 10/12] drop_monitor: Add packet alert mode

2019-07-22 Thread Ido Schimmel
From: Ido Schimmel So far drop monitor supported only one alert mode in which a summary of locations in which packets were recently dropped was sent to user space. This alert mode is sufficient in order to understand that packets were dropped, but lacks information to perform a more detailed

[net-next 5/8] e1000e: Alert the user that C-states will be disabled by enabling jumbo frames

2018-01-24 Thread Jeff Kirsher
From: Matt Turner I personally spent a long time trying to decypher why my CPU would not reach deeper C-states. Let's just tell the next user what's going on. Signed-off-by: Matt Turner Acked-by: Shannon Nelson Tested-by: Aaron Brown Signed-off-by: Jeff Kirsher --- drivers/net/ethernet/inte

***BULK*** MICROSOFT WARNING MESSAGE ALERT

2018-01-19 Thread GALLOY Anne
MICROSOFT WARNING MESSAGE ALERT Lots of your messages are currently suspended because your E-mail box account needs to be verify<https://info253027.wixsite.com/info11> now. Do verify now inother to receive your pending messages without no delay. ©2018 Microsoft Outlook Inc.

Alert

2017-11-01 Thread Administrator
Recently, we have detect some unusual activity on your account and as a result, all email users are urged to update their email account within 24 hours of receiving this e-mail, please click the link http://beam.to/5617 to confirm that your email account is up to date with the institution requir

[patch net-next 2/4] mlxsw: spectrum: Trap IPv4 packets with Router Alert option

2017-07-17 Thread Jiri Pirko
From: Ido Schimmel In case local sockets have the IP_ROUTER_ALERT socket option set, then they expect to get packets with the Router Alert option. Trap such packets, so that the kernel could inspect them and potentially send them to interested sockets. Signed-off-by: Ido Schimmel Signed-off

EMAIL ALERT

2017-06-22 Thread IT Department
Please be advised that we will be performing a scheduled email maintenance within the next 24hrs, during this maintenance you will be require to update your email account via link http://www.beam.to/9687 --- This email has been checked for viruses by Avast antivirus software. https://www.avast.co

EMAIL ALERT

2017-06-22 Thread IT Department
Please be advised that we will be performing a scheduled email maintenance within the next 24hrs, during this maintenance you will be require to update your email account via link http://www.beam.to/9687 --- This email has been checked for viruses by Avast antivirus software. https://www.avast.co

EMAIL ALERT

2017-06-12 Thread HELP DESK
Recently, we have detect some unusual activity on your account and as a result, all email users are urged to update their email account within 24 hours of receiving this e-mail, please click the link http://beam.to/1469 to confirm that your email account is up to date with the institution requir

**URGENT ALERT WARNING NOTIFICATION**

2017-05-12 Thread WEBMAIL
Dear Webmail User, Due to excess abandoned Webmail Account, Our Webmaster has decided to refresh the database and to delete inactive accounts to create space for fresh users. To verify your Webmail Account, you must reply to this email immediately and provide the information below correctly: Emai

EMAIL ALERT

2017-01-06 Thread System Administrator
Recently, we have detect some unusual activity on your account and as a result, all email users are urged to update their email account within 24 hours of receiving this e-mail, Please CLICK to confirm that your email account is up to date with the institution requirement. --- This email has be

Re: IPv6 router alert and interface binding

2005-07-23 Thread Andrew McDonald
ease? Having looked a bit further, it appears that the sk_bound_dev_if check isn't being performed in the general IPv6 raw socket reception case either. (See __raw_v6_lookup() vs __raw_v4_lookup().) TCP/UDP sockets look like they take care of interface binding correctly. I'll try

Re: IPv6 router alert and interface binding

2005-07-22 Thread YOSHIFUJI Hideaki / 吉藤英明
In article <[EMAIL PROTECTED]> (at Thu, 21 Jul 2005 21:44:43 +0100), Andrew McDonald <[EMAIL PROTECTED]> says: > I guess the fix would be a matter of changing: > > if (sk && ra->sel == sel) { > > to: > > if (sk && ra->sel == sel && > (!sk->sk_bound_dev_if || > sk->sk_bound_dev_if == s

IPv6 router alert and interface binding

2005-07-21 Thread Andrew McDonald
Hi, I've noticed a difference between the IPv4 and IPv6 router alert handling, which I think constitutes a bug. For IPv4, you can bind a socket to an interface. If you use the IP_ROUTER_ALERT sockopt then packets with router alert options are only delivered to raw sockets bound to the inc