Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-09-11 Thread Wolfgang Walter
t; skb_dst(skb) for NULL after skb_dst_force() and drop the packet > in cast the dst_entry was cleared. > > Fixes: 222d7dbd258d ("net: prevent dst uses after free") > Reported-by: Tobias Hommel > Reported-by: Kristian Evensen > Reported-by: Wolfgang Walter > Signed-off-by: S

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-09-10 Thread Wolfgang Walter
ng) so that we can check how often that happens here? Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-09-07 Thread Wolfgang Walter
eturn atomic_inc_not_zero(>__refcnt); } Am Freitag, 7. September 2018, 22:22:39 schrieb Wolfgang Walter: > Am Freitag, 31. August 2018, 08:50:24 schrieb Steffen Klassert: > > On Thu, Aug 30, 2018 at 08:53:50PM +0200, Wolfgang Walter wrote: > > > Hello, > > > > >

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-09-07 Thread Wolfgang Walter
Am Freitag, 31. August 2018, 08:50:24 schrieb Steffen Klassert: > On Thu, Aug 30, 2018 at 08:53:50PM +0200, Wolfgang Walter wrote: > > Hello, > > > > kernels > 4.12 do not work on one of our main routers. They crash as soon > > as ipsec-tunnels are configured an

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-09-07 Thread Wolfgang Walter
Hello, didn't respond as I've been on vacation. Am Freitag, 31. August 2018, 08:50:24 schrieb Steffen Klassert: > On Thu, Aug 30, 2018 at 08:53:50PM +0200, Wolfgang Walter wrote: > > Hello, > > > > kernels > 4.12 do not work on one of our main routers. They crash as s

Re: kernels > v4.12 oops/crash with ipsec-traffic: bisected to b838d5e1c5b6e57b10ec8af2268824041e3ea911: ipv4: mark DST_NOGC and remove the operation of dst_free()

2018-08-30 Thread Wolfgang Walter
y run 4.9 on the machine with the problem and 4.14 on most other routers. I also tested 4.18.5 and it still shows this bug. Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts

kernels >= v4.12 oops/crash with ipsec-traffic: partly bisected

2018-08-30 Thread Wolfgang Walter
; 4.12 from debian, they also crash. Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts

Re: regression kernel 4.4: stops routing packets with a GRE-payload

2016-01-20 Thread Wolfgang Walter
Am Mittwoch, 20. Januar 2016, 17:58:52 schrieb Nicolas Dichtel: > Le 20/01/2016 15:00, Wolfgang Walter a écrit : > > Hello, > > > > we tried 4.4 on our routers. We found one problem: 4.4 stops routing GRE > > packets (ipv4 in GRE/ipv4) here. 4.4.15 works fine.

Re: [PATCH net-next] ipv6: gro: support sit protocol

2015-11-04 Thread Wolfgang Walter
Am Mittwoch, 4. November 2015, 04:40:51 schrieb Eric Dumazet: > On Wed, 2015-11-04 at 13:19 +0100, Wolfgang Walter wrote: > > Today I found a problem: on a router forwarding GRE-packets (ipv4) (it is > > not the endpount) the interface (intel igb) stops sending packets after > &g

Re: [PATCH net-next] ipv6: gro: support sit protocol

2015-11-04 Thread Wolfgang Walter
Am Dienstag, 3. November 2015, 05:07:33 schrieb Eric Dumazet: > On Tue, 2015-11-03 at 13:57 +0100, Wolfgang Walter wrote: > > Am Montag, 19. Oktober 2015, 20:40:17 schrieb Eric Dumazet: > > > From: Eric Dumazet <eduma...@google.com> > > > > > > Tom He

Re: [PATCH net-next] ipv6: gro: support sit protocol

2015-11-04 Thread Wolfgang Walter
Am Mittwoch, 4. November 2015, 07:13:07 schrieb Eric Dumazet: > On Wed, 2015-11-04 at 15:09 +0100, Wolfgang Walter wrote: > > Yes, maybe igb has a problem sending a gro-packet if it is an isatap in > > gre. > We might detect this condition properly from igb ndo_featu

Re: [PATCH net-next] ipv6: gro: support sit protocol

2015-11-03 Thread Wolfgang Walter
cks = { > @@ -292,6 +302,8 @@ static struct packet_offload ipv6_packet_offload > __read_mostly = { static const struct net_offload sit_offload = { > .callbacks = { > .gso_segment= ipv6_gso_segment, > + .gro_receive= ipv6_gro_receive, > +

Re: [PATCH v2 net-next 3/4] ipv6: Add gro functions to sit_offloads

2015-10-20 Thread Wolfgang Walter
This patch reverts 19424e052fb44da2f00d1a868cbb51f3e9f4bbb5 ("sit: > > Add gro callbacks to sit_offload") because it generates packets > > that cannot be handled even by our own GSO. > > > > Reported-by: Wolfgang Walter <li...@stwm.de> > &g

Re: Soft lockup issue in Linux 4.1.9

2015-10-02 Thread Wolfgang Walter
types of production-like loads with it for 14+ hours without hanging. > > Just got up, and yes - my systems survived the night as well, no issues. > > Greg, any chance you can drop this into the pending 4.1.10? Otherwise people > will get another broken release. >

kernel 4.1.9: networking hangs with rcu_preempt self-detected stall, 4.1.8 works; was: Re: [PATCH 4.1 125/159] net: call rcu_read_lock early in process_backlog

2015-10-01 Thread Wolfgang Walter
ries though. After that the router completely hangs: networking stops working and we need to restart it. Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@

Re: sit: Set SKB_GSO_SIT bit when performing GRO

2015-07-20 Thread Wolfgang Walter
Am Montag, 20. Juli 2015, 14:14:59 schrieb Herbert Xu: On Fri, Jul 17, 2015 at 05:38:30PM +0200, Wolfgang Walter wrote: eth1 stops sending with the patch after some time disabling gro on eth0 helps disabling tso or gso on eth0 and/or eth1 or both does not help eth0 and eth1 are both

Re: sit: Set SKB_GSO_SIT bit when performing GRO

2015-07-17 Thread Wolfgang Walter
Am Freitag, 17. Juli 2015, 09:56:51 schrieb Herbert Xu: On Thu, Jul 16, 2015 at 12:58:45PM +0200, Wolfgang Walter wrote: Am Donnerstag, 16. Juli 2015, 08:23:50 schrieb Herbert Xu: On Wed, Jul 15, 2015 at 02:25:59PM +0200, Wolfgang Walter wrote: Yes. Switching TSO off and leaving GRO

Re: sit: Set SKB_GSO_SIT bit when performing GRO

2015-07-16 Thread Wolfgang Walter
Am Donnerstag, 16. Juli 2015, 08:23:50 schrieb Herbert Xu: On Wed, Jul 15, 2015 at 02:25:59PM +0200, Wolfgang Walter wrote: Yes. Switching TSO off and leaving GRO on works, too. OK, could you please try this patch? Patch works here. Thanks, Wolfgang ---8--- We need to set

Re: GRO: forwading ISATAP packets is very slow with kernel 4.1

2015-07-15 Thread Wolfgang Walter
Am Mittwoch, 15. Juli 2015, 17:50:20 schrieb Herbert Xu: On Wed, Jul 15, 2015 at 02:34:41AM +0200, Wolfgang Walter wrote: I wonder if the router may treat all ipv6-tcp connections of a host as a single flow as all those ipv6-packets are embedded in ipv4-packets with the ipv4-address

GRO: forwading ISATAP packets is very slow with kernel 4.1

2015-07-14 Thread Wolfgang Walter
with IPv6 support but IPv6 is disabled via kernel command line. The router is not a tunnel endpoint, it only forwards the ISATAP- packets. MTU is 1500 on both interfaces. Netfilter conntrack is not used and disabling netfilter has no effect. Regards, -- Wolfgang Walter Studentenwerk München Anstalt

Re: GRO: forwading ISATAP packets is very slow with kernel 4.1

2015-07-14 Thread Wolfgang Walter
Am Mittwoch, 15. Juli 2015, 08:08:49 schrieben Sie: On Wed, Jul 15, 2015 at 12:16:30AM +0200, Wolfgang Walter wrote: Hello, I upgraded routers from 3.14.x to 4.1.2. Forwarding ISATAP-packets (IPv4 packets with IPv6 payload) is very slow with 4.1 if GRO is enabled (youtube for example

Re: kernel = 4.0: crashes when using traceroute6 with isatap

2015-05-06 Thread Wolfgang Walter
Am Mittwoch, 6. Mai 2015, 11:15:18 schrieben Sie: (Cc'ing netdev.) On Sat, May 2, 2015 at 5:29 AM, Wolfgang Walter li...@stwm.de wrote: Am Samstag, 2. Mai 2015, 02:16:36 schrieb Wolfgang Walter: Hello, kernel 4.0 (and 4.0.1) crashes immediately when I use traceroute6 with an isatap

problems with e1000 and flow control

2008-02-25 Thread Wolfgang Walter
this in the lans of our student halls. I think flow control should be completely disabled by default if the switch does not advertise it. It still can be forced with ethtool. Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts -- To unsubscribe from this list: send the line

Re: kernel 2.6.23.8: KERNEL: assertion in net/ipv4/tcp_input.c

2007-12-13 Thread Wolfgang Walter
2007 14:34 schrieb Ilpo Järvinen: On Mon, 3 Dec 2007, Wolfgang Walter wrote: with kernel 2.6.23.8 we saw a KERNEL: assertion ((int)tcp_packets_in_flight(tp) = 0) failed at net/ipv4/tcp_input.c (1292) Is this the only message? Are there any Leak printouts? Any tweaking done to TCP

Re: kernel 2.6.23.8: KERNEL: assertion in net/ipv4/tcp_input.c

2007-12-03 Thread Wolfgang Walter
Am Montag, 3. Dezember 2007 14:34 schrieb Ilpo Järvinen: On Mon, 3 Dec 2007, Wolfgang Walter wrote: with kernel 2.6.23.8 we saw a KERNEL: assertion ((int)tcp_packets_in_flight(tp) = 0) failed at net/ipv4/tcp_input.c (1292) Is this the only message? Are there any Leak printouts? No. 4

kernel 2.6.23.8: KERNEL: assertion in net/ipv4/tcp_input.c

2007-12-02 Thread Wolfgang Walter
Hello, with kernel 2.6.23.8 we saw a KERNEL: assertion ((int)tcp_packets_in_flight(tp) = 0) failed at net/ipv4/tcp_input.c (1292) Regards, Wolfgang Walter -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts -- To unsubscribe from this list: send the line unsubscribe

Re: [PATCHv6 0/3] Interface group patches

2007-11-22 Thread Wolfgang Walter
that). Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

ipsec: icmp fragmentation-needed from ipsec-gateway is not encrypted

2007-09-18 Thread Wolfgang Walter
echo-reply packet (which has the same source-address as the fragmentation needed) but only the outgoing esp-packet (and the echo-reply reaches HB, by the way). Regards, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen Rechts - To unsubscribe from this list: send the line

Re: [patch] sunrpc: make closing of old temporary sockets work (was: problems with lockd in 2.6.22.6)

2007-09-14 Thread Wolfgang Walter
Am Mittwoch, 12. September 2007 21:55 schrieb J. Bruce Fields: On Wed, Sep 12, 2007 at 09:40:57PM +0200, Wolfgang Walter wrote: On Wednesday 12 September 2007, J. Bruce Fields wrote: On Wed, Sep 12, 2007 at 04:14:06PM +0200, Neil Brown wrote: So it is in 2.6.21 and later and should

[patch] sunrpc: make closing of old temporary sockets work (was: problems with lockd in 2.6.22.6)

2007-09-12 Thread Wolfgang Walter
2.6.22.6 which changes the test to svsk-sk_inuse = 0 which was probably meant. The patched kernel runs fine here. Unused sockets get closed (after 6 to 12 minutes) Signed-off-by: Wolfgang Walter [EMAIL PROTECTED] --- ../linux-2.6.22.6/net/sunrpc/svcsock.c 2007-08-27 18:10:14.0 +0200

Re: [NFS] [patch] sunrpc: make closing of old temporary sockets work (was: problems with lockd in 2.6.22.6)

2007-09-12 Thread Wolfgang Walter
Am Mittwoch, 12. September 2007 15:37 schrieb J. Bruce Fields: On Wed, Sep 12, 2007 at 02:07:10PM +0200, Wolfgang Walter wrote: as already described old temporary sockets (client is gone) of lockd aren't closed after some time. So, with enough clients and some time gone, there are 80 open

Re: [patch] sunrpc: make closing of old temporary sockets work (was: problems with lockd in 2.6.22.6)

2007-09-12 Thread Wolfgang Walter
not matter - SK_CLOSED may be set at any time. svc_age_temp_sockets only detaches the socket, sets SK_CLOSED and then enqueues it. If SK_BUSY is set its already enqueued and svc_sock_enqueue ensures that it is not enqueued twice. Regards, -- Wolfgang Walter Studentenwerk München Anstalt des

Re: [patch] sunrpc: make closing of old temporary sockets work (was: problems with lockd in 2.6.22.6)

2007-09-12 Thread Wolfgang Walter
On Wednesday 12 September 2007, J. Bruce Fields wrote: On Wed, Sep 12, 2007 at 09:40:57PM +0200, Wolfgang Walter wrote: On Wednesday 12 September 2007, J. Bruce Fields wrote: On Wed, Sep 12, 2007 at 04:14:06PM +0200, Neil Brown wrote: So it is in 2.6.21 and later and should probably go

Re: [NFS] problems with lockd in 2.6.22.6

2007-09-08 Thread Wolfgang Walter
On Friday 07 September 2007, J. Bruce Fields wrote: On Fri, Sep 07, 2007 at 05:49:55PM +0200, Wolfgang Walter wrote: Hello, 3) For unknown reason these sockets then remain open. In the morning when people start their workstation again we therefor not only get a lot of these messages

problems with lockd in 2.6.22.6

2007-09-07 Thread Wolfgang Walter
in svc_tcp_accept. I already posted this patch on netdev@vger.kernel.org: Signed-off-by: Wolfgang Walter [EMAIL PROTECTED] --- linux-2.6.22.6/net/sunrpc/svcsock.c 2007-08-27 18:10:14.0 +0200 +++ linux-2.6.22.6w/net/sunrpc/svcsock.c2007-09-03 18:27:30.0 +0200 @@ -1090,7

Re: [NFS] problems with lockd in 2.6.22.6

2007-09-07 Thread Wolfgang Walter
Am Freitag, 7. September 2007 18:19 schrieben Sie: On Fri, Sep 07, 2007 at 05:49:55PM +0200, Wolfgang Walter wrote: Hello, we upgraded the kernel of a nfs-server from 2.6.17.11 to 2.6.22.6. Since then we get the message lockd: too many open TCP sockets, consider increasing the number

[patch] sunrpc: fix printk argument in svc_tcp_accept

2007-09-03 Thread Wolfgang Walter
be printk(KERN_NOTICE %s: last TCP connect from %s\n, serv-sv_name, __svc_print_addr(sin, buf, sizeof(buf))); Signed-off-by: Wolfgang Walter [EMAIL PROTECTED] --- linux-2.6.22.6/net/sunrpc/svcsock.c 2007-08-27 18:10:14.0 +0200 +++ linux-2.6.22.6w/net/sunrpc

Re: iproute2 weirdness - fwmark and route pb

2005-11-10 Thread Wolfgang Walter
is found. But this route is via eth2. Please note that if you set /proc/sys/net/ipv4/conf/eth3/rp_filter to 0 you probably want to check the src address of incoming packets on eth3 for not being ones from your eth1. Greetings, -- Wolfgang Walter Studentenwerk München Anstalt des öffentlichen