From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:58994 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726865AbeIQSPH (ORCPT ); Mon, 17 Sep 2018 14:15:07 -0400 Date: Mon, 17 Sep 2018 14:47:52 +0200 From: Greg KH To: Stephen Hemminger Cc: davem@davemloft.net, netdev@vger.kernel.org, stable@vger.kernel.org, edumazet@google.com, Stephen Hemminger Subject: Re: [PATCH v3 00/30] backport of IP fragmentation fixes Message-ID: <20180917124752.GA15391@kroah.com> References: <20180913145902.17531-1-sthemmin@microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180913145902.17531-1-sthemmin@microsoft.com> Sender: stable-owner@vger.kernel.org List-ID: On Thu, Sep 13, 2018 at 07:58:32AM -0700, Stephen Hemminger wrote: > Took the set of patches from 4.19 to handle IP fragmentation DoS > and applied them against 4.14.69. Most of these are from Eric. > In a couple case, it required some manual merge conflict resolution. > > Tested normal IP fragmentation with iperf3 and malicious IP fragments > with fragmentsmack. Under fragmentation attack (700Kpps) the original > 4.14.69 consumes 97% CPU; with this patch it drops to 5%. All now queued up, thanks for doing the backport. greg k-h