[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f59a8400-54ba-62eb-2e9b-b8a6b7533f90@kernel.org>
Date: Wed, 7 Sep 2022 18:40:56 -0600
From: David Ahern <dsahern@...nel.org>
To: Andrew Melnychenko <andrew@...nix.com>, edumazet@...gle.com,
netdev@...r.kernel.org, virtualization@...ts.linux-foundation.org,
linux-kernel@...r.kernel.org, davem@...emloft.net, kuba@...nel.org,
jasowang@...hat.com, mst@...hat.com, pabeni@...hat.com,
yoshfuji@...ux-ipv6.org
Cc: yan@...nix.com, yuri.benditovich@...nix.com
Subject: Re: [PATCH v3 1/6] udp: allow header check for dodgy GSO_UDP_L4
packets.
On 9/7/22 6:50 AM, Andrew Melnychenko wrote:
> diff --git a/net/ipv4/udp_offload.c b/net/ipv4/udp_offload.c
> index 6d1a4bec2614..8e002419b4d5 100644
> --- a/net/ipv4/udp_offload.c
> +++ b/net/ipv4/udp_offload.c
> @@ -387,7 +387,7 @@ static struct sk_buff *udp4_ufo_fragment(struct sk_buff *skb,
> if (!pskb_may_pull(skb, sizeof(struct udphdr)))
> goto out;
>
> - if (skb_shinfo(skb)->gso_type & SKB_GSO_UDP_L4)
> + if (skb_shinfo(skb)->gso_type & SKB_GSO_UDP_L4 && !skb_gso_ok(skb, features | NETIF_F_GSO_ROBUST))
that line needs to be wrapped.
> return __udp_gso_segment(skb, features, false);
>
> mss = skb_shinfo(skb)->gso_size;
Powered by blists - more mailing lists