lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1210924374.5136.94.camel@localhost.localdomain>
Date:	Fri, 16 May 2008 16:52:54 +0900
From:	Ichiro Suzuki <isuzuki@...aclelinux.com>
To:	netdev@...r.kernel.org
Cc:	Naohiro Ooiwa <nooiwa@...aclelinux.com>
Subject: Question about VLAN + checksum offloading

Hi,

  Looking in oprofile log, I observed
	csum_partial_copy_generic()
is invoked for a 802.1Q VLAN device created on e1000,
This suggests checksum offloading is not in effect.
The offloading works fine when e1000 is used directly.
Attached one liner patch fixes this. But, it seems
too obvious to be a correct answer.

  My questions are,
o Is it right to expect checksum offloading should work
 on VLAN devices?
o If so, is there any mechanism to propagate
 real_dev->features flags in vlan.c?
o If such mechanism doesn't exist, is my patch reasonable?
.

  The machine arch is x86_64.  I got similar results
on an ancient 2.6.9 kernel and on the latest 2.6.25.

Thanks in advance,
----------------------------------------------
Ichiro Suzuki       <isuzuki@...aclelinux.com>
Miracle Linux Corp., Advanced Technology Group
----------------------------------------------


View attachment "linux-2.6.25_vlan.patch" of type "text/x-patch" (477 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ