| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <20110330.024231.57465584.davem@davemloft.net> Date: Wed, 30 Mar 2011 02:42:31 -0700 (PDT) From: David Miller <davem@...emloft.net> To: daniel@...e.fr Cc: ebiederm@...ssion.com, eric.dumazet@...il.com, kaber@...sh.net, nightnord@...il.com, netdev@...r.kernel.org Subject: Re: [V4] dev : fix mtu check when TSO is enabled From: Daniel Lezcano <daniel@...e.fr> Date: Wed, 30 Mar 2011 11:40:35 +0200 > From: Daniel Lezcano <daniel.lezcano@...e.fr> > > In case the device where is coming from the packet has TSO enabled, > we should not check the mtu size value as this one could be bigger > than the expected value. > > This is the case for the macvlan driver when the lower device has > TSO enabled. The macvlan inherit this feature and forward the packets > without fragmenting them. Then the packets go through dev_forward_skb > and are dropped. This patch fix this by checking TSO is not enabled > when we want to check the mtu size. > > Signed-off-by: Daniel Lezcano <daniel.lezcano@...e.fr> > Acked-by: "Eric W. Biederman" <ebiederm@...ssion.com> Applied. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists