lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 8 Apr 2019 13:31:33 +0000
From:   David Laight <David.Laight@...LAB.COM>
To:     'Rafał Miłecki' <>,
        "" <>,
        "David S. Miller" <>,
        Toshiaki Makita <>,
        Toke Høiland-Jørgensen <>,
        "Florian Westphal" <>,
        Eric Dumazet <>
CC:     Stefano Brivio <>,
        Sabrina Dubroca <>,
        David Ahern <>, Felix Fietkau <>,
        "Jo-Philipp Wich" <>,
        Koen Vandeputte <>
Subject: RE: NAT performance regression caused by vlan GRO support

From: Rafal Milecki
> Sent: 07 April 2019 12:55
> If not, maybe w really need to think about some good & clever condition for
> disabling GRO by default on hw without checksum offloading.

Maybe GRO could assume the checksums are valid so the checksum
would only be verified when the packet is delivered locally.

If the packet is forwarded then, provided the same packet
boundaries are used, the original checksums (maybe modified
by NAT) can be used.

No idea how easy this might be :-)


Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)

Powered by blists - more mailing lists