lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 10 Dec 2022 21:07:32 -0800
From:   Michael Chan <>
To:     Coco Li <>
Cc:     "David S . Miller" <>,
        Hideaki YOSHIFUJI <>,
        David Ahern <>,
        Eric Dumazet <>,
        Jakub Kicinski <>,
        Paolo Abeni <>,,
Subject: Re: [RFC net-next v6 2/2] bnxt: Use generic HBH removal helper in tx path

On Fri, Dec 9, 2022 at 8:16 PM Coco Li <> wrote:
> Eric Dumazet implemented Big TCP that allowed bigger TSO/GRO packet sizes
> for IPv6 traffic. See patch series:
> 'commit 89527be8d8d6 ("net: add IFLA_TSO_{MAX_SIZE|SEGS} attributes")'
> This reduces the number of packets traversing the networking stack and
> should usually improves performance. However, it also inserts a
> temporary Hop-by-hop IPv6 extension header.
> Using the HBH header removal method in the previous patch, the extra header
> be removed in bnxt drivers to allow it to send big TCP packets (bigger
> TSO packets) as well.
> Tested:
> Compiled locally
> To further test functional correctness, update the GSO/GRO limit on the
> physical NIC:
> ip link set eth0 gso_max_size 181000
> ip link set eth0 gro_max_size 181000
> Note that if there are bonding or ipvan devices on top of the physical
> NIC, their GSO sizes need to be updated as well.
> Then, IPv6/TCP packets with sizes larger than 64k can be observed.
> Signed-off-by: Coco Li <>

Reviewed-by: Michael Chan <>
Tested-by: Michael Chan <>


Download attachment "smime.p7s" of type "application/pkcs7-signature" (4209 bytes)

Powered by blists - more mailing lists