[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240801-udp-gso-egress-from-tunnel-v2-0-9a2af2f15d8d@cloudflare.com>
Date: Thu, 01 Aug 2024 15:52:52 +0200
From: Jakub Sitnicki <jakub@...udflare.com>
To: netdev@...r.kernel.org
Cc: "David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>,
Paolo Abeni <pabeni@...hat.com>, Willem de Bruijn <willemb@...gle.com>,
kernel-team@...udflare.com,
syzbot+e15b7e15b8a751a91d9a@...kaller.appspotmail.com
Subject: [PATCH net v2 0/2] Silence bad offload warning when sending UDP
GSO with IPv6 extension headers
This series addresses a recent regression report from syzbot [1].
Please see patch 1 description for details.
[1] https://lore.kernel.org/all/000000000000e1609a061d5330ce@google.com/
Signed-off-by: Jakub Sitnicki <jakub@...udflare.com>
---
Changes in v2:
- Contain the fix inside the GSO stack after discussing with Willem
- Rework tests after realizing the regression has nothing to do with tunnels
- Link to v1: https://lore.kernel.org/r/20240725-udp-gso-egress-from-tunnel-v1-0-5e5530ead524@cloudflare.com
---
Jakub Sitnicki (2):
gso: Skip bad offload detection when device supports requested GSO
selftests/net: Add coverage for UDP GSO with IPv6 extension headers
net/core/gso.c | 6 ++++--
tools/testing/selftests/net/udpgso.c | 25 ++++++++++++++++++++++++-
2 files changed, 28 insertions(+), 3 deletions(-)
Powered by blists - more mailing lists