From mboxrd@z Thu Jan 1 00:00:00 1970 From: Sowmini Varadhan Subject: Re: [PATCH RFC net-next 00/11] udp gso Date: Mon, 3 Sep 2018 07:45:40 -0400 Message-ID: <20180903114540.GA8269@oracle.com> References: <20180417200059.30154-1-willemdebruijn.kernel@gmail.com> <20180417201557.GA4080@oracle.com> <20180417204829.GK7632@oracle.com> <8b4de31a06d9bdb69e348f88ad0dcbf7d8576477.camel@redhat.com> <20180903080248.GM23674@gauss3.secunet.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Willem de Bruijn , Paolo Abeni , Network Development , Willem de Bruijn , alexander.h.duyck@intel.com To: Steffen Klassert Return-path: Received: from aserp2120.oracle.com ([141.146.126.78]:38540 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726023AbeICQFt (ORCPT ); Mon, 3 Sep 2018 12:05:49 -0400 Content-Disposition: inline In-Reply-To: <20180903080248.GM23674@gauss3.secunet.de> Sender: netdev-owner@vger.kernel.org List-ID: On (09/03/18 10:02), Steffen Klassert wrote: > I'm working on patches that builds such skb lists. The list is chained > at the frag_list pointer of the first skb, all subsequent skbs are linked > to the next pointer of the skb. It looks like this: there are some risks to using the frag_list pointer, Alex Duyck had pointed this out to me in https://www.mail-archive.com/netdev@vger.kernel.org/msg131081.html (see last paragraph, or search for the string "gotcha" there) I dont know the details of your playground patch, but might want to watch out for those to make sure it is immune to these issues.. --Sowmini