From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Gallatin Subject: Re: [PATCH] lro: IP fragment checking Date: Mon, 01 Dec 2008 12:50:15 -0500 Message-ID: <493423D7.5030203@myri.com> References: <4933A74F.3050809@de.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: David Miller , netdev@vger.kernel.org, linux-kernel , tklein@de.ibm.com, Christoph Raisch , jb.billaud@gmail.com, hering2@de.ibm.com To: Jan-Bernd Themann Return-path: Received: from mailbox2.myri.com ([64.172.73.26]:1974 "EHLO myri.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751708AbYLARu3 (ORCPT ); Mon, 1 Dec 2008 12:50:29 -0500 In-Reply-To: <4933A74F.3050809@de.ibm.com> Sender: netdev-owner@vger.kernel.org List-ID: Jan-Bernd Themann wrote: > This patch prevents that ip fragmented TCP packets are considered vaild > for aggregation <...> > + if (iph->frag_off & IP_MF) > + return -1; > + I think there is an endian bug, and that you should also check IP_OFFSET. What about: if (iph->frag_off & htons(IP_MF|IP_OFFSET)) As to whether or not to do it in the drivers/hardware or in the LRO code, I favor doing it in the LRO code just so that it is not missed in some driver. Drew