From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Newall Subject: Re: Bad checksum on bridge with IP options Date: Wed, 14 May 2014 22:38:28 +0930 Message-ID: <53736ACC.9010902@davidnewall.com> References: <536F8C0F.4090206@davidnewall.com>,<5370CB47.4010400@davidnewall.com> <53715D67.8020803@davidnewall.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "fw@strlen.de" To: Lukas Tribus , Eric Dumazet , Netdev Return-path: Received: from hawking.rebel.net.au ([203.20.69.83]:60248 "EHLO hawking.rebel.net.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932072AbaENNIc (ORCPT ); Wed, 14 May 2014 09:08:32 -0400 In-Reply-To: <53715D67.8020803@davidnewall.com> Sender: netdev-owner@vger.kernel.org List-ID: My thought of calling ip_forward_options to set RR and TS addresses (not to mention checksum) is not working out, because skb_rtable returns NULL. I think I'm supposed to call skb_set_dst, but how I get dst is eluding me. Leaving broken values in the options, just recalculating the checksum, is starting to look very attractive right now, but I'd rather not. How do I proceed?