summaryrefslogtreecommitdiff
path: root/drivers/net/vxlan.c
diff options
context:
space:
mode:
authorDavid Woodhouse <dwmw2@infradead.org>2015-09-24 13:38:22 +0300
committerDavid S. Miller <davem@davemloft.net>2015-09-27 08:38:34 +0300
commit8b7a7048220f86547db31de0abe1ea6dd2cfa892 (patch)
treed2fc6cc721822b02e326569b2d011bd906a6842b /drivers/net/vxlan.c
parent5a58f227790faded5a3ef6075f3ddd65093e0f86 (diff)
downloadlinux-8b7a7048220f86547db31de0abe1ea6dd2cfa892.tar.xz
8139cp: Fix GSO MSS handling
When fixing the TSO support I noticed we just mask ->gso_size with the MSSMask value and don't care about the consequences. Provide a .ndo_features_check() method which drops the NETIF_F_TSO feature for any skb which would exceed the maximum, and thus forces it to be segmented by software. Then we can stop the masking in cp_start_xmit(), and just WARN if the maximum is exceeded, which should now never happen. Finally, Francois Romieu noticed that we didn't even have the right value for MSSMask anyway; it should be 0x7ff (11 bits) not 0xfff. Signed-off-by: David Woodhouse <David.Woodhouse@intel.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/vxlan.c')
0 files changed, 0 insertions, 0 deletions