diff options
author | David Woodhouse <dwmw2@infradead.org> | 2015-09-24 13:38:22 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-09-27 08:38:34 +0300 |
commit | 8b7a7048220f86547db31de0abe1ea6dd2cfa892 (patch) | |
tree | d2fc6cc721822b02e326569b2d011bd906a6842b /drivers/net/vxlan.c | |
parent | 5a58f227790faded5a3ef6075f3ddd65093e0f86 (diff) | |
download | linux-8b7a7048220f86547db31de0abe1ea6dd2cfa892.tar.xz |
8139cp: Fix GSO MSS handling
When fixing the TSO support I noticed we just mask ->gso_size with the
MSSMask value and don't care about the consequences.
Provide a .ndo_features_check() method which drops the NETIF_F_TSO
feature for any skb which would exceed the maximum, and thus forces it
to be segmented by software.
Then we can stop the masking in cp_start_xmit(), and just WARN if the
maximum is exceeded, which should now never happen.
Finally, Francois Romieu noticed that we didn't even have the right
value for MSSMask anyway; it should be 0x7ff (11 bits) not 0xfff.
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/vxlan.c')
0 files changed, 0 insertions, 0 deletions