NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/53562: bridge(4) breaks segmentation / TX checksum offloading

The following reply was made to PR kern/53562; it has been noted by GNATS.

From: Christoph Badura <>
To: Rin Okuyama <>
Cc: Ryota Ozaki <>, Masanobu SAITOH <>,
	"" <>,,,
Subject: Re: kern/53562: bridge(4) breaks segmentation / TX checksum
Date: Wed, 5 Sep 2018 23:51:37 +0200

 On Wed, Sep 05, 2018 at 09:04:16PM +0900, Rin Okuyama wrote:
 > With both patches, TX works fine through an interface added to bridge,
 > even if TSO is enabled. However, RX from an host which shares the
 > interface via bridge does not work for larger packets (because of TSO?).
 > RX of smaller packets and TX work for that host.
 I would not expect any TSO flags to be set on a packet that is received
 from another host.  The packet should have been segmented on other host
 > I'm not sure if my setup should work in principle...
 Maybe you could describe your setup in more detail.  Looking at the PR I
 don't understand what exactly your setup is.
 It might be worth going over the original PR kern/27007 again.  Also note
 the second part of PR kern/21831 by yamt@.
 Note that in kern/27007 the damage was actually done only when ipf was
 enabled on the bridge interface.  It might well be that my change was
 not correct because it was to broad.  Maybe ipf has changed since, so that
 packets do not get corrupted anymore in this case, too.
 Looking back at the code I think the comment could have been worded
 better.  If you move it out of bridge_enqueue() it would be nice if the
 comment could be expanded.  Like, what exactly the circumstances are that
 the flags have been set and why they need clearing.
 Maybe we need ATF tests.  That certainly would be nice.  Also we now have
 more test cases to consider: npf and pf active on the bridge.

Home | Main Index | Thread Index | Old Index