From: Hannes Frederic Sowa <han...@stressinduktion.org> Date: Tue, 15 Dec 2015 21:01:54 +0100
> udp tunnel offloads tend to aggregate datagrams based on inner > headers. gro engine gets notified by tunnel implementations about > possible offloads. The match is solely based on the port number. > > Imagine a tunnel bound to port 53, the offloading will look into all > DNS packets and tries to aggregate them based on the inner data found > within. This could lead to data corruption and malformed DNS packets. > > While this patch minimizes the problem and helps an administrator to find > the issue by querying ip tunnel/fou, a better way would be to match on > the specific destination ip address so if a user space socket is bound > to the same address it will conflict. > > Cc: Tom Herbert <t...@herbertland.com> > Cc: Eric Dumazet <eduma...@google.com> > Signed-off-by: Hannes Frederic Sowa <han...@stressinduktion.org> It looks this issue is still being hashed out so I've marked this patch as deferred for now. THanks. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html