Message ID | cover.1698156966.git.yan@cloudflare.com (mailing list archive) |
---|---|
Headers | show |
Series | ipv6: avoid atomic fragment on GSO output | expand |
Hello: This series was applied to netdev/net-next.git (main) by Jakub Kicinski <kuba@kernel.org>: On Tue, 24 Oct 2023 07:26:28 -0700 you wrote: > When the ipv6 stack output a GSO packet, if its gso_size is larger than > dst MTU, then all segments would be fragmented. However, it is possible > for a GSO packet to have a trailing segment with smaller actual size > than both gso_size as well as the MTU, which leads to an "atomic > fragment". Atomic fragments are considered harmful in RFC-8021. An > Existing report from APNIC also shows that atomic fragments are more > likely to be dropped even it is equivalent to a no-op [1]. > > [...] Here is the summary with links: - [v5,net-next,1/3] ipv6: drop feature RTAX_FEATURE_ALLFRAG https://git.kernel.org/netdev/net-next/c/e57a34478586 - [v5,net-next,2/3] ipv6: refactor ip6_finish_output for GSO handling https://git.kernel.org/netdev/net-next/c/1f7ec1b3721d - [v5,net-next,3/3] ipv6: avoid atomic fragment on GSO packets https://git.kernel.org/netdev/net-next/c/03d6c848bfb4 You are awesome, thank you!