From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ben Hutchings Subject: Re: [PATCH 2/4] xen-netfront: drop skb when skb->len > 65535 Date: Tue, 19 Mar 2013 21:24:49 +0000 Message-ID: <1363728289.31336.7.camel__38050.429247278$1363728392$gmane$org@deadeye.wl.decadent.org.uk> References: <1363602955-24790-1-git-send-email-wei.liu2@citrix.com> <1363602955-24790-3-git-send-email-wei.liu2@citrix.com> <1363606970.30193.22.camel@zakaz.uk.xensource.com> <1363617642.29093.203.camel@zion.uk.xensource.com> <1363618459.2963.10.camel@zakaz.uk.xensource.com> <1363619098.29093.205.camel@zion.uk.xensource.com> <1363619244.2963.11.camel@zakaz.uk.xensource.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1363619244.2963.11.camel@zakaz.uk.xensource.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Ian Campbell Cc: "netdev@vger.kernel.org" , "annie.li@oracle.com" , "konrad.wilk@oracle.com" , Wei Liu , "xen-devel@lists.xen.org" List-Id: xen-devel@lists.xenproject.org On Mon, 2013-03-18 at 15:07 +0000, Ian Campbell wrote: > On Mon, 2013-03-18 at 15:04 +0000, Wei Liu wrote: > > On Mon, 2013-03-18 at 14:54 +0000, Ian Campbell wrote: > > > On Mon, 2013-03-18 at 14:40 +0000, Wei Liu wrote: > > > > On Mon, 2013-03-18 at 11:42 +0000, Ian Campbell wrote: > > > > > On Mon, 2013-03-18 at 10:35 +0000, Wei Liu wrote: > > > > > > The `size' field of Xen network wire format is uint16_t, anything bigger than > > > > > > 65535 will cause overflow. > > > > > > > > > > > > Signed-off-by: Wei Liu > > > > > > --- > > > > > > drivers/net/xen-netfront.c | 12 ++++++++++++ > > > > > > 1 file changed, 12 insertions(+) > > > > > > > > > > > > diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c > > > > > > index 5527663..8c3d065 100644 > > > > > > --- a/drivers/net/xen-netfront.c > > > > > > +++ b/drivers/net/xen-netfront.c > > > > > > @@ -547,6 +547,18 @@ static int xennet_start_xmit(struct sk_buff *skb, struct net_device *dev) > > > > > > unsigned int len = skb_headlen(skb); > > > > > > unsigned long flags; > > > > > > > > > > > > + /* > > > > > > + * wire format of xen_netif_tx_request only supports skb->len > > > > > > + * < 64K, because size field in xen_netif_tx_request is > > > > > > + * uint16_t. > > > > > > > > > > Is there some field we can set e.g. in struct ethernet_device which > > > > > would stop this from happening? > > > > > > > > > > > > > struct ethernet_device? I could not find it. > > > > > > > > And for struct net_device, > > > > > > I meant struct net_device. > > > > > > > there is no field for this AFAICT. > > > > > > Interesting. Are hardware devices expected to cope with arbitrary sized > > > GSO skbs then I wonder. > > > > > > > No idea. But there is a macro called GSO_MAX_SIZE (65536) in struct > > net_device. :-) > > But aren't we seeing skb's bigger than that? > > Maybe this is just a historical bug in some older guests? GSO_MAX_SIZE is the maximum payload length, not the maximum total length of an skb. Ben. -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked.