http://bugzilla.suse.com/show_bug.cgi?id=1104824
http://bugzilla.suse.com/show_bug.cgi?id=1104824#c1
--- Comment #1 from Manfred Härtel ---
As the problem only occurs when the first fragment is larger than the
RX_COPY_THRESHOLD, I had the idea to enlarge RX_COPY_THRESHOLD to the maximum
size of a fragment:
#define RX_COPY_THRESHOLD 4096
There is no explanation in the source code why RX_COPY_THRESHOLD is only 256 at
the moment. May be someone can explain.
However, my first tests with the enlarged value of 4096 were successful and
free of side effects.
I also added two printk() statements around the __pskb_pull_tail() call and, as
expected, __pskb_pull_tail() is able to decrease skb_shinfo(skb)->nr_frags by
one in all observed cases.
--
You are receiving this mail because:
You are on the CC list for the bug.