]> The Tcpdump Group git mirrors - tcpdump/commit
IP: Enable TSO (TCP Segmentation Offload) support
authorFrancois-Xavier Le Bail <[email protected]>
Wed, 20 Sep 2023 06:44:09 +0000 (08:44 +0200)
committerFrancois-Xavier Le Bail <[email protected]>
Wed, 25 Oct 2023 14:19:07 +0000 (16:19 +0200)
commit4c9a2df09bac0bd6dab0831da135892b51c12053
tree9288655faf17634103905faa6e548a30f8cba18f
parentbf70c3ab06f04e010300141d261c1b8926f5c09b
IP: Enable TSO (TCP Segmentation Offload) support

It's a follow-up to c8623960f050cb81c12b31107070021f27f14b18.

The support is now enabled by default. No more "#ifdef GUESS_TSO".

Output example:
  length 2016 [was 0, presumed TSO]

Add a test file with presumed TSO.
(From http://cloudshark.org/captures/25e40f73bc1c, found via
https://osqa-ask.wireshark.org/questions/16279/)

Use ND_ICHECKMSG_U() to test an invalid total length < header length.

Output example:
  [total length 19 < 20] (invalid)

Add a test file for this case.

Move ND_TCHECK_SIZE(ip) after the new tests.

Add a const qualifier for the ip_print() parameter 'length'.

Update the man page.

(backported from commit 3465ec4a0c94f3abe774dfdb9874f966403e20ce)
netdissect.h
print-ip.c
tcpdump.1.in
tests/TESTLIST
tests/ipv4_invalid_total_length_2.out [new file with mode: 0644]
tests/ipv4_invalid_total_length_2.pcap [new file with mode: 0644]
tests/ipv4_tcp_http_xml_tso.out [new file with mode: 0644]
tests/ipv4_tcp_http_xml_tso.pcap [new file with mode: 0644]