> > > > So I guess VIRTIO_NET_HDR_GSO_* without VIRTIO_NET_HDR_F_DATA_VALID > > > > would be wrong on rx. > > > > > > > > But the new check > > > > > > > > if (hdr->gso_type != VIRTIO_NET_HDR_GSO_NONE) { > > > > > > > > [...] > > > > > > > > case SKB_GSO_TCPV4: > > > > case SKB_GSO_TCPV6: > > > > if (skb->csum_offset != offsetof(struct tcphdr, check)) > > > > return -EINVAL; > > > > > > > > should be limited to callers of virtio_net_hdr_to_skb on the tx/GSO path. > > > > > > > > Looking what the cleanest/minimal patch is to accomplish that. > > > > > > > > > > virtio_net_hdr_to_skb() translates virtio-net header to skb metadata, > > > so it's RX. For TX the helper should be virtio_net_hdr_from_skb() > > > which translates skb metadata to virtio hdr. > > > > virtio_net_hdr_to_skb is used by PF_PACKET, tun and tap > > Exactly. > > > when injecting a packet into the egress path. > > For tuntap it's still the RX path. For PF_PACEKT and macvtap, it's the tx. > > Maybe a new parameter to virtio_net_hdr_to_skb()? This is the most straightforward approach. But requires changse to all callers, in a patch targeting all the stable branches. I'd prefer if we can detect ingress vs egress directly. Based on ip_summed, pkt_type, is_skb_wmem or so. But so far have not found a suitable condition. I noticed something else: as you point out TUN is ingress. Unlike virtnet_receive, it does not set ip_summed to CHECKSUM_UNNECESSARY if VIRTIO_NET_HDR_F_DATA_VALID. It probably should. GRO expects packets to have had their integrity verified. CHECKSUM_NONE on ingress is not correct for GRO. And also related: no GRO should be generated by a device unless VIRTIO_NET_HDR_F_DATA_VALID is also passed? I have to check the spec if it says anything about this.