)]}'
{
  "commit": "71cd44c2ce14a7098a606eb6f627d68348342bae",
  "tree": "881393daea1e7aba61dd0acde99b55a2c3f261a7",
  "parents": [
    "6c1ab818b69b3acc6911e64f7cc3f7cc42994652"
  ],
  "author": {
    "name": "Jibin Zhang",
    "email": "jibin.zhang@mediatek.com",
    "time": "Mon Mar 02 14:55:28 2026 +0800"
  },
  "committer": {
    "name": "Chenglong Tang",
    "email": "chenglongtang@google.com",
    "time": "Sat Apr 11 20:19:27 2026 -0700"
  },
  "message": "net: fix segmentation of forwarding fraglist GRO\n\n[ Upstream commit 426ca15c7f6cb6562a081341ca88893a50c59fa2 ]\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.\n\nBUG\u003db/484728118\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dFixed CVE-2026-23154 in the Linux kernel.\n\ncos-patch: security-moderate\nChange-Id: I47c44e4b7ec4175af884b37185a9bd4eb58da023\nSigned-off-by: Jibin Zhang \u003cjibin.zhang@mediatek.com\u003e\nFixes: 9fd1ff5d2ac7 (\"udp: Support UDP fraglist GRO/GSO.\")\nCc: stable@vger.kernel.org\nLink: https://patch.msgid.link/20260126152114.1211-1-jibin.zhang@mediatek.com\nSigned-off-by: Paolo Abeni \u003cpabeni@redhat.com\u003e\nSigned-off-by: Li hongliang \u003c1468888505@139.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\nSigned-off-by: chenglongtang \u003cchenglongtang@google.com\u003e\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/143967\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Kevin Berry \u003ckpberry@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "f3098d83e814f33a36265f2f7a15fada628d3d40",
      "old_mode": 33188,
      "old_path": "net/core/filter.c",
      "new_id": "faeefcc92e2773fdd5d415e23d4c771a123c7bd9",
      "new_mode": 33188,
      "new_path": "net/core/filter.c"
    },
    {
      "type": "modify",
      "old_id": "36595709279c98ab7c99cd8df261131d3c476bb4",
      "old_mode": 33188,
      "old_path": "net/ipv4/tcp_offload.c",
      "new_id": "7b09f6d0818b7254e27c8be62c63cb3bf875aef1",
      "new_mode": 33188,
      "new_path": "net/ipv4/tcp_offload.c"
    },
    {
      "type": "modify",
      "old_id": "9be9df2caf65400ad44e8dc61e1180295973c389",
      "old_mode": 33188,
      "old_path": "net/ipv4/udp_offload.c",
      "new_id": "cd860d8d497b4fa2405c9c5a0ffc229dead3b327",
      "new_mode": 33188,
      "new_path": "net/ipv4/udp_offload.c"
    },
    {
      "type": "modify",
      "old_id": "7567c32670c62e96022b47e7bb8c146f7c640f3e",
      "old_mode": 33188,
      "old_path": "net/ipv6/tcpv6_offload.c",
      "new_id": "10025c9e07d355e5ad7e1fe9d55df9772099d677",
      "new_mode": 33188,
      "new_path": "net/ipv6/tcpv6_offload.c"
    }
  ]
}
