Skip to content

ethernet: add checksum offloading#194

Closed
GaurikaSohnvi wants to merge 2 commits into
renode:masterfrom
teslamotors:ethernet/checksum-offloading
Closed

ethernet: add checksum offloading#194
GaurikaSohnvi wants to merge 2 commits into
renode:masterfrom
teslamotors:ethernet/checksum-offloading

Conversation

@GaurikaSohnvi
Copy link
Copy Markdown
Contributor

No description provided.

@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Mar 25, 2026

CLA assistant check
All committers have signed the CLA.

Validate IP header and payload checksums on received frames when
MACCR.IPC (Checksum Offload) is enabled. Report results via
IpHeaderError, IpPayloadError, and IpChecksumBypassed fields in
the RX descriptor writeback. UDP checksum validation is skipped
for IPv4 when the checksum field is zero, per RFC 768.
TX checksum insertion was incorrectly gated on MACCR.IPC, which only
controls RX checksum offload. TX checksum insertion is controlled by
the per-descriptor CIC (Checksum Insertion Control) field per the DWC
spec. This caused packets to be transmitted with zero checksums when
IPC was not set, even though the firmware requested checksum insertion
via the descriptor. TSO now unconditionally enables checksum offload
as segmentation inherently requires it.
@GaurikaSohnvi GaurikaSohnvi force-pushed the ethernet/checksum-offloading branch from 5f87e33 to d833407 Compare March 31, 2026 16:57
@jlef-oss
Copy link
Copy Markdown

jlef-oss commented May 15, 2026

Thank you for your contribution @GaurikaSohnvi. This PR has been reviewed internally and merged after a rebase on current master branch (cd46f13 and cd415c5).

@jlef-oss jlef-oss closed this May 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants