diff --git a/overlay/tio/tio_gso_linux.go b/overlay/tio/tio_gso_linux.go index 3bcf725d..583bad35 100644 --- a/overlay/tio/tio_gso_linux.go +++ b/overlay/tio/tio_gso_linux.go @@ -307,9 +307,8 @@ func (r *Offload) decodeRead(pktLen int) error { // GSO superpacket: validate, fix the kernel-supplied HdrLen on the // FORWARD path (CorrectHdrLen), pick the L4 protocol, and attach - // the metadata. The bytes stay in rxBuf untouched — segmentation - // happens in SegmentSuperpacket against a per-routine MTU scratch - // at encrypt time. + // the metadata. The bytes stay in rxBuf untouched, segmentation + // happens in SegmentSuperpacket at encrypt time. if err := virtio.CheckValid(body, hdr); err != nil { return err } @@ -347,8 +346,6 @@ func (r *Offload) writeWithScratch(buf []byte, iovs *[2]unix.Iovec) (int, error) if len(buf) == 0 { return 0, nil } - // Point the payload iovec at the caller's buffer. iovs[0] is pre-wired - // to validVnetHdr during Offload construction so we don't rebuild it here. iovs[1].Base = &buf[0] iovs[1].SetLen(len(buf)) return r.rawWrite(unsafe.Slice(&iovs[0], len(iovs)))