[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20110210.145555.39165146.davem@davemloft.net>
Date: Thu, 10 Feb 2011 14:55:55 -0800 (PST)
From: David Miller <davem@...emloft.net>
To: herbert@...dor.apana.org.au
CC: netdev@...r.kernel.org, netfilter-devel@...r.kernel.org
Subject: GRO/GSO hiding PMTU?
I was trying to setup something simple to trigger PMTU to test my
PMTU patches, and the simplest (I thought) would be to simply down
the mtu of the internet facing side of my simple NAT box.
All I did was "ip link set eth0 mtu 1400", and try to send large
TCP sequences from inside.
To my surprise I saw no ICMP messages, on input to the NAT machine the
TCP packets had length 1448 and on output they had length 1348.
This NAT box has TG3 on both input and output, so supports GRO and
TSO. The kernel is 2.6.34-rc7 vintage :-)
I suspect that the packet arrives on eth1, accumulates into GRO, and
thus marked as GSO as well, then GSO/TSO on output to eth0 is
re-segmenting things transparently, and we're not getting the ICMP
frag-needed message and the packet drop because of the skb_is_gso()
check in ip_forward().
if (unlikely(skb->len > dst_mtu(&rt->dst) && !skb_is_gso(skb) &&
(ip_hdr(skb)->frag_off & htons(IP_DF))) && !skb->local_df) {
IP_INC_STATS(dev_net(rt->dst.dev), IPSTATS_MIB_FRAGFAILS);
icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED,
htonl(dst_mtu(&rt->dst)));
goto drop;
}
So if that's what is happening, that's cute, but I think we need to
fix this :-)
Perhaps the check in ip_forward() should instead validate the gso_size
in the skb_is_gso() case?
That'd be a little tricky since gso_size is an MSS value whereas what
we're checking against (skb->len) is the full packet size, headers and
all.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists