Environment is 2.6.16.9 with e1000 NICs.

Paul and I (as part of the Quagga project) are working on a user mode 
method for doing BGP MD5 checksums using ip_queue.  All is working except 
when TSO is enabled I am seeing some problems.

It appears that when TSO is enabled, ip_queue can be used to manipulate 
packets that have a size higher than the particular MSS (and MTU) for a 
TCP stream.

This results in a larger than MSS packet going out to the NIC with a TCP 
MD5 checksum, getting split by the NIC to match the MTU of the LAN, and 
then being received as multiple packets with incorrect MD5 checksums.

Then a retransmit with a smaller/correct MSS happens and the packets are 
received with valid MD5 checksums.

So in effect, the data eventually makes it across the link, but it is sent 
twice, once with invalid checksums and once with valid checksums, and 
throughput is slow.

When TSO is disabled, things happen as they should.

Does this sound like a bug or by design?

Does it make sense that ip_queue mangled packets be subjected to TSO, 
given that the TCP header can be messed with by the user mode code?

Chris
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to