From: Chris Caputo <[EMAIL PROTECTED]>
Date: Wed, 10 May 2006 18:44:30 +0000 (GMT)

> Does this sound like a bug or by design?
> 
> Does it make sense that ip_queue mangled packets be subjected to TSO, 
> given that the TCP header can be messed with by the user mode code?

This is by design.  Netfilter looks at full TSO frames, but the
TSO hardware in the cards do not interpret the TCP options in any
way whatsoever when splitting the TSO packet up into MSS frames,
they just copy the options as-is into each sub-frame.

Once you add MD5 checksums to the TCP packet, TSO can no longer be
used on that path, so you'll have to disable TSO either in the route
or via some other means.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to