On Fri, Aug 01, 2014 at 10:36:17AM +0300, Julian Anastasov wrote:
> The tunneling method should properly use tunnel encapsulation.
> Fixes problem with CHECKSUM_PARTIAL packets when TCP/UDP csum
> offload is supported.
>
> Thanks to Alex Gartrell for reporting the problem, providing
> solution and for all suggestions.
With this patch is Alex's patch "[PATCH ipvs] ipvs: invoke
skb_checksum_help prior to encapsulation in tunnel xmit " also needed?
>
> Reported-by: Alex Gartrell <agartrell@xxxxxx>
> Signed-off-by: Julian Anastasov <ja@xxxxxx>
> Signed-off-by: Alex Gartrell <agartrell@xxxxxx>
> ---
> net/netfilter/ipvs/ip_vs_xmit.c | 20 ++++++++++++++++----
> 1 file changed, 16 insertions(+), 4 deletions(-)
>
> I'm not sure if TUN mode worked with HW csum enabled, one with
> such hardware can check if the breakage happens after some kernel
> version.
>
> Here is what I found for skb->encapsulation and support in drivers
>
> - GRO started to use CHECKSUM_PARTIAL for TCP long time ago
>
> - the skb->encapsulation support is added in 3.8
>
> - BNX2 started to use inner header depending on skb->encapsulation
> in 3.10
>
> - i40e appears in 3.12 and started to use inner header depending on
> skb->encapsulation
>
> - iptunnel_handle_offloads() is added in 3.13. This patch
> uses this function.
>
> - mlx4 started to use inner header depending on skb->encapsulation
> in 3.14
>
> - benet started to use inner header depending on skb->encapsulation
> in 3.14
>
> As result, I'm not sure that all devices support tunneled TCP/UDP,
> I see some drivers supported csum offload (CHECKSUM_PARTIAL) only
> if not tunneled. In the future if problem happens with csum
> offload we should check if the driver has support for tunneled
> TCP/UDP. Otherwise, user can disable the csum offload for device
> or as alternative we can add sysctl var in IPVS to call
> iptunnel_handle_offloads with csum_help = true.
>
> For now I don't know which stable kernels wihout
> iptunnel_handle_offloads() function may need some alternative fix.
>
> diff --git a/net/netfilter/ipvs/ip_vs_xmit.c b/net/netfilter/ipvs/ip_vs_xmit.c
> index 73ba1cc..5371654 100644
> --- a/net/netfilter/ipvs/ip_vs_xmit.c
> +++ b/net/netfilter/ipvs/ip_vs_xmit.c
> @@ -38,6 +38,7 @@
> #include <net/route.h> /* for ip_route_output */
> #include <net/ipv6.h>
> #include <net/ip6_route.h>
> +#include <net/ip_tunnels.h>
> #include <net/addrconf.h>
> #include <linux/icmpv6.h>
> #include <linux/netfilter.h>
> @@ -862,11 +863,15 @@ ip_vs_tunnel_xmit(struct sk_buff *skb, struct
> ip_vs_conn *cp,
> old_iph = ip_hdr(skb);
> }
>
> - skb->transport_header = skb->network_header;
> -
> /* fix old IP header checksum */
> ip_send_check(old_iph);
>
> + skb = iptunnel_handle_offloads(skb, false, SKB_GSO_IPIP);
> + if (IS_ERR(skb))
> + goto tx_error;
> +
> + skb->transport_header = skb->network_header;
> +
> skb_push(skb, sizeof(struct iphdr));
> skb_reset_network_header(skb);
> memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
> @@ -900,7 +905,8 @@ ip_vs_tunnel_xmit(struct sk_buff *skb, struct ip_vs_conn
> *cp,
> return NF_STOLEN;
>
> tx_error:
> - kfree_skb(skb);
> + if (!IS_ERR(skb))
> + kfree_skb(skb);
> rcu_read_unlock();
> LeaveFunction(10);
> return NF_STOLEN;
> @@ -953,6 +959,11 @@ ip_vs_tunnel_xmit_v6(struct sk_buff *skb, struct
> ip_vs_conn *cp,
> old_iph = ipv6_hdr(skb);
> }
>
> + /* GSO: we need to provide proper SKB_GSO_ value for IPv6 */
> + skb = iptunnel_handle_offloads(skb, false, 0); /* SKB_GSO_SIT/IPV6 */
> + if (IS_ERR(skb))
> + goto tx_error;
> +
> skb->transport_header = skb->network_header;
>
> skb_push(skb, sizeof(struct ipv6hdr));
> @@ -988,7 +999,8 @@ ip_vs_tunnel_xmit_v6(struct sk_buff *skb, struct
> ip_vs_conn *cp,
> return NF_STOLEN;
>
> tx_error:
> - kfree_skb(skb);
> + if (!IS_ERR(skb))
> + kfree_skb(skb);
> rcu_read_unlock();
> LeaveFunction(10);
> return NF_STOLEN;
> --
> 1.9.0
>
--
To unsubscribe from this list: send the line "unsubscribe lvs-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
|