netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Lindahl <greg@blekko.com>
To: "Ilpo Järvinen" <ilpo.jarvinen@helsinki.fi>
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
	Netdev <netdev@vger.kernel.org>
Subject: Re: Treason uncloaked / Broken peer again
Date: Fri, 27 Feb 2009 13:22:34 -0800	[thread overview]
Message-ID: <20090227212234.GB25573@bx9.net> (raw)
In-Reply-To: <Pine.LNX.4.64.0902261105030.31742@wrl-59.cs.helsinki.fi>

On Thu, Feb 26, 2009 at 11:30:58AM +0200, Ilpo Järvinen wrote:

> Right, it's rather crude to have buggy kernel which sends past the 
> receiver's advertized window, and then when it cannot cope the results of 
> its own bug (and prints that message), put a blame on others who behave in 
> a compliant way.

Well, perhaps we shouldn't have the message be "Broken peer" when the
problem is often on the node printing the message? Maybe "Something's
broken, might be me"?

One of the people who complained to me is running 2.4.26, so the bug
in TSO that you fixed in 2.6.25 is not the last bug at issue. I was
also able to turn off TSO on all my 2.6.18+redhat systems and quickly
got Treason, so this bug is not the only one. But still, I can't cause
the bug often enough to get a tcpdump of it in action.

-- greg

Fixed in 2.6.25:

commit 5ea3a7480606cef06321cd85bc5113c72d2c7c68
Author: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Date:   Tue Mar 11 17:55:27 2008 -0700

    [TCP]: Prevent sending past receiver window with TSO (at last skb)

    With TSO it was possible to send past the receiver window when the skb
    to be sent was the last in the write queue while the receiver window
    is the limiting factor. One can notice that there's a loophole in the
    tcp_mss_split_point that lacked a receiver window check for the
    tcp_write_queue_tail() if also cwnd was smaller than the full skb.

    Noticed by Thomas Gleixner <tglx@linutronix.de> in form of "Treason
    uncloaked! Peer ... shrinks window .... Repaired."  messages (the peer
    didn't actually shrink its window as the message suggests, we had just
    sent something past it without a permission to do so).


  reply	other threads:[~2009-02-27 21:22 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-02-21 19:58 Treason uncloaked / Broken peer again Greg Lindahl
2009-02-21 21:34 ` Ilpo Järvinen
2009-02-21 21:50   ` Greg Lindahl
2009-02-26  6:30   ` Greg Lindahl
2009-02-26  8:58     ` Herbert Xu
2009-02-26  9:30       ` Ilpo Järvinen
2009-02-27 21:22         ` Greg Lindahl [this message]
2009-02-27 21:27           ` Greg Lindahl
2009-02-28  0:31           ` David Miller
2009-03-10 19:37             ` Greg Lindahl

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20090227212234.GB25573@bx9.net \
    --to=greg@blekko.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=ilpo.jarvinen@helsinki.fi \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).