From patchwork Wed Nov 25 04:01:20 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: wenxu X-Patchwork-Id: 1405848 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=ucloud.cn Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4CgnJg26sXz9sSf for ; Wed, 25 Nov 2020 15:01:55 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727824AbgKYEBa (ORCPT ); Tue, 24 Nov 2020 23:01:30 -0500 Received: from m9785.mail.qiye.163.com ([220.181.97.85]:28409 "EHLO m9785.mail.qiye.163.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727663AbgKYEB2 (ORCPT ); Tue, 24 Nov 2020 23:01:28 -0500 Received: from localhost.localdomain (unknown [123.59.132.129]) by m9785.mail.qiye.163.com (Hmail) with ESMTPA id B8A5E5C1B1F; Wed, 25 Nov 2020 12:01:23 +0800 (CST) From: wenxu@ucloud.cn To: kuba@kernel.org, jhs@mojatatu.com Cc: netdev@vger.kernel.org, marcelo.leitner@gmail.com, vladbu@nvidia.com, xiyou.wangcong@gmail.com Subject: [PATCH v4 net-next 0/3] net/sched: fix over mtu packet of defrag in Date: Wed, 25 Nov 2020 12:01:20 +0800 Message-Id: <1606276883-6825-1-git-send-email-wenxu@ucloud.cn> X-Mailer: git-send-email 1.8.3.1 X-HM-Spam-Status: e1kfGhgUHx5ZQUtXWQgYFAkeWUFZS1VLWVdZKFlBSUI3V1ktWUFJV1kPCR oVCBIfWUFZSEsZTR4eHR5OHk9IVkpNS01JTE1DQ0hDT05VGRETFhoSFyQUDg9ZV1kWGg8SFR0UWU FZT0tIVUpKS0hKTFVLWQY+ X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6Oio6ERw6Vj04FDFMTzg4TUJK SghPCS5VSlVKTUtNSUxNQ0NPS0pKVTMWGhIXVQweFQMOOw4YFxQOH1UYFUVZV1kSC1lBWUpJSFVO QlVKSElVSklCWVdZCAFZQUpCSU03Bg++ X-HM-Tid: 0a75fd9025722087kuqyb8a5e5c1b1f Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org From: wenxu Currently kernel tc subsystem can do conntrack in act_ct. But when several fragment packets go through the act_ct, function tcf_ct_handle_fragments will defrag the packets to a big one. But the last action will redirect mirred to a device which maybe lead the reassembly big packet over the mtu of target device. The first patch fix miss init the qdisc_skb_cb->mru The send one refactor the hanle of xmit in act_mirred and prepare for the third one The last one add implict packet fragment support to fix the over mtu for defrag in act_ct. wenxu (3): net/sched: fix miss init the mru in qdisc_skb_cb net/sched: act_mirred: refactor the handle of xmit net/sched: sch_frag: add generic packet fragment support. include/net/act_api.h | 6 ++ include/net/sch_generic.h | 5 +- net/core/dev.c | 2 + net/sched/Makefile | 1 + net/sched/act_api.c | 16 +++++ net/sched/act_ct.c | 3 + net/sched/act_mirred.c | 21 +++++-- net/sched/sch_frag.c | 150 ++++++++++++++++++++++++++++++++++++++++++++++ 8 files changed, 194 insertions(+), 10 deletions(-) create mode 100644 net/sched/sch_frag.c