From owner-freebsd-net@FreeBSD.ORG Sat Jul 14 03:31:05 2007 Return-Path: X-Original-To: freebsd-net@FreeBSD.org Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id ED93916A405 for ; Sat, 14 Jul 2007 03:31:05 +0000 (UTC) (envelope-from karels@redrock.karels.net) Received: from redrock.karels.net (redrock.karels.net [206.196.45.2]) by mx1.freebsd.org (Postfix) with ESMTP id 9EA3213C478 for ; Sat, 14 Jul 2007 03:31:05 +0000 (UTC) (envelope-from karels@redrock.karels.net) Received: from redrock.karels.net (localhost.karels.net [127.0.0.1]) by redrock.karels.net (8.13.8/8.13.6) with ESMTP id l6E3RqWA007006; Fri, 13 Jul 2007 22:27:52 -0500 (CDT) (envelope-from karels@redrock.karels.net) Message-Id: <200707140327.l6E3RqWA007006@redrock.karels.net> To: "Bruce M. Simpson" From: Mike Karels In-reply-to: Your message of Sat, 14 Jul 2007 03:30:54 +0100. <4698355E.2030707@FreeBSD.org> Date: Fri, 13 Jul 2007 22:27:52 -0500 Sender: karels@karels.net Cc: Stephen.Clark@seclark.us, Sten Daniel Soersdal , Julian Elischer , Bill Moran , freebsd-net@FreeBSD.org Subject: Re: 6.2 mtu now limits size of incomming packet X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: karels@karels.net List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Jul 2007 03:31:06 -0000 > In -CURRENT my changes to the ethernet input path maintain the use of > ETHER_MAX_FRAME() however the check is folded under #ifdef DIAGNOSTIC. I > don't recall adding this conditional or touching it so it seems to be > something which was already thereo radded by someone else. It has been there at least since 6.0. The issue is that ETHER_MAX_FRAME is computed using ifp->if_mtu, as opposed to something like ETHER_MAX_LEN. This is under #ifdef DIAGNOSTIC in -current, not in -stable. > Could be pilot error; its use in -CURRENT seems to apply strictly to the > use of large-receive offload (LRO). LRO relaxes the requirement, otherwise LRO packets would never pass the check. Mike