[CRIU] TCP_REPAIR MSS issue
Eggert, Lars
lars at netapp.com
Tue Jun 14 04:40:01 PDT 2016
On 2016-06-14, at 13:28, Pavel Emelyanov <xemul at virtuozzo.com> wrote:
> Andrey (in Cc) has played with TCP_REPAIR recently, I guess he can know something.
Thanks for CC'ing him. We looked a little bit more into this:
When TCP_REPAIR is on, tcp_connect() directly calls tcp_finish_connect() before returning, passing NULL for skb, which causes sk_rx_dst_set() to be bypassed. Later, when TCP_REPAIR is being turned off, do_tcp_setsockopt() just does tcp_send_window_probe(), but apparently all the "dst" stuff is being bypassed then also, so the mss remains at TCP_MSS_DEFAULT.
Lars
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.openvz.org/pipermail/criu/attachments/20160614/efe86e4c/attachment.sig>
More information about the CRIU
mailing list