Bug 65

Summary: passt/pasta MTU occasionally still requires IP fragmentation
Product: passt Reporter: David Gibson <dgibson>
Component: IPv4Assignee: David Gibson <dgibson>
Status: CONFIRMED ---    
Severity: normal    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Bug Depends on: 66    
Bug Blocks: 55    

Description David Gibson 2023-07-04 03:42:47 UTC
The guest facing link of passt/pasta has an MTU of 65520, just slightly smaller than the maximum allowed IPv4 packet size of 65535 bytes.  This means that if the guest tries to send very large (but legal) ICMP or UDP packets, they will be fragmented, and those packets will then not be propagated properly by passt because it doesn't handle IP defragmentation.

It should be possible to increase the paast/pasta MTU to 65535.  However, this will require increasing the size of a number of internal buffers over another page boundary.  We want to be careful this doesn't have too much of a performance impact.
Comment 1 David Gibson 2023-07-04 06:04:40 UTC
Drat.  Unfortunately, it isn't going to be possible to do this, at least for pasta:  the kernel appears to limit the mtu for tap devices to 65521 or less bytes.