Date: Tue, 31 Oct 2017 12:43:02 +0000 From: Rick Macklem <rmacklem@uoguelph.ca> To: Cy Schubert <Cy.Schubert@komquats.com> Cc: Yuri Pankov <yuripv@gmx.com>, freebsd-current <freebsd-current@freebsd.org> Subject: Re: NFSv3 issues with latest -current Message-ID: <YTOPR0101MB21726BD554458A4C2D190A03DD5E0@YTOPR0101MB2172.CANPRD01.PROD.OUTLOOK.COM> In-Reply-To: <201710291525.v9TFPXmQ052790@slippy.cwsent.com> References: Message from Rick Macklem <rmacklem@uoguelph.ca> of "Sun, 29 Oct 2017 13:13:31 -0000." <YTOPR0101MB2172093DDDCB04687D83DA49DD580@YTOPR0101MB2172.CANPRD01.PROD.OUTLOOK.COM>, <201710291525.v9TFPXmQ052790@slippy.cwsent.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Cy Schubert wrote:
[stuff snipped]
>The sysctl is net.inet.tcp.tso. You can also disable tso through ifconfig
>for an interface.
>
For testing this case, I'd recommend using the sysctl. Since the net device
driver is often the culprit, that device driver might not handle the "ifcon=
fig"
correctly either.
Btw, NFS often causes this because...
- Typically TSO is limited to a 64K packet (including TCP/IP and MAC header=
s).
- When NFS does reading/writing, it will do 64K + NFS, TCP/IP and MAC heade=
rs
for an RPC (or a multiple of 64K like 128K).
--> This results in tcp_output() generating a 64K TSO segment followed by a
small TCP segment (since another RPC message doesn;t usually end up
queued quickly enough to fill in the rest of the second TCP segment).
- Also, at the end of file, you can get an RPC which is just under 64K incl=
uding
NFS and TCP/IP headers. (The drivers often broke when adding the MAC
header bumped this case to > 64K.)
Thanks go to Yuri for diagnosing this, rick
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?YTOPR0101MB21726BD554458A4C2D190A03DD5E0>
