From nobody Thu Aug 10 14:57:38 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RM95G66FNz4mNlq for ; Thu, 10 Aug 2023 14:57:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RM95G1Yhwz3dQ8 for ; Thu, 10 Aug 2023 14:57:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1691679458; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=RnOZYhdse9wzuW9tYLMkzTWwot7K9M/dfFvh+GZcuUM=; b=oVLd8b/9TfiKYFahzRbFG53ktZqFKCN1VPKi5ToYzmN2H2NWQYhc4BdGNLbJZX8cA+OLZ6 oMMTDUBWOOxLPCyLj+XZgvwN3H32DCf264Y0Oxx27pfOvs2qEYN4e92ENGgpWW5Ni9Nh/+ 9Mq4E340ixBuf3Wn8zKBQWpvm1OqggPz0qIJ5kBLPgfbAU2XrCUO5KnW7jl8daNMOOvwcZ tVeAgBpr/l5Fuqh8Xg21SJZO6JLSooI/pJZXaPfAwMvpppp99GuvCoYsDeynmZ8ijbwkAA 2vp+/FfcDMQxhLhVeOlQUdanGXUjsLeD23cQ14hMg/S2hMj+9jShwELDLyDekA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1691679458; a=rsa-sha256; cv=none; b=tuHmIN7tjZ/k6aMXO9yp1j2J0ZO8ypJr/iEcE3f+Xvei3/WXjMCU4oILwo8kUimhj9tLA2 mYLEPy5Tog3fyGR1ET1ljBJJ1wYDJf/6lO+6tCVCTm+ZpUrLfwqOyvFKD0/5HT3O6q8g8O BNOmuL9txCqUewObu1K5vo096v3jkQKn4230TjhlRtXLG5DLYPiE0N1q5fNpsLwMliyr6x lKW56UEFawWEuhticaMUEdYJblde9Kxr3u36ujnDWcaSWY5G/wXGvISISD0ewhFkItw91O vIwQfV2B5dfL+oKtcZT2yOIUo9EvnlHtydSD/4zlWoUPfQ6cVlTXs4pf2D02hQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RM95G0f96z11lk for ; Thu, 10 Aug 2023 14:57:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 37AEvciI066792 for ; Thu, 10 Aug 2023 14:57:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 37AEvcHT066791 for bugs@FreeBSD.org; Thu, 10 Aug 2023 14:57:38 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 273046] xn0: xen netfront does LRO even if packet forwarding is enabled Date: Thu, 10 Aug 2023 14:57:38 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dfr@rabson.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273046 Bug ID: 273046 Summary: xn0: xen netfront does LRO even if packet forwarding is enabled Product: Base System Version: 13.2-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: dfr@rabson.org On a test VM running on an XCP-NG host, I noticed that large-receive was happening on the VM's interface for traffic that was intended to be routed = to a vnet-enabled jail. The resulting large coalesced packets were too large to = be routed to the jail, causing retransmits and very slow performance inside the vnet jail. In my setup which uses podman to manage setting up network bridging for the vnet jail, net.inet.ip.forwarding is set quite late and after network interfaces are configured so I tried adding net.inet.ip.forwarding=3D1 to sysctl.conf to see if that fixed the problem but the netfront driver was st= ill coalescing segments on receive - this is clearly visible in packet captures= as oversized packets. My impression from reading iflib.c was that LRO should not happen if packet forwarding is enabled but netfront is missing this logic. Based on user reports, this problem may also be present in the virtio vtnet driver - one user reported slow podman network performance for a VM running= on a Proxmox host. --=20 You are receiving this mail because: You are the assignee for the bug.=