Date: Tue, 14 Jul 2015 11:54:32 -0700 From: Colin Percival <cperciva@freebsd.org> To: Mark Felder <feld@FreeBSD.org>, freebsd-xen@freebsd.org Cc: gnn@freebsd.org Subject: Re: Networking under Xen Message-ID: <55A55AE8.4090101@freebsd.org> In-Reply-To: <1436890526.3162974.323521249.6B73E6E2@webmail.messagingengine.com> References: <4E7B7075-4E0D-4EA7-9F5D-6D252CFBD487@gmail.com> <1436890526.3162974.323521249.6B73E6E2@webmail.messagingengine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 07/14/15 09:15, Mark Felder wrote: > On Tue, Jul 14, 2015, at 07:36, Sydney Meyer wrote: >> - Dropped/Stalled Connections with TCP Segmentation Offload and pf >> enabled. > > TSO is a known issue. I've been turning it off for years to get FreeBSD > to play nice on Xen. More precisely *pf* is a known issue. It's inserting TCP checksums into TSO packets. I reported this a long time ago and I don't know why pf still hasn't been fixed. -- Colin Percival Security Officer Emeritus, FreeBSD | The power to serve Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?55A55AE8.4090101>