Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Jul 2015 11:54:32 -0700
From:      Colin Percival <cperciva@freebsd.org>
To:        Mark Felder <feld@FreeBSD.org>, freebsd-xen@freebsd.org
Cc:        gnn@freebsd.org
Subject:   Re: Networking under Xen
Message-ID:  <55A55AE8.4090101@freebsd.org>
In-Reply-To: <1436890526.3162974.323521249.6B73E6E2@webmail.messagingengine.com>
References:  <4E7B7075-4E0D-4EA7-9F5D-6D252CFBD487@gmail.com> <1436890526.3162974.323521249.6B73E6E2@webmail.messagingengine.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 07/14/15 09:15, Mark Felder wrote:
> On Tue, Jul 14, 2015, at 07:36, Sydney Meyer wrote:
>> - Dropped/Stalled Connections with TCP Segmentation Offload and pf
>> enabled.
> 
> TSO is a known issue. I've been turning it off for years to get FreeBSD
> to play nice on Xen.

More precisely *pf* is a known issue.  It's inserting TCP checksums
into TSO packets.  I reported this a long time ago and I don't know
why pf still hasn't been fixed.

-- 
Colin Percival
Security Officer Emeritus, FreeBSD | The power to serve
Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?55A55AE8.4090101>