Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Oct 2015 15:33:21 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-xen@FreeBSD.org
Subject:   [Bug 154428] [xen] xn0 network interface and PF - Massive performance drop
Message-ID:  <bug-154428-23905-JvmOs9ckwP@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-154428-23905@https.bugs.freebsd.org/bugzilla/>
References:  <bug-154428-23905@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=154428

--- Comment #21 from commit-hook@freebsd.org ---
A commit references this bug:

Author: kp
Date: Wed Oct 21 15:32:21 UTC 2015
New revision: 289703
URL: https://svnweb.freebsd.org/changeset/base/289703

Log:
  MFC r289316:

  pf: Fix TSO issues

  In certain configurations (mostly but not exclusively as a VM on Xen) pf
  produced packets with an invalid TCP checksum.

  The problem was that pf could only handle packets with a full checksum. The
  FreeBSD IP stack produces TCP packets with a pseudo-header checksum (only
  addresses, length and protocol).
  Certain network interfaces expect to see the pseudo-header checksum, so they
  end up producing packets with invalid checksums.

  To fix this stop calculating the full checksum and teach pf to only update
TCP
  checksums if TSO is disabled or the change affects the pseudo-header
checksum.

  PR:             154428, 193579, 198868
  Relnotes:       yes
  Sponsored by:   RootBSD

Changes:
_U  stable/10/
  stable/10/sys/net/pfvar.h
  stable/10/sys/netpfil/pf/pf.c
  stable/10/sys/netpfil/pf/pf_ioctl.c
  stable/10/sys/netpfil/pf/pf_norm.c

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-154428-23905-JvmOs9ckwP>