Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Sep 2006 12:53:01 +0000 (UTC)
From:      Andre Oppermann <andre@FreeBSD.org>
To:        src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/sys/netinet tcp_output.c
Message-ID:  <200609071253.k87Cr1fa005248@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
andre       2006-09-07 12:53:01 UTC

  FreeBSD src repository

  Modified files:
    sys/netinet          tcp_output.c 
  Log:
  Second step of TSO (TCP segmentation offload) support in our network stack.
  
  TSO is only used if we are in a pure bulk sending state.  The presence of
  TCP-MD5, SACK retransmits, SACK advertizements, IPSEC and IP options prevent
  using TSO.  With TSO the TCP header is the same (except for the sequence number)
  for all generated packets.  This makes it impossible to transmit any options
  which vary per generated segment or packet.
  
  The length of TSO bursts is limited to TCP_MAXWIN.
  
  The sysctl net.inet.tcp.tso globally controls the use of TSO and is enabled.
  
  TSO enabled sends originating from tcp_output() have the CSUM_TCP and CSUM_TSO
  flags set, m_pkthdr.csum_data filled with the header pseudo-checksum and
  m_pkthdr.tso_segsz set to the segment size (net payload size, not counting
  IP+TCP headers or TCP options).
  
  IPv6 currently lacks a pseudo-header checksum function and thus doesn't support
  TSO yet.
  
  Tested by:      Jack Vogel <jfvogel-at-gmail.com>
  Sponsored by:   TCP/IP Optimization Fundraise 2005
  
  Revision  Changes    Path
  1.116     +73 -15    src/sys/netinet/tcp_output.c



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200609071253.k87Cr1fa005248>