From nobody Sat Aug 12 11:57:01 2023 X-Original-To: xen@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RNJzx5YJfz4mRlh for ; Sat, 12 Aug 2023 11:57:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RNJzx2LJkz4f8x for ; Sat, 12 Aug 2023 11:57:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1691841421; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Y0YgIAoSQMcEpAweBKAwbtKUt+VVSmPSTNdH6E80D1I=; b=ZJlGk++fakq6WQIDJectPnzUXq8LDwxie9VOO6lQWaG9vxPTzEbzM3BRZI6vw4x8nH0+mP //eaI1iikpv7NFMmPL3Ks3kLJmxLr6mnlxcTwyjcjIC9K4MbU6HaPFd6fegiqAqzk7R8Ao 5ERIN4mRKSt5fWQVtPUfkrtvFm5nCajxv38yVqlhS0AwcWy1jqfDHRIGV1PTnqO2El6DZm URAr7wfkjnJ1qky7dn4EOaIFSno3alMFzDOhm34XrHba0fGHsvjUD7e8rycLP++Pr6WdqH sn33q5W+dDnretvi92CuhSF4mOIW9BdRSPycSdInyCcPL1U2CgHQHbKW1KbbHw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1691841421; a=rsa-sha256; cv=none; b=grJI95d9SRLSNfsr3Vntyn1kPZ5Ygo7qZy+Rtc2lmio1XUhn6ycYeouraTnqxWfOaTOuA7 bureCUfcFxSsfTXXVuzH21aScw9vJm6sQlGVDhRbh6jV+s4HVg6PeZyG5yA09nAIyOMtVh x6JibXZxnaxlc4GZ3E/8Mpx2Gs0fm5U8Ght1gNppui/JubaHr2GjRh5CF7utslZ8F76Wzu PLYlNNviSPfssYicr7rkz/QF0LFss/Lq9ScCmDEiuAWmPUF31gsdTg2JCdotAgjJVl898j GQEo+tEsCH57xrGACHw0yCELENUka2o/W5mbmJjG0S09Mzm27T539iklXAuU4Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RNJzx1PCzz53f for ; Sat, 12 Aug 2023 11:57:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 37CBv12O079658 for ; Sat, 12 Aug 2023 11:57:01 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 37CBv1vR079657 for xen@FreeBSD.org; Sat, 12 Aug 2023 11:57:01 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: xen@FreeBSD.org Subject: [Bug 273046] xn: xen netfront does LRO even if packet forwarding is enabled Date: Sat, 12 Aug 2023 11:57:01 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dfr@rabson.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: xen@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-xen List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-xen@freebsd.org X-BeenThere: freebsd-xen@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273046 --- Comment #1 from dfr@rabson.org --- I tried to fix this today by adding logic to stop requesting LRO from the backend when forwarding is enabled. Unfortunately, the code which sets up features for the backend runs long before the value of net.inet.ip.forwardi= ng is set (via sysctl.conf in my test). If LRO is disabled manually, the driver re-initialises the backend state. There seems to be no way for the driver to detect changes to the forwarding state. The linux kernel seems to actively disable LRO on all devices when forwarding is enabled. Also, we have confirmed that a similar issue of slow network throughput for= vmm jails affects the vtnet driver for VMs running as guests on Proxmox hosts w= hich can also be mitigated by disabling LRO. Perhaps a better assignee for this should be freebsd-net? --=20 You are receiving this mail because: You are the assignee for the bug.=