Hi,
First of all I would like to thank you all for developing an awesome packet
capturing framework.
I have been using it recently and find it very very fast and efficient.
However off late I am trying to capture Jumbo packets on the network for
the following scenario's but that doesn't seem to b
Hi,
I'll follow up more tomorrow, as it's late and I don't have time for
detail.
The basic TSO patch didn't work, as packets were were still going over
65535 by a fair amount. I thought I wrote that earlier, but I am dumping a
lot of info into a few threads, so I apologize if I'm not as concise
Christopher Forgeron wrote:
>
>
>
>
>
>
>
>
> Update:
>
> For giggles, I set IP_MAXPACKET = 32768.
>
Well, I'm pretty sure you don't want to do that, except for an experiment.
You can just set if_hw_tsomax to whatever you want to try, at the place
my ixgbe.patch put it (just before the ca
Christopher Forgeron wrote:
> Hi Rick, very helpful as always.
>
>
> On Sat, Mar 22, 2014 at 6:18 PM, Rick Macklem
> wrote:
>
> > Christopher Forgeron wrote:
> >
> > Well, you could try making if_hw_tsomax somewhat smaller. (I can't
> > see
> > how the packet including ethernet header would be
Christopher Forgeron wrote:
>
>
>
>
>
>
> On Sat, Mar 22, 2014 at 6:41 PM, Rick Macklem < rmack...@uoguelph.ca
> > wrote:
>
>
>
> Christopher Forgeron wrote:
> > #if defined(INET) || defined(INET6)
> > /* Initialize to max value. */
> > if (ifp->if_hw_tsomax == 0)
> > ifp->if_hw_tsomax = I
Update:
For giggles, I set IP_MAXPACKET = 32768.
Over a hour of runtime, and no issues. This is better than with the TSO
patch and the 9.2 ixgbe, as that was just a drastic reduction in errors.
Still have an 'angry' netstat -m on boot, and I'm still incrementing
denied netbuf calls, so someth
On 3/23/2014 10:57 AM, Karl Denninger wrote:
On 3/23/2014 12:01 AM, Karl Denninger wrote:
On 3/22/2014 5:44 PM, Karl Denninger wrote:
FreeBSD-STABLE 10 r263037M
It *looks* like anything coming in through IPSEC and being decoded
in there never goes through the ipfw chain at all.
Thi
On 3/23/2014 12:01 AM, Karl Denninger wrote:
On 3/22/2014 5:44 PM, Karl Denninger wrote:
FreeBSD-STABLE 10 r263037M
It *looks* like anything coming in through IPSEC and being decoded in
there never goes through the ipfw chain at all.
This may be addressed by PR185876 checking.
On Sat, Mar 22, 2014 at 11:58 PM, Rick Macklem wrote:
> Christopher Forgeron wrote:
> >
>
> > Also should we not also subtract ETHER_VLAN_ENCAP_LEN from tsomax to
> > make sure VLANs fit?
> >
> I took a look and, yes, this does seem to be needed. It will only be
> needed for the case where a vlan
On Sat, Mar 22, 2014 at 6:41 PM, Rick Macklem wrote:
> Christopher Forgeron wrote:
> > #if defined(INET) || defined(INET6)
> > /* Initialize to max value. */
> > if (ifp->if_hw_tsomax == 0)
> > ifp->if_hw_tsomax = IP_MAXPACKET;
> > KASSERT(ifp->if_hw_tsomax <= IP_MAXPACKET &&
> > ifp->if_hw_tsoma
Hi Rick, very helpful as always.
On Sat, Mar 22, 2014 at 6:18 PM, Rick Macklem wrote:
> Christopher Forgeron wrote:
>
> Well, you could try making if_hw_tsomax somewhat smaller. (I can't see
> how the packet including ethernet header would be more than 64K with the
> patch, but?? For example, t
11 matches
Mail list logo