Hi, Whenever there is a output device change for locally generated traffic due to, DNAT/mark based routing in OUTPUT nat/mangle MASQURADE in POSTROUTING nat NETIF_F_TSO flag is not unset from sk->sk_route_caps. So, there are chances that, output device returned at TCP/IP layer routing supports NETIF_F_TSO and changed output device due to DNAT/mark based routing/MASQUERADE doesn’t support NETIF_F_TSO. In some of my experiments for some interfaces, I got “NETDEV_WATCHDOG: eth1 transmit timeout” messages and for some others packets doesn’t go out of the box. Currently I have disabled TSO on all interfaces through ethtool. Is there any other way to solve this issue (something like resetting the flag in route_me_harder() if device doesn’t support TSO ) ? Rgds, Nishit Shah. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html