On Tue, Sep 20, 2022 at 2:21 PM David Marchand <david.march...@redhat.com>
wrote:

> On Mon, Sep 12, 2022 at 4:47 PM Flavio Leitner <f...@redhat.com> wrote:
> > On Mon, Sep 12, 2022 at 5:52 AM David Marchand <
> david.march...@redhat.com> wrote:
> >> On Fri, Sep 9, 2022 at 7:58 PM Flavio Leitner <f...@redhat.com> wrote:
> >> >
> >> > Thanks for working on this patch!
> >> >
> >> > It seems possible to change this patch later when the other TSO series
> >> > gets merged to disable TSO only on the affected port.
> >> > Mike, any thoughts?
> >>
> >> It should be what this patch already does: disable TSO only for the
> >> affected port as I mentionned in the commitlog below.
> >> Can you clarify?
> >
> >
> > Oops, I should have added more context. The issue is that TSO is
> all-or-nothing
> > because there is no software fallback currently [see
> netdev_send_prepare_packet()].
> > So, if the problem happens and the reconnection with disabled TSO
> succeeds, all
> > TSO packets to that port will be dropped. The question is "should we
> allow the update
> > but run the risk of dropping packets or fail to update?"
> >
> > The software fallback  is provided in the posted TSO series. In that
> case, we can
> > have a per-port TSO knob because if it gets disabled, the packets will
> be segmented
> > in software and not dropped.
> > So, the patch makes sense with the posted TSO series applied, but I am
> not so sure
> > with the current code.
> >
> > What do you think?
>
> Ok, I get your point now.
>
> Btw, I still have some review to finish on the TSO series.
> For the time being, I will mark my patch as "Changes requested",
> rebase it and test on top of TSO series.
>


It sounds like a plan to me, thanks David.
fbl
_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to