On 7/7/23 14:22, David Marchand wrote:
> On Fri, Jul 7, 2023 at 1:50 PM Ilya Maximets <i.maxim...@ovn.org> wrote:
>>> @@ -4268,7 +4295,9 @@ new_device(int vid)
>>>                      dev->hw_ol_features |= NETDEV_TX_SCTP_CKSUM_OFFLOAD;
>>>                  }
>>>
>>> -                if (userspace_tso_enabled()) {
>>> +                if (userspace_tso_enabled()
>>> +                    && dev->virtio_features_state & OVS_VIRTIO_F_CLEAN) {
>>
>> If this needed?  There is no harm in using these features on Tx if 
>> negotiated.
> 
> I did not test without it.
> 
> Without this limitation, this means that the host/OVS can make tso
> offloading requests to the guest, but the guest can't make them to the
> host.
> Iow, on the host side, TSO would be advertised to OVS layers, and
> would be displayed in the port status field.
> On the guest side, TSO would be forbidden.
> I find this asymmetry confusing.
> 
> If you don't have access to the guest (which happens in deployments
> with VNF as black boxes), the only chance to catch that the workaround
> is in effect is to look at the "userspace-tso" field that gets added
> by this patch.
> But to know about this field, you would have to get a hint something
> is wrong on the TSO side.
> 
> With announcing that TSO is off for both sides of this vhost port, I
> think we have more chances a user would search in OVS documentation
> and find out about the "userspace-tso" status field.

OK.  Makes sense.

_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to