On Fri, Jul 7, 2023 at 1:50 PM Ilya Maximets <i.maxim...@ovn.org> wrote:
> > @@ -4268,7 +4295,9 @@ new_device(int vid)
> >                      dev->hw_ol_features |= NETDEV_TX_SCTP_CKSUM_OFFLOAD;
> >                  }
> >
> > -                if (userspace_tso_enabled()) {
> > +                if (userspace_tso_enabled()
> > +                    && dev->virtio_features_state & OVS_VIRTIO_F_CLEAN) {
>
> If this needed?  There is no harm in using these features on Tx if negotiated.

I did not test without it.

Without this limitation, this means that the host/OVS can make tso
offloading requests to the guest, but the guest can't make them to the
host.
Iow, on the host side, TSO would be advertised to OVS layers, and
would be displayed in the port status field.
On the guest side, TSO would be forbidden.
I find this asymmetry confusing.

If you don't have access to the guest (which happens in deployments
with VNF as black boxes), the only chance to catch that the workaround
is in effect is to look at the "userspace-tso" field that gets added
by this patch.
But to know about this field, you would have to get a hint something
is wrong on the TSO side.

With announcing that TSO is off for both sides of this vhost port, I
think we have more chances a user would search in OVS documentation
and find out about the "userspace-tso" status field.


-- 
David Marchand

_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to