Thomas Spatzier <thomas.spatzier@de.ibm.com> wrote: > > In the current version of tcp_sendmsg it is never possible to exploit > TSO because in function select_size (net/ipv4/tcp.c) always the > mss_cache_std value is selected. This is bogus. The subsequent if clause is what allows the size to exceed mss_cache_std. TSO without NETIF_F_SG is not worth it. -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt - : send the line "unsubscribe linux-net" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html