Re: [PATCH] select appropriate skb size in tcp_sendmsg when TSO is used

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 






Herbert Xu <herbert@gondor.apana.org.au> wrote on 20.10.2004 12:52:55:
> This is bogus.  The subsequent if clause is what allows the size to
> exceed mss_cache_std.
>
> TSO without NETIF_F_SG is not worth it.

Ok, but when exactly would that if statement take effect?
When I send very large tcp packets I never get large skbs
given into my driver from the stack.
The internal if statement if (tmp >= pgbreak ...
never becomes true since the mss_cache_std value is always
set to MTU size - header length, in my case 1492 - 52 = 1440.

So, how can I get the stack to exploit TSO?

Regards,
Thomas.

-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux