Re: [PATCH rdma-next 2/3] IB/mlx4: Report TSO capabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Feb 26, 2018 at 11:59:02AM -0700, Jason Gunthorpe wrote:
> On Mon, Feb 26, 2018 at 03:02:22PM +0200, Leon Romanovsky wrote:
>
> > +struct mlx4_ib_tso_caps {
> > +	__u32 max_tso; /* Maximum tso payload size in bytes */
> > +	/* Corresponding bit will be set if qp type from
> > +	 * 'enum ib_qp_type' is supported.
> > +	 */
> > +	__u32 supported_qpts;
> > +};
>
> Where is the user space for this?

provider/mlx5/* directory is full of TSO code, there is no reason to
believe that we won't update provider/mlx4/* after this patch.

Thanks

>
> Jason
> --
> To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux