On 16-12-08 01:36 PM, Michael S. Tsirkin wrote:
> On Wed, Dec 07, 2016 at 12:11:11PM -0800, John Fastabend wrote:
>> This adds support for dynamically setting the LRO feature flag. The
>> message to control guest features in the backend uses the
>> CTRL_GUEST_OFFLOADS msg type.
>>
>> Signed-off-by: John Fastabend <john.r.fastab...@intel.com>
>> ---
>>  drivers/net/virtio_net.c |   40 +++++++++++++++++++++++++++++++++++++++-
>>  1 file changed, 39 insertions(+), 1 deletion(-)
>>
>> diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c
>> index a21d93a..a5c47b1 100644
>> --- a/drivers/net/virtio_net.c
>> +++ b/drivers/net/virtio_net.c
>> @@ -1419,6 +1419,36 @@ static void virtnet_init_settings(struct net_device 
>> *dev)
>>      .set_settings = virtnet_set_settings,
>>  };
>>  
>> +static int virtnet_set_features(struct net_device *netdev,
>> +                            netdev_features_t features)
>> +{
>> +    struct virtnet_info *vi = netdev_priv(netdev);
>> +    struct virtio_device *vdev = vi->vdev;
>> +    struct scatterlist sg;
>> +    u64 offloads = 0;
>> +
>> +    if (features & NETIF_F_LRO)
>> +            offloads |= (1 << VIRTIO_NET_F_GUEST_TSO4) |
>> +                        (1 << VIRTIO_NET_F_GUEST_TSO6);
>> +
>> +    if (features & NETIF_F_RXCSUM)
>> +            offloads |= (1 << VIRTIO_NET_F_GUEST_CSUM);
>> +
>> +    if (virtio_has_feature(vdev, VIRTIO_NET_F_CTRL_GUEST_OFFLOADS)) {
>> +            sg_init_one(&sg, &offloads, sizeof(uint64_t));
>> +            if (!virtnet_send_command(vi,
>> +                                      VIRTIO_NET_CTRL_GUEST_OFFLOADS,
>> +                                      VIRTIO_NET_CTRL_GUEST_OFFLOADS_SET,
>> +                                      &sg)) {
> 
> Hmm I just realised that this will slow down setups that bridge
> virtio net interfaces since bridge calls this if provided.
> See below.


Really? What code is trying to turn off GRO via the GUEST_OFFLOADS LRO
command. My qemu/Linux setup has a set of tap/vhost devices attached to
a bridge and all of them have LRO enabled even with this patch series.

I must missing a setup handler somewhere?

> 
>> +                    dev_warn(&netdev->dev,
>> +                             "Failed to set guest offloads by virtnet 
>> command.\n");
>> +                    return -EINVAL;
>> +            }
>> +    }
> 
> Hmm if VIRTIO_NET_F_CTRL_GUEST_OFFLOADS is off, this fails
> silently. It might actually be a good idea to avoid
> breaking setups.
> 
>> +
>> +    return 0;
>> +}
>> +
>>  static const struct net_device_ops virtnet_netdev = {
>>      .ndo_open            = virtnet_open,
>>      .ndo_stop            = virtnet_close,
>> @@ -1435,6 +1465,7 @@ static void virtnet_init_settings(struct net_device 
>> *dev)
>>  #ifdef CONFIG_NET_RX_BUSY_POLL
>>      .ndo_busy_poll          = virtnet_busy_poll,
>>  #endif
>> +    .ndo_set_features       = virtnet_set_features,
>>  };
>>  
>>  static void virtnet_config_changed_work(struct work_struct *work)
>> @@ -1815,6 +1846,12 @@ static int virtnet_probe(struct virtio_device *vdev)
>>      if (virtio_has_feature(vdev, VIRTIO_NET_F_GUEST_CSUM))
>>              dev->features |= NETIF_F_RXCSUM;
>>  
>> +    if (virtio_has_feature(vdev, VIRTIO_NET_F_GUEST_TSO4) &&
>> +        virtio_has_feature(vdev, VIRTIO_NET_F_GUEST_TSO6)) {
>> +            dev->features |= NETIF_F_LRO;
>> +            dev->hw_features |= NETIF_F_LRO;
> 
> So the issue is I think that the virtio "LRO" isn't really
> LRO, it's typically just GRO forwarded to guests.
> So these are easily re-split along MTU boundaries,
> which makes it ok to forward these across bridges.
> 
> It's not nice that we don't document this in the spec,
> but it's the reality and people rely on this.
> 
> For now, how about doing a custom thing and just disable/enable
> it as XDP is attached/detached?

The annoying part about doing this is ethtool will say that it is fixed
yet it will be changed by seemingly unrelated operation. I'm not sure I
like the idea to start automatically configuring the link via xdp_set.

> 
>> +    }
>> +
>>      dev->vlan_features = dev->features;
>>  
>>      /* MTU range: 68 - 65535 */
>> @@ -2057,7 +2094,8 @@ static int virtnet_restore(struct virtio_device *vdev)
>>      VIRTIO_NET_F_CTRL_RX, VIRTIO_NET_F_CTRL_VLAN, \
>>      VIRTIO_NET_F_GUEST_ANNOUNCE, VIRTIO_NET_F_MQ, \
>>      VIRTIO_NET_F_CTRL_MAC_ADDR, \
>> -    VIRTIO_NET_F_MTU
>> +    VIRTIO_NET_F_MTU, \
>> +    VIRTIO_NET_F_CTRL_GUEST_OFFLOADS
>>  
>>  static unsigned int features[] = {
>>      VIRTNET_FEATURES,

Reply via email to