Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp629087ybi; Fri, 31 May 2019 06:42:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqyYLhXp4m93SKABB99qG0NPPaYpjLxJRjxeDBAYS+GYdWhU+Axk/ZHYJSI7b17QtZSycovh X-Received: by 2002:aa7:9e9a:: with SMTP id p26mr10083628pfq.176.1559310170424; Fri, 31 May 2019 06:42:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559310170; cv=none; d=google.com; s=arc-20160816; b=WJHNOv5vS2mlHjCwgp6wkx/+3ATvCpA+fvtICgxDif29D6ZHKx4DxMmp7VDuONHJwV 1Oh5ZsJGDZbFJd6chS3h1ZL5E/kBXuKFp+i0dA0zV+1oRlcAYOgiYo++Js11A7Zv25v2 IkmRFM/vwWrIjb0bo84UwZhESGFcKIZ06H6ft9WzanbbP1V97U59n2nEOokIOqLrzjO/ 7Gq8qFwVA/KFxBA7Wf0Bjw0Cl/Jycg/U4r+h4HcUOGkydfp8tJ5mwJXPoDebeODrwNG7 LWR4vCwk3+xwsTh5eH5Ii8pXR6MFNVsJPmfLY1kKh76Ic7zvEB3em2MgnxywVwzsFjoj 1hKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=y1KEm27ZrjXuWgrqpGzZOtQ7wFe2Rm1J4aJOXsvacSY=; b=xl+XoHCBbRdMJMpF0hxBiSDno1I64lR4KyG4fzPoxLtfEZnP5fsMh3nC4s8uJvRH95 gMxNRBkj6/CuDufDaQ+1lzfmuRmnS7Qxm+QUuIhjTFNRSSXYFGqFoAIQHe1hy9eSvuAQ m1S2egqURjgQFJqfqRk5fcEHh8eZi71MNLib69ii2KbWKoZiH6f9x1QxlwPC0iUXsNXU XpQyQbVgjIm2t/Lg3WNouyyEnZJnSCSgJ2Rk9uTf6HFliD5QP2uNO7Iag6Dj0Ct5zcv0 2n0B47LfRr8gWTc4ynxy1LS610zqneMEQxljsGdeleFZwBaNAFWLFaRa5qkfknE5X3sq fPjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6si6342868pga.360.2019.05.31.06.42.32; Fri, 31 May 2019 06:42:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726964AbfEaNkf (ORCPT + 99 others); Fri, 31 May 2019 09:40:35 -0400 Received: from mx1.redhat.com ([209.132.183.28]:1158 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726917AbfEaNk3 (ORCPT ); Fri, 31 May 2019 09:40:29 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 18D2B9FFE8; Fri, 31 May 2019 13:40:29 +0000 (UTC) Received: from steredhat.redhat.com (ovpn-117-15.ams2.redhat.com [10.36.117.15]) by smtp.corp.redhat.com (Postfix) with ESMTP id 16BEC5D719; Fri, 31 May 2019 13:40:25 +0000 (UTC) From: Stefano Garzarella To: netdev@vger.kernel.org Cc: Stefan Hajnoczi , virtualization@lists.linux-foundation.org, "Michael S. Tsirkin" , "David S. Miller" , Jason Wang , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [PATCH v3 5/5] vsock/virtio: change the maximum packet size allowed Date: Fri, 31 May 2019 15:39:54 +0200 Message-Id: <20190531133954.122567-6-sgarzare@redhat.com> In-Reply-To: <20190531133954.122567-1-sgarzare@redhat.com> References: <20190531133954.122567-1-sgarzare@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 31 May 2019 13:40:29 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since now we are able to split packets, we can avoid limiting their sizes to VIRTIO_VSOCK_DEFAULT_RX_BUF_SIZE. Instead, we can use VIRTIO_VSOCK_MAX_PKT_BUF_SIZE as the max packet size. Signed-off-by: Stefano Garzarella --- net/vmw_vsock/virtio_transport_common.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c index d192cb91cf25..b6ec6f81018b 100644 --- a/net/vmw_vsock/virtio_transport_common.c +++ b/net/vmw_vsock/virtio_transport_common.c @@ -182,8 +182,8 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, vvs = vsk->trans; /* we can send less than pkt_len bytes */ - if (pkt_len > VIRTIO_VSOCK_DEFAULT_RX_BUF_SIZE) - pkt_len = VIRTIO_VSOCK_DEFAULT_RX_BUF_SIZE; + if (pkt_len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE) + pkt_len = VIRTIO_VSOCK_MAX_PKT_BUF_SIZE; /* virtio_transport_get_credit might return less than pkt_len credit */ pkt_len = virtio_transport_get_credit(vvs, pkt_len); -- 2.20.1