Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp3123306rdb; Fri, 22 Sep 2023 21:00:51 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHmOcS4WZVqZL50G7QfYTVYoezHBBKhSGaoXUOP/zEGhgUDx5dH2wQYIisjcbqZm95jp3FE X-Received: by 2002:a17:902:b698:b0:1c1:ed61:e058 with SMTP id c24-20020a170902b69800b001c1ed61e058mr1079045pls.16.1695441651230; Fri, 22 Sep 2023 21:00:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695441651; cv=none; d=google.com; s=arc-20160816; b=O//KA82KiuQF8opUHEK3CI00AXcvZFb0hL+YoPbyE05MFKmSQ9SmRxps3XvizOCG6y fTkU6YZVGcFZj1LBUVyzh+b18UOhNZGeHXq5ZPkYngjOYdxYdNgqf5FfSVDCXpeetLMW iNlnsgxodFSLwws2bAAAu9GErXAqofl/5z3uBTDqpLm9fddx0dp4tBq2msUMevfaE+SG HgZ64UKIHfo23WUSOgNfAQISqnglKKjYTfp5cKPeHHxYStjWcbZJYplJAJf+iVf53+Hq 7HmS6WsO1S6aAanYy/yolDOLZyceljgfBhuiWzEDG2+Va8o06W+f+K1IKrBhx/WZi23W EdGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:subject:message-id:date:from:mime-version :dkim-signature; bh=94Bskd58xVReBXeRtix4vcuwmuqzkWRde2XRgjbo05s=; fh=bEeu7C1eNfldRxDzKylIGYbG7mZY67jgfnwYs+RUHSY=; b=POnrHQ0wnw0crQT15eYaOgsMA4p/bXwDw6gAFAJ2CpNdlkbNYLxbPfRKnZpSr6g7eU 8m73UkXQSIHJ8yr2gpB70hVa8VaOGFxPekksvLpFZBjkQPqDxGDvcDdCz96MdAcUOQ83 cVORs/8KzBHEdZNhfdHkElTnyE8aE2vF+35ebEkxEEWN4htjtfemxBy/mcL29SN8git+ QkPwd0INTVMhQz+OQmsehLoOOe4l0oXIyU0CoJm2FByFHW7B/j2rhBcH0EsM7+td/lJ/ LqJEYCmsfcN9f26vo3hIS2UgVa/8jwQFpPoBM8aTA3VxEmh7ExDhLVApVWYvK6Y82T5r Wwkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Asj5PMAP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id ik22-20020a170902ab1600b001bc996e40cdsi903912plb.511.2023.09.22.21.00.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Sep 2023 21:00:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Asj5PMAP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 7F2E683CC92E; Fri, 22 Sep 2023 19:13:23 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230502AbjIWCNG (ORCPT + 99 others); Fri, 22 Sep 2023 22:13:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59144 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229541AbjIWCNF (ORCPT ); Fri, 22 Sep 2023 22:13:05 -0400 Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com [IPv6:2a00:1450:4864:20::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA0E2C6 for ; Fri, 22 Sep 2023 19:12:59 -0700 (PDT) Received: by mail-lf1-x133.google.com with SMTP id 2adb3069b0e04-50308217223so4952239e87.3 for ; Fri, 22 Sep 2023 19:12:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1695435178; x=1696039978; darn=vger.kernel.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=94Bskd58xVReBXeRtix4vcuwmuqzkWRde2XRgjbo05s=; b=Asj5PMAP8tU190Fd2j1GIaTf3Ssyth0pma1nBm6vGdNsQMlVmSabCzU7AE9TjaAauB I3NIkv5GOMaiRgHtic1fkyyxwpOWtPko8wBE87Q1Qy5ZF1MqvaIJ4xuukJ7EGF/xK+30 oeTHx74vuJVODOVU8yvyn72i65LwPHOCTCOW0uuPqJUO0dtl/bh6DAMbBgPHjRJQGZ0/ FGCQDrNIv9JSQqQt5p+8utS6VAfbyNaP4FxiW6MUwgSGEYUKJnk+4lOyD+Da0Mt1tvR1 jE1Wj7DV+Ze867T2OdvE9jbLl6x2Z9YLb4g3ssOlFTCnZUCDiMJlnQxHsbPtjEIsasFx 774Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695435178; x=1696039978; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=94Bskd58xVReBXeRtix4vcuwmuqzkWRde2XRgjbo05s=; b=JB+aCG1QdXprSwxwgbYCUIDnDniqfamOwLbuWewWnVCk/EnUKnULhCdTh4nXOf4OCf eN6om/L6r+QE3/oQnXjh/AfWxWbke4p6FwpomjdJY3UN/qvU7uzL7II3qcEKT6+/3DDK xf65P5w23Nm5nMaVq9cDoqozbxcJrf21gz5PjMp0QKF/2E+7i8vTUaWKiksoZrKegkpt ktNGt6/6zglVZqxjNG/6meZ0pxSUwxaZj83dg53KJ/xMwRdNg0/8cYa9uTrol7IP2ehn ydPY/p2MnmeRQK4Ml/a312Ng1N1YHkQ3f31TjoPCCSWTf2LLTq6kaZ3U/F7macdBmrb/ LLKg== X-Gm-Message-State: AOJu0Yy5d2x6k606oVZoQBB1gMN4hC++q7b8CqJOuUgwrolcspHOZE3q nCevp4cKl37tNCJuVe/QOxXI413yNPQoM0a8R0W86n4CuQ0= X-Received: by 2002:a05:6512:6cc:b0:500:7a21:3e78 with SMTP id u12-20020a05651206cc00b005007a213e78mr1066595lff.55.1695435177620; Fri, 22 Sep 2023 19:12:57 -0700 (PDT) MIME-Version: 1.0 From: Naruto Nguyen Date: Sat, 23 Sep 2023 12:12:46 +1000 Message-ID: Subject: Small MSS in vmxnet3 To: kernel derkeiler , kernelnewbies Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=3.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_SBL_CSS, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 22 Sep 2023 19:13:23 -0700 (PDT) X-Spam-Level: ** Hello everyone, Recently I found that packets sent from vmxnet3 driver on guest have MSS value set to very small size, some 10 bytes, some 25 bytes MSS. The vmxnet3 NIC enables TSO. Could you let me know any possible reason that the packets are fragmented with very small MSS.and is it normal?. Any way to avoid this small MSS or it's just normal. In addition, when enabling debug for vmxnet3, in function vmxnet3_tq_xmit, it has a printout netdev_dbg(adapter->netdev, "txd[%u]: SOP 0x%Lx 0x%x 0x%x\n", (u32)(ctx.sop_txd - tq->tx_ring.base), le64_to_cpu(gdesc->txd.addr), le32_to_cpu(gdesc->dword[2]), le32_to_cpu(gdesc->dword[3])); could you suggest an easier way to extract the MSS value from this output? Thanks, Kind regards, Naruto