Red Hat Bugzilla – Bug 1366919
extend virtio-net to expose host MTU to guest
Last modified: 2017-08-01 23:27:29 EDT
Description of problem: It is useful to expose host MTU to guest. In particular, guest can then disable guest offloads and be sure that packets will fit in MTU sized receive buffers, and / or disable host offloads and still be sure that packets can be transmitted. Will need to clone to linux and dpdk down the road.
QEMU RFC v3 sent on the ML: https://mail-archive.com/qemu-devel@nongnu.org/msg416009.html Message-Id: <20161130101017.13382-1-maxime.coquelin@redhat.com> In this version, the MTU value is specified by the user (management tool) in QEMU command line via the host_mtu virtio-net parameter.
Upstream commits: a93e599 virtio-net: Add MTU feature support 45a368a vhost-net: Notify the backend about the host MTU c5f048d vhost-user: Add MTU protocol feature and op
Verified. Test result can be find in: https://bugzilla.redhat.com/show_bug.cgi?id=1452756#c15 Related bug is: https://bugzilla.redhat.com/show_bug.cgi?id=1412234
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2017:2392