From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8FCD8C02198 for ; Sun, 16 Feb 2025 12:36:31 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id 4113683EFB; Sun, 16 Feb 2025 12:36:31 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id YGqVObIhL-PG; Sun, 16 Feb 2025 12:36:30 +0000 (UTC) X-Comment: SPF check N/A for local connections - client-ip=140.211.166.142; helo=lists1.osuosl.org; envelope-from=intel-wired-lan-bounces@osuosl.org; receiver= DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 839F783F36 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=osuosl.org; s=default; t=1739709390; bh=sDBfuwN7zF5bfcepsK7mvv2IbRXE9jZFhB763pxzsqs=; h=Date:To:Cc:References:From:In-Reply-To:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: From; b=kvgE/KJWZsOnXgba3bcWecrnsdUE6QJrZa/t6w1zKEKMtACBVDpDprxWzZecNZd0C RVpTW/bCZDDCOm20RlQ3nWhwl0rchYIL9rJW03/sRLrWqcmHGl0y4Ne0p73drwLiRA eKkFAzY6uXISW96TUyqA8X8lL7koh03GuK8OqePGIwVJHBa6S/h7oCMiulkPIkpffk L4Iy7nE7QCCFTEwYrrRFBwbCryVABagXfwuQ6PSji9m97U6ADdogBHMmFjeimJHMTL 7J4VIr7Fe6qSHEujUvvVrZotTnu6yD6JvhHr3zccgE/9Iy3fTlooRC/3fhQLb1yKOp kt6u555NmJrzg== Received: from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142]) by smtp1.osuosl.org (Postfix) with ESMTP id 839F783F36; Sun, 16 Feb 2025 12:36:30 +0000 (UTC) Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) by lists1.osuosl.org (Postfix) with ESMTP id 7733CC8 for ; Sun, 16 Feb 2025 12:36:29 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 5C34860A6A for ; Sun, 16 Feb 2025 12:36:29 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id OhX2axKZnazp for ; Sun, 16 Feb 2025 12:36:28 +0000 (UTC) X-Greylist: delayed 10930 seconds by postgrey-1.37 at util1.osuosl.org; Sun, 16 Feb 2025 12:36:27 UTC DMARC-Filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org 9C85B60B1D DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 9C85B60B1D Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=95.215.58.173; helo=out-173.mta1.migadu.com; envelope-from=yanjun.zhu@linux.dev; receiver= Received: from out-173.mta1.migadu.com (out-173.mta1.migadu.com [95.215.58.173]) by smtp3.osuosl.org (Postfix) with ESMTPS id 9C85B60B1D for ; Sun, 16 Feb 2025 12:36:26 +0000 (UTC) Message-ID: <6775786f-ee86-4990-8db8-ea95d4313973@linux.dev> Date: Sun, 16 Feb 2025 13:36:17 +0100 MIME-Version: 1.0 To: Leon Romanovsky Cc: Steffen Klassert , Andrew Lunn , Ayush Sawal , Bharat Bhushan , Eric Dumazet , Geetha sowjanya , hariprasad , Herbert Xu , intel-wired-lan@lists.osuosl.org, Jakub Kicinski , Jay Vosburgh , Jonathan Corbet , linux-doc@vger.kernel.org, linux-rdma@vger.kernel.org, Louis Peens , netdev@vger.kernel.org, oss-drivers@corigine.com, Paolo Abeni , Potnuri Bharat Teja , Przemek Kitszel , Saeed Mahameed , Subbaraya Sundeep , Sunil Goutham , Tariq Toukan , Tony Nguyen , Ilia Lin References: <647895d9-e8d1-4921-b5ba-b38b2176604e@linux.dev> <20250216110711.GU17863@unreal> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Zhu Yanjun In-Reply-To: <20250216110711.GU17863@unreal> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Mailman-Original-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1739709383; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=sDBfuwN7zF5bfcepsK7mvv2IbRXE9jZFhB763pxzsqs=; b=rbTLqm4MS/vUuGgVmIojj0rfqc5jA5Fz/SJAClsGV+8TPL+SqVsz+x5wr5PDlcP2JVzM4Q wMVVwSo+vYPPiqKQRDUhjJWKruqaNxTZl4p7WlIDelGyWNxg9NBpbdw41Ub3a85ElyeWOS eYpA3rry46FvVQ+DG3bo3huLFkWgR6c= X-Mailman-Original-Authentication-Results: smtp3.osuosl.org; dmarc=pass (p=none dis=none) header.from=linux.dev X-Mailman-Original-Authentication-Results: smtp3.osuosl.org; dkim=pass (1024-bit key, unprotected) header.d=linux.dev header.i=@linux.dev header.a=rsa-sha256 header.s=key1 header.b=rbTLqm4M Subject: Re: [Intel-wired-lan] [PATCH ipsec-next 4/5] xfrm: provide common xdo_dev_offload_ok callback implementation X-BeenThere: intel-wired-lan@osuosl.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Intel Wired Ethernet Linux Kernel Driver Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: intel-wired-lan-bounces@osuosl.org Sender: "Intel-wired-lan" 在 2025/2/16 12:07, Leon Romanovsky 写道: > On Sun, Feb 16, 2025 at 10:33:59AM +0100, Zhu Yanjun wrote: >> 在 2025/2/5 19:20, Leon Romanovsky 写道: >>> From: Leon Romanovsky >>> >>> Almost all drivers except bond and nsim had same check if device >>> can perform XFRM offload on that specific packet. The check was that >>> packet doesn't have IPv4 options and IPv6 extensions. >>> >>> In NIC drivers, the IPv4 HELEN comparison was slightly different, but >>> the intent was to check for the same conditions. So let's chose more >>> strict variant as a common base. >>> >>> Signed-off-by: Leon Romanovsky >>> --- >>> Documentation/networking/xfrm_device.rst | 3 ++- >>> drivers/net/bonding/bond_main.c | 16 +++++--------- >>> .../net/ethernet/chelsio/cxgb4/cxgb4_main.c | 21 ------------------- >>> .../inline_crypto/ch_ipsec/chcr_ipsec.c | 16 -------------- >>> .../net/ethernet/intel/ixgbe/ixgbe_ipsec.c | 21 ------------------- >>> drivers/net/ethernet/intel/ixgbevf/ipsec.c | 21 ------------------- >>> .../marvell/octeontx2/nic/cn10k_ipsec.c | 15 ------------- >>> .../mellanox/mlx5/core/en_accel/ipsec.c | 16 -------------- >>> .../net/ethernet/netronome/nfp/crypto/ipsec.c | 11 ---------- >>> drivers/net/netdevsim/ipsec.c | 11 ---------- >>> drivers/net/netdevsim/netdevsim.h | 1 - >>> net/xfrm/xfrm_device.c | 15 +++++++++++++ >>> 12 files changed, 22 insertions(+), 145 deletions(-) >>> >>> diff --git a/Documentation/networking/xfrm_device.rst b/Documentation/networking/xfrm_device.rst >>> index 66f6e9a9b59a..39bb98939d1f 100644 >>> --- a/Documentation/networking/xfrm_device.rst >>> +++ b/Documentation/networking/xfrm_device.rst >>> @@ -126,7 +126,8 @@ been setup for offload, it first calls into xdo_dev_offload_ok() with >>> the skb and the intended offload state to ask the driver if the offload >>> will serviceable. This can check the packet information to be sure the >>> offload can be supported (e.g. IPv4 or IPv6, no IPv4 options, etc) and >>> -return true of false to signify its support. >>> +return true of false to signify its support. In case driver doesn't implement >> In this commit, remove the functions cxgb4_ipsec_offload_ok, >> ch_ipsec_offload_ok, ixgbe_ipsec_offload_ok, ixgbevf_ipsec_offload_ok, >> cn10k_ipsec_offload_ok, mlx5e_ipsec_offload_ok, nfp_net_ipsec_offload_ok and >> nsim_ipsec_offload_ok, use the function xfrm_dev_offload_ok to do the same >> work. >> >> But in the file xfrm_device.rst, "return true or false to signify its >> support"? > This sentence continued in the xfrm_device.rst: "... In case driver doesn't implement > this callback, the stack provides reasonable defaults." Got it. I mean "... and return true of false to signify its support..."                                           ^^ should be "... and return true or false to signify its support..." ^_^ Zhu Yanjun > >> of --> should be "or" >> >> Thanks a lot. >> Reviewed-by: Zhu Yanjun > Thanks > >> Zhu Yanjun >> >>> +this callback, the stack provides reasonable defaults. >>> Crypto offload mode: >>> When ready to send, the driver needs to inspect the Tx packet for the >>> diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c >>> index e45bba240cbc..bfb55c23380b 100644 >>> --- a/drivers/net/bonding/bond_main.c >>> +++ b/drivers/net/bonding/bond_main.c >>> @@ -676,22 +676,16 @@ static void bond_ipsec_free_sa(struct xfrm_state *xs) >>> static bool bond_ipsec_offload_ok(struct sk_buff *skb, struct xfrm_state *xs) -- Best Regards, Yanjun.Zhu