[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <06a66824-cc2e-4f6d-8776-c2bd415c06f9@grimberg.me>
Date: Mon, 12 Aug 2024 12:13:51 +0300
From: Sagi Grimberg <sagi@...mberg.me>
To: Christoph Hellwig <hch@....de>, Tariq Toukan <ttoukan.linux@...il.com>,
Jakub Kicinski <kuba@...nel.org>
Cc: Anna Schumaker <Anna.Schumaker@...app.com>,
Trond Myklebust <trondmy@...nel.org>, linux-nfs@...r.kernel.org,
Boris Pismenny <borisp@...dia.com>, John Fastabend
<john.fastabend@...il.com>, Jakub Kicinski <kuba@...nel.org>,
Maxim Mikityanskiy <maxtram95@...il.com>, Saeed Mahameed
<saeedm@...dia.com>, Gal Pressman <gal@...dia.com>,
Networking <netdev@...r.kernel.org>, Paolo Abeni <pabeni@...hat.com>,
Eric Dumazet <edumazet@...gle.com>, "David S. Miller" <davem@...emloft.net>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Leon Romanovsky <leon@...nel.org>, Tariq Toukan <tariqt@...dia.com>
Subject: Re: [Bug report] NFS patch breaks TLS device-offloaded TX zerocopy
On 12/08/2024 12:02, Christoph Hellwig wrote:
> On Tue, Aug 06, 2024 at 01:07:47PM +0300, Tariq Toukan wrote:
>> Adding Maxim Mikityanskiy, he might have some insights.
> I think the important part to find out is if the in-kernel TLS API
> has a limitation to PAGE_SIZE buffer segments, or not.
I don't see why it should. Also note that sw tls does not suffer from
this. Maybe Jakub can add more light here in case something was missed?
Powered by blists - more mailing lists