lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171215112058.00007963@intel.com>
Date:   Fri, 15 Dec 2017 11:20:58 -0800
From:   Jesse Brandeburg <jesse.brandeburg@...el.com>
To:     Shannon Nelson <shannon.nelson@...cle.com>
Cc:     Alexander Duyck <alexander.duyck@...il.com>,
        intel-wired-lan <intel-wired-lan@...ts.osuosl.org>,
        Jeff Kirsher <jeffrey.t.kirsher@...el.com>,
        Steffen Klassert <steffen.klassert@...unet.com>,
        Netdev <netdev@...r.kernel.org>,
        "Sowmini Varadhan" <sowmini.varadhan@...cle.com>,
        jesse.brandeburg@...el.com
Subject: Re: [Intel-wired-lan] [PATCH v2 next-queue 08/10] ixgbe: process
 the Tx ipsec offload

On Tue, 12 Dec 2017 21:45:13 -0800
Shannon Nelson <shannon.nelson@...cle.com> wrote:

> > Also you are still setting the TCP flag for these packets. I'm
> > wondering if the TCP flag is really needed. I get that your current
> > setup only runs on TCP flows but what about other types of flows?
> > Couldn't UDP be encapsulated via ESP?  
> 
> That L4T_TCP bit annoys me - if I don't set it, the offload doesn't 
> work, whether doing csum offload or not.
> 
> The UDP messages can be encapsulated, but they don't seem to go down the 
> offload route.  I haven't looked into why yet.

L4T_TCP, AFAIK is a control of whether or not the L4 checksum generated
by the offload hardware uses the "never equal 0" logic required by TCP
checksums, but not required by UDP checksums.  Not sure if that helps,
or even really applies to the case where you're doing IPSEC offload.
Seems like something else is at play as well (undocumented HW
requirements?)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ