[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201110154428.06094336@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com>
Date: Tue, 10 Nov 2020 15:44:28 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: Tariq Toukan <tariqt@...dia.com>
Cc: "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org,
Saeed Mahameed <saeedm@...dia.com>,
Moshe Shemesh <moshe@...dia.com>,
Boris Pismenny <borisp@...dia.com>
Subject: Re: [PATCH net V2] net: Disable NETIF_F_HW_TLS_TX when HW_CSUM is
disabled
On Sun, 8 Nov 2020 16:43:09 +0200 Tariq Toukan wrote:
> @@ -528,3 +528,7 @@ Drivers should ignore the changes to TLS the device feature flags.
> These flags will be acted upon accordingly by the core ``ktls`` code.
> TLS device feature flags only control adding of new TLS connection
> offloads, old connections will remain active after flags are cleared.
> +
> +The TLS encryption cannot be offloaded to device if checksum calculation
> +is not, hence the TLS TX device feature flag is cleared when HW_CSUM is
> +disabled.
This makes it sound like the driver will fall back to software crypto
if L4 csum offload gets disabled, is this your intention?
Seems at odds with the paragraph above it.
> diff --git a/net/core/dev.c b/net/core/dev.c
> index 9499a414d67e..26c9b059cade 100644
> --- a/net/core/dev.c
> +++ b/net/core/dev.c
> @@ -9584,6 +9584,11 @@ static netdev_features_t netdev_fix_features(struct net_device *dev,
> }
> }
>
> + if ((features & NETIF_F_HW_TLS_TX) && !(features & NETIF_F_HW_CSUM)) {
> + netdev_dbg(dev, "Dropping TLS TX HW offload feature since no CSUM feature.\n");
> + features &= ~NETIF_F_HW_TLS_TX;
> + }
> +
> return features;
> }
>
Powered by blists - more mailing lists