[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220818100930.GA622211@gauss3.secunet.de>
Date: Thu, 18 Aug 2022 12:09:30 +0200
From: Steffen Klassert <steffen.klassert@...unet.com>
To: Leon Romanovsky <leon@...nel.org>
CC: Leon Romanovsky <leonro@...dia.com>,
"David S . Miller" <davem@...emloft.net>,
Herbert Xu <herbert@...dor.apana.org.au>,
<netdev@...r.kernel.org>, Raed Salem <raeds@...dia.com>,
ipsec-devel <devel@...ux-ipsec.org>
Subject: Re: [PATCH xfrm-next v2 0/6] Extend XFRM core to allow full offload
configuration
Hi Leon,
On Tue, Aug 16, 2022 at 11:59:21AM +0300, Leon Romanovsky wrote:
> From: Leon Romanovsky <leonro@...dia.com>
>
> Changelog:
> v2:
> * Rebased to latest 6.0-rc1
> * Add an extra check in TX datapath patch to validate packets before
> forwarding to HW.
> * Added policy cleanup logic in case of netdev down event
> v1: https://lore.kernel.org/all/cover.1652851393.git.leonro@nvidia.com
> * Moved comment to be before if (...) in third patch.
> v0: https://lore.kernel.org/all/cover.1652176932.git.leonro@nvidia.com
> -----------------------------------------------------------------------
>
> The following series extends XFRM core code to handle new type of IPsec
> offload - full offload.
>
> In this mode, the HW is going to be responsible for whole data path, so
> both policy and state should be offloaded.
some general comments about the pachset:
As implemented, the software does not hold any state.
I.e. there is no sync between hardware and software
regarding stats, liftetime, lifebyte, packet counts
and replay window. IKE rekeying and auditing is based
on these, how should this be done?
I have not seen anything that catches configurations
that stack multiple tunnels with the outer offloaded.
Where do we make sure that policy offloading device
is the same as the state offloading device?
Powered by blists - more mailing lists