[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Yws1Qs4+1Omo8DPL@unreal>
Date: Sun, 28 Aug 2022 12:28:34 +0300
From: Leon Romanovsky <leon@...nel.org>
To: Jakub Kicinski <kuba@...nel.org>
Cc: Steffen Klassert <steffen.klassert@...unet.com>,
"David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>,
Herbert Xu <herbert@...dor.apana.org.au>,
netdev@...r.kernel.org, Paolo Abeni <pabeni@...hat.com>,
Raed Salem <raeds@...dia.com>,
Saeed Mahameed <saeedm@...dia.com>
Subject: Re: [PATCH xfrm-next v3 0/6] Extend XFRM core to allow full offload
configuration
On Fri, Aug 26, 2022 at 04:45:22PM -0700, Jakub Kicinski wrote:
> On Fri, 26 Aug 2022 09:26:57 +0300 Leon Romanovsky wrote:
> > On Thu, Aug 25, 2022 at 02:36:10PM -0700, Jakub Kicinski wrote:
> > > On Tue, 23 Aug 2022 16:31:57 +0300 Leon Romanovsky wrote:
> > > > * I didn't hear any suggestion what term to use instead of
> > > > "full offload", so left it as is. It is used in commit messages
> > > > and documentation only and easy to rename.
> > > > * Added performance data and background info to cover letter
> > > > * Reused xfrm_output_resume() function to support multiple XFRM transformations
> > > > * Add PMTU check in addition to driver .xdo_dev_offload_ok validation
> > > > * Documentation is in progress, but not part of this series yet.
> > >
> > > Since the use case is somewhat in question, perhaps switch to RFC
> > > postings until the drivers side incl. tc forwarding is implemented?
<...>
> > We also don't offload anything related to routing as we can't
> > differentiate between local traffic.
>
> Yeah, nah, that's not what I'm asking for.
> I said forwarding, not sending traffic thru a different virtual
> interface. The TC rules must forward from or two the IPSec ifc.
>
> That was the use case Jason mentioned.
I see, word "TC" confused me, sorry about that.
My next mlx5-related task after this IPsec full offload will be accepted
is to extend mlx5 with extra eswitch logic.
There is no change in API, xfrm code or behavior, just internal change
where IPsec flow steering tables will be created and how they will be
created/destroyed.
Unfortunately, this "just.." change is a complicated task due to mlx5 core
internal implementation and will take time, but as I said, I will do it.
>
> > > Also the perf traces, I don't see them here.
> >
> > It is worth to separate it to standalone discussion with a title:
> > "why crypto is not fast enough?". I don't think that mixed discussions
> > about full offload which Steffen said that he is interested and
> > research about crypto bottlenecks will be productive. These discussions
> > are orthogonal.
>
> What do you mean by crypto bottlenecks?
I think that I used same language all the time.
* IPsec SW - software path
* IPsec crypto - HW offload of crypto part
* IPsec full offload - state and policy offloads to the HW.
I will try to be more clear next time.
>
> Please use more precise language. crypto here may mean "crypto only
> offload" or "crypto as done by CPU". I have no idea which one you mean.
>
> We are very much interested in the former, the latter is indeed out of
> scope here.
Powered by blists - more mailing lists