Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp1931969ybj; Wed, 6 May 2020 07:50:10 -0700 (PDT) X-Google-Smtp-Source: APiQypInuz8DAbkMoVg7xQsQNSJJjqhDvqC+hUnK2IdjadiaGwMDbMbiMJuQWunJyNhLqPfAnzF9 X-Received: by 2002:a17:907:7246:: with SMTP id ds6mr7222539ejc.203.1588776610161; Wed, 06 May 2020 07:50:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588776610; cv=none; d=google.com; s=arc-20160816; b=Ek3/EK5agQHqPsADUWSzu04QesD8vbRoW4pKdO32dVUbnZSM5u29HGPq/nDPgVm/V6 wBnmyU8PwJyas+0hB7EaYUAgKBiVaxg2ewBvbAywRdX8L+z6sMYu6Jx8Py8yhbP9pP+1 2ErCozJBCuSPv0wrhh18v5VvLbLzopWEZlUwVpdyrrRAQNFQ5zxiKmiNHv78099NhsC3 7e/BQl0bFIGnSWNZPwvOd13fFvhAYpXXeD/AUOx/5IBeAMVrXzEfb/U+3JRgVh276GCP HAQA2mfZVo++mTKG5iYRAdDcBgAi9ZoDcQfuAwjf7ZHbxitQ1fP+Q7HTRbXxNSCunYcN w8Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=UqneBkAGnm6scPVQIQiFnJmpB8LCSUdDHk01UqI/94w=; b=B6aDVsZ7I2jjQTA9uyNHDKH8Gx76yNhy4X1eE7aTlwukCRFcelRAVCMEKsOdZrptcV BE6Q5CYndBLlFm1bHQSojQpyeX86xFPSF2Pad8yioe53o2/exiqDFh7njdozd6Q+pMxK bJSVsMjaxBPncYt4tM9Ct/zMayogVzOXmwzc2U/UurivPnvNBeN/YSSM1i8+xBkfzav7 lsgVqt1VECmkWglFDXeaM5kBs4bvhCOe1bZOT4xUgq11SeDwUiLtp0fJGG6Mb0+5siEi pTsxvG45hwSbb4EinC2kJ7zFXVlpHQMBtafmi832cEhFUpJTuogolHur/YzCwyZr+WG5 ipmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t30si1091469edt.410.2020.05.06.07.49.37; Wed, 06 May 2020 07:50:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729108AbgEFOsy (ORCPT + 99 others); Wed, 6 May 2020 10:48:54 -0400 Received: from stargate.chelsio.com ([12.32.117.8]:43439 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726114AbgEFOsy (ORCPT ); Wed, 6 May 2020 10:48:54 -0400 Received: from chumthang.blr.asicdesigners.com (chumthang.blr.asicdesigners.com [10.193.186.96]) by stargate.chelsio.com (8.13.8/8.13.8) with ESMTP id 046EmaCK024883; Wed, 6 May 2020 07:48:37 -0700 From: Ayush Sawal To: davem@davemloft.net, herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, netdev@vger.kernel.org, manojmalaviya@chelsio.com, Ayush Sawal Subject: [PATCH net-next] Revert "crypto: chelsio - Inline single pdu only" Date: Wed, 6 May 2020 20:17:19 +0530 Message-Id: <20200506144719.3725-1-ayush.sawal@chelsio.com> X-Mailer: git-send-email 2.26.0.rc1.11.g30e9940 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This reverts commit 27c6feb0fb33a665a746346e76714826a5be5d10. For ipsec offload the chelsio's ethernet driver expects a single mtu sized packet. But when ipsec traffic is running using iperf, most of the packets in that traffic are gso packets(large sized skbs) because GSO is enabled by default in TCP, due to this commit 0a6b2a1dc2a2 ("tcp: switch to GSO being always on"), so chcr_ipsec_offload_ok() receives a gso skb(with gso_size non zero). Due to the check in chcr_ipsec_offload_ok(), this function returns false for most of the packet, then ipsec offload is skipped and the skb goes out taking the coprocessor path which reduces the bandwidth for inline ipsec. If this check is removed then for most of the packets(large sized skbs) the chcr_ipsec_offload_ok() returns true and then as GSO is on, the segmentation of the packet happens in the kernel and then finally the driver_xmit is called, which receives a segmented mtu sized packet which is what the driver expects for ipsec offload. So this case becomes unnecessary here, therefore removing it. Signed-off-by: Ayush Sawal --- drivers/crypto/chelsio/chcr_ipsec.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/crypto/chelsio/chcr_ipsec.c b/drivers/crypto/chelsio/chcr_ipsec.c index 9fd3b9d1ec2f..d25689837b26 100644 --- a/drivers/crypto/chelsio/chcr_ipsec.c +++ b/drivers/crypto/chelsio/chcr_ipsec.c @@ -294,9 +294,6 @@ static bool chcr_ipsec_offload_ok(struct sk_buff *skb, struct xfrm_state *x) if (ipv6_ext_hdr(ipv6_hdr(skb)->nexthdr)) return false; } - /* Inline single pdu */ - if (skb_shinfo(skb)->gso_size) - return false; return true; } -- 2.26.0.rc1.11.g30e9940