Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp189183ybj; Wed, 6 May 2020 14:53:55 -0700 (PDT) X-Google-Smtp-Source: APiQypI35osqpNJJxfJBJ6zmqH0u/IkU15B8MPIM6H4l8HRq3YGyfLEDeyTNeTbuJWO1IrsuKPVk X-Received: by 2002:a50:eb8e:: with SMTP id y14mr9059224edr.270.1588802035770; Wed, 06 May 2020 14:53:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588802035; cv=none; d=google.com; s=arc-20160816; b=OL/gsynBuCQhcqBumjLT11IjKDmVfSnWYFmRd4hWJogZ1oWxhyipi3P8LjeBsiO71W fW3Z8ZiSlECbaL0xCFSRJMKq0KF7d16NTK/HMU9wOL2VB0Eo4o3S3TMj4UyzocYpQKaL BcFii6bRaMvoHdL89jJ1fxfHOloRTMZsoaRF9vXt6ji9aQYPDtns+UUavhVSWO3X6U9Q v5nE3MZBM40TiyTLU16XYM6oq3nh4paTHYUpvHu52hxy6FjbF4MYDwkUG7ACf05ZqbAy md/HIJoT5MEjPN7NNpplrcLZ9f4lm+snTwmCMQKsxVrsCz2YIeGUfIyO0KoYEiNM8Gcc m6Ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=womprVqWVAW/pBkE4jH+vBgP8K5HDA4m3o/IvW58qCo=; b=konfsfOmVP5aVCmPmqtQQwlWI0cjvg0pOU5n4oVqNcCMFaR8cMdjeI+OMlPWuSW8Kh Zr7hu1fPhE6AnemzITCW40JomAVmWg3+mLbNiUslPd5pMVnc/5Q25BrVyDwo9sc6Nfny y9ksTQME4H66kDDHLyaXURNgP8QVaKA1Fes2L7lZzsHEBa3ka3PyOEtp4sMCIdFwISVn gLcDmcTgBJ+f1yu/0+N020lEHR0xrbo+fTMxJA3OjTGGxBGBmEAIWjdA1i4pN6c9uNl/ AM/r/QtJ6bRhVF626zu52KAJQn8Pobgs/yvSdALZw8C37IpXsHqYpRDHIj2dT0aKhEss YbhQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b7si1993590eju.8.2020.05.06.14.53.21; Wed, 06 May 2020 14:53:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729911AbgEFVwW (ORCPT + 99 others); Wed, 6 May 2020 17:52:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34930 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1728621AbgEFVwV (ORCPT ); Wed, 6 May 2020 17:52:21 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C29D1C061A0F; Wed, 6 May 2020 14:52:21 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 3F66D1273D95E; Wed, 6 May 2020 14:52:21 -0700 (PDT) Date: Wed, 06 May 2020 14:52:20 -0700 (PDT) Message-Id: <20200506.145220.1567628861970386108.davem@davemloft.net> To: ayush.sawal@chelsio.com Cc: herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, netdev@vger.kernel.org, manojmalaviya@chelsio.com Subject: Re: [PATCH net-next] Revert "crypto: chelsio - Inline single pdu only" From: David Miller In-Reply-To: <20200506144719.3725-1-ayush.sawal@chelsio.com> References: <20200506144719.3725-1-ayush.sawal@chelsio.com> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 06 May 2020 14:52:21 -0700 (PDT) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Ayush Sawal Date: Wed, 6 May 2020 20:17:19 +0530 > This reverts commit 27c6feb0fb33a665a746346e76714826a5be5d10. > > For ipsec offload the chelsio's ethernet driver expects a single mtu > sized packet. > > But when ipsec traffic is running using iperf, most of the packets in > that traffic are gso packets(large sized skbs) because GSO is enabled by > default in TCP, due to this commit 0a6b2a1dc2a2 ("tcp: switch to GSO > being always on"), so chcr_ipsec_offload_ok() receives a gso > skb(with gso_size non zero). > > Due to the check in chcr_ipsec_offload_ok(), this function returns false > for most of the packet, then ipsec offload is skipped and the skb goes > out taking the coprocessor path which reduces the bandwidth for inline > ipsec. > > If this check is removed then for most of the packets(large sized skbs) > the chcr_ipsec_offload_ok() returns true and then as GSO is on, the > segmentation of the packet happens in the kernel and then finally the > driver_xmit is called, which receives a segmented mtu sized packet which > is what the driver expects for ipsec offload. So this case becomes > unnecessary here, therefore removing it. > > Signed-off-by: Ayush Sawal Applied.