From patchwork Wed Feb 19 13:50:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Leon Romanovsky X-Patchwork-Id: 13982260 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5A5241E0B61; Wed, 19 Feb 2025 13:51:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739973078; cv=none; b=GLEPOUl3o2C7Rel+nughXjOszdSu3JhEkaeoEtMJ8RtxoDUiONKKlFpPZsG9nFdpYx/qFFPyTQMWy+GSxPXLmWJOWTak6ZJ8GxrvaT+tzCCPrNYBBJRl84p07+jn3B0GecAiajCUIFfyYf2sxC77Hxk7EwyR9jzzyIVOx0gg72k= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739973078; c=relaxed/simple; bh=Djbf4KqW2xY32dbdHluYN/2ezxhAVFXdhkJiMbQukAs=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Kul+UoEGCclB5Z4KAWfkF73ZSTrBVJ77RzHHpzVplWXzUjICl4IaMNIuG6pSKMy7THBjFTA1cRGSyQ5dlcQEDmxXLvQb4bv2DRLNnc2ADNGMRbgPC53YTajOOUI9m34uvScaHjzcjEHnedyVMQ7SOtt4fDEt/1J0GWlCz+cbpm4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=mD5MLQeP; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="mD5MLQeP" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C8E0BC4CED1; Wed, 19 Feb 2025 13:51:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1739973075; bh=Djbf4KqW2xY32dbdHluYN/2ezxhAVFXdhkJiMbQukAs=; h=From:To:Cc:Subject:Date:From; b=mD5MLQePuBA3co7TadcIZ8FuyExS1Lu4iYTWa60nIag6zE2hYC52thT8jM2Gj6tu3 hVh8PKwTv/tDG15CmaV+vkbjSozCeA4I8ZIpCZdfYrcwUEyynZsdSDEHgQ9fCg7jFi vho8y3/8vL7jXXhOssH43yIVifxpiXMlFfobO82kU1gKxw9PKD5SEyXTgeNUUgYbAM jz30tXTEaj25NZlLA/ZzpxsK/I/GkfiH6FA/pW69h2Azkg8L0AQtC51qQ4CIAcmmG+ 9qV8vj8B43sPhHqS+unafmJU+I7Oz3YpZ3PUD4azxX2iSkuL/g4NNbyzD5HPXiHV97 9qUnQ/jwX+0pg== From: Leon Romanovsky To: Steffen Klassert Cc: Andrew Lunn , Ayush Sawal , Bharat Bhushan , Eric Dumazet , Geetha sowjanya , hariprasad , Herbert Xu , intel-wired-lan@lists.osuosl.org, Jakub Kicinski , Jay Vosburgh , Jonathan Corbet , linux-doc@vger.kernel.org, linux-rdma@vger.kernel.org, Louis Peens , netdev@vger.kernel.org, oss-drivers@corigine.com, Paolo Abeni , Potnuri Bharat Teja , Przemek Kitszel , Saeed Mahameed , Subbaraya Sundeep , Sunil Goutham , Tariq Toukan , Tony Nguyen , Zhu Yanjun , Bharat Bhushan Subject: [PATCH ipsec-next v1 0/5] Support PMTU in tunnel mode for packet offload Date: Wed, 19 Feb 2025 15:50:56 +0200 Message-ID: X-Mailer: git-send-email 2.48.1 Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Changelog: v1: * Changed signature and names of functions which set and clear type_offload * Fixed typos * Add Zhu's ROB tag v0: https://lore.kernel.org/all/cover.1738778580.git.leon@kernel.org Hi, This series refactors the xdo_dev_offload_ok() to be global place for drivers to check if their offload can perform encryption for xmit packets. Such common place gives us an option to check MTU and PMTU at one place. Thanks Leon Romanovsky (5): xfrm: delay initialization of offload path till its actually requested xfrm: simplify SA initialization routine xfrm: rely on XFRM offload xfrm: provide common xdo_dev_offload_ok callback implementation xfrm: check for PMTU in tunnel mode for packet offload Documentation/networking/xfrm_device.rst | 3 +- drivers/net/bonding/bond_main.c | 16 ++---- .../net/ethernet/chelsio/cxgb4/cxgb4_main.c | 21 -------- .../inline_crypto/ch_ipsec/chcr_ipsec.c | 16 ------ .../net/ethernet/intel/ixgbe/ixgbe_ipsec.c | 21 -------- drivers/net/ethernet/intel/ixgbevf/ipsec.c | 21 -------- .../marvell/octeontx2/nic/cn10k_ipsec.c | 15 ------ .../mellanox/mlx5/core/en_accel/ipsec.c | 16 ------ .../net/ethernet/netronome/nfp/crypto/ipsec.c | 11 ---- drivers/net/netdevsim/ipsec.c | 11 ---- drivers/net/netdevsim/netdevsim.h | 1 - include/net/xfrm.h | 21 +++++++- net/xfrm/xfrm_device.c | 46 ++++++++++++----- net/xfrm/xfrm_output.c | 6 ++- net/xfrm/xfrm_state.c | 50 ++++++++----------- net/xfrm/xfrm_user.c | 2 +- 16 files changed, 87 insertions(+), 190 deletions(-)