From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 588EDA0C4E; Thu, 12 Aug 2021 16:10:21 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id B259A410FC; Thu, 12 Aug 2021 16:10:16 +0200 (CEST) Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mails.dpdk.org (Postfix) with ESMTP id 0B35340042 for ; Thu, 12 Aug 2021 16:10:13 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10074"; a="300944303" X-IronPort-AV: E=Sophos;i="5.84,316,1620716400"; d="scan'208";a="300944303" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Aug 2021 07:10:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,316,1620716400"; d="scan'208";a="446554311" Received: from silpixa00400884.ir.intel.com ([10.243.22.82]) by fmsmga007.fm.intel.com with ESMTP; 12 Aug 2021 07:10:02 -0700 From: Radu Nicolau To: Cc: dev@dpdk.org, mdr@ashroe.eu, konstantin.ananyev@intel.com, vladimir.medvedkin@intel.com, bruce.richardson@intel.com, hemant.agrawal@nxp.com, gakhil@marvell.com, anoobj@marvell.com, declan.doherty@intel.com, abhijit.sinha@intel.com, daniel.m.buckley@intel.com, marchana@marvell.com, ktejasree@marvell.com, matan@nvidia.com, Radu Nicolau , Abhijit Sinha Date: Thu, 12 Aug 2021 14:54:16 +0100 Message-Id: <20210812135425.698189-2-radu.nicolau@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210812135425.698189-1-radu.nicolau@intel.com> References: <20210713133542.3550525-1-radu.nicolau@intel.com> <20210812135425.698189-1-radu.nicolau@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v2 01/10] security: add support for TSO on IPsec session X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Allow user to provision a per security session maximum segment size (MSS) for use when Transmit Segmentation Offload (TSO) is supported. The MSS value will be used when PKT_TX_TCP_SEG or PKT_TX_UDP_SEG ol_flags are specified in mbuf. Signed-off-by: Declan Doherty Signed-off-by: Radu Nicolau Signed-off-by: Abhijit Sinha Signed-off-by: Daniel Martin Buckley --- lib/security/rte_security.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index 88d31de0a6..45896a77d0 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -181,6 +181,19 @@ struct rte_security_ipsec_sa_options { * * 0: Disable per session security statistics collection for this SA. */ uint32_t stats : 1; + + /** Transmit Segmentation Offload (TSO) + * + * * 1: Enable per session security TSO support, use MSS value provide + * in IPsec security session when PKT_TX_TCP_SEG or PKT_TX_UDP_SEG + * ol_flags are set in mbuf. + * this SA, if supported by the driver. + * * 0: No TSO support for offload IPsec packets. Hardware will not + * attempt to segment packet, and packet transmission will fail if + * larger than MTU of interface + */ + uint32_t tso : 1; + }; /** IPSec security association direction */ @@ -217,6 +230,8 @@ struct rte_security_ipsec_xform { /**< Anti replay window size to enable sequence replay attack handling. * replay checking is disabled if the window size is 0. */ + uint32_t mss; + /**< IPsec payload Maximum Segment Size */ }; /** -- 2.25.1