From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 77FD2A0C4D; Fri, 13 Aug 2021 11:46:14 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8EF3D41247; Fri, 13 Aug 2021 11:46:09 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mails.dpdk.org (Postfix) with ESMTP id 14D9F40140 for ; Fri, 13 Aug 2021 11:46:06 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10074"; a="279274328" X-IronPort-AV: E=Sophos;i="5.84,318,1620716400"; d="scan'208";a="279274328" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Aug 2021 02:46:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,318,1620716400"; d="scan'208";a="508165871" Received: from silpixa00400884.ir.intel.com ([10.243.22.82]) by fmsmga004.fm.intel.com with ESMTP; 13 Aug 2021 02:46:02 -0700 From: Radu Nicolau To: Akhil Goyal , Declan Doherty Cc: dev@dpdk.org, mdr@ashroe.eu, konstantin.ananyev@intel.com, vladimir.medvedkin@intel.com, bruce.richardson@intel.com, hemant.agrawal@nxp.com, anoobj@marvell.com, abhijit.sinha@intel.com, daniel.m.buckley@intel.com, marchana@marvell.com, ktejasree@marvell.com, matan@nvidia.com, Radu Nicolau Date: Fri, 13 Aug 2021 10:30:10 +0100 Message-Id: <20210813093019.785286-2-radu.nicolau@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210813093019.785286-1-radu.nicolau@intel.com> References: <20210713133542.3550525-1-radu.nicolau@intel.com> <20210813093019.785286-1-radu.nicolau@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v3 01/10] security: add support for TSO on IPsec session X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Allow user to provision a per security session maximum segment size (MSS) for use when Transmit Segmentation Offload (TSO) is supported. The MSS value will be used when PKT_TX_TCP_SEG or PKT_TX_UDP_SEG ol_flags are specified in mbuf. Signed-off-by: Declan Doherty Signed-off-by: Radu Nicolau Signed-off-by: Abhijit Sinha Signed-off-by: Daniel Martin Buckley --- lib/security/rte_security.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index 88d31de0a6..45896a77d0 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -181,6 +181,19 @@ struct rte_security_ipsec_sa_options { * * 0: Disable per session security statistics collection for this SA. */ uint32_t stats : 1; + + /** Transmit Segmentation Offload (TSO) + * + * * 1: Enable per session security TSO support, use MSS value provide + * in IPsec security session when PKT_TX_TCP_SEG or PKT_TX_UDP_SEG + * ol_flags are set in mbuf. + * this SA, if supported by the driver. + * * 0: No TSO support for offload IPsec packets. Hardware will not + * attempt to segment packet, and packet transmission will fail if + * larger than MTU of interface + */ + uint32_t tso : 1; + }; /** IPSec security association direction */ @@ -217,6 +230,8 @@ struct rte_security_ipsec_xform { /**< Anti replay window size to enable sequence replay attack handling. * replay checking is disabled if the window size is 0. */ + uint32_t mss; + /**< IPsec payload Maximum Segment Size */ }; /** -- 2.25.1