From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0045.outbound.protection.outlook.com [104.47.34.45]) by dpdk.org (Postfix) with ESMTP id BDAEE2935 for ; Fri, 14 Jul 2017 13:12:29 +0200 (CEST) Received: from BN6PR03CA0021.namprd03.prod.outlook.com (10.168.230.159) by BLUPR03MB471.namprd03.prod.outlook.com (10.141.78.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Fri, 14 Jul 2017 11:12:28 +0000 Received: from BL2FFO11FD022.protection.gbl (2a01:111:f400:7c09::150) by BN6PR03CA0021.outlook.office365.com (2603:10b6:404:23::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13 via Frontend Transport; Fri, 14 Jul 2017 11:12:28 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BL2FFO11FD022.mail.protection.outlook.com (10.173.161.101) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1240.9 via Frontend Transport; Fri, 14 Jul 2017 11:12:27 +0000 Received: from [127.0.0.1] (B35197-11.ap.freescale.net [10.232.134.49]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v6EBCHLs011806; Fri, 14 Jul 2017 04:12:24 -0700 To: Declan Doherty , Boris Pismenny , CC: , "Nicolau, Radu" , References: <1499672117-56728-1-git-send-email-borisp@mellanox.com> From: Akhil Goyal Message-ID: <7834b3bd-0800-500c-1c89-3b89e2eb47fa@nxp.com> Date: Fri, 14 Jul 2017 16:42:16 +0530 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-EOPAttributedMessage: 0 X-Matching-Connectors: 131445043474879162; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39410400002)(39400400002)(39380400002)(39840400002)(39850400002)(39450400003)(39860400002)(2980300002)(1110001)(1109001)(339900001)(3190300001)(377454003)(199003)(189002)(24454002)(9170700003)(6666003)(4326008)(2950100002)(38730400002)(36756003)(120886001)(77096006)(64126003)(498600001)(305945005)(356003)(104016004)(8656002)(54906002)(65806001)(229853002)(4001350100001)(6246003)(626005)(53936002)(230700001)(31696002)(65956001)(47776003)(65826007)(8936002)(7126002)(5660300001)(7246003)(76176999)(50986999)(23676002)(2906002)(85426001)(561944003)(31686004)(53546010)(83506001)(54356999)(105606002)(81166006)(86362001)(8676002)(33646002)(189998001)(68736007)(50466002)(106466001)(21314002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR03MB471; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BL2FFO11FD022; 1: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 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5209e5ad-5772-470e-f159-08d4caa93642 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BLUPR03MB471; X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 3:1m9mpFcKOuHegeYcHZQZe+44Tu9Oe2KgcGrThlIH32tCMnSWOH7HwGyxB8Zjcxh5AQ5kQ0ajqjDv+SQUx7FtlT0BqchvZIBxybMNBNX4bgFNKGgYTAOIsAwSh6ZbqOv7dWEL9gPhxYoHS+sGJ9L6SC8zd8pgngu2RepM0LBx0/Cr75UrijcE8kFrzOnbIJlRUBWnAVQnJxLmIOrTx6taJJUmRNy+URhUG66y3aGx+c+xgwCgrAPJ4wuuCmUwxSrxinENXtLwk6Nc/z3s5mlvSQ+VsvaZhxZ5ao2w7ionoYuh6Qs74wftenU9PGQYw2SfxOZZ5bWDVxYS0gMKmCL/9sQtiTqA8pToTfWGHtCe3DMZrRNq7v6s+ahb/9osvZTZzRUkCRCYqvDnNG96dCe0yij4TpPblwOmnlvpt2qupHe2qtfOgDUe1KzfD3h6A01Fm8tNYI+0e7WoyCmlxC3f/voj2mSsyr35XYjiz10iqhFNORPNxKw6jwjxYjtJDPSHF9Sab28kQJDBu1iUcOinDIwhsPBkWALUvo+BDHNxt69WidPVdFV3qsA03jT2JHHG8RXEZZ1pBG1K/kymBUf9Ccb3Ap4Pj5k+Uj/js0yxBOjMy0XFTkJ7dsxkQCwHSzUZp0yOpcSGaFLuk2Tnhw+1qdx+Xkl+YHEVjgajLSxsb9RA4PXbdds2IRaJF7Zb1suOAVH2gEBYnzsR3Rk6NwMN55ORSKv6lxA6N/xuRDKdIZymvwBPPW5Zcmt3JQeU6Qy5yJC9mvVd+Oh1fUkyGHHF+78dsu9orodquXNXyFxK5KMhZVP1bWT4TINPXLSwLZmH5FMQVSqgbrZiTtRYwexkbwGRIEqDA7uBTuqKXIf0Vt5MSl0Cw67GRKZ6ffZvTNcU X-MS-TrafficTypeDiagnostic: BLUPR03MB471: X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 25:hzbUgrSyxA1lfEi7fiz42hdIcgWAiTauaVnoMVRGbvu1z083cOOBNXjuG2KWmCh7DYPSQlBZAMHw/S0dXK7JbTUFxTFxz6YCe+mUm8B/e85y/8BxZfh20m9Z7gFiULreoMVYyq956U+8Z5RStRTq5Rnf0pL5M+OlxxMnhUj/EnXyLNzKrltnifzIE+4iZ1ppBWzcvgbWfHJcupOS9SLgBqX7bMl3+MY916Y77XXTLHA9GhmEbtgimeyUSx85Ri9OWyF2x8pyg9bDmcxB0j6ZNNg6lURjoVExrOb2ZcPNksXHRnua8M3h9EHkjaPWLp9WxWlc/tFCuOkjKkWv5S8cFRaK3BmJKEJFWkhzLwwfo4vqlh5wso/SbLpWGnnMMREw72Ql76ly//LEDhcoy/3kBleQ+6L+SKuslaAPyyG3u+yyVrclQDvWhSyXlEywOjuk3R/+StOaYAbPBHgNr8ixahXWKskraeZLGDH9mMxysjKVhEj4BXaFQ0rUhfvfEURRrQBIeK4JVk590USXjYfIWjsRbW6E5ooIRdWxNZJJoNTlLeHDJ1eE1TGwhTe+8WC0J8eMKcprO+Ud/ddIpsKK/X/KQoh71kua38zRTprZgjc/T5HJCuuUSRhUisG4jwpqoOev/jVxQ+k6ZFXH+4im8r2VGAg28zs9uojEOFLSZf9DBJfypWDBNWujqwy0SkxE/s0qoviMuwo8CqlfrvZibJNv6iuHDRbXYOBIHxko7gjxFSV8RpIqISht22DYGi6+HCWM0sIEDfOa0jw6Lres9tQ489U0kzbN5RLIO1qErtfUxx7QMX9obgfIdhWaZ8VJk7m/d/zNHUmRTx3Ujm8ZrIsfSaDr1Tac79qAZWwsJCGiTXUSyGAqesXhtS+X/iO050u/NB+P3UXnthf+TsQXUsA95DA8DaRuNurjmQPxwJg= X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 31: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 X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(192374486261705)(131327999870524)(48057245064654)(148574349560750)(247924648384137); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13016025)(5005006)(8121501046)(13018025)(2017060910075)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(3002001)(6055026)(6096035)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(20161123559100)(20161123565025)(20161123563025)(20161123561025)(20161123556025)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BLUPR03MB471; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BLUPR03MB471; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjAzTUI0NzE7NDpxMW5OR1NsTWE4MFRnaGdRK09EU0pCWGtndjVS?= =?utf-8?B?dmNlMVo0Y1pCRlZkMUh5Q2k2Y1loKzQ2NDM3aUF6dkFIMXFrSHd4RUorR29K?= =?utf-8?B?NHFUS20vV3Zna2kycTR4a3V6UngvVi9VQjZhSU1mbGEwYWdZVTdqbmhvc0I3?= =?utf-8?B?QUMvd2tSTEFRUXZyamtmWTRTTWZiK05vM0ZnOHNVenhZdU9MZVhVK2dlR2dn?= =?utf-8?B?OWYyUC9SWGdUTTZvcnpvSlc0eWhHUnZkMVdVYmtaa1NSdTFYam1TRTlVY2Fw?= =?utf-8?B?TEJtU2x1dnpsNGMxeW9zOEQ1bnpXRHUzKzg5LzdqT25WbkRLOW0yOGRKV2RT?= =?utf-8?B?OGdOZmE0SitOTjMzeGE0VzE2ajBhaGVITC9aTUd3aEV0S0VuaG9LMnVNdlNl?= =?utf-8?B?aWROUHVEK0ZsK3l5ck1jSGJQVzNZTTZub29FVkt1RTJKS1UrU21rcnQ3R05T?= =?utf-8?B?VTJBOTVoRjNaVUlrSzNNZWwrQmoxQ1FlUTZqcDIrTnR2cy9yWDl6RkgxUy96?= =?utf-8?B?V0F2RnpZN1FVQzFVeWEyMXBLZ011R0l4WFJuWDlmQ0RZcWs4T2FELzJhaVJj?= =?utf-8?B?TXRSUWNraWtqZTZkUzFUSHBJNkgxY1crRlhtZFE3eTB3aHZLMGd3aGRRT1RV?= =?utf-8?B?dnZCSS9vaHVaMGhHbkh0ZmxtcjZsZy8yWWVZejZKNTZKZVNacHFLS21sNDVS?= =?utf-8?B?VVZkcytjVEdzODNYK0tIM0drdkV6VUJqMGlLUWJCbVAwT3RDZ09CdnYzZ2p3?= =?utf-8?B?bjI0TDh3QzBHdk52ZU5DSnphdFQrc3BwV0w3WXFiRU1SeEFINi92Mld2OGl6?= =?utf-8?B?T0pTVlZaNkpxOWdCM0V0OTBsTmsycmtDdHZRTWhSS2hWcGdWcno2UGE4ekNq?= =?utf-8?B?VTJYK24vTGJYc3E3aE1MeTdVQUZRV0t1SGsyRndxZncxY1R5OGpsdUVVR2Ur?= =?utf-8?B?OUxNaWg1YUhoOUdSM2FQSGpSODVkY3RTRXh2THprakhFZDdscmtvOG5qRW1D?= =?utf-8?B?NmVyeEZFeW1oSThCa3BJcGVOemg1eU5KMHdTUThYQnhjNndWQlV6OVhnY0Rs?= =?utf-8?B?TE9YcTZXbHlmbVJjeTRyU3BINFBuWVVleVlFeEhlWUxIbE9KSGh2M0p2SktV?= =?utf-8?B?SjBrQzh1Vy9VWVZ6MGtMT1RrYnV1dG5OR1pUTzdCODY0blNORVI3cGJSdkNq?= =?utf-8?B?cmRmK0FzbDV6KzRwNGpRcjVQVFZxRktMazJJQVQyUitJdWt5eTVsTTEwT3hm?= =?utf-8?B?WFdlR0VqUWYwa0hUK2RYZ2kwVUkzSndkUlg1RUZsbXFqVmh3ZVdBTlRWeVI3?= =?utf-8?B?NTRiNDhSelhJenUzK0F6UW45OHRMb0hJRGJUbW1zNnp6Qi81NHhaZy92djl3?= =?utf-8?B?YzBQTExLMytEY0d5U0ZyUlJRNHZKamlwTG5hMnBQWEpVdHZ5cWQreW8vamZl?= =?utf-8?B?U2JLQkpWUEJ3SGhvTHVkL1VvUlNaUkkvYTRNdkNLUThDSytPbGlMK3BGVHlm?= =?utf-8?B?KzIrc3J4VWJYYWszSncxN3VuRUJIVG0xaXpNWmg3dWtWSVlsSUd1RW8vK3J4?= =?utf-8?B?d1ZYRExJT1JhMEhRbnFsVkpCb3RBaVc2WHp6QlVWemUzRDlwRGhMSXF2NExi?= =?utf-8?B?Y1FLT0RENGY4Z1Q5TEVIVlFibW1ncTlrMXNaYlZNQ0JDZ2Fha3U5bFR2U1dU?= =?utf-8?B?eFc3d1FuaGVTenNiTm83U1JUUnMzbUt5ZUN2RUhJSm1uYnJ2bzB1LzVyZjBj?= =?utf-8?B?QVJvdngrZmNKMWh3Ry9VVGxrSzR5NEtZbGtCUjIxUHE5dS9yMnpNRG4reUkv?= =?utf-8?B?cE9UWWE1bitmb0xVMktrZ2t4Zys1RTBtS251eUU2VnJGVTNuNzRiVitQNnVa?= =?utf-8?B?bU1GWUhXWU5LK0JaUEJiWmpxejZJaUxkRlZQRjBxay91NjZhT2QraWJwUVhB?= =?utf-8?B?dFhvZHZZMHZwcFhxS056L0JUd0twakdhdGV6ejFMZDNiQnhvYWxvQ2IxZFM0?= =?utf-8?B?cENGeVZEbk5uVlVXWmtoc1l3aHRtbmFRQWtZbVFuV2V0ZThRby9NTjAxc2ZN?= =?utf-8?Q?HY=3D?= X-Forefront-PRVS: 0368E78B5B X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjAzTUI0NzE7MjM6ekJtazlKYWZ2bTM0VGZxRXE3SUxKa3oxOVVa?= =?utf-8?B?cjlJZGVvWklmVGR6NHIxVEFFNnh3TWQzTnpTam05bnVrM2w3U3hFd0QwT1ll?= =?utf-8?B?ODFHTVVPaytYV3dXQzlXNEt3WCtneVlEbHUrTTZlSHlzY05kRlNMT2sxUm1a?= =?utf-8?B?VURZTmVNdEZzRXJaMzgrZnQwNzVrNnlkMk9VUTIyQWdOc3I3c2dTclU2TUt4?= =?utf-8?B?eWdUT0NLN2J5OS9MVUYyZEo5Y3N1K1piUFBUMGZLMXV6WU1iem0zaUh0YnZI?= =?utf-8?B?TEZyamZRQXhjQVJSaXNpUjBhakl3c0VsN2dRMEZmVURsQ0dBZlozTUtncm9Q?= =?utf-8?B?cDRxRlY1UkdHUjBkNGlWcCs5NXZSWGlVY3EvVCs4VDYzNDB6NDdlSzV0Rk53?= =?utf-8?B?Z2c5M2gxREYxM0p3NWtNc1IyY0txNXl5YzJkWUtkU3MyRndPaHdqM0duUVhS?= =?utf-8?B?RWI1S1BSeElvQnV6RWx2UzBsS0tabTJKcENmd0dsRmtDbk40OW1pSzFEWUhO?= =?utf-8?B?SWIrQnprVWc0S2NMdzIzMEVuRW40dHFFaEF1cW12NkRzYnVkY2c4OFNoeUxi?= =?utf-8?B?UkhEeFVFTXZZSUNWYnlsNGNyN1BYWmNwZG5wcVRJVTNwa1lHL25wdnl0cmxm?= =?utf-8?B?YXJLYlRPbkxqUE5XK205cDgyVjVpVldmSXpHWDRJVmRUbEdYbnNPL293ZXdr?= =?utf-8?B?eFNlYWJLUVFIalh5bkFxRUVGRnh3WlhJb0ZjMmZpdmx3cG02T0VJaWxoRjFw?= =?utf-8?B?SG9ReGUyVlNrRlZ2bEdPb0IyWVZwQTZXcCtxdWVPcUliQVFOYi8wSStZUmlR?= =?utf-8?B?Z3RrREdueG9FV1hoK1p4WXhnVFRVUis5dHRqakdoL2UzNnRRZDRNaEhyMFJ4?= =?utf-8?B?WkxDZndiRXJ2cFR0dURYUnJRVTNDOW9oczJ6c05yMjNuVGVSZkg2MnBsZGNL?= =?utf-8?B?akpUZHVWeEh5TDZGZzRmdEVXYTNnbkcvbURyWjYvdWVkcVN1UlJJZitXR3VP?= =?utf-8?B?ZXJGYTdkOEZNQWtSaURObXZoNkJPeUdvV25oL0F6RHo2d0tWS1FzYVpJaGt1?= =?utf-8?B?S29McnV5T3ZNVFpTdkRyOXgrdnUzYUJzV1BYN1NmT2FRdFJNWDJyYlUvQmcr?= =?utf-8?B?eW1LOUZ3cVNTWHpRR0pGaWhoQjZCMmpXd0NxUU1pVHQyQnhteXBxeXlVMWpy?= =?utf-8?B?eWNhQmFuZFVpSURld21oQU9SMnJLdFNpSkxiWW5qZXRZVG1pbmlodEM1eFZD?= =?utf-8?B?OHNyUVd2b0VkbkxKL3Z1ZllVM3JVTHpzRjk5Uk5XbTg4dld0RHRPMHJlUEtp?= =?utf-8?B?QmdXNkUxcFlDcGErVnUrVkNHNWNCRGI0Ynp1NnhxSU1sRWF3WTJwN2xKTzRV?= =?utf-8?B?eVVBaCt6UTV0aXFkZG92SjlYWGcrWXhkMEUwcGZuQU54WW5YZHhPSEZPSjVh?= =?utf-8?B?WGk5VVdvSXJDdDlESjNKbktZWXh1OGpWcjFNekZBaFNEUjgxVU5Wc3ZLYytU?= =?utf-8?B?aG1qQ205WklCa2FvQ1ZtZElPS1o4SHoyT1MzaDFyWDR5WHU2SzNlUjdKRXF4?= =?utf-8?B?OEd6Tk5mSUpadkhsVXArWkU1cnJpQ0dzcmVEclI4NVl3TFpZcmN0U3FWWFo4?= =?utf-8?B?VU02S2R6cGJIVjRpVnByWkVSRnRkSmtiL0lJd3RwTXE3NU4xWEl3UWtiMHVC?= =?utf-8?B?Mlg0eXZNTGpXaVF0S09zajFIUGFSNGhPL1p6SU5uZ0tjN2ZORlFIRGIxWlc4?= =?utf-8?B?b3hIS296SFpBR1dGNERuRFBJYmtzbUNLZzFiSmoyUTMyM2xUTWYrc1YwSm5X?= =?utf-8?B?STRPN1NRekZXT3FjeFk4NWhCVHdud09Say9EWTIxNFBuWDEzT1l5QlAzVFNo?= =?utf-8?B?cXBNVTl6SFJaUjZ5N2o0dGM5WnpKNGxJVmJQQmZheGtvSmQrOGJNZ21mZVVy?= =?utf-8?B?VUhkZlFObW92ZDVnM2JWbHI1NDNQQWFUazlQY3N5YnZBVm9HVzgrQ2VQL0tD?= =?utf-8?B?aVU1NEx6bkZmN3dmQUVPWXBZS0VWWEExcjJnZk5sa1ZaUlFPazFZS0JSL1Yr?= =?utf-8?B?TlBSV1lWckVjK1pMNlNoNjFoalNBYlFBZ3pqU1NWdGtjQjJtMnc3ZWhVc3oy?= =?utf-8?B?WWZRQWtBbnU2MjBjaWw5ZkkwbU50cWQ0THY5WG4yV0tWVXQvOWJSMHc4Zklu?= =?utf-8?Q?Gbm4WFAW8exMJfHa3d9toM/JZPLvq3y80QZbZejuE=3D?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjAzTUI0NzE7NjoyZ3RMNlpWeUdEWWZSMmp0SGdma1hsUW1ZNmF5?= =?utf-8?B?S1pBdUhoNnhlZ3cxZER0ZWRsTXppa0NYc0pFajVla0w5M21Pb3llRWtBRWVD?= =?utf-8?B?Q3Vock5yb1ZrcmgxTVdyMmgyR1gwaS9SNXBzaXJhUUp1VFp1UWVpY29VdVND?= =?utf-8?B?QS9KMk5yVEx4SWZGSGxvWE93VGFpMmcrSG9Za2prdHp3U2ttaGhQNEl3VXA1?= =?utf-8?B?SlRrZTNZd09rTStTODBDUXFzNUh3b2U1cDlsT0U0TUVIZmFzb0VWRlQxTDJ6?= =?utf-8?B?RzF5MlIrT0RxSitnWCtzZHRKWHdlNjZyUWRlbC82UnBDUXZoUjNrTk93aTRi?= =?utf-8?B?VnVBMUxZeFZwajcwMEM1S0wxenJNeVlrdFpXUjRlNE1VZG1TQ0RsN21tR2NX?= =?utf-8?B?TlBwM0hQQmt2dWJjREt3K0dESGpKQTlLN2tlMUMwSjdKTUhxcXFMYzY5VmQx?= =?utf-8?B?RHpiRWx1UW1renNDbkZhYTBpYkxUdndYbGpMc002RWFyVjVNUk9qSngzN09x?= =?utf-8?B?enlueVJUN2pIYytvQ3FsWjcvVndaOHFWL1NtN212K1RTQjBXbUYxbzRGTEVP?= =?utf-8?B?VWtSQW51YkU5dERjRkpKTm5UaXBITW5Qa0ZTRW1KZERuWGMxWi91R1JRSHRD?= =?utf-8?B?WXE0V1JHa1Bsc2RnanNncVh1eEJDZzV0QmNLY0xSczJrNXprTGZHVTU1Slda?= =?utf-8?B?Wm0yQ1Qxc1R6cU9ibTk1bEd0MnlUV2Zla3htaWpBeUdxOVgxWWZJQTkrZ01h?= =?utf-8?B?dHF1RWU0SjhVR1l1TkpwdkMyZHhmeTdpODFFTkIyQks4QmY5SUpiaHovOGpl?= =?utf-8?B?d25UaUJRLzhseU1XYTczbDN2NCtqNVdyZG44anc5U0dDS29xQ0RHb0lIZmRl?= =?utf-8?B?QVdPZGI5UU5FWUllWUxENE1Cc1hpZHQ4Znh6bldIdE8vZ3dmNHd0RThWU0VP?= =?utf-8?B?R0tPUDhKQ2pqMFVERTRjdHpKV0xiTXEzemEzVkYzTUVuWU5hZU1USFBzRmpl?= =?utf-8?B?Y3M0TVliWmZOWlh0a2lXR3ZFNEs2d1I3NGQvQnFidENhU1hXV2djbjNaalVs?= =?utf-8?B?SHdXbWgrOTdSQTNlNi82QklTSHJCRzRNQ2pNM1BWVFJGZzFWMUI3cjNDQzZo?= =?utf-8?B?cEpTbkR3eWo2RGZoTEx0Z3JQc2plOTFVYVNPSHRrWFVYVGM2Qkpva3lTcnVE?= =?utf-8?B?RkwwanhNZXErdFVNMUdTSUhhN1pDOGljaStGenJuUCtnQ2tKenl3TUtVdnpB?= =?utf-8?B?czA5T2U1aUEzVHpwaEExQjhwZng4RzZJT1JSdklUZHA1NnhJMnhGZ2ZjSFNt?= =?utf-8?B?RGt5bnA4THVBPT0=?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 5: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; 24:OHw4LKgKmXbvGPINf1x7u0lQL2jXPcO/Qz2/g/LMTn+tethSwKTIfbj95UIZCKW4WF+ndjhvQFUYSG2CgbazGCm8zRMFelaABG4wErvIwMI= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Jul 2017 11:12:27.2539 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR03MB471 Subject: Re: [dpdk-dev] [RFC 0/7] ipsec inline X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Jul 2017 11:12:30 -0000 Hi Declan/Boris, On 7/11/2017 10:36 PM, Declan Doherty wrote: > On 10/07/2017 8:35 AM, Boris Pismenny wrote: >> In this RFC we introduce a infrastructure for IPSec inline hardware >> offloading. >> This RFC introduces device capabilities, configuration API and data path >> processing. We also provide a comparison with a previous RFC posted on >> the list >> for this feature. >> > > Hey Boris, we've been working on v2 of the RFC based on the feedback you > and others gave on our original , but as what we were going to propose > is largely inline with your proposal here, with one or 2 exceptions, > mainly on the IPsec SA management elements, I'll just comment here > instead of sending another RFC. > > We agree the rte_flow based approach as proposed here is the more > flexible approach and should work better with futures devices which > could offer support for other protocols as well as full protocol offload. > > The main difference to your proposal below and what we are considering > is that we would like to introduce the idea of a port based rte_security > API which would support a generic API for security protocol > configuration, I can see MACsec, IPsec, DTLS all working easily under > this approach. > > struct rte_security_session * > rte_security_session_create(uint8_t port_id, > struct rte_security_sess_conf *sess_conf); > Is this a proposal to add another library to add APIs and structures rte_security_XXX. If not, is it not worth to add a generic security library which can be used both by ethdev and cryptodev. We may have crypto devices(dpaa2_sec) which can also support look-aside protocol offload. rte_security_session_create(), may take a dev_id and device type as input and call respective device's security session create. > > The session create function will return a opaque security session which > would be used in the security flow action programming. The session > configuration will contain the security protocol specific information, > in IPsec case the SA parameter as well as the crypto xforms. > > /** IPsec Security Session Configuration */ > struct rte_security_conf_ipsec_sa { > unsigned int spi; > /**< SA security parameter index */ > > enum rte_security_conf_ipsec_sa_dir { > RTE_SECURITY_IPSEC_SA_DIR_INGRESS, > RTE_SECURITY_IPSEC_SA_DIR_EGRESS > } direction; > /**< IPsec SA direction - ingress / egress */ > > enum rte_security_conf_ipsec_sa_mode { > RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT, > RTE_SECURITY_IPSEC_SA_MODE_TUNNEL > } mode; > /**< IPsec SA Mode - transport/tunnel */ > > enum rte_security_conf_ipsec_sa_protocol { > RTE_SECURITY_IPSEC_SA_PROTO_AH, > RTE_SECURITY_IPSEC_SA_PROTO_ESP > } proto; > /**< IPsec SA Protocol - AH/ESP */ > > struct ipaddr src_ip; /**< Source IP */ > struct ipaddr dst_ip; /**< Destination IP */ > }; > > /** > * Security Session Configuration > */ > struct rte_security_sess_conf { > enum { > RTE_SECURITY_SESS_INLINE_CRYPTO, > RTE_SECURITY_SESS_FULL_PROTO_OFFLOAD > } action_type; > > enum rte_security_sess_conf_type { > SEC_CONF_DTLS, > SEC_CONF_IPSEC, > SEC_CONF_MACSEC > > } type; > /**< Type of security session to be configured */ > > struct { > struct rte_security_conf_dtls dtls; > struct rte_security_conf_ipsec_sa ipsec_sa; > struct rte_security_conf_macsec macsec; > }; > /* Configuration parameters for security session */ > > struct rte_crypto_sym_xform *xform; > /**< Symmetric Crypto Transform Chain */ > }; > > The APIs would be introduced in the same manner as the flow and traffic > management API as a plug-able component into a ethdev, and would provide > the abstraction to configure security protocols state (IPsec SA, DTLS > record etc.) and then the flow action would be a security flow action > instead of the crypto flow action as proposed below. > > This gives a flexible approach to future extension to other protocols > and modes (crypto vs full offload) and also addresses an issue raised on > the our previous RFC regarding polluting the crypto namespace with > security protocol specific information. One other issue with putting the > protocol information into a crypto transform is that we won't have any > crypto devices which support them. > > > >> 1. Inline crypto processing >> 1.1. Device Capabilities: >> o DEV_RX_OFFLOAD_IPSEC_CRYPTO - device support inline >> ipsec >> decryption offload. >> o DEV_TX_OFFLOAD_IPSEC_CRYPTO_HW_TRAILER - device support inline >> ipsec >> encrypted offload, ipsec trailer is added by hardware. >> o DEV_TX_OFFLOAD_IPSEC_CRYPTO_TSO - device support inline >> ipsec >> encrypted offload within segment large packets, ipsec trailer is >> added by >> hardware to each segment. >> >> 1.2. Configuration API: >> We will modify steering API in order to add IPsec transform actions. >> >> o Definition of ESP header: >> >> struct esp_hdr { >> int32_t spi; /**< Security Parameters Index */ >> uint32_t seq; /**< packet sequence number */ >> } __attribute__((__packed__)); >> >> o New flow item: >> >> enum rte_flow_item_type { >> ... >> >> /** >> * Matches a ESP header. >> * >> * See struct rte_flow_item_esp. >> */ >> RTE_FLOW_ITEM_TYPE_ESP, >> }; >> >> struct rte_flow_item_esp { >> struct esp_hdr hdr; /**< ESP header definition. */ >> }; >> >> struct rte_flow_item_esp { >> static const struct rte_flow_item_esp rte_flow_item_esp_mask = { >> .hdr = { >> .spi = 0xffffffff, >> }, >> }; >> >> o New ipsec transform: >> struct rte_crypto_ipsec_xform { >> enum rte_crypto_cipher_operation op; >> enum rte_crypto_cipher_algorithm algo; >> >> struct { >> uint8_t *data; /**< pointer to key data */ >> size_t length; /**< key length in bytes */ >> } key; >> >> uint32_t salt; /* salt for this security association */ >> }; >> Authentication algos and key missing. -Akhil