From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <dev-bounces@dpdk.org>
Received: from dpdk.org (dpdk.org [92.243.14.124])
	by inbox.dpdk.org (Postfix) with ESMTP id AABE1A046B;
	Thu,  9 Jan 2020 12:49:56 +0100 (CET)
Received: from [92.243.14.124] (localhost [127.0.0.1])
	by dpdk.org (Postfix) with ESMTP id 3BD8C1DC86;
	Thu,  9 Jan 2020 12:49:56 +0100 (CET)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com
 [67.231.156.173]) by dpdk.org (Postfix) with ESMTP id 00FEB1DC85
 for <dev@dpdk.org>; Thu,  9 Jan 2020 12:49:53 +0100 (CET)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1])
 by mx0b-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id
 009BjmbS003862; Thu, 9 Jan 2020 03:49:53 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;
 h=from : to : cc :
 subject : date : message-id : references : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=pfpt0818;
 bh=+gktYU5mTxDgHFapMaLc6sGcPJHx1qU59d9mm0AJjOE=;
 b=C3QCfMWOYD9z74LI7nOI4oAjT2Y2c5z1SpHgLcISPsoRvIVP/OqkHO58h9VOhSIcnO6G
 HHSUIupxNIpHS25ZrRX41fNH2LkZyQwNRjLsAkwRTMDB0yzBKY10yGYcYp1obhNCN5WM
 AcTFj/PqThVxD6yDAljlFYo33+PVDY6Cxkn1is/EutZPZ3c/ErF8o468LfjRDqKhVKlB
 nSjwVjZWlIzL+0RTwKzkFU94eKJymruyudBKQ1yYMnnIbye1ub/nmkqBAozo+pzSgxEW
 4Zd2+i1kq8J4o3Y0iISwoIBHe2yit5ZmKkHbMx1SE2Tiko538z7vt/D4ZAAdbeno6jhA Pg== 
Received: from sc-exch04.marvell.com ([199.233.58.184])
 by mx0b-0016f401.pphosted.com with ESMTP id 2xdu321tc3-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);
 Thu, 09 Jan 2020 03:49:53 -0800
Received: from SC-EXCH01.marvell.com (10.93.176.81) by SC-EXCH04.marvell.com
 (10.93.176.84) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 9 Jan
 2020 03:49:50 -0800
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.105)
 by SC-EXCH01.marvell.com (10.93.176.81) with Microsoft SMTP Server (TLS) id
 15.0.1497.2 via Frontend Transport; Thu, 9 Jan 2020 03:49:50 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WauBYsYu4dLYDUvQhkad3fCFWPOLk95m1H4M/kQeaUjFXuAotVbPzUesvGOlB8US8clEB5t3o6n+BoS7PixPlQfjoEOyqpouNjN+VA93/281YOESQLfko9J6tUUt8brMgnGMp7FGsgrLC0xpjAck4qxc9kE5+RdlM3husaRsYx6484zm8vTUqmM+EFz0XK1IEpCxp0kXm/N3EenHspItvdQeyk3jS++dl/4tAsPyhKY7KIeHF8PUlZYqQckPQ4PbF8Wd7njb7Xpmjh/dl6PiskDexf4vwTQpk9gsl117/8bT9LUlayALaAULgX58bP3HO424WpFudjGT/mOef/K2tQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+gktYU5mTxDgHFapMaLc6sGcPJHx1qU59d9mm0AJjOE=;
 b=cyVKn8g9Jif8D9+9qoN3njJVVOOjvyxXbBEGitkkvZj0IZ/rIRXSC6mjLIucRIrQFafjhUwNmYbiMbzt26HiU4e1TzD/7O7otkxwraqS92q5Ij970QiUXfJLdaz0VMkFhd5NZIPVbBkNHDETwrHa7gzZ06CLt2/ZWR+AewVtZnAPtK9CJLOtOwQpc3HFM7iQzSphcimsZjUHHQiR+yBcvxniwnlDIrj5/RF56uOeTPt2Fo/NOgBwMLa1uej/cyfp13zqkJZCM5aRNXtJfLiu6i0la8iaHdjNkQ9SZlO3dHBPE43uoXaGqefwltaxvhV4IKCWVX3MTnCVSpvBnwapQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com;
 dkim=pass header.d=marvell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+gktYU5mTxDgHFapMaLc6sGcPJHx1qU59d9mm0AJjOE=;
 b=dcFaiV3k6zMLGiWEOlNwIUhwi1AcvG5eGDInWkbi7MpVLv/U8vmTSih9JaowVrQXekXh/wv6aJ1LWOJDBlD3yMt4FTIxD4YF/K6QYiqH325dTLHkmrqiESday7wqFAP0Y9zO26Fi3FE5k3xICJqPSgBmbl4Pj1mFz3Zp5d14+1Q=
Received: from MN2PR18MB2877.namprd18.prod.outlook.com (20.179.20.218) by
 MN2PR18MB2495.namprd18.prod.outlook.com (20.179.83.217) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.2623.10; Thu, 9 Jan 2020 11:49:48 +0000
Received: from MN2PR18MB2877.namprd18.prod.outlook.com
 ([fe80::5db5:d179:8a01:4636]) by MN2PR18MB2877.namprd18.prod.outlook.com
 ([fe80::5db5:d179:8a01:4636%7]) with mapi id 15.20.2623.008; Thu, 9 Jan 2020
 11:49:48 +0000
From: Anoob Joseph <anoobj@marvell.com>
To: "Ananyev, Konstantin" <konstantin.ananyev@intel.com>, Akhil Goyal
 <akhil.goyal@nxp.com>, "Nicolau, Radu" <radu.nicolau@intel.com>, "Thomas
 Monjalon" <thomas@monjalon.net>
CC: Ankur Dwivedi <adwivedi@marvell.com>, Jerin Jacob Kollanukkaran
 <jerinj@marvell.com>, Narayana Prasad Raju Athreya <pathreya@marvell.com>,
 Archana Muniganti <marchana@marvell.com>, Tejasree Kondoj
 <ktejasree@marvell.com>, Vamsi Krishna Attunuru <vattunuru@marvell.com>,
 Lukas Bartosik <lbartosik@marvell.com>, "dev@dpdk.org" <dev@dpdk.org>
Thread-Topic: [dpdk-dev] [PATCH 12/14] examples/ipsec-secgw: add	driver
 outbound worker
Thread-Index: AQHVxWceXV0uUP7oIU2ZKNDBABZKiKfiN3ZA
Date: Thu, 9 Jan 2020 11:49:48 +0000
Message-ID: <MN2PR18MB2877693213D6F887CFBD45F4DF390@MN2PR18MB2877.namprd18.prod.outlook.com>
References: <1575808249-31135-1-git-send-email-anoobj@marvell.com>
 <1575808249-31135-13-git-send-email-anoobj@marvell.com>
 <SN6PR11MB2558FE2A49BF2F0CFD9F5E509A2E0@SN6PR11MB2558.namprd11.prod.outlook.com>
 <MN2PR18MB28774B88B7A9ABC40B23206CDF220@MN2PR18MB2877.namprd18.prod.outlook.com>
 <SN6PR11MB25580A93E4AE683CA2FE26939A3C0@SN6PR11MB2558.namprd11.prod.outlook.com>
 <MN2PR18MB28777D25CB55BE98D5B85B15DF3F0@MN2PR18MB2877.namprd18.prod.outlook.com>
 <SN6PR11MB2558FB15447F335EF60459029A3F0@SN6PR11MB2558.namprd11.prod.outlook.com>
In-Reply-To: <SN6PR11MB2558FB15447F335EF60459029A3F0@SN6PR11MB2558.namprd11.prod.outlook.com>
Accept-Language: en-IN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [14.140.231.66]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 656077c8-4349-41c8-9176-08d794fa0775
x-ms-traffictypediagnostic: MN2PR18MB2495:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR18MB2495E2631D31882A321CE64DDF390@MN2PR18MB2495.namprd18.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 02778BF158
x-forefront-antispam-report: SFV:NSPM;
 SFS:(10009020)(4636009)(366004)(346002)(136003)(376002)(39850400004)(396003)(189003)(199004)(13464003)(55236004)(26005)(186003)(2906002)(110136005)(53546011)(66946007)(5660300002)(52536014)(6506007)(54906003)(66446008)(81156014)(55016002)(8936002)(9686003)(64756008)(66556008)(86362001)(76116006)(81166006)(66476007)(30864003)(71200400001)(7696005)(316002)(4326008)(478600001)(33656002);
 DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR18MB2495;
 H:MN2PR18MB2877.namprd18.prod.outlook.com; FPR:; SPF:None; LANG:en;
 PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: marvell.com does not designate
 permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: yHx0gqsScJoCtHauCz9jMNAUtaI8OspERg56/Woww1RvpGzmyG89XYF7wCX1BqU3yGKUw+PL5o+OcypPQQQHUNwvT7efk3SBq7BopqQYz/rbuM8I71pc2brJiPThVbmsIOVMyMQf7BjS4T1zOWeF+aL5wfI6KZIuRqujxbcwbfDJU7/bSPYjuds0e5vstoxm56pow7mCA1YIHox5+ylZG+DaxcHxB5XAB+bYCj3wxeiEtO/PrdYK0QCSWyOSQF8aJhc5VCTRkRY5X/tExxfH0f0aiPQhMidhEgaPJXPXqBo6oNSPo4hCidcql0qO8wj8mcxDKl8GGXbrkqqjunT5NKjyttbjoN0J/1jsknv91bOYsr6T7hxFcCTOmPLm8U4TZxPORFqiPLlGkHhwGEgnrTY5rNe49xO9DMj+bxzJ308AOO93mt4T6GXqDo6L7J5Ni1FAWE5CE3aGysJDaKAj2LzwMddcCeJGIAjuAEI+JSCdbRCegT7GM1QhDhdeHSC6
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 656077c8-4349-41c8-9176-08d794fa0775
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jan 2020 11:49:48.1996 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dY8bLyJgpINyAnLbowblhyQIccU5hK0f/7RBF88V5PZOLp9Q6n5GwsvIzvntNUpVrRsTRmzMkcmxPt7jmXeCcA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR18MB2495
X-OriginatorOrg: marvell.com
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572
 definitions=2020-01-09_02:2020-01-09,
 2020-01-09 signatures=0
Subject: Re: [dpdk-dev] [PATCH 12/14] examples/ipsec-secgw:
	add	driver	outbound worker
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <https://mails.dpdk.org/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://mails.dpdk.org/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <https://mails.dpdk.org/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
Errors-To: dev-bounces@dpdk.org
Sender: "dev" <dev-bounces@dpdk.org>

Hi Konstantin,

Please see inline.

Thanks,
Anoob

> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Ananyev, Konstantin
> Sent: Tuesday, January 7, 2020 8:01 PM
> To: Anoob Joseph <anoobj@marvell.com>; Akhil Goyal
> <akhil.goyal@nxp.com>; Nicolau, Radu <radu.nicolau@intel.com>; Thomas
> Monjalon <thomas@monjalon.net>
> Cc: Ankur Dwivedi <adwivedi@marvell.com>; Jerin Jacob Kollanukkaran
> <jerinj@marvell.com>; Narayana Prasad Raju Athreya
> <pathreya@marvell.com>; Archana Muniganti <marchana@marvell.com>;
> Tejasree Kondoj <ktejasree@marvell.com>; Vamsi Krishna Attunuru
> <vattunuru@marvell.com>; Lukas Bartosik <lbartosik@marvell.com>;
> dev@dpdk.org
> Subject: Re: [dpdk-dev] [PATCH 12/14] examples/ipsec-secgw: add driver
> outbound worker
>=20
> > > > > > This patch adds the driver outbound worker thread for ipsec-sec=
gw.
> > > > > > In this mode the security session is a fixed one and sa update
> > > > > > is not done.
> > > > > >
> > > > > > Signed-off-by: Ankur Dwivedi <adwivedi@marvell.com>
> > > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > > Signed-off-by: Lukasz Bartosik <lbartosik@marvell.com>
> > > > > > ---
> > > > > >  examples/ipsec-secgw/ipsec-secgw.c  | 12 +++++
> > > > > >  examples/ipsec-secgw/ipsec.c        |  9 ++++
> > > > > >  examples/ipsec-secgw/ipsec_worker.c | 90
> > > > > > ++++++++++++++++++++++++++++++++++++-
> > > > > >  3 files changed, 110 insertions(+), 1 deletion(-)
> > > > > >
> > > > > > diff --git a/examples/ipsec-secgw/ipsec-secgw.c
> > > > > > b/examples/ipsec-secgw/ipsec-secgw.c
> > > > > > index 2e7d4d8..76719f2 100644
> > > > > > --- a/examples/ipsec-secgw/ipsec-secgw.c
> > > > > > +++ b/examples/ipsec-secgw/ipsec-secgw.c
> > > > > > @@ -2011,6 +2011,18 @@ cryptodevs_init(void)
> > > > > >  			i++;
> > > > > >  		}
> > > > > >
> > > > > > +		/*
> > > > > > +		 * Set the queue pair to at least the number of
> ethernet
> > > > > > +		 * devices for inline outbound.
> > > > > > +		 */
> > > > > > +		qp =3D RTE_MAX(rte_eth_dev_count_avail(), qp);
> > > > >
> > > > >
> > > > > Not sure, what for?
> > > > > Why we can't process packets from several eth devs on the same
> > > > > crypto-dev queue?
> > > >
> > > > [Anoob] This is because of a limitation in our hardware. In our
> > > > hardware, it's the crypto queue pair which would be submitting to
> > > > the ethernet queue for Tx. But in DPDK spec, the security
> > > > processing is done by the ethernet PMD Tx routine alone. We manage
> > > > to do this by sharing
> > > the crypto queue internally. The crypto queues initialized during
> > > crypto_configure() gets mapped to various ethernet ports. Because of
> > > this, we need to have atleast as many crypto queues as the number of
> eth ports.
> > >
> > > Ok, but that breaks current behavior.
> > > Right now in poll-mode it is possible to map traffic from N eth-devs
> > > to M crypto- devs (N>=3D M, by using M lcores).
> > > Would prefer to keep this functionality in place.
> >
> > [Anoob] Understood. I don't think that functionality is broken. If the
> > number of qps available is lower than the number of eth devs, then only
> the ones available would be enabled. Inline protocol session for the othe=
r
> eth devs would fail for us.
> >
> > Currently, the app assumes that for one core, it needs only one qp
> > (and for M core, M qp). Is there any harm in enabling all qps available=
? If
> such a change can be done, that would also work for us.
>=20
> Hmm, I suppose it could cause some problems with some corner-cases:
> if we'll have crypto-dev with really big number of max_queues.
> In that case it might require a lot of extra memory for
> cryptodev_configure/queue_pair_setup.
> Probably the easiest way to deal with it:
> - add req_queue_num parameter for cryptodevs_init()
>    And then do: qp =3DRTE_MIN(max_nb_qps, RTE_MAX(req_queue_num,
> qp));
>  - for poll mode we'll call cryptodevs_init(0), for your case it could be
>    cryptodevs_init(rte_eth_dev_count_avail()).
>=20
> Would it work for your case?

[Anoob] I tried investigating about this a bit more. The reason why we get =
limited by the number of cores is because of the logic in add_cdev_mapping(=
) & add_mapping() functions. I've tried reworking it a bit and was able to =
make it equal to number of lcore params (core-port-queue mapping). Technica=
lly, we just need to match that. What do you think? I will submit a separat=
e patch with the said rework.
=20
>=20
> > >
> > > >
> > > > The above change is required because here we limit the number of
> > > > crypto qps based on the number of cores etc. So when tried on
> > > > single core, the
> > > qps get limited to 1, which causes session_create() to fail for all
> > > ports other than the first one.
> > > >
> > > > >
> > > > > > +
> > > > > > +		/*
> > > > > > +		 * The requested number of queues should never
> exceed
> > > > > > +		 * the max available
> > > > > > +		 */
> > > > > > +		qp =3D RTE_MIN(qp, max_nb_qps);
> > > > > > +
> > > > > >  		if (qp =3D=3D 0)
> > > > > >  			continue;
> > > > > >
> > > > > > diff --git a/examples/ipsec-secgw/ipsec.c
> > > > > > b/examples/ipsec-secgw/ipsec.c index e529f68..9ff8a63 100644
> > > > > > --- a/examples/ipsec-secgw/ipsec.c
> > > > > > +++ b/examples/ipsec-secgw/ipsec.c
> > > > > > @@ -141,6 +141,10 @@ create_lookaside_session(struct ipsec_ctx
> > > > > *ipsec_ctx, struct ipsec_sa *sa,
> > > > > >  	return 0;
> > > > > >  }
> > > > > >
> > > > > > +uint16_t sa_no;
> > > > > > +#define MAX_FIXED_SESSIONS	10
> > > > > > +struct rte_security_session
> > > > > > +*sec_session_fixed[MAX_FIXED_SESSIONS];
> > > > > > +
> > > > > >  int
> > > > > >  create_inline_session(struct socket_ctx *skt_ctx, struct ipsec=
_sa
> *sa,
> > > > > >  		struct rte_ipsec_session *ips) @@ -401,6 +405,11
> @@
> > > > > > create_inline_session(struct socket_ctx *skt_ctx, struct
> > > > > > ipsec_sa *sa,
> > > > > >
> > > > > >  		ips->security.ol_flags =3D sec_cap->ol_flags;
> > > > > >  		ips->security.ctx =3D sec_ctx;
> > > > > > +		if (sa_no < MAX_FIXED_SESSIONS) {
> > > > > > +			sec_session_fixed[sa_no] =3D
> > > > > > +				ipsec_get_primary_session(sa)-
> > > > > >security.ses;
> > > > > > +			sa_no++;
> > > > > > +		}
> > > > > >  	}
> > > > >
> > > > > Totally lost what is the purpose of these changes...
> > > > > Why first 10 inline-proto are special and need to be saved
> > > > > inside global array (sec_session_fixed)?
> > > > > Why later, in ipsec_worker.c this array is referenced by eth port=
_id?
> > > > > What would happen if number of inline-proto sessions is less
> > > > > than number of eth ports?
> > > >
> > > > [Anoob] This is required for the outbound driver mode. The 'driver
> > > > mode' is more like 'single_sa' mode of the existing application.
> > > > The idea is to skip all the lookups etc done in the s/w and
> > > > perform ipsec processing fully in h/w. In outbound, following is
> > > > roughly what we should do for driver mode,
> > > >
> > > > pkt =3D rx_burst();
> > > >
> > > > /* set_pkt_metadata() */
> > > > pkt-> udata64 =3D session;
> > > >
> > > > tx_burst(pkt);
> > > >
> > > > The session is created on eth ports. And so, if we have single SA,
> > > > then the entire traffic will have to be forwarded on the same
> > > > port. The above
> > > change is to make sure we could send traffic on all ports.
> > > >
> > > > Currently we just use the first 10 SAs and save it in the array.
> > > > So the user has to set the conf properly and make sure the SAs are
> > > > distributed such. Will update this to save the first parsed
> > > > outbound SA for a
> > > port in the array. That way the size of the array will be
> RTE_MAX_ETHPORTS.
> > >
> > > Ok, then if it is for specific case (event-mode + sing-sa mode) then
> > > in create_inline_session we probably shouldn't do it always, but
> > > only when this mode is selected.
> >
> > [Anoob] Will make that change.
> >
> > > Also wouldn't it better to reuse current  single-sa cmd-line option a=
nd
> logic?
> > > I.E. whe event-mode and single-sa is selected, go though all
> > > eth-devs and for each do create_inline_session() with for sa that
> corresponds to sing_sa_idx?
> > > Then, I think create_inline_session() can be kept intact.
> >
> > [Anoob] No disagreement. Current single_sa uses single_sa universally.
> The driver mode intends to use single_sa per port.
> > Technically, just single_sa (universally) will result in the eth port
> > being the bottleneck. So I can fix the single sa and we can use single_=
sa
> option in eventmode as you have described.
> >
> > >
> > > >
> > > > Is the above approach fine?
> > > >
> > > > >
> > > > > >  set_cdev_id:
> > > > > > diff --git a/examples/ipsec-secgw/ipsec_worker.c
> > > > > > b/examples/ipsec-secgw/ipsec_worker.c
> > > > > > index 2af9475..e202277 100644
> > > > > > --- a/examples/ipsec-secgw/ipsec_worker.c
> > > > > > +++ b/examples/ipsec-secgw/ipsec_worker.c
> > > > > > @@ -263,7 +263,7 @@ process_ipsec_ev_inbound(struct ipsec_ctx
> > > > > > *ctx,
> > > > > struct route_table *rt,
> > > > > >   */
> > > > > >
> > > > > >  /* Workers registered */
> > > > > > -#define IPSEC_EVENTMODE_WORKERS		2
> > > > > > +#define IPSEC_EVENTMODE_WORKERS		3
> > > > > >
> > > > > >  /*
> > > > > >   * Event mode worker
> > > > > > @@ -423,6 +423,84 @@
> > > > > ipsec_wrkr_non_burst_int_port_app_mode_inb(struct
> > > > > eh_event_link_info *links,
> > > > > >  	return;
> > > > > >  }
> > > > > >
> > > > > > +/*
> > > > > > + * Event mode worker
> > > > > > + * Operating parameters : non-burst - Tx internal port -
> > > > > > +driver mode
> > > > > > +- outbound  */ extern struct rte_security_session
> > > > > > +*sec_session_fixed[]; static void
> > > > > > +ipsec_wrkr_non_burst_int_port_drvr_mode_outb(struct
> > > > > eh_event_link_info *links,
> > > > > > +		uint8_t nb_links)
> > > > > > +{
> > > > > > +	unsigned int nb_rx =3D 0;
> > > > > > +	struct rte_mbuf *pkt;
> > > > > > +	unsigned int port_id;
> > > > > > +	struct rte_event ev;
> > > > > > +	uint32_t lcore_id;
> > > > > > +
> > > > > > +	/* Check if we have links registered for this lcore */
> > > > > > +	if (nb_links =3D=3D 0) {
> > > > > > +		/* No links registered - exit */
> > > > > > +		goto exit;
> > > > > > +	}
> > > > > > +
> > > > > > +	/* Get core ID */
> > > > > > +	lcore_id =3D rte_lcore_id();
> > > > > > +
> > > > > > +	RTE_LOG(INFO, IPSEC,
> > > > > > +		"Launching event mode worker (non-burst - Tx
> internal port
> > > > > > +-
> > > > > "
> > > > > > +		"driver mode - outbound) on lcore %d\n", lcore_id);
> > > > > > +
> > > > > > +	/* We have valid links */
> > > > > > +
> > > > > > +	/* Check if it's single link */
> > > > > > +	if (nb_links !=3D 1) {
> > > > > > +		RTE_LOG(INFO, IPSEC,
> > > > > > +			"Multiple links not supported. Using first
> link\n");
> > > > > > +	}
> > > > > > +
> > > > > > +	RTE_LOG(INFO, IPSEC, " -- lcoreid=3D%u event_port_id=3D%u\n",
> > > > > lcore_id,
> > > > > > +			links[0].event_port_id);
> > > > > > +	while (!force_quit) {
> > > > > > +		/* Read packet from event queues */
> > > > > > +		nb_rx =3D
> rte_event_dequeue_burst(links[0].eventdev_id,
> > > > > > +				links[0].event_port_id,
> > > > > > +				&ev,	/* events */
> > > > > > +				1,	/* nb_events */
> > > > > > +				0	/* timeout_ticks */);
> > > > > > +
> > > > > > +		if (nb_rx =3D=3D 0)
> > > > > > +			continue;
> > > > > > +
> > > > > > +		port_id =3D ev.queue_id;
> > > > > > +		pkt =3D ev.mbuf;
> > > > > > +
> > > > > > +		rte_prefetch0(rte_pktmbuf_mtod(pkt, void *));
> > > > > > +
> > > > > > +		/* Process packet */
> > > > > > +		ipsec_event_pre_forward(pkt, port_id);
> > > > > > +
> > > > > > +		pkt->udata64 =3D (uint64_t)
> sec_session_fixed[port_id];
> > > > > > +
> > > > > > +		/* Mark the packet for Tx security offload */
> > > > > > +		pkt->ol_flags |=3D PKT_TX_SEC_OFFLOAD;
> > > > > > +
> > > > > > +		/*
> > > > > > +		 * Since tx internal port is available, events can be
> > > > > > +		 * directly enqueued to the adapter and it would be
> > > > > > +		 * internally submitted to the eth device.
> > > > > > +		 */
> > > > > > +
> 	rte_event_eth_tx_adapter_enqueue(links[0].eventdev_id,
> > > > > > +				links[0].event_port_id,
> > > > > > +				&ev,	/* events */
> > > > > > +				1,	/* nb_events */
> > > > > > +				0	/* flags */);
> > > > > > +	}
> > > > > > +
> > > > > > +exit:
> > > > > > +	return;
> > > > > > +}
> > > > > > +
> > > > > >  static uint8_t
> > > > > >  ipsec_eventmode_populate_wrkr_params(struct
> > > > > eh_app_worker_params
> > > > > > *wrkrs)  { @@ -449,6 +527,16 @@
> > > > > > ipsec_eventmode_populate_wrkr_params(struct
> > > > > > eh_app_worker_params
> > > > > *wrkrs)
> > > > > >  	wrkr->cap.ipsec_dir =3D EH_IPSEC_DIR_TYPE_INBOUND;
> > > > > >  	wrkr->worker_thread =3D
> > > > > ipsec_wrkr_non_burst_int_port_app_mode_inb;
> > > > > >
> > > > > > +	wrkr++;
> > > > > > +	nb_wrkr_param++;
> > > > > > +
> > > > > > +	/* Non-burst - Tx internal port - driver mode - outbound */
> > > > > > +	wrkr->cap.burst =3D EH_RX_TYPE_NON_BURST;
> > > > > > +	wrkr->cap.tx_internal_port =3D EH_TX_TYPE_INTERNAL_PORT;
> > > > > > +	wrkr->cap.ipsec_mode =3D EH_IPSEC_MODE_TYPE_DRIVER;
> > > > > > +	wrkr->cap.ipsec_dir =3D EH_IPSEC_DIR_TYPE_OUTBOUND;
> > > > > > +	wrkr->worker_thread =3D
> > > > > ipsec_wrkr_non_burst_int_port_drvr_mode_outb;
> > > > > > +
> > > > > >  	nb_wrkr_param++;
> > > > > >  	return nb_wrkr_param;
> > > > > >  }
> > > > > > --
> > > > > > 2.7.4