From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id C0EF7A0535; Tue, 4 Feb 2020 16:25:42 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 499C41C206; Tue, 4 Feb 2020 16:25:42 +0100 (CET) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2045.outbound.protection.outlook.com [40.107.20.45]) by dpdk.org (Postfix) with ESMTP id AF03E1C1F6 for ; Tue, 4 Feb 2020 16:25:40 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kOJaeS5fP/1awYGbJeRRvZa2qwVPZeR8wKvwIyOcjRA/VeiH3Amd/CnyxWNVGrhdK/QcNZzrxfoV8HLxtYQ3xoq7iRjH3jpCxAzJV1K9bFDW6XYZ1PhmJR0x353HMtLzr7xgsHrjr0/paBvOjXcVhx/69J/ClYT5sWOV8clxfGu95oCvTnJ4URekLxkmkOkw7ErKZNJbrEK5lZakSlugSJQMiZs/87gWd+vTp1MC8Ma7EhWY1TqhlVFxpHpKPLRKTDC86ivQPtr/b+JLteyHW5oUkLoWzxYmEzh0itiw46n9EZZYA/Q+mf/9GH/VagRQUI1K962lwOHQYW0wP/P9Fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4O+ejnw2fdffdF3C7KXmQRRcavjMXPFa/qkE56GW9xs=; b=X96f2xMIMywjQVksrFHgkgy6MoklAn6TmRESbUUKyp5Pcnpi2XMcQaotAbWrxTzfIubZl5jzmN6wDU94SvfUVnupOm6CxRKqC3ERQBVXhM7RzN6K+10dFJ4mU9lTxts60R4tUIxUhSwJ0zUQuvImugFaJbXDLwiSia5U0Xo8Gx8nqQK3ZH6T1s3BuezuVVqbkvWnLQjBNjXL8mxfEJ8BvxmOOKeJc+bo71HijA4tV1GFR2cXIK75IVXJ9lav9Z0sYE3B9X8oGAOu+qJlFkzWx8s14AdZmC7N+eepdyvtxRcNNQhfKR2Aaw/kqmZkI2XRmsjhoUwcxaQHEjC553caGg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4O+ejnw2fdffdF3C7KXmQRRcavjMXPFa/qkE56GW9xs=; b=NUg6I+TteZCUYO6tIPi3e6VFdSKyM0yuEb+UMxuCqoZOeT8e0f1TqD3wcUa9XkcV6lXWOGaGZYTpFXJAaDNHr22U1P9yZ6kD/xrTV0K32BDK+rzc/1HbBwGchU3FO9gnL/5QGDs31Kx4pBdkL3h6CC5x/kyZf401BM37gqHs/JU= Received: from VE1PR04MB6639.eurprd04.prod.outlook.com (10.255.118.11) by VE1PR04MB6478.eurprd04.prod.outlook.com (10.255.118.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.30; Tue, 4 Feb 2020 15:25:40 +0000 Received: from VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1]) by VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1%7]) with mapi id 15.20.2686.031; Tue, 4 Feb 2020 15:25:40 +0000 From: Akhil Goyal To: Vladimir Medvedkin , "dev@dpdk.org" CC: "konstantin.ananyev@intel.com" Thread-Topic: [PATCH v6 0/8] integrate librte_ipsec SAD into ipsec-secgw Thread-Index: AQHV2F13K30UCYoQu0qgYrse2FlTGKgLLbvg Date: Tue, 4 Feb 2020 15:25:39 +0000 Message-ID: References: <1580306768-110555-1-git-send-email-vladimir.medvedkin@intel.com> <1580492385-120134-1-git-send-email-vladimir.medvedkin@intel.com> In-Reply-To: <1580492385-120134-1-git-send-email-vladimir.medvedkin@intel.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-originating-ip: [92.120.1.72] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: f412d3a6-055a-456e-d735-08d7a9867dff x-ms-traffictypediagnostic: VE1PR04MB6478: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:962; x-forefront-prvs: 03030B9493 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(136003)(346002)(376002)(366004)(39860400002)(199004)(189003)(64756008)(66946007)(66556008)(66476007)(4326008)(66446008)(86362001)(7696005)(52536014)(44832011)(5660300002)(186003)(2906002)(26005)(6506007)(33656002)(110136005)(316002)(9686003)(8676002)(81156014)(8936002)(55016002)(81166006)(478600001)(71200400001)(76116006); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR04MB6478; H:VE1PR04MB6639.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: ROILaE4n3DlFHMAxAI65cuAPhXfY+pG7kA55wlq9dbHLshj9PBA538ExvMDCWzwQSQMG9U/vTy7ivuoS6mw2vnHLMwfBSeydxSY0UQ3mi4jeFOYvj0KuHOFev5mwRkdCM1uU72QKzWp8po8gn9tRy+K8OuhZ/OBmbxvKk1MQPbx5rJboBhALkPOyA+qHExhk4mFSQThrv688rJgF1YYwJYXrEo4NRuxaQMnGEcZPzbkJjKmoXcdaQw9UJ3QajhACw2q/uKsGEzZ9MZDirra3UZxPx6Na3EScS2TJbszNbTifT/snWes+z54fPONXJun2EAZib9alq02kiFYlJrCdM5D95hPo+8Wpyz7+v1E4Lv6MjcfNw6Sh8/mVB2n5IBcPgv7BfeNhq8O3veT7HFXfHJQkL7ZAzBFyhU2mJD/ov0e/ZvnY8LCw8NmzbZwaOYKT x-ms-exchange-antispam-messagedata: VKUyKe6X9FPn/vKRlcrJwNJd8Cx0p7nV5u6mlfpLon1ArGReqi+myNMhbdtpzz9K4HKYDhDP9/lJsafO/JZoTRfsoKSFzPy6zK7PA3eUufDs/280XChTnymEI3oRyfo2YdGlo35HOhZuW8wY1HTpSA== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: f412d3a6-055a-456e-d735-08d7a9867dff X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2020 15:25:39.9345 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ZtFy1i+PglmnmMUMyt5GvqH/pCszgaXBEH4lpeQnn/kb2x8A1sv31CkvRfI1CmokuYfi1yS/Ge0HgffKbS99XA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6478 Subject: Re: [dpdk-dev] [PATCH v6 0/8] integrate librte_ipsec SAD into ipsec-secgw X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > This series integrates SA database (SAD) capabilities from ipsec library. > The goal is to make ipsec-secgw RFC compliant regarding inbound SAD. > Also patch series removes hardcoded limitation for maximum number of SA's > and SP's. > According to our measurements, after this series of patches, > ipsec-secgw performance drops by about 0-2%. >=20 > v6: > - add SA check for NULL pointer after rte_ipsec_sad_lookup() > - using mbuf ptype field to distinguish v4 and v6 packets > - add SAD cache size option into documentation >=20 > v5: > - introduce SAD cache to solve performance degradation > - ipsec_sad_add() returns an error if the key is present >=20 > v4: > - put tunnel SA's into SAD with SPI_ONLY type for performance reason >=20 > v3: > - parse SA and SP into sorted array instead of linked list >=20 > v2: > - get rid of maximum sp limitation >=20 > Vladimir Medvedkin (8): > ipsec: move ipsec sad name length into .h > examples/ipsec-secgw: implement inbound SAD > examples/ipsec-secgw: integrate inbound SAD > examples/ipsec-secgw: get rid of maximum sa limitation > examples/ipsec-secgw: get rid of maximum sp limitation > examples/ipsec-secgw: add SAD cache > examples/ipsec-secgw: set/use mbuf ptype > doc: update ipsec-secgw guide >=20 > doc/guides/sample_app_ug/ipsec_secgw.rst | 6 + > examples/ipsec-secgw/Makefile | 1 + > examples/ipsec-secgw/ipsec-secgw.c | 36 ++++- > examples/ipsec-secgw/ipsec.h | 12 +- > examples/ipsec-secgw/meson.build | 2 +- > examples/ipsec-secgw/parser.c | 4 + > examples/ipsec-secgw/parser.h | 9 ++ > examples/ipsec-secgw/sa.c | 238 ++++++++++++++++++-------= ------ > examples/ipsec-secgw/sad.c | 149 +++++++++++++++++++ > examples/ipsec-secgw/sad.h | 170 ++++++++++++++++++++++ > examples/ipsec-secgw/sp4.c | 114 +++++++++++---- > examples/ipsec-secgw/sp6.c | 112 +++++++++++---- > lib/librte_ipsec/ipsec_sad.c | 20 +-- > lib/librte_ipsec/rte_ipsec_sad.h | 2 + > 14 files changed, 696 insertions(+), 179 deletions(-) > create mode 100644 examples/ipsec-secgw/sad.c > create mode 100644 examples/ipsec-secgw/sad.h >=20 > -- > 2.7.4 Squashed the last patch with 6th patch Applied to dpdk-next-crypto Thanks.