From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id D0B83A04FA; Wed, 5 Feb 2020 16:03:04 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 23BE41C1F8; Wed, 5 Feb 2020 16:03:04 +0100 (CET) Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140053.outbound.protection.outlook.com [40.107.14.53]) by dpdk.org (Postfix) with ESMTP id 0DD521C1A0 for ; Wed, 5 Feb 2020 16:03:03 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Jq6vM9GefH1IS+FEy6D9P3Qlw8hSrlgBPor2X4Uz1JtH67oHqItO7kPDovHhDd/2g/n3ZEX2GRPGuiEJyC1LPB+VJL+STfxwsGl0PFUC7AiD119W0qIF/RUaOsiJghYSkOpBd+Ps/IfFcpyJuyvWjcf20da8xVPC4eQRtmXIb74CiT/I3UiwlS6GXQDajhdnFyJot/D4F9vCB+PkwguluEGBpkbdkpFH25I9Emti+tymu1Yk/6uasyjODsgouRfKPlgOiTGwDvC/2iCxdrbVoOtfrEWMPpGuD/zHoZs81Ws4+X9+ZdAveXsDhTyDL4x9lxcuEFzns1Ok08wcBwWvGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EXhQPG0yp1rc623U3i1z8AqDJIdLpI/SMmULRCYd+BI=; b=U6ZLPoDxVRgr1zJxXsezfwsC58O841y2DdZ6bPGw6NvgVWwbvW30ve4c5b82yIh5Ghrv751iBg4oFABY9WubL0N3xyRi4mrhrubXN5W7DXaF0clPcLaTm4Wd8d4/E4jelURzKkPBvGeRvOWRRxlVyhh3rfVnJNxfajbFJYcy2q+3N8J1KQGNdKij3bV3DpIgKl3aIOsIZtV0+NvWS0C1W5++TY/zP2leEsJNka02C3Y9dlPOLLctU5MGib3/mVC9a5/jicRkO/UjjbtibpDq/O5LKUCyfSx2CWioHpIokMyyNeMGdPU6RoUgzoEs+UCu2Im7niQ41Lk7OrO26GL4Fg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EXhQPG0yp1rc623U3i1z8AqDJIdLpI/SMmULRCYd+BI=; b=ObgdtRsr1dk+ONMxCBi6atLpbVEL17XS1LlPEVbScwYdCj24isD9l1bqwxE28GrjAdbn9kOfWlZQECMn8/h2+H8e4GVrgl9FYr0cMVf1e9mea4KtHjka39UG5/tIF6lwbc1Y0+Vnlgc+FGjHbzNHjCE+zUUnK/yMolHXn+OEUBc= Received: from VE1PR04MB6639.eurprd04.prod.outlook.com (10.255.118.11) by VE1PR04MB6349.eurprd04.prod.outlook.com (20.179.235.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.30; Wed, 5 Feb 2020 15:03:02 +0000 Received: from VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1]) by VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1%7]) with mapi id 15.20.2707.020; Wed, 5 Feb 2020 15:03:02 +0000 From: Akhil Goyal To: Marcin Smoczynski , "konstantin.ananyev@intel.com" , "roy.fan.zhang@intel.com" , "declan.doherty@intel.com" , "radu.nicolau@intel.com" , "pablo.de.lara.guarch@intel.com" CC: "dev@dpdk.org" Thread-Topic: [PATCH v6 0/8] Introduce CPU crypto mode Thread-Index: AQHV21zXrZy3QmQMQUORB3lflqm6T6gMs3UA Date: Wed, 5 Feb 2020 15:03:02 +0000 Message-ID: References: <20200128142220.16644-1-marcinx.smoczynski@intel.com> <20200204131258.17632-1-marcinx.smoczynski@intel.com> In-Reply-To: <20200204131258.17632-1-marcinx.smoczynski@intel.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-originating-ip: [64.157.242.222] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 5c547ec9-e67c-4616-e0a8-08d7aa4c7f2f x-ms-traffictypediagnostic: VE1PR04MB6349: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-forefront-prvs: 0304E36CA3 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(39860400002)(136003)(346002)(396003)(366004)(189003)(199004)(55016002)(26005)(5660300002)(44832011)(81156014)(478600001)(86362001)(64756008)(316002)(76116006)(66446008)(66476007)(66946007)(66556008)(186003)(4326008)(8676002)(6506007)(52536014)(33656002)(110136005)(7696005)(71200400001)(9686003)(2906002)(8936002)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR04MB6349; H:VE1PR04MB6639.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: M+LBWqAJ25H3Q10FhxUaSYC11S/c7g2XKtGq/tlfQxoOqbuigl+t274d4SARe0fVg4/9++q0jBXQ8O+su9pvQSgCCsZvobRnUNBqLbmJ7ErY6N0XefEqCuK8hZtvQEnpKC/c6LGC7bLQh9jzZOV4XQLjfnBJ17cIEe+QZ0I2jjWolInzYqaDieO0a+sC5FTS97Hg2Gi0zCiWpxymvoaJgdJIXiJ3kscZj9RlxaLZRfnxYXQOGvo9eTWQOGthzoaT8WrL2caMhrHdTinZfgVtzi1VzdqkTCh7M5nnIURkfuRlG8yVWT6Gv5y44P5NwphYibbOSacaavmMAurHLxeXRrNNK4s8zNap0AssRaPu6MZkg8FNauvytF6NqvbJWBhksdbh5kzK4tRlXff4cI0DLaJQvsZO2Zaz9Z8GuqcYyzKKixtVuUGO0iAHF04Oewg4 x-ms-exchange-antispam-messagedata: vSwaqM70Y/A5zo0sEuPY/iHz3CPrbYbfeRLE6/NRnQoQjgSZj6Qslpjq5ZD3n3HO5fuL4JGJA/3PkSIAdxTkv/jTFGtkwh0FRMWXTeRbxADzWO5FgCSz6gCA+NUqWzAdvSdh8JNxhScyuGK29wk7kg== x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5c547ec9-e67c-4616-e0a8-08d7aa4c7f2f X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Feb 2020 15:03:02.3175 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: QssRmjsmxgBDjYrLCgUbclC8pTP67O+R2TfBjfiAcQc32ar/gH9j1pv09DCGzKm1TQGJx7P5RvH1k56Xv5VftQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6349 Subject: Re: [dpdk-dev] [PATCH v6 0/8] Introduce CPU crypto mode X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > Originally both SW and HW crypto PMDs use rte_crypot_op based API to > process the crypto workload asynchronously. This way provides uniformity > to both PMD types, but also introduce unnecessary performance penalty to > SW PMDs that have to "simulate" HW async behavior (crypto-ops > enqueue/dequeue, HW addresses computations, storing/dereferencing user > provided data (mbuf) for each crypto-op, etc). >=20 > The aim is to introduce a new optional API for SW crypto-devices > to perform crypto processing in a synchronous manner. >=20 > v3 to v4 changes: > - add feature discovery in the ipsec example application when > using cpu-crypto > - add gmac in aesni-gcm > - add tests for aesni-gcm/cpu crypto mode > - add documentation: pg and rel notes > - remove xform flags as no longer needed > - add some extra API comments > - remove compilation error from v3 >=20 > v4 to v5 changes: > - fixed build error for arm64 (missing header include) > - update licensing information >=20 > v5 to v6 changes: > - unit tests integrated in the current test application for cryptodev > - iova fix > - moved mbuf to sgl helper function to crypo sym header >=20 > Marcin Smoczynski (8): > cryptodev: introduce cpu crypto support API > crypto/aesni_gcm: cpu crypto support > security: add cpu crypto action type > test/crypto: add cpu crypto mode to tests > ipsec: introduce support for cpu crypto mode > examples/ipsec-secgw: cpu crypto support > examples/ipsec-secgw: cpu crypto testing > doc: add release notes for cpu crypto Series applied to dpdk-next-crypto Last patch is split and merged in relevant patches Following patch is dropped while merging due to merge conflict. Please send it again, we will merge in RC3 "test/crypto: add cpu crypto mode to tests" >=20 > app/test/test_cryptodev.c | 161 ++++++++++++- > doc/guides/cryptodevs/aesni_gcm.rst | 7 +- > doc/guides/cryptodevs/features/aesni_gcm.ini | 1 + > doc/guides/cryptodevs/features/default.ini | 1 + > doc/guides/prog_guide/cryptodev_lib.rst | 33 ++- > doc/guides/prog_guide/ipsec_lib.rst | 10 +- > doc/guides/prog_guide/rte_security.rst | 15 +- > doc/guides/rel_notes/release_20_02.rst | 7 + > drivers/crypto/aesni_gcm/aesni_gcm_ops.h | 11 +- > drivers/crypto/aesni_gcm/aesni_gcm_pmd.c | 222 +++++++++++++++++- > drivers/crypto/aesni_gcm/aesni_gcm_pmd_ops.c | 4 +- > .../crypto/aesni_gcm/aesni_gcm_pmd_private.h | 13 +- > examples/ipsec-secgw/ipsec.c | 25 +- > examples/ipsec-secgw/ipsec_process.c | 136 +++++++---- > examples/ipsec-secgw/sa.c | 30 ++- > examples/ipsec-secgw/test/common_defs.sh | 21 ++ > examples/ipsec-secgw/test/linux_test4.sh | 11 +- > examples/ipsec-secgw/test/linux_test6.sh | 11 +- > .../test/trs_3descbc_sha1_common_defs.sh | 8 +- > .../test/trs_aescbc_sha1_common_defs.sh | 8 +- > .../test/trs_aesctr_sha1_common_defs.sh | 8 +- > .../test/tun_3descbc_sha1_common_defs.sh | 8 +- > .../test/tun_aescbc_sha1_common_defs.sh | 8 +- > .../test/tun_aesctr_sha1_common_defs.sh | 8 +- > lib/librte_cryptodev/rte_crypto_sym.h | 128 +++++++++- > lib/librte_cryptodev/rte_cryptodev.c | 35 ++- > lib/librte_cryptodev/rte_cryptodev.h | 22 +- > lib/librte_cryptodev/rte_cryptodev_pmd.h | 21 +- > .../rte_cryptodev_version.map | 1 + > lib/librte_ipsec/esp_inb.c | 156 ++++++++++-- > lib/librte_ipsec/esp_outb.c | 136 ++++++++++- > lib/librte_ipsec/misc.h | 73 +++++- > lib/librte_ipsec/rte_ipsec.h | 20 +- > lib/librte_ipsec/sa.c | 114 +++++++-- > lib/librte_ipsec/sa.h | 19 +- > lib/librte_ipsec/ses.c | 5 +- > lib/librte_security/rte_security.h | 8 +- > 37 files changed, 1311 insertions(+), 194 deletions(-) >=20 > -- > 2.17.1