From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 6BFC5A0353; Tue, 5 Nov 2019 13:20:32 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 326902C27; Tue, 5 Nov 2019 13:20:32 +0100 (CET) Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40070.outbound.protection.outlook.com [40.107.4.70]) by dpdk.org (Postfix) with ESMTP id 7272C2C02 for ; Tue, 5 Nov 2019 13:20:31 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EAjzLPBo9mWTFCqhjv382eCfTt1R3DKRe4xAgjrkShfIL5tA7F9cpwxPRkmYUTKB7drC8JCWi4qfABu8N/+cRBG+6BZRwt3/Zr6eFTRXQthdc7pbLxpP1JwBfGVj43PuCz5LSXGVs+6BvQCxFTc/6KVDBaT/piLJzRlKfHbQLBgE2hItcVG5G7Ag9ekGHpzyMXy5arHR7mTknGAXLdAIbt1Es8ma60W/shVe8sBXCdymgjuu7G6LlwHpUYxvc7zwHFQeRABXDVVOcqr9i779xyXE++GUZoVg5kQ7ewLNmVi9Z6VpGNhQWmF6+CH0E8C6yVk4pnRSlAMzSZYFBHFogQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uQ6JH9idnS8YR5xC/wewPEnmT2RjWcG8YvB6Fx9xD6E=; b=YK7nMIChBEgKrxT+vujAKjvjdGBP+gvqaGlhu0r29nWi6h3TYYyUR9Rhhznhwno7wCgAMuAHTh2l35hlnfl2yUevsT79TIW5nsUpavSEdKwejaIHVjPgs7Q6PLoFrTrgkKCpG4RmWCFAuEXDdN5G5AkzVx3xQHxFiAgU1bNdo0dAlGLZfWhru6XDSxs+v6PTq9+TNiqvkd4lYRY8p/g3v+upvn3LnEOOwrlVBVNqVn3u+ByYC5ykqK4e2nNGeItXjIRPQmBsMLrSFWFm9nJkDOu70tjQypf5K2WoMpwXphojApFmOdqj97mMa01tqrRe62rdUPrk/qsvykYdS91v+w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uQ6JH9idnS8YR5xC/wewPEnmT2RjWcG8YvB6Fx9xD6E=; b=XfozQjO3wWpW+ZeJ44XiyND2k/LUunqgz5Bm4ghwED7UAW9keszAuIHRavCnGP9AyGOiWknGUZQNh4xT8w4VxGqehQ3EV19bgWkYtA8vgDuLW+4GUsu0t2NUrd/SnR11nIDc1tGM8gvRVrtOwyFUt7DdXAvdHvhUHwe0bfhNwzQ= Received: from VE1PR04MB6639.eurprd04.prod.outlook.com (10.255.118.11) by VE1PR04MB6415.eurprd04.prod.outlook.com (20.179.232.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2408.24; Tue, 5 Nov 2019 12:20:30 +0000 Received: from VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::9dc:aa5c:2bb8:b561]) by VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::9dc:aa5c:2bb8:b561%6]) with mapi id 15.20.2408.024; Tue, 5 Nov 2019 12:20:30 +0000 From: Akhil Goyal To: Marcin Smoczynski , "anoobj@marvell.com" , "konstantin.ananyev@intel.com" CC: "dev@dpdk.org" Thread-Topic: [PATCH v7 0/4] add fallback session Thread-Index: AQHVgpYcTBdzRGEpS0CBn7ju4eP2UKd8oUfw Date: Tue, 5 Nov 2019 12:20:30 +0000 Message-ID: References: <20191007130254.3064-1-marcinx.smoczynski@intel.com> <20191014134842.3084-1-marcinx.smoczynski@intel.com> In-Reply-To: <20191014134842.3084-1-marcinx.smoczynski@intel.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-originating-ip: [92.120.1.72] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 50c73e44-5949-4458-40f3-08d761ea8ca8 x-ms-traffictypediagnostic: VE1PR04MB6415: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:1468; x-forefront-prvs: 0212BDE3BE x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(396003)(39860400002)(136003)(346002)(366004)(189003)(199004)(110136005)(2201001)(66446008)(66556008)(52536014)(9686003)(4326008)(71200400001)(86362001)(71190400001)(64756008)(6246003)(66476007)(76116006)(66946007)(478600001)(14444005)(256004)(55016002)(2501003)(66066001)(6436002)(2906002)(6116002)(25786009)(186003)(305945005)(44832011)(7696005)(76176011)(74316002)(316002)(81166006)(81156014)(99286004)(486006)(14454004)(33656002)(446003)(11346002)(7736002)(229853002)(5660300002)(3846002)(6506007)(102836004)(8676002)(8936002)(26005)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR04MB6415; H:VE1PR04MB6639.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 2swinn1rChZsPclfyqm9bKRAf2ThgeO9n5GZ4xaMeZH28sA2G4eYRY2O4Vd0bJ22fLZgbyhXmh4KicGlDVqSdNeuVkYH7XNdaAjrMcSTvOFUyuJa6fenM9Fw+y2pmU2HD0KdI/g9/EHKRxqq1zI94MCa/gd2MIIqG1H7hxUdO25fd6XK2ab43+BiKoktaX3q8uINcCVTFBHvqwnbCRypeG71w1LeZhHb/azBfGfPe+oKYFBtZo9OtiQuFp5iXWOJTtUwZbur1s5IcuZUK5TFjr4UoVuT9QUn4/cJci6KxtAQWp9eE4DICx2jmAjrHRpiBmmXu/HuDw5OeJiXa0KZPEO2d2SpaK76uJCMPk7RE5roo4iDcegPNeRo3YqBxmwq0VLbbU1WAjarIEMg/FrLS1xVb7H/O2k/FDzfYR5hIj6PzRGadfEx7ksF6OwpL32E x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 50c73e44-5949-4458-40f3-08d761ea8ca8 X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Nov 2019 12:20:30.5783 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 2qBd1Z/DQThoGQ948jcJf6rxiQRKvNxNq8TdWx7L//ycxyC6SUui45VPkb6NpDnO5Km0xFlOISYPHqOezJ+RrA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6415 Subject: Re: [dpdk-dev] [PATCH v7 0/4] add fallback session X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" >=20 > Add fallback session feature allowing to process packets that inline > processor is unable to handle (e.g. fragmented traffic). Processing > takes place in a secondary session defined for SA in a configuration > file. >=20 > This feature is limited to ingress IPsec traffic only. IPsec > anti-replay window and ESN are supported in conjunction with fallback > session when following conditions are met: > * primary session is 'inline-crypto-offload, > * fallback sessions is 'lookaside-none'. > Due to different processing times of inline and lookaside modes, > fallback session introduces some packet reordering, therefore when > using with IPsec window, its value should be increased. >=20 > v6 to v7 changes: > - remove partial support for "*-protocol" fall-back session types > - rebase on master (31b798a) >=20 > v5 to v6 changes: > - add sanity check: fail to parse SA configuration if fallback session > is configured but primary session is not inline crypto > - update documentation for ipsec-secgw tests (MULTI_SEG_TESTS var > described) > - add release notes > - minor commit log changes >=20 > v4 to v5 changes: > - fix build errors related to frag TTL command line option and > parse_decimal method >=20 > v3 to v4 changes: > - add info about packet reordering to the documentation regarding > fallback session > - add patch with --frag-ttl command line option which allows to change > fragment lifetime >=20 > v2 to v3 changes: > - doc and commit log update - explicitly state feature limitations >=20 > v1 to v2 changes: > - disable fallback offload for outbound SAs > - add test scripts >=20 > Marcin Smoczynski (4): > examples/ipsec-secgw: sa structure cleanup > examples/ipsec-secgw: add fallback session feature > examples/ipsec-secgw: add frag TTL cmdline option > examples/ipsec-secgw: add offload fallback tests >=20 > doc/guides/rel_notes/release_19_11.rst | 8 + > doc/guides/sample_app_ug/ipsec_secgw.rst | 34 +++- > examples/ipsec-secgw/esp.c | 35 ++-- > examples/ipsec-secgw/ipsec-secgw.c | 56 ++++-- > examples/ipsec-secgw/ipsec.c | 101 +++++------ > examples/ipsec-secgw/ipsec.h | 61 +++++-- > examples/ipsec-secgw/ipsec_process.c | 113 ++++++++----- > examples/ipsec-secgw/sa.c | 159 +++++++++++++----- > .../test/trs_aesgcm_common_defs.sh | 4 +- > .../trs_aesgcm_inline_crypto_fallback_defs.sh | 5 + > .../test/tun_aesgcm_common_defs.sh | 6 +- > .../tun_aesgcm_inline_crypto_fallback_defs.sh | 5 + > 12 files changed, 409 insertions(+), 178 deletions(-) > create mode 100644 examples/ipsec- > secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh > create mode 100644 examples/ipsec- > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh >=20 > -- > 2.17.1 Series Acked-by: Akhil Goyal Applied to dpdk-next-crypto Release notes update merged with previous entry of IPsec changes. Thanks.