* [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
@ 2019-07-24 14:17 Anoob Joseph
2019-08-02 5:35 ` Anoob Joseph
0 siblings, 1 reply; 13+ messages in thread
From: Anoob Joseph @ 2019-07-24 14:17 UTC (permalink / raw)
To: Akhil Goyal, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Anoob Joseph, Jerin Jacob, Narayana Prasad, Ankur Dwivedi,
Shahaf Shuler, Hemant Agrawal, Matan Azrad, Yongseok Koh,
Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
The rte_security API which enables inline protocol/crypto feature
mandates that for every security session an rte_flow is created. This
would internally translate to a rule in the hardware which would do
packet classification.
In rte_securty, one SA would be one security session. And if an rte_flow
need to be created for every session, the number of SAs supported by an
inline implementation would be limited by the number of rte_flows the
PMD would be able to support.
If the fields SPI & IP addresses are allowed to be a range, then this
limitation can be overcome. Multiple flows will be able to use one rule
for SECURITY processing. In this case, the security session provided as
conf would be NULL.
Application should do an rte_flow_validate() to make sure the flow is
supported on the PMD.
Signed-off-by: Anoob Joseph <anoobj@marvell.com>
---
lib/librte_ethdev/rte_flow.h | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h
index f3a8fb1..4977d3c 100644
--- a/lib/librte_ethdev/rte_flow.h
+++ b/lib/librte_ethdev/rte_flow.h
@@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
* direction.
*
* Multiple flows can be configured to use the same security session.
+ *
+ * The NULL value is allowed for security session. If security session is NULL,
+ * then SPI field in ESP flow item and IP addresses in flow items 'IPv4' and
+ * 'IPv6' will be allowed to be a range. The rule thus created can enable
+ * SECURITY processing on multiple flows.
+ *
*/
struct rte_flow_action_security {
void *security_session; /**< Pointer to security session structure. */
--
2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-07-24 14:17 [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow Anoob Joseph
@ 2019-08-02 5:35 ` Anoob Joseph
2019-08-14 9:22 ` Anoob Joseph
0 siblings, 1 reply; 13+ messages in thread
From: Anoob Joseph @ 2019-08-02 5:35 UTC (permalink / raw)
To: Anoob Joseph, Akhil Goyal, Adrien Mazarguil, Declan Doherty,
Pablo de Lara, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Akhil, Adrien, Declan, Pablo,
Can you review this proposal and share your feedback?
Thanks,
Anoob
> -----Original Message-----
> From: Anoob Joseph <anoobj@marvell.com>
> Sent: Wednesday, July 24, 2019 7:47 PM
> To: Akhil Goyal <akhil.goyal@nxp.com>; Adrien Mazarguil
> <adrien.mazarguil@6wind.com>; Declan Doherty
> <declan.doherty@intel.com>; Pablo de Lara
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> <thomas@monjalon.net>
> Cc: Anoob Joseph <anoobj@marvell.com>; Jerin Jacob Kollanukkaran
> <jerinj@marvell.com>; Narayana Prasad Raju Athreya
> <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>; Shahaf
> Shuler <shahafs@mellanox.com>; Hemant Agrawal
> <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>;
> Yongseok Koh <yskoh@mellanox.com>; Wenzhuo Lu
> <wenzhuo.lu@intel.com>; Konstantin Ananyev
> <konstantin.ananyev@intel.com>; Radu Nicolau <radu.nicolau@intel.com>;
> dev@dpdk.org
> Subject: [RFC] ethdev: allow multiple security sessions to use one rte flow
>
> The rte_security API which enables inline protocol/crypto feature mandates
> that for every security session an rte_flow is created. This would internally
> translate to a rule in the hardware which would do packet classification.
>
> In rte_securty, one SA would be one security session. And if an rte_flow
> need to be created for every session, the number of SAs supported by an
> inline implementation would be limited by the number of rte_flows the PMD
> would be able to support.
>
> If the fields SPI & IP addresses are allowed to be a range, then this limitation
> can be overcome. Multiple flows will be able to use one rule for SECURITY
> processing. In this case, the security session provided as conf would be NULL.
>
> Application should do an rte_flow_validate() to make sure the flow is
> supported on the PMD.
>
> Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> ---
> lib/librte_ethdev/rte_flow.h | 6 ++++++
> 1 file changed, 6 insertions(+)
>
> diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h index
> f3a8fb1..4977d3c 100644
> --- a/lib/librte_ethdev/rte_flow.h
> +++ b/lib/librte_ethdev/rte_flow.h
> @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> * direction.
> *
> * Multiple flows can be configured to use the same security session.
> + *
> + * The NULL value is allowed for security session. If security session
> + is NULL,
> + * then SPI field in ESP flow item and IP addresses in flow items
> + 'IPv4' and
> + * 'IPv6' will be allowed to be a range. The rule thus created can
> + enable
> + * SECURITY processing on multiple flows.
> + *
> */
> struct rte_flow_action_security {
> void *security_session; /**< Pointer to security session structure. */
> --
> 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-02 5:35 ` Anoob Joseph
@ 2019-08-14 9:22 ` Anoob Joseph
2019-08-14 11:07 ` Akhil Goyal
0 siblings, 1 reply; 13+ messages in thread
From: Anoob Joseph @ 2019-08-14 9:22 UTC (permalink / raw)
To: Akhil Goyal, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi all,
Reminder...!
If there are no concerns, I'll send the patch after adding the required changes in ipsec-secgw as well.
Thanks,
Anoob
> -----Original Message-----
> From: Anoob Joseph <anoobj@marvell.com>
> Sent: Friday, August 2, 2019 11:05 AM
> To: Anoob Joseph <anoobj@marvell.com>; Akhil Goyal
> <akhil.goyal@nxp.com>; Adrien Mazarguil <adrien.mazarguil@6wind.com>;
> Declan Doherty <declan.doherty@intel.com>; Pablo de Lara
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi
> <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> Hemant Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>; Yongseok Koh <yskoh@mellanox.com>; Wenzhuo
> Lu <wenzhuo.lu@intel.com>; Konstantin Ananyev
> <konstantin.ananyev@intel.com>; Radu Nicolau <radu.nicolau@intel.com>;
> dev@dpdk.org
> Subject: RE: [RFC] ethdev: allow multiple security sessions to use one rte
> flow
>
> Hi Akhil, Adrien, Declan, Pablo,
>
> Can you review this proposal and share your feedback?
>
> Thanks,
> Anoob
>
> > -----Original Message-----
> > From: Anoob Joseph <anoobj@marvell.com>
> > Sent: Wednesday, July 24, 2019 7:47 PM
> > To: Akhil Goyal <akhil.goyal@nxp.com>; Adrien Mazarguil
> > <adrien.mazarguil@6wind.com>; Declan Doherty
> > <declan.doherty@intel.com>; Pablo de Lara
> > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > <thomas@monjalon.net>
> > Cc: Anoob Joseph <anoobj@marvell.com>; Jerin Jacob Kollanukkaran
> > <jerinj@marvell.com>; Narayana Prasad Raju Athreya
> > <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>;
> Shahaf
> > Shuler <shahafs@mellanox.com>; Hemant Agrawal
> > <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>;
> Yongseok
> > Koh <yskoh@mellanox.com>; Wenzhuo Lu <wenzhuo.lu@intel.com>;
> > Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> > <radu.nicolau@intel.com>; dev@dpdk.org
> > Subject: [RFC] ethdev: allow multiple security sessions to use one rte
> > flow
> >
> > The rte_security API which enables inline protocol/crypto feature
> > mandates that for every security session an rte_flow is created. This
> > would internally translate to a rule in the hardware which would do packet
> classification.
> >
> > In rte_securty, one SA would be one security session. And if an
> > rte_flow need to be created for every session, the number of SAs
> > supported by an inline implementation would be limited by the number
> > of rte_flows the PMD would be able to support.
> >
> > If the fields SPI & IP addresses are allowed to be a range, then this
> > limitation can be overcome. Multiple flows will be able to use one
> > rule for SECURITY processing. In this case, the security session provided as
> conf would be NULL.
> >
> > Application should do an rte_flow_validate() to make sure the flow is
> > supported on the PMD.
> >
> > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > ---
> > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > 1 file changed, 6 insertions(+)
> >
> > diff --git a/lib/librte_ethdev/rte_flow.h
> > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > --- a/lib/librte_ethdev/rte_flow.h
> > +++ b/lib/librte_ethdev/rte_flow.h
> > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > * direction.
> > *
> > * Multiple flows can be configured to use the same security session.
> > + *
> > + * The NULL value is allowed for security session. If security
> > + session is NULL,
> > + * then SPI field in ESP flow item and IP addresses in flow items
> > + 'IPv4' and
> > + * 'IPv6' will be allowed to be a range. The rule thus created can
> > + enable
> > + * SECURITY processing on multiple flows.
> > + *
> > */
> > struct rte_flow_action_security {
> > void *security_session; /**< Pointer to security session structure.
> > */
> > --
> > 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-14 9:22 ` Anoob Joseph
@ 2019-08-14 11:07 ` Akhil Goyal
2019-08-15 6:49 ` Anoob Joseph
0 siblings, 1 reply; 13+ messages in thread
From: Akhil Goyal @ 2019-08-14 11:07 UTC (permalink / raw)
To: Anoob Joseph, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Anoob,
>
> Hi all,
>
> Reminder...!
>
Sorry for a delayed response.
> If there are no concerns, I'll send the patch after adding the required changes in
> ipsec-secgw as well.
>
> Thanks,
> Anoob
>
> > -----Original Message-----
> > From: Anoob Joseph <anoobj@marvell.com>
> > Sent: Friday, August 2, 2019 11:05 AM
> > To: Anoob Joseph <anoobj@marvell.com>; Akhil Goyal
> > <akhil.goyal@nxp.com>; Adrien Mazarguil <adrien.mazarguil@6wind.com>;
> > Declan Doherty <declan.doherty@intel.com>; Pablo de Lara
> > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > <thomas@monjalon.net>
> > Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> > Athreya <pathreya@marvell.com>; Ankur Dwivedi
> > <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> > Hemant Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> > <matan@mellanox.com>; Yongseok Koh <yskoh@mellanox.com>; Wenzhuo
> > Lu <wenzhuo.lu@intel.com>; Konstantin Ananyev
> > <konstantin.ananyev@intel.com>; Radu Nicolau <radu.nicolau@intel.com>;
> > dev@dpdk.org
> > Subject: RE: [RFC] ethdev: allow multiple security sessions to use one rte
> > flow
> >
> > Hi Akhil, Adrien, Declan, Pablo,
> >
> > Can you review this proposal and share your feedback?
> >
> > Thanks,
> > Anoob
> >
> > > -----Original Message-----
> > > From: Anoob Joseph <anoobj@marvell.com>
> > > Sent: Wednesday, July 24, 2019 7:47 PM
> > > To: Akhil Goyal <akhil.goyal@nxp.com>; Adrien Mazarguil
> > > <adrien.mazarguil@6wind.com>; Declan Doherty
> > > <declan.doherty@intel.com>; Pablo de Lara
> > > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > > <thomas@monjalon.net>
> > > Cc: Anoob Joseph <anoobj@marvell.com>; Jerin Jacob Kollanukkaran
> > > <jerinj@marvell.com>; Narayana Prasad Raju Athreya
> > > <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>;
> > Shahaf
> > > Shuler <shahafs@mellanox.com>; Hemant Agrawal
> > > <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>;
> > Yongseok
> > > Koh <yskoh@mellanox.com>; Wenzhuo Lu <wenzhuo.lu@intel.com>;
> > > Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> > > <radu.nicolau@intel.com>; dev@dpdk.org
> > > Subject: [RFC] ethdev: allow multiple security sessions to use one rte
> > > flow
> > >
> > > The rte_security API which enables inline protocol/crypto feature
> > > mandates that for every security session an rte_flow is created. This
> > > would internally translate to a rule in the hardware which would do packet
> > classification.
> > >
> > > In rte_securty, one SA would be one security session. And if an
> > > rte_flow need to be created for every session, the number of SAs
> > > supported by an inline implementation would be limited by the number
> > > of rte_flows the PMD would be able to support.
> > >
> > > If the fields SPI & IP addresses are allowed to be a range, then this
> > > limitation can be overcome. Multiple flows will be able to use one
> > > rule for SECURITY processing. In this case, the security session provided as
> > conf would be NULL.
SPI values are normally used to uniquely identify the SA that need to be applied on a particular flow.
I believe SPI value should not be a range for applying a particular SA or session.
Plain packet IP addresses can be a range. That is not an issue. Multiple plain packet flows
can use the same session/SA.
Why do you feel that security session provided should be NULL to support multiple flows.
How will the keys and other SA related info will be passed to the driver/HW.
> > >
> > > Application should do an rte_flow_validate() to make sure the flow is
> > > supported on the PMD.
> > >
> > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > ---
> > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > 1 file changed, 6 insertions(+)
> > >
> > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > --- a/lib/librte_ethdev/rte_flow.h
> > > +++ b/lib/librte_ethdev/rte_flow.h
> > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > * direction.
> > > *
> > > * Multiple flows can be configured to use the same security session.
> > > + *
> > > + * The NULL value is allowed for security session. If security
> > > + session is NULL,
> > > + * then SPI field in ESP flow item and IP addresses in flow items
> > > + 'IPv4' and
> > > + * 'IPv6' will be allowed to be a range. The rule thus created can
> > > + enable
> > > + * SECURITY processing on multiple flows.
> > > + *
> > > */
> > > struct rte_flow_action_security {
> > > void *security_session; /**< Pointer to security session structure.
> > > */
> > > --
> > > 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-14 11:07 ` Akhil Goyal
@ 2019-08-15 6:49 ` Anoob Joseph
2019-08-15 9:48 ` Ananyev, Konstantin
2019-08-16 8:32 ` Akhil Goyal
0 siblings, 2 replies; 13+ messages in thread
From: Anoob Joseph @ 2019-08-15 6:49 UTC (permalink / raw)
To: Akhil Goyal, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Akhil,
Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: Akhil Goyal <akhil.goyal@nxp.com>
> Sent: Wednesday, August 14, 2019 4:37 PM
> To: Anoob Joseph <anoobj@marvell.com>; Adrien Mazarguil
> <adrien.mazarguil@6wind.com>; Declan Doherty
> <declan.doherty@intel.com>; Pablo de Lara
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi
> <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> Hemant Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>; Yongseok Koh <yskoh@mellanox.com>; Wenzhuo
> Lu <wenzhuo.lu@intel.com>; Konstantin Ananyev
> <konstantin.ananyev@intel.com>; Radu Nicolau <radu.nicolau@intel.com>;
> dev@dpdk.org
> Subject: RE: [RFC] ethdev: allow multiple security sessions to use one rte
> flow
>
> Hi Anoob,
>
> >
> > Hi all,
> >
> > Reminder...!
> >
> Sorry for a delayed response.
>
> > If there are no concerns, I'll send the patch after adding the
> > required changes in ipsec-secgw as well.
> >
> > Thanks,
> > Anoob
> >
> > > -----Original Message-----
> > > From: Anoob Joseph <anoobj@marvell.com>
> > > Sent: Friday, August 2, 2019 11:05 AM
> > > To: Anoob Joseph <anoobj@marvell.com>; Akhil Goyal
> > > <akhil.goyal@nxp.com>; Adrien Mazarguil
> > > <adrien.mazarguil@6wind.com>; Declan Doherty
> > > <declan.doherty@intel.com>; Pablo de Lara
> > > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > > <thomas@monjalon.net>
> > > Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad
> > > Raju Athreya <pathreya@marvell.com>; Ankur Dwivedi
> > > <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> Hemant
> > > Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>;
> > > Yongseok Koh <yskoh@mellanox.com>; Wenzhuo Lu
> > > <wenzhuo.lu@intel.com>; Konstantin Ananyev
> > > <konstantin.ananyev@intel.com>; Radu Nicolau
> > > <radu.nicolau@intel.com>; dev@dpdk.org
> > > Subject: RE: [RFC] ethdev: allow multiple security sessions to use
> > > one rte flow
> > >
> > > Hi Akhil, Adrien, Declan, Pablo,
> > >
> > > Can you review this proposal and share your feedback?
> > >
> > > Thanks,
> > > Anoob
> > >
> > > > -----Original Message-----
> > > > From: Anoob Joseph <anoobj@marvell.com>
> > > > Sent: Wednesday, July 24, 2019 7:47 PM
> > > > To: Akhil Goyal <akhil.goyal@nxp.com>; Adrien Mazarguil
> > > > <adrien.mazarguil@6wind.com>; Declan Doherty
> > > > <declan.doherty@intel.com>; Pablo de Lara
> > > > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > > > <thomas@monjalon.net>
> > > > Cc: Anoob Joseph <anoobj@marvell.com>; Jerin Jacob Kollanukkaran
> > > > <jerinj@marvell.com>; Narayana Prasad Raju Athreya
> > > > <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>;
> > > Shahaf
> > > > Shuler <shahafs@mellanox.com>; Hemant Agrawal
> > > > <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>;
> > > Yongseok
> > > > Koh <yskoh@mellanox.com>; Wenzhuo Lu <wenzhuo.lu@intel.com>;
> > > > Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> > > > <radu.nicolau@intel.com>; dev@dpdk.org
> > > > Subject: [RFC] ethdev: allow multiple security sessions to use one
> > > > rte flow
> > > >
> > > > The rte_security API which enables inline protocol/crypto feature
> > > > mandates that for every security session an rte_flow is created.
> > > > This would internally translate to a rule in the hardware which
> > > > would do packet
> > > classification.
> > > >
> > > > In rte_securty, one SA would be one security session. And if an
> > > > rte_flow need to be created for every session, the number of SAs
> > > > supported by an inline implementation would be limited by the
> > > > number of rte_flows the PMD would be able to support.
> > > >
> > > > If the fields SPI & IP addresses are allowed to be a range, then
> > > > this limitation can be overcome. Multiple flows will be able to
> > > > use one rule for SECURITY processing. In this case, the security
> > > > session provided as
> > > conf would be NULL.
>
> SPI values are normally used to uniquely identify the SA that need to be
> applied on a particular flow.
> I believe SPI value should not be a range for applying a particular SA or
> session.
>
> Plain packet IP addresses can be a range. That is not an issue. Multiple plain
> packet flows can use the same session/SA.
>
> Why do you feel that security session provided should be NULL to support
> multiple flows.
> How will the keys and other SA related info will be passed to the driver/HW.
[Anoob] The SA configuration would be done via rte_security session. The proposal here only changes the 1:1 dependency of rte_flow and rte_security session.
The h/w could use SPI field in the received packet to identify SA(ie, rte_security session). If the h/w allows to index into a table which holds SA information, then per SPI rte_flow is not required. This is in fact our case. And for PMDs which doesn't do it this way, rte_flow_validate() would fail and then per SPI rte_flow would require to be created.
In the present model, a security session is created, and then rte_flow will connect ESP packets with one SPI to one security session. Instead, when we create the security session, h/w can populate entries in a DB that would be accessed during data path handling. And the rte_flow could say, all SPI in some range gets inline processed with the security session identified with its SPI.
Our PMD supports limited number of flow entries but our h/w can do SA lookup without flow entries(using SPI instead). So the current approach of one flow per session is creating an artificial limit to the number of SAs that can be supported.
>
> > > >
> > > > Application should do an rte_flow_validate() to make sure the flow
> > > > is supported on the PMD.
> > > >
> > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > ---
> > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > 1 file changed, 6 insertions(+)
> > > >
> > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > * direction.
> > > > *
> > > > * Multiple flows can be configured to use the same security session.
> > > > + *
> > > > + * The NULL value is allowed for security session. If security
> > > > + session is NULL,
> > > > + * then SPI field in ESP flow item and IP addresses in flow items
> > > > + 'IPv4' and
> > > > + * 'IPv6' will be allowed to be a range. The rule thus created
> > > > + can enable
> > > > + * SECURITY processing on multiple flows.
> > > > + *
> > > > */
> > > > struct rte_flow_action_security {
> > > > void *security_session; /**< Pointer to security session structure.
> > > > */
> > > > --
> > > > 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-15 6:49 ` Anoob Joseph
@ 2019-08-15 9:48 ` Ananyev, Konstantin
2019-08-16 3:24 ` Anoob Joseph
2019-08-16 8:32 ` Akhil Goyal
1 sibling, 1 reply; 13+ messages in thread
From: Ananyev, Konstantin @ 2019-08-15 9:48 UTC (permalink / raw)
To: Anoob Joseph, Akhil Goyal, Adrien Mazarguil, Doherty, Declan,
De Lara Guarch, Pablo, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Lu, Wenzhuo, Nicolau, Radu, dev
Hi Anoob,
>
> > > > >
> > > > > The rte_security API which enables inline protocol/crypto feature
> > > > > mandates that for every security session an rte_flow is created.
> > > > > This would internally translate to a rule in the hardware which
> > > > > would do packet
> > > > classification.
> > > > >
> > > > > In rte_securty, one SA would be one security session. And if an
> > > > > rte_flow need to be created for every session, the number of SAs
> > > > > supported by an inline implementation would be limited by the
> > > > > number of rte_flows the PMD would be able to support.
> > > > >
> > > > > If the fields SPI & IP addresses are allowed to be a range, then
> > > > > this limitation can be overcome. Multiple flows will be able to
> > > > > use one rule for SECURITY processing. In this case, the security
> > > > > session provided as
> > > > conf would be NULL.
> >
> > SPI values are normally used to uniquely identify the SA that need to be
> > applied on a particular flow.
> > I believe SPI value should not be a range for applying a particular SA or
> > session.
> >
> > Plain packet IP addresses can be a range. That is not an issue. Multiple plain
> > packet flows can use the same session/SA.
> >
> > Why do you feel that security session provided should be NULL to support
> > multiple flows.
> > How will the keys and other SA related info will be passed to the driver/HW.
>
> [Anoob] The SA configuration would be done via rte_security session. The proposal here only changes the 1:1 dependency of rte_flow and
> rte_security session.
>
> The h/w could use SPI field in the received packet to identify SA(ie, rte_security session). If the h/w allows to index into a table which holds
> SA information, then per SPI rte_flow is not required. This is in fact our case. And for PMDs which doesn't do it this way, rte_flow_validate()
> would fail and then per SPI rte_flow would require to be created.
>
> In the present model, a security session is created, and then rte_flow will connect ESP packets with one SPI to one security session. Instead,
> when we create the security session, h/w can populate entries in a DB that would be accessed during data path handling. And the rte_flow
> could say, all SPI in some range gets inline processed with the security session identified with its SPI.
>
> Our PMD supports limited number of flow entries but our h/w can do SA lookup without flow entries(using SPI instead). So the current
> approach of one flow per session is creating an artificial limit to the number of SAs that can be supported.
QQ: Would that change be accompanied with real implementation for some particular PMD?
Konstantin
>
> >
> > > > >
> > > > > Application should do an rte_flow_validate() to make sure the flow
> > > > > is supported on the PMD.
> > > > >
> > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > ---
> > > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > > 1 file changed, 6 insertions(+)
> > > > >
> > > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > > * direction.
> > > > > *
> > > > > * Multiple flows can be configured to use the same security session.
> > > > > + *
> > > > > + * The NULL value is allowed for security session. If security
> > > > > + session is NULL,
> > > > > + * then SPI field in ESP flow item and IP addresses in flow items
> > > > > + 'IPv4' and
> > > > > + * 'IPv6' will be allowed to be a range. The rule thus created
> > > > > + can enable
> > > > > + * SECURITY processing on multiple flows.
> > > > > + *
> > > > > */
> > > > > struct rte_flow_action_security {
> > > > > void *security_session; /**< Pointer to security session structure.
> > > > > */
> > > > > --
> > > > > 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-15 9:48 ` Ananyev, Konstantin
@ 2019-08-16 3:24 ` Anoob Joseph
0 siblings, 0 replies; 13+ messages in thread
From: Anoob Joseph @ 2019-08-16 3:24 UTC (permalink / raw)
To: Ananyev, Konstantin, Akhil Goyal, Adrien Mazarguil, Doherty,
Declan, De Lara Guarch, Pablo, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Lu, Wenzhuo, Nicolau, Radu, dev
Hi Konstantin,
Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: Ananyev, Konstantin <konstantin.ananyev@intel.com>
> Sent: Thursday, August 15, 2019 3:18 PM
> To: Anoob Joseph <anoobj@marvell.com>; Akhil Goyal
> <akhil.goyal@nxp.com>; Adrien Mazarguil <adrien.mazarguil@6wind.com>;
> Doherty, Declan <declan.doherty@intel.com>; De Lara Guarch, Pablo
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi
> <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> Hemant Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>; Yongseok Koh <yskoh@mellanox.com>; Lu,
> Wenzhuo <wenzhuo.lu@intel.com>; Nicolau, Radu
> <radu.nicolau@intel.com>; dev@dpdk.org
> Subject: RE: [RFC] ethdev: allow multiple security sessions to use one rte
> flow
>
> Hi Anoob,
>
> >
> > > > > >
> > > > > > The rte_security API which enables inline protocol/crypto
> > > > > > feature mandates that for every security session an rte_flow is
> created.
> > > > > > This would internally translate to a rule in the hardware
> > > > > > which would do packet
> > > > > classification.
> > > > > >
> > > > > > In rte_securty, one SA would be one security session. And if
> > > > > > an rte_flow need to be created for every session, the number
> > > > > > of SAs supported by an inline implementation would be limited
> > > > > > by the number of rte_flows the PMD would be able to support.
> > > > > >
> > > > > > If the fields SPI & IP addresses are allowed to be a range,
> > > > > > then this limitation can be overcome. Multiple flows will be
> > > > > > able to use one rule for SECURITY processing. In this case,
> > > > > > the security session provided as
> > > > > conf would be NULL.
> > >
> > > SPI values are normally used to uniquely identify the SA that need
> > > to be applied on a particular flow.
> > > I believe SPI value should not be a range for applying a particular
> > > SA or session.
> > >
> > > Plain packet IP addresses can be a range. That is not an issue.
> > > Multiple plain packet flows can use the same session/SA.
> > >
> > > Why do you feel that security session provided should be NULL to
> > > support multiple flows.
> > > How will the keys and other SA related info will be passed to the
> driver/HW.
> >
> > [Anoob] The SA configuration would be done via rte_security session.
> > The proposal here only changes the 1:1 dependency of rte_flow and
> rte_security session.
> >
> > The h/w could use SPI field in the received packet to identify SA(ie,
> > rte_security session). If the h/w allows to index into a table which
> > holds SA information, then per SPI rte_flow is not required. This is in fact
> our case. And for PMDs which doesn't do it this way, rte_flow_validate()
> would fail and then per SPI rte_flow would require to be created.
> >
> > In the present model, a security session is created, and then rte_flow
> > will connect ESP packets with one SPI to one security session.
> > Instead, when we create the security session, h/w can populate entries in a
> DB that would be accessed during data path handling. And the rte_flow could
> say, all SPI in some range gets inline processed with the security session
> identified with its SPI.
> >
> > Our PMD supports limited number of flow entries but our h/w can do SA
> > lookup without flow entries(using SPI instead). So the current approach of
> one flow per session is creating an artificial limit to the number of SAs that
> can be supported.
>
> QQ: Would that change be accompanied with real implementation for some
> particular PMD?
> Konstantin
[Anoob] Yes. This will be implemented as part of the rte_security additions in net_octeontx2 PMD, which will be upstreamed this release cycle.
>
>
> >
> > >
> > > > > >
> > > > > > Application should do an rte_flow_validate() to make sure the
> > > > > > flow is supported on the PMD.
> > > > > >
> > > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > > ---
> > > > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > > > 1 file changed, 6 insertions(+)
> > > > > >
> > > > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > > > * direction.
> > > > > > *
> > > > > > * Multiple flows can be configured to use the same security
> session.
> > > > > > + *
> > > > > > + * The NULL value is allowed for security session. If
> > > > > > + security session is NULL,
> > > > > > + * then SPI field in ESP flow item and IP addresses in flow
> > > > > > + items 'IPv4' and
> > > > > > + * 'IPv6' will be allowed to be a range. The rule thus
> > > > > > + created can enable
> > > > > > + * SECURITY processing on multiple flows.
> > > > > > + *
> > > > > > */
> > > > > > struct rte_flow_action_security {
> > > > > > void *security_session; /**< Pointer to security session
> structure.
> > > > > > */
> > > > > > --
> > > > > > 2.7.4
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-15 6:49 ` Anoob Joseph
2019-08-15 9:48 ` Ananyev, Konstantin
@ 2019-08-16 8:32 ` Akhil Goyal
2019-08-16 10:12 ` Anoob Joseph
1 sibling, 1 reply; 13+ messages in thread
From: Akhil Goyal @ 2019-08-16 8:32 UTC (permalink / raw)
To: Anoob Joseph, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Anoob,
>
> Hi Akhil,
>
> > > > >
> > > > > The rte_security API which enables inline protocol/crypto feature
> > > > > mandates that for every security session an rte_flow is created.
> > > > > This would internally translate to a rule in the hardware which
> > > > > would do packet
> > > > classification.
> > > > >
> > > > > In rte_securty, one SA would be one security session. And if an
> > > > > rte_flow need to be created for every session, the number of SAs
> > > > > supported by an inline implementation would be limited by the
> > > > > number of rte_flows the PMD would be able to support.
> > > > >
> > > > > If the fields SPI & IP addresses are allowed to be a range, then
> > > > > this limitation can be overcome. Multiple flows will be able to
> > > > > use one rule for SECURITY processing. In this case, the security
> > > > > session provided as
> > > > conf would be NULL.
> >
> > SPI values are normally used to uniquely identify the SA that need to be
> > applied on a particular flow.
> > I believe SPI value should not be a range for applying a particular SA or
> > session.
> >
> > Plain packet IP addresses can be a range. That is not an issue. Multiple plain
> > packet flows can use the same session/SA.
> >
> > Why do you feel that security session provided should be NULL to support
> > multiple flows.
> > How will the keys and other SA related info will be passed to the driver/HW.
>
> [Anoob] The SA configuration would be done via rte_security session. The
> proposal here only changes the 1:1 dependency of rte_flow and rte_security
> session.
I don't see this dependency for rte_flow and security session.
Multiple flows can be configured to use the same security session.
>
> The h/w could use SPI field in the received packet to identify SA(ie, rte_security
> session). If the h/w allows to index into a table which holds SA information, then
> per SPI rte_flow is not required. This is in fact our case. And for PMDs which
> doesn't do it this way, rte_flow_validate() would fail and then per SPI rte_flow
> would require to be created.
I am not able to understand the issue here. Flow are validated based on some pattern,
You can identify the flow based on some parameter(currently it is spi in case of inline crypto and also your case).
You can perform some action based on the security session that you have created before validating the flow
And that session creation is nowhere linked to the type of flow. You can use the same session for as many flows you want.
>
> In the present model, a security session is created, and then rte_flow will
> connect ESP packets with one SPI to one security session. Instead, when we
> create the security session, h/w can populate entries in a DB that would be
> accessed during data path handling. And the rte_flow could say, all SPI in some
> range gets inline processed with the security session identified with its SPI.
>
> Our PMD supports limited number of flow entries but our h/w can do SA lookup
> without flow entries(using SPI instead). So the current approach of one flow per
> session is creating an artificial limit to the number of SAs that can be supported.
Ok now I got it. You want to configure a single flow with multiple sessions in it.
But defining a range in SPI and tunnel IP addresses does not make sense. In real world applications,
Sessions can be created and destroyed at any time with varied values of SPI and tunnel IPs. How can
One put a range to that.
I would rather say, you actually do not need the rte_flows to be configured for
Inline protocol processing. You have configured all the session info in the hw while
Creating the session and your H/W will be able to identify on the basis of SPI value which
It has stored in the DB and do all the processing.
What are the changes that you need in the ipsec-secgw for inline proto to work, there is
No flow processing currently in the inline proto case. Will it not work as is for you?
Atleast for NXP devices we are able to work as is without any issue.
>
> >
> > > > >
> > > > > Application should do an rte_flow_validate() to make sure the flow
> > > > > is supported on the PMD.
> > > > >
> > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > ---
> > > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > > 1 file changed, 6 insertions(+)
> > > > >
> > > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > > * direction.
> > > > > *
> > > > > * Multiple flows can be configured to use the same security session.
> > > > > + *
> > > > > + * The NULL value is allowed for security session. If security
> > > > > + session is NULL,
> > > > > + * then SPI field in ESP flow item and IP addresses in flow items
> > > > > + 'IPv4' and
> > > > > + * 'IPv6' will be allowed to be a range. The rule thus created
> > > > > + can enable
> > > > > + * SECURITY processing on multiple flows.
What you intent here is " The rule thus created can enable multiple security sessions on a single rte flow"
Regards,
Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-16 8:32 ` Akhil Goyal
@ 2019-08-16 10:12 ` Anoob Joseph
2019-08-19 7:09 ` Akhil Goyal
0 siblings, 1 reply; 13+ messages in thread
From: Anoob Joseph @ 2019-08-16 10:12 UTC (permalink / raw)
To: Akhil Goyal, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Akhil,
Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Akhil Goyal
> Sent: Friday, August 16, 2019 2:02 PM
> To: Anoob Joseph <anoobj@marvell.com>; Adrien Mazarguil
> <adrien.mazarguil@6wind.com>; Declan Doherty
> <declan.doherty@intel.com>; Pablo de Lara
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi
> <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>;
> Hemant Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>; Yongseok Koh <yskoh@mellanox.com>; Wenzhuo
> Lu <wenzhuo.lu@intel.com>; Konstantin Ananyev
> <konstantin.ananyev@intel.com>; Radu Nicolau <radu.nicolau@intel.com>;
> dev@dpdk.org
> Subject: Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use
> one rte flow
>
> Hi Anoob,
> >
> > Hi Akhil,
> >
> > > > > >
> > > > > > The rte_security API which enables inline protocol/crypto
> > > > > > feature mandates that for every security session an rte_flow is
> created.
> > > > > > This would internally translate to a rule in the hardware
> > > > > > which would do packet
> > > > > classification.
> > > > > >
> > > > > > In rte_securty, one SA would be one security session. And if
> > > > > > an rte_flow need to be created for every session, the number
> > > > > > of SAs supported by an inline implementation would be limited
> > > > > > by the number of rte_flows the PMD would be able to support.
> > > > > >
> > > > > > If the fields SPI & IP addresses are allowed to be a range,
> > > > > > then this limitation can be overcome. Multiple flows will be
> > > > > > able to use one rule for SECURITY processing. In this case,
> > > > > > the security session provided as
> > > > > conf would be NULL.
> > >
> > > SPI values are normally used to uniquely identify the SA that need
> > > to be applied on a particular flow.
> > > I believe SPI value should not be a range for applying a particular
> > > SA or session.
> > >
> > > Plain packet IP addresses can be a range. That is not an issue.
> > > Multiple plain packet flows can use the same session/SA.
> > >
> > > Why do you feel that security session provided should be NULL to
> > > support multiple flows.
> > > How will the keys and other SA related info will be passed to the
> driver/HW.
> >
> > [Anoob] The SA configuration would be done via rte_security session.
> > The proposal here only changes the 1:1 dependency of rte_flow and
> > rte_security session.
>
> I don't see this dependency for rte_flow and security session.
> Multiple flows can be configured to use the same security session.
>
> >
> > The h/w could use SPI field in the received packet to identify SA(ie,
> > rte_security session). If the h/w allows to index into a table which
> > holds SA information, then per SPI rte_flow is not required. This is
> > in fact our case. And for PMDs which doesn't do it this way,
> > rte_flow_validate() would fail and then per SPI rte_flow would require to
> be created.
>
> I am not able to understand the issue here. Flow are validated based on
> some pattern, You can identify the flow based on some parameter(currently
> it is spi in case of inline crypto and also your case).
> You can perform some action based on the security session that you have
> created before validating the flow And that session creation is nowhere
> linked to the type of flow. You can use the same session for as many flows
> you want.
>
> >
> > In the present model, a security session is created, and then rte_flow
> > will connect ESP packets with one SPI to one security session.
> > Instead, when we create the security session, h/w can populate entries
> > in a DB that would be accessed during data path handling. And the
> > rte_flow could say, all SPI in some range gets inline processed with the
> security session identified with its SPI.
> >
> > Our PMD supports limited number of flow entries but our h/w can do SA
> > lookup without flow entries(using SPI instead). So the current
> > approach of one flow per session is creating an artificial limit to the number
> of SAs that can be supported.
>
> Ok now I got it. You want to configure a single flow with multiple sessions in
> it.
> But defining a range in SPI and tunnel IP addresses does not make sense. In
> real world applications, Sessions can be created and destroyed at any time
> with varied values of SPI and tunnel IPs. How can One put a range to that.
>
> I would rather say, you actually do not need the rte_flows to be configured
> for Inline protocol processing. You have configured all the session info in the
> hw while Creating the session and your H/W will be able to identify on the
> basis of SPI value which It has stored in the DB and do all the processing.
[Anoob] Yes. That is the model being followed right now. Concern is, whether this would be deviating from the spec. In other words, we could have devices which would need rte_flow for every rte_security session (ixgbe needs for inline crypto), and then we could have devices which doesn't need per session rte_flow (which is our case). What do you think is the right approach for supporting both kinds of devices?
>
> What are the changes that you need in the ipsec-secgw for inline proto to
> work, there is No flow processing currently in the inline proto case. Will it not
> work as is for you?
[Anoob] In ipsec-secgw, a default flow would be created per security enabled port with 'conf=NULL' & SPI = 'ANY'. Flow validate would be done to make sure the underlying PMD supports it. For PMDs which doesn't support this model, per SA flow would be created.
> Atleast for NXP devices we are able to work as is without any issue.
[Anoob] Just curious, would having such a dependency on rte_flow be an issue for NXP devices?
>
> >
> > >
> > > > > >
> > > > > > Application should do an rte_flow_validate() to make sure the
> > > > > > flow is supported on the PMD.
> > > > > >
> > > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > > ---
> > > > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > > > 1 file changed, 6 insertions(+)
> > > > > >
> > > > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > > > * direction.
> > > > > > *
> > > > > > * Multiple flows can be configured to use the same security
> session.
> > > > > > + *
> > > > > > + * The NULL value is allowed for security session. If
> > > > > > + security session is NULL,
> > > > > > + * then SPI field in ESP flow item and IP addresses in flow
> > > > > > + items 'IPv4' and
> > > > > > + * 'IPv6' will be allowed to be a range. The rule thus
> > > > > > + created can enable
> > > > > > + * SECURITY processing on multiple flows.
>
> What you intent here is " The rule thus created can enable multiple security
> sessions on a single rte flow"
>
>
> Regards,
> Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-16 10:12 ` Anoob Joseph
@ 2019-08-19 7:09 ` Akhil Goyal
2019-10-08 13:00 ` Yigit, Ferruh
0 siblings, 1 reply; 13+ messages in thread
From: Akhil Goyal @ 2019-08-19 7:09 UTC (permalink / raw)
To: Anoob Joseph, Adrien Mazarguil, Declan Doherty, Pablo de Lara,
Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Anoob,
>
> Hi Akhil,
>
> > > > > > >
> > > > > > > The rte_security API which enables inline protocol/crypto
> > > > > > > feature mandates that for every security session an rte_flow is
> > created.
> > > > > > > This would internally translate to a rule in the hardware
> > > > > > > which would do packet
> > > > > > classification.
> > > > > > >
> > > > > > > In rte_securty, one SA would be one security session. And if
> > > > > > > an rte_flow need to be created for every session, the number
> > > > > > > of SAs supported by an inline implementation would be limited
> > > > > > > by the number of rte_flows the PMD would be able to support.
> > > > > > >
> > > > > > > If the fields SPI & IP addresses are allowed to be a range,
> > > > > > > then this limitation can be overcome. Multiple flows will be
> > > > > > > able to use one rule for SECURITY processing. In this case,
> > > > > > > the security session provided as
> > > > > > conf would be NULL.
> > > >
> > > > SPI values are normally used to uniquely identify the SA that need
> > > > to be applied on a particular flow.
> > > > I believe SPI value should not be a range for applying a particular
> > > > SA or session.
> > > >
> > > > Plain packet IP addresses can be a range. That is not an issue.
> > > > Multiple plain packet flows can use the same session/SA.
> > > >
> > > > Why do you feel that security session provided should be NULL to
> > > > support multiple flows.
> > > > How will the keys and other SA related info will be passed to the
> > driver/HW.
> > >
> > > [Anoob] The SA configuration would be done via rte_security session.
> > > The proposal here only changes the 1:1 dependency of rte_flow and
> > > rte_security session.
> >
> > I don't see this dependency for rte_flow and security session.
> > Multiple flows can be configured to use the same security session.
> >
> > >
> > > The h/w could use SPI field in the received packet to identify SA(ie,
> > > rte_security session). If the h/w allows to index into a table which
> > > holds SA information, then per SPI rte_flow is not required. This is
> > > in fact our case. And for PMDs which doesn't do it this way,
> > > rte_flow_validate() would fail and then per SPI rte_flow would require to
> > be created.
> >
> > I am not able to understand the issue here. Flow are validated based on
> > some pattern, You can identify the flow based on some parameter(currently
> > it is spi in case of inline crypto and also your case).
> > You can perform some action based on the security session that you have
> > created before validating the flow And that session creation is nowhere
> > linked to the type of flow. You can use the same session for as many flows
> > you want.
> >
> > >
> > > In the present model, a security session is created, and then rte_flow
> > > will connect ESP packets with one SPI to one security session.
> > > Instead, when we create the security session, h/w can populate entries
> > > in a DB that would be accessed during data path handling. And the
> > > rte_flow could say, all SPI in some range gets inline processed with the
> > security session identified with its SPI.
> > >
> > > Our PMD supports limited number of flow entries but our h/w can do SA
> > > lookup without flow entries(using SPI instead). So the current
> > > approach of one flow per session is creating an artificial limit to the number
> > of SAs that can be supported.
> >
> > Ok now I got it. You want to configure a single flow with multiple sessions in
> > it.
> > But defining a range in SPI and tunnel IP addresses does not make sense. In
> > real world applications, Sessions can be created and destroyed at any time
> > with varied values of SPI and tunnel IPs. How can One put a range to that.
> >
> > I would rather say, you actually do not need the rte_flows to be configured
> > for Inline protocol processing. You have configured all the session info in the
> > hw while Creating the session and your H/W will be able to identify on the
> > basis of SPI value which It has stored in the DB and do all the processing.
>
> [Anoob] Yes. That is the model being followed right now. Concern is, whether
> this would be deviating from the spec. In other words, we could have devices
> which would need rte_flow for every rte_security session (ixgbe needs for inline
> crypto), and then we could have devices which doesn't need per session
> rte_flow (which is our case). What do you think is the right approach for
> supporting both kinds of devices?
Inline proto case is not using rte_flow at the moment.
And as far as I understand, you also do not need rte_flow to be configured.
Inline crypto cases are mainly for Intel and Mellanox cases which only supported
Inline crypto. For Protocol offload cases, I don't feel we need rte_flow as all information
related to ipsec is already there when we call the session create. Rte_flows are used
For segregation of ethernet traffic for classification which can be configured for various factors
as well.
>
> >
> > What are the changes that you need in the ipsec-secgw for inline proto to
> > work, there is No flow processing currently in the inline proto case. Will it not
> > work as is for you?
>
> [Anoob] In ipsec-secgw, a default flow would be created per security enabled
> port with 'conf=NULL' & SPI = 'ANY'. Flow validate would be done to make sure
> the underlying PMD supports it. For PMDs which doesn't support this model, per
> SA flow would be created.
Why do you need that flow as well. You have all the information in the session already.
You can process the packets based on that information. Isn't it?
Current implementation in application is good enough in my opinion.
>
> > Atleast for NXP devices we are able to work as is without any issue.
>
> [Anoob] Just curious, would having such a dependency on rte_flow be an issue
> for NXP devices?
As of now I do not have any comment on this. We are not using rte_flow in our work as of now.
It is kind of POC for us, we may not upstream it.
This will depend on the changes that will be done.
>
> >
> > >
> > > >
> > > > > > >
> > > > > > > Application should do an rte_flow_validate() to make sure the
> > > > > > > flow is supported on the PMD.
> > > > > > >
> > > > > > > Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > > > > > > ---
> > > > > > > lib/librte_ethdev/rte_flow.h | 6 ++++++
> > > > > > > 1 file changed, 6 insertions(+)
> > > > > > >
> > > > > > > diff --git a/lib/librte_ethdev/rte_flow.h
> > > > > > > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > > > > > > --- a/lib/librte_ethdev/rte_flow.h
> > > > > > > +++ b/lib/librte_ethdev/rte_flow.h
> > > > > > > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > > > > > > * direction.
> > > > > > > *
> > > > > > > * Multiple flows can be configured to use the same security
> > session.
> > > > > > > + *
> > > > > > > + * The NULL value is allowed for security session. If
> > > > > > > + security session is NULL,
> > > > > > > + * then SPI field in ESP flow item and IP addresses in flow
> > > > > > > + items 'IPv4' and
> > > > > > > + * 'IPv6' will be allowed to be a range. The rule thus
> > > > > > > + created can enable
> > > > > > > + * SECURITY processing on multiple flows.
> >
> > What you intent here is " The rule thus created can enable multiple security
> > sessions on a single rte flow"
> >
> >
> > Regards,
> > Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-08-19 7:09 ` Akhil Goyal
@ 2019-10-08 13:00 ` Yigit, Ferruh
2019-10-09 10:55 ` [dpdk-dev] [EXT] " Anoob Joseph
0 siblings, 1 reply; 13+ messages in thread
From: Yigit, Ferruh @ 2019-10-08 13:00 UTC (permalink / raw)
To: Akhil Goyal, Anoob Joseph, Adrien Mazarguil, Declan Doherty,
Pablo de Lara, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
On 8/19/2019 8:09 AM, Akhil Goyal wrote:
> Hi Anoob,
>>
>> Hi Akhil,
>>
>>>>>>>>
>>>>>>>> The rte_security API which enables inline protocol/crypto
>>>>>>>> feature mandates that for every security session an rte_flow is
>>> created.
>>>>>>>> This would internally translate to a rule in the hardware
>>>>>>>> which would do packet
>>>>>>> classification.
>>>>>>>>
>>>>>>>> In rte_securty, one SA would be one security session. And if
>>>>>>>> an rte_flow need to be created for every session, the number
>>>>>>>> of SAs supported by an inline implementation would be limited
>>>>>>>> by the number of rte_flows the PMD would be able to support.
>>>>>>>>
>>>>>>>> If the fields SPI & IP addresses are allowed to be a range,
>>>>>>>> then this limitation can be overcome. Multiple flows will be
>>>>>>>> able to use one rule for SECURITY processing. In this case,
>>>>>>>> the security session provided as
>>>>>>> conf would be NULL.
>>>>>
>>>>> SPI values are normally used to uniquely identify the SA that need
>>>>> to be applied on a particular flow.
>>>>> I believe SPI value should not be a range for applying a particular
>>>>> SA or session.
>>>>>
>>>>> Plain packet IP addresses can be a range. That is not an issue.
>>>>> Multiple plain packet flows can use the same session/SA.
>>>>>
>>>>> Why do you feel that security session provided should be NULL to
>>>>> support multiple flows.
>>>>> How will the keys and other SA related info will be passed to the
>>> driver/HW.
>>>>
>>>> [Anoob] The SA configuration would be done via rte_security session.
>>>> The proposal here only changes the 1:1 dependency of rte_flow and
>>>> rte_security session.
>>>
>>> I don't see this dependency for rte_flow and security session.
>>> Multiple flows can be configured to use the same security session.
>>>
>>>>
>>>> The h/w could use SPI field in the received packet to identify SA(ie,
>>>> rte_security session). If the h/w allows to index into a table which
>>>> holds SA information, then per SPI rte_flow is not required. This is
>>>> in fact our case. And for PMDs which doesn't do it this way,
>>>> rte_flow_validate() would fail and then per SPI rte_flow would require to
>>> be created.
>>>
>>> I am not able to understand the issue here. Flow are validated based on
>>> some pattern, You can identify the flow based on some parameter(currently
>>> it is spi in case of inline crypto and also your case).
>>> You can perform some action based on the security session that you have
>>> created before validating the flow And that session creation is nowhere
>>> linked to the type of flow. You can use the same session for as many flows
>>> you want.
>>>
>>>>
>>>> In the present model, a security session is created, and then rte_flow
>>>> will connect ESP packets with one SPI to one security session.
>>>> Instead, when we create the security session, h/w can populate entries
>>>> in a DB that would be accessed during data path handling. And the
>>>> rte_flow could say, all SPI in some range gets inline processed with the
>>> security session identified with its SPI.
>>>>
>>>> Our PMD supports limited number of flow entries but our h/w can do SA
>>>> lookup without flow entries(using SPI instead). So the current
>>>> approach of one flow per session is creating an artificial limit to the number
>>> of SAs that can be supported.
>>>
>>> Ok now I got it. You want to configure a single flow with multiple sessions in
>>> it.
>>> But defining a range in SPI and tunnel IP addresses does not make sense. In
>>> real world applications, Sessions can be created and destroyed at any time
>>> with varied values of SPI and tunnel IPs. How can One put a range to that.
>>>
>>> I would rather say, you actually do not need the rte_flows to be configured
>>> for Inline protocol processing. You have configured all the session info in the
>>> hw while Creating the session and your H/W will be able to identify on the
>>> basis of SPI value which It has stored in the DB and do all the processing.
>>
>> [Anoob] Yes. That is the model being followed right now. Concern is, whether
>> this would be deviating from the spec. In other words, we could have devices
>> which would need rte_flow for every rte_security session (ixgbe needs for inline
>> crypto), and then we could have devices which doesn't need per session
>> rte_flow (which is our case). What do you think is the right approach for
>> supporting both kinds of devices?
>
> Inline proto case is not using rte_flow at the moment.
> And as far as I understand, you also do not need rte_flow to be configured.
> Inline crypto cases are mainly for Intel and Mellanox cases which only supported
> Inline crypto. For Protocol offload cases, I don't feel we need rte_flow as all information
> related to ipsec is already there when we call the session create. Rte_flows are used
> For segregation of ethernet traffic for classification which can be configured for various factors
> as well.
>
>>
>>>
>>> What are the changes that you need in the ipsec-secgw for inline proto to
>>> work, there is No flow processing currently in the inline proto case. Will it not
>>> work as is for you?
>>
>> [Anoob] In ipsec-secgw, a default flow would be created per security enabled
>> port with 'conf=NULL' & SPI = 'ANY'. Flow validate would be done to make sure
>> the underlying PMD supports it. For PMDs which doesn't support this model, per
>> SA flow would be created.
>
> Why do you need that flow as well. You have all the information in the session already.
> You can process the packets based on that information. Isn't it?
> Current implementation in application is good enough in my opinion.
>
>>
>>> Atleast for NXP devices we are able to work as is without any issue.
>>
>> [Anoob] Just curious, would having such a dependency on rte_flow be an issue
>> for NXP devices?
>
> As of now I do not have any comment on this. We are not using rte_flow in our work as of now.
> It is kind of POC for us, we may not upstream it.
> This will depend on the changes that will be done.
Is there any follow up to the RFC? Is it still valid?
>
>>
>>>
>>>>
>>>>>
>>>>>>>>
>>>>>>>> Application should do an rte_flow_validate() to make sure the
>>>>>>>> flow is supported on the PMD.
>>>>>>>>
>>>>>>>> Signed-off-by: Anoob Joseph <anoobj@marvell.com>
>>>>>>>> ---
>>>>>>>> lib/librte_ethdev/rte_flow.h | 6 ++++++
>>>>>>>> 1 file changed, 6 insertions(+)
>>>>>>>>
>>>>>>>> diff --git a/lib/librte_ethdev/rte_flow.h
>>>>>>>> b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
>>>>>>>> --- a/lib/librte_ethdev/rte_flow.h
>>>>>>>> +++ b/lib/librte_ethdev/rte_flow.h
>>>>>>>> @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
>>>>>>>> * direction.
>>>>>>>> *
>>>>>>>> * Multiple flows can be configured to use the same security
>>> session.
>>>>>>>> + *
>>>>>>>> + * The NULL value is allowed for security session. If
>>>>>>>> + security session is NULL,
>>>>>>>> + * then SPI field in ESP flow item and IP addresses in flow
>>>>>>>> + items 'IPv4' and
>>>>>>>> + * 'IPv6' will be allowed to be a range. The rule thus
>>>>>>>> + created can enable
>>>>>>>> + * SECURITY processing on multiple flows.
>>>
>>> What you intent here is " The rule thus created can enable multiple security
>>> sessions on a single rte flow"
>>>
>>>
>>> Regards,
>>> Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [EXT] Re: [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-10-08 13:00 ` Yigit, Ferruh
@ 2019-10-09 10:55 ` Anoob Joseph
2019-12-03 5:32 ` Anoob Joseph
0 siblings, 1 reply; 13+ messages in thread
From: Anoob Joseph @ 2019-10-09 10:55 UTC (permalink / raw)
To: Yigit, Ferruh, Akhil Goyal, Adrien Mazarguil, Declan Doherty,
Pablo de Lara, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Ferruh,
I would like to pursue this RFC.
@Akhil, Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: Yigit, Ferruh <ferruh.yigit@linux.intel.com>
> Sent: Tuesday, October 8, 2019 6:30 PM
> To: Akhil Goyal <akhil.goyal@nxp.com>; Anoob Joseph <anoobj@marvell.com>;
> Adrien Mazarguil <adrien.mazarguil@6wind.com>; Declan Doherty
> <declan.doherty@intel.com>; Pablo de Lara <pablo.de.lara.guarch@intel.com>;
> Thomas Monjalon <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>;
> Shahaf Shuler <shahafs@mellanox.com>; Hemant Agrawal
> <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>; Yongseok
> Koh <yskoh@mellanox.com>; Wenzhuo Lu <wenzhuo.lu@intel.com>;
> Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> <radu.nicolau@intel.com>; dev@dpdk.org
> Subject: [EXT] Re: [dpdk-dev] [RFC] ethdev: allow multiple security sessions to
> use one rte flow
>
> External Email
>
> ----------------------------------------------------------------------
> On 8/19/2019 8:09 AM, Akhil Goyal wrote:
> > Hi Anoob,
> >>
> >> Hi Akhil,
> >>
> >>>>>>>>
> >>>>>>>> The rte_security API which enables inline protocol/crypto
> >>>>>>>> feature mandates that for every security session an rte_flow is
> >>> created.
> >>>>>>>> This would internally translate to a rule in the hardware which
> >>>>>>>> would do packet
> >>>>>>> classification.
> >>>>>>>>
> >>>>>>>> In rte_securty, one SA would be one security session. And if an
> >>>>>>>> rte_flow need to be created for every session, the number of
> >>>>>>>> SAs supported by an inline implementation would be limited by
> >>>>>>>> the number of rte_flows the PMD would be able to support.
> >>>>>>>>
> >>>>>>>> If the fields SPI & IP addresses are allowed to be a range,
> >>>>>>>> then this limitation can be overcome. Multiple flows will be
> >>>>>>>> able to use one rule for SECURITY processing. In this case, the
> >>>>>>>> security session provided as
> >>>>>>> conf would be NULL.
> >>>>>
> >>>>> SPI values are normally used to uniquely identify the SA that need
> >>>>> to be applied on a particular flow.
> >>>>> I believe SPI value should not be a range for applying a
> >>>>> particular SA or session.
> >>>>>
> >>>>> Plain packet IP addresses can be a range. That is not an issue.
> >>>>> Multiple plain packet flows can use the same session/SA.
> >>>>>
> >>>>> Why do you feel that security session provided should be NULL to
> >>>>> support multiple flows.
> >>>>> How will the keys and other SA related info will be passed to the
> >>> driver/HW.
> >>>>
> >>>> [Anoob] The SA configuration would be done via rte_security session.
> >>>> The proposal here only changes the 1:1 dependency of rte_flow and
> >>>> rte_security session.
> >>>
> >>> I don't see this dependency for rte_flow and security session.
> >>> Multiple flows can be configured to use the same security session.
> >>>
> >>>>
> >>>> The h/w could use SPI field in the received packet to identify
> >>>> SA(ie, rte_security session). If the h/w allows to index into a
> >>>> table which holds SA information, then per SPI rte_flow is not
> >>>> required. This is in fact our case. And for PMDs which doesn't do
> >>>> it this way,
> >>>> rte_flow_validate() would fail and then per SPI rte_flow would
> >>>> require to
> >>> be created.
> >>>
> >>> I am not able to understand the issue here. Flow are validated based
> >>> on some pattern, You can identify the flow based on some
> >>> parameter(currently it is spi in case of inline crypto and also your case).
> >>> You can perform some action based on the security session that you
> >>> have created before validating the flow And that session creation is
> >>> nowhere linked to the type of flow. You can use the same session for
> >>> as many flows you want.
> >>>
> >>>>
> >>>> In the present model, a security session is created, and then
> >>>> rte_flow will connect ESP packets with one SPI to one security session.
> >>>> Instead, when we create the security session, h/w can populate
> >>>> entries in a DB that would be accessed during data path handling.
> >>>> And the rte_flow could say, all SPI in some range gets inline
> >>>> processed with the
> >>> security session identified with its SPI.
> >>>>
> >>>> Our PMD supports limited number of flow entries but our h/w can do
> >>>> SA lookup without flow entries(using SPI instead). So the current
> >>>> approach of one flow per session is creating an artificial limit to
> >>>> the number
> >>> of SAs that can be supported.
> >>>
> >>> Ok now I got it. You want to configure a single flow with multiple
> >>> sessions in it.
> >>> But defining a range in SPI and tunnel IP addresses does not make
> >>> sense. In real world applications, Sessions can be created and
> >>> destroyed at any time with varied values of SPI and tunnel IPs. How can One
> put a range to that.
> >>>
> >>> I would rather say, you actually do not need the rte_flows to be
> >>> configured for Inline protocol processing. You have configured all
> >>> the session info in the hw while Creating the session and your H/W
> >>> will be able to identify on the basis of SPI value which It has stored in the DB
> and do all the processing.
> >>
> >> [Anoob] Yes. That is the model being followed right now. Concern is,
> >> whether this would be deviating from the spec. In other words, we
> >> could have devices which would need rte_flow for every rte_security
> >> session (ixgbe needs for inline crypto), and then we could have
> >> devices which doesn't need per session rte_flow (which is our case).
> >> What do you think is the right approach for supporting both kinds of devices?
> >
> > Inline proto case is not using rte_flow at the moment.
> > And as far as I understand, you also do not need rte_flow to be configured.
> > Inline crypto cases are mainly for Intel and Mellanox cases which only
> > supported Inline crypto. For Protocol offload cases, I don't feel we
> > need rte_flow as all information related to ipsec is already there
> > when we call the session create. Rte_flows are used For segregation of
> > ethernet traffic for classification which can be configured for various factors
> as well.
> >
> >>
> >>>
> >>> What are the changes that you need in the ipsec-secgw for inline
> >>> proto to work, there is No flow processing currently in the inline
> >>> proto case. Will it not work as is for you?
> >>
> >> [Anoob] In ipsec-secgw, a default flow would be created per security
> >> enabled port with 'conf=NULL' & SPI = 'ANY'. Flow validate would be
> >> done to make sure the underlying PMD supports it. For PMDs which
> >> doesn't support this model, per SA flow would be created.
> >
> > Why do you need that flow as well. You have all the information in the session
> already.
> > You can process the packets based on that information. Isn't it?
> > Current implementation in application is good enough in my opinion.
> >
> >>
> >>> Atleast for NXP devices we are able to work as is without any issue.
> >>
> >> [Anoob] Just curious, would having such a dependency on rte_flow be
> >> an issue for NXP devices?
> >
> > As of now I do not have any comment on this. We are not using rte_flow in
> our work as of now.
> > It is kind of POC for us, we may not upstream it.
> > This will depend on the changes that will be done.
[Anoob] For inline crypto/protocol processing, a h/w lookup is required. Whether we need one per SPI is the question here.
The current approach in inline crypto assumes per session, rte_flow would be created. But for inline protocol, ipsec-secgw doesn't create any rte_flow, which also could work if we can have static rules to enable SECURITY processing for all ESP packets.
The problem is, in that case any other action on ESP packets could result in a conflict. Or if the applications wants to enable SECURITY processing only for specific flows, the current usage model wouldn't allow that.
May be I'll summarize my concerns,
1. rte_flow SECURITY action type requires a security session.
From the spec of rte_flow, "For INLINE_PROTOCOL, the security protocol is fully offloaded to HW, providing full encapsulation and decapsulation of packets in security protocols. The flow pattern specifies both the outer security header fields and the inner packet fields. The security session specified in the action must match the pattern parameters."
Issue: If only this is allowed, then the numbers of SAs supported will be limited by max number of flows supported. [Current ipsec-secgw is in violation of the above]
2. A static rule to enable security processing on all ESP packets can be enabled. With this, application won't be required to create rte_flow per flow and will be able to use SPI field to identify the security processing to be done on the packet.
Issue: If there are any conflicting rte_flow entries for ESP packets, the behavior is not defined. Also, if application wants to control the flows on which SECURITY processing is done (as in SECURITY is enabled only for selected SPI values), then it is not possible.
I believe it is okay to have either of them in ipsec-secgw, but as a spec we should allow both use cases. Also, all these can be protected by capability check/rte_flow_validate(). So if any PMD doesn't support these modes, an alternate path can be taken. What do you think?
>
> Is there any follow up to the RFC? Is it still valid?
>
> >
> >>
> >>>
> >>>>
> >>>>>
> >>>>>>>>
> >>>>>>>> Application should do an rte_flow_validate() to make sure the
> >>>>>>>> flow is supported on the PMD.
> >>>>>>>>
> >>>>>>>> Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> >>>>>>>> ---
> >>>>>>>> lib/librte_ethdev/rte_flow.h | 6 ++++++
> >>>>>>>> 1 file changed, 6 insertions(+)
> >>>>>>>>
> >>>>>>>> diff --git a/lib/librte_ethdev/rte_flow.h
> >>>>>>>> b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> >>>>>>>> --- a/lib/librte_ethdev/rte_flow.h
> >>>>>>>> +++ b/lib/librte_ethdev/rte_flow.h
> >>>>>>>> @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> >>>>>>>> * direction.
> >>>>>>>> *
> >>>>>>>> * Multiple flows can be configured to use the same security
> >>> session.
> >>>>>>>> + *
> >>>>>>>> + * The NULL value is allowed for security session. If security
> >>>>>>>> + session is NULL,
> >>>>>>>> + * then SPI field in ESP flow item and IP addresses in flow
> >>>>>>>> + items 'IPv4' and
> >>>>>>>> + * 'IPv6' will be allowed to be a range. The rule thus created
> >>>>>>>> + can enable
> >>>>>>>> + * SECURITY processing on multiple flows.
> >>>
> >>> What you intent here is " The rule thus created can enable multiple
> >>> security sessions on a single rte flow"
> >>>
> >>>
> >>> Regards,
> >>> Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [dpdk-dev] [EXT] Re: [RFC] ethdev: allow multiple security sessions to use one rte flow
2019-10-09 10:55 ` [dpdk-dev] [EXT] " Anoob Joseph
@ 2019-12-03 5:32 ` Anoob Joseph
0 siblings, 0 replies; 13+ messages in thread
From: Anoob Joseph @ 2019-12-03 5:32 UTC (permalink / raw)
To: Anoob Joseph, Yigit, Ferruh, Akhil Goyal, Adrien Mazarguil,
Declan Doherty, Pablo de Lara, Thomas Monjalon
Cc: Jerin Jacob Kollanukkaran, Narayana Prasad Raju Athreya,
Ankur Dwivedi, Shahaf Shuler, Hemant Agrawal, Matan Azrad,
Yongseok Koh, Wenzhuo Lu, Konstantin Ananyev, Radu Nicolau, dev
Hi Akhil,
Can you see my responses below and see if I can pursue this RFC?
Thanks,
Anoob
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Anoob Joseph
> Sent: Wednesday, October 9, 2019 4:25 PM
> To: Yigit, Ferruh <ferruh.yigit@linux.intel.com>; Akhil Goyal
> <akhil.goyal@nxp.com>; Adrien Mazarguil <adrien.mazarguil@6wind.com>;
> Declan Doherty <declan.doherty@intel.com>; Pablo de Lara
> <pablo.de.lara.guarch@intel.com>; Thomas Monjalon <thomas@monjalon.net>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad Raju
> Athreya <pathreya@marvell.com>; Ankur Dwivedi <adwivedi@marvell.com>;
> Shahaf Shuler <shahafs@mellanox.com>; Hemant Agrawal
> <hemant.agrawal@nxp.com>; Matan Azrad <matan@mellanox.com>; Yongseok
> Koh <yskoh@mellanox.com>; Wenzhuo Lu <wenzhuo.lu@intel.com>;
> Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> <radu.nicolau@intel.com>; dev@dpdk.org
> Subject: Re: [dpdk-dev] [EXT] Re: [RFC] ethdev: allow multiple security sessions
> to use one rte flow
>
> Hi Ferruh,
>
> I would like to pursue this RFC.
>
> @Akhil, Please see inline.
>
> Thanks,
> Anoob
>
> > -----Original Message-----
> > From: Yigit, Ferruh <ferruh.yigit@linux.intel.com>
> > Sent: Tuesday, October 8, 2019 6:30 PM
> > To: Akhil Goyal <akhil.goyal@nxp.com>; Anoob Joseph
> > <anoobj@marvell.com>; Adrien Mazarguil <adrien.mazarguil@6wind.com>;
> > Declan Doherty <declan.doherty@intel.com>; Pablo de Lara
> > <pablo.de.lara.guarch@intel.com>; Thomas Monjalon
> > <thomas@monjalon.net>
> > Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Narayana Prasad
> > Raju Athreya <pathreya@marvell.com>; Ankur Dwivedi
> > <adwivedi@marvell.com>; Shahaf Shuler <shahafs@mellanox.com>; Hemant
> > Agrawal <hemant.agrawal@nxp.com>; Matan Azrad
> <matan@mellanox.com>;
> > Yongseok Koh <yskoh@mellanox.com>; Wenzhuo Lu
> <wenzhuo.lu@intel.com>;
> > Konstantin Ananyev <konstantin.ananyev@intel.com>; Radu Nicolau
> > <radu.nicolau@intel.com>; dev@dpdk.org
> > Subject: [EXT] Re: [dpdk-dev] [RFC] ethdev: allow multiple security
> > sessions to use one rte flow
> >
> > External Email
> >
> > ----------------------------------------------------------------------
> > On 8/19/2019 8:09 AM, Akhil Goyal wrote:
> > > Hi Anoob,
> > >>
> > >> Hi Akhil,
> > >>
> > >>>>>>>>
> > >>>>>>>> The rte_security API which enables inline protocol/crypto
> > >>>>>>>> feature mandates that for every security session an rte_flow
> > >>>>>>>> is
> > >>> created.
> > >>>>>>>> This would internally translate to a rule in the hardware
> > >>>>>>>> which would do packet
> > >>>>>>> classification.
> > >>>>>>>>
> > >>>>>>>> In rte_securty, one SA would be one security session. And if
> > >>>>>>>> an rte_flow need to be created for every session, the number
> > >>>>>>>> of SAs supported by an inline implementation would be limited
> > >>>>>>>> by the number of rte_flows the PMD would be able to support.
> > >>>>>>>>
> > >>>>>>>> If the fields SPI & IP addresses are allowed to be a range,
> > >>>>>>>> then this limitation can be overcome. Multiple flows will be
> > >>>>>>>> able to use one rule for SECURITY processing. In this case,
> > >>>>>>>> the security session provided as
> > >>>>>>> conf would be NULL.
> > >>>>>
> > >>>>> SPI values are normally used to uniquely identify the SA that
> > >>>>> need to be applied on a particular flow.
> > >>>>> I believe SPI value should not be a range for applying a
> > >>>>> particular SA or session.
> > >>>>>
> > >>>>> Plain packet IP addresses can be a range. That is not an issue.
> > >>>>> Multiple plain packet flows can use the same session/SA.
> > >>>>>
> > >>>>> Why do you feel that security session provided should be NULL to
> > >>>>> support multiple flows.
> > >>>>> How will the keys and other SA related info will be passed to
> > >>>>> the
> > >>> driver/HW.
> > >>>>
> > >>>> [Anoob] The SA configuration would be done via rte_security session.
> > >>>> The proposal here only changes the 1:1 dependency of rte_flow and
> > >>>> rte_security session.
> > >>>
> > >>> I don't see this dependency for rte_flow and security session.
> > >>> Multiple flows can be configured to use the same security session.
> > >>>
> > >>>>
> > >>>> The h/w could use SPI field in the received packet to identify
> > >>>> SA(ie, rte_security session). If the h/w allows to index into a
> > >>>> table which holds SA information, then per SPI rte_flow is not
> > >>>> required. This is in fact our case. And for PMDs which doesn't do
> > >>>> it this way,
> > >>>> rte_flow_validate() would fail and then per SPI rte_flow would
> > >>>> require to
> > >>> be created.
> > >>>
> > >>> I am not able to understand the issue here. Flow are validated
> > >>> based on some pattern, You can identify the flow based on some
> > >>> parameter(currently it is spi in case of inline crypto and also your case).
> > >>> You can perform some action based on the security session that you
> > >>> have created before validating the flow And that session creation
> > >>> is nowhere linked to the type of flow. You can use the same
> > >>> session for as many flows you want.
> > >>>
> > >>>>
> > >>>> In the present model, a security session is created, and then
> > >>>> rte_flow will connect ESP packets with one SPI to one security session.
> > >>>> Instead, when we create the security session, h/w can populate
> > >>>> entries in a DB that would be accessed during data path handling.
> > >>>> And the rte_flow could say, all SPI in some range gets inline
> > >>>> processed with the
> > >>> security session identified with its SPI.
> > >>>>
> > >>>> Our PMD supports limited number of flow entries but our h/w can
> > >>>> do SA lookup without flow entries(using SPI instead). So the
> > >>>> current approach of one flow per session is creating an
> > >>>> artificial limit to the number
> > >>> of SAs that can be supported.
> > >>>
> > >>> Ok now I got it. You want to configure a single flow with multiple
> > >>> sessions in it.
> > >>> But defining a range in SPI and tunnel IP addresses does not make
> > >>> sense. In real world applications, Sessions can be created and
> > >>> destroyed at any time with varied values of SPI and tunnel IPs.
> > >>> How can One
> > put a range to that.
> > >>>
> > >>> I would rather say, you actually do not need the rte_flows to be
> > >>> configured for Inline protocol processing. You have configured all
> > >>> the session info in the hw while Creating the session and your H/W
> > >>> will be able to identify on the basis of SPI value which It has
> > >>> stored in the DB
> > and do all the processing.
> > >>
> > >> [Anoob] Yes. That is the model being followed right now. Concern
> > >> is, whether this would be deviating from the spec. In other words,
> > >> we could have devices which would need rte_flow for every
> > >> rte_security session (ixgbe needs for inline crypto), and then we
> > >> could have devices which doesn't need per session rte_flow (which is our
> case).
> > >> What do you think is the right approach for supporting both kinds of
> devices?
> > >
> > > Inline proto case is not using rte_flow at the moment.
> > > And as far as I understand, you also do not need rte_flow to be configured.
> > > Inline crypto cases are mainly for Intel and Mellanox cases which
> > > only supported Inline crypto. For Protocol offload cases, I don't
> > > feel we need rte_flow as all information related to ipsec is already
> > > there when we call the session create. Rte_flows are used For
> > > segregation of ethernet traffic for classification which can be
> > > configured for various factors
> > as well.
> > >
> > >>
> > >>>
> > >>> What are the changes that you need in the ipsec-secgw for inline
> > >>> proto to work, there is No flow processing currently in the inline
> > >>> proto case. Will it not work as is for you?
> > >>
> > >> [Anoob] In ipsec-secgw, a default flow would be created per
> > >> security enabled port with 'conf=NULL' & SPI = 'ANY'. Flow validate
> > >> would be done to make sure the underlying PMD supports it. For PMDs
> > >> which doesn't support this model, per SA flow would be created.
> > >
> > > Why do you need that flow as well. You have all the information in
> > > the session
> > already.
> > > You can process the packets based on that information. Isn't it?
> > > Current implementation in application is good enough in my opinion.
> > >
> > >>
> > >>> Atleast for NXP devices we are able to work as is without any issue.
> > >>
> > >> [Anoob] Just curious, would having such a dependency on rte_flow be
> > >> an issue for NXP devices?
> > >
> > > As of now I do not have any comment on this. We are not using
> > > rte_flow in
> > our work as of now.
> > > It is kind of POC for us, we may not upstream it.
> > > This will depend on the changes that will be done.
>
> [Anoob] For inline crypto/protocol processing, a h/w lookup is required.
> Whether we need one per SPI is the question here.
>
> The current approach in inline crypto assumes per session, rte_flow would be
> created. But for inline protocol, ipsec-secgw doesn't create any rte_flow, which
> also could work if we can have static rules to enable SECURITY processing for all
> ESP packets.
>
> The problem is, in that case any other action on ESP packets could result in a
> conflict. Or if the applications wants to enable SECURITY processing only for
> specific flows, the current usage model wouldn't allow that.
>
> May be I'll summarize my concerns,
> 1. rte_flow SECURITY action type requires a security session.
> From the spec of rte_flow, "For INLINE_PROTOCOL, the security protocol is fully
> offloaded to HW, providing full encapsulation and decapsulation of packets in
> security protocols. The flow pattern specifies both the outer security header
> fields and the inner packet fields. The security session specified in the action
> must match the pattern parameters."
>
> Issue: If only this is allowed, then the numbers of SAs supported will be limited
> by max number of flows supported. [Current ipsec-secgw is in violation of the
> above]
>
> 2. A static rule to enable security processing on all ESP packets can be enabled.
> With this, application won't be required to create rte_flow per flow and will be
> able to use SPI field to identify the security processing to be done on the packet.
>
> Issue: If there are any conflicting rte_flow entries for ESP packets, the behavior
> is not defined. Also, if application wants to control the flows on which SECURITY
> processing is done (as in SECURITY is enabled only for selected SPI values), then
> it is not possible.
>
> I believe it is okay to have either of them in ipsec-secgw, but as a spec we should
> allow both use cases. Also, all these can be protected by capability
> check/rte_flow_validate(). So if any PMD doesn't support these modes, an
> alternate path can be taken. What do you think?
>
> >
> > Is there any follow up to the RFC? Is it still valid?
> >
> > >
> > >>
> > >>>
> > >>>>
> > >>>>>
> > >>>>>>>>
> > >>>>>>>> Application should do an rte_flow_validate() to make sure the
> > >>>>>>>> flow is supported on the PMD.
> > >>>>>>>>
> > >>>>>>>> Signed-off-by: Anoob Joseph <anoobj@marvell.com>
> > >>>>>>>> ---
> > >>>>>>>> lib/librte_ethdev/rte_flow.h | 6 ++++++
> > >>>>>>>> 1 file changed, 6 insertions(+)
> > >>>>>>>>
> > >>>>>>>> diff --git a/lib/librte_ethdev/rte_flow.h
> > >>>>>>>> b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > >>>>>>>> --- a/lib/librte_ethdev/rte_flow.h
> > >>>>>>>> +++ b/lib/librte_ethdev/rte_flow.h
> > >>>>>>>> @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> > >>>>>>>> * direction.
> > >>>>>>>> *
> > >>>>>>>> * Multiple flows can be configured to use the same security
> > >>> session.
> > >>>>>>>> + *
> > >>>>>>>> + * The NULL value is allowed for security session. If
> > >>>>>>>> + security session is NULL,
> > >>>>>>>> + * then SPI field in ESP flow item and IP addresses in flow
> > >>>>>>>> + items 'IPv4' and
> > >>>>>>>> + * 'IPv6' will be allowed to be a range. The rule thus
> > >>>>>>>> + created can enable
> > >>>>>>>> + * SECURITY processing on multiple flows.
> > >>>
> > >>> What you intent here is " The rule thus created can enable
> > >>> multiple security sessions on a single rte flow"
> > >>>
> > >>>
> > >>> Regards,
> > >>> Akhil
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2019-12-03 5:32 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-24 14:17 [dpdk-dev] [RFC] ethdev: allow multiple security sessions to use one rte flow Anoob Joseph
2019-08-02 5:35 ` Anoob Joseph
2019-08-14 9:22 ` Anoob Joseph
2019-08-14 11:07 ` Akhil Goyal
2019-08-15 6:49 ` Anoob Joseph
2019-08-15 9:48 ` Ananyev, Konstantin
2019-08-16 3:24 ` Anoob Joseph
2019-08-16 8:32 ` Akhil Goyal
2019-08-16 10:12 ` Anoob Joseph
2019-08-19 7:09 ` Akhil Goyal
2019-10-08 13:00 ` Yigit, Ferruh
2019-10-09 10:55 ` [dpdk-dev] [EXT] " Anoob Joseph
2019-12-03 5:32 ` Anoob Joseph
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).