From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0060.outbound.protection.outlook.com [104.47.40.60]) by dpdk.org (Postfix) with ESMTP id 0668E1B31C for ; Mon, 29 Jan 2018 09:03:54 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=uCL+ARE70622f7hjiDlZCVLsYRj85OVY3ntPFNm6l7g=; b=Hz7iXpNm5PeHtlO9SPrk/IACUWqsyiFwsxVp485QIxZT9nREijFrZRZgi93zjl7JDnNL51eJDQtKKblCz/UgEbcj7H2Gw6Ql65/hEEJbnlLBUPhf/tXxh8KoaVTYoaDdZ7wvqSalfQvyJ2Uq42NiDkNJ39KUHguc1gKnD99cqcI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Anoob.Joseph@cavium.com; Received: from hyd1ajoseph-dt.caveonetworks.com (115.113.156.2) by BLUPR0701MB1059.namprd07.prod.outlook.com (10.160.34.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.444.14; Mon, 29 Jan 2018 08:03:46 +0000 Cc: anoob.joseph@caviumnetworks.com, "Doherty, Declan" , "Gonzalez Monroy, Sergio" , Jerin Jacob , Narayana Prasad , Nelio Laranjeiro , "dev@dpdk.org" To: Akhil Goyal , "Nicolau, Radu" References: <1516626668-9031-1-git-send-email-anoob.joseph@caviumnetworks.com> <4ab55855-0649-4d68-7b63-b75a6029dbb2@caviumnetworks.com> <763A2F19A5EFF34F8B7F1657C992EE297B31E1D5@IRSMSX104.ger.corp.intel.com> <763A2F19A5EFF34F8B7F1657C992EE297B3202FA@IRSMSX104.ger.corp.intel.com> <8c1b457a-d6ea-1a56-cd73-385108f8c538@nxp.com> From: Anoob Joseph Message-ID: Date: Mon, 29 Jan 2018 13:33:40 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <8c1b457a-d6ea-1a56-cd73-385108f8c538@nxp.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [115.113.156.2] X-ClientProxiedBy: MWHPR20CA0008.namprd20.prod.outlook.com (10.171.151.146) To BLUPR0701MB1059.namprd07.prod.outlook.com (10.160.34.156) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 900b310b-fa6a-40ec-e787-08d566eed524 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(2017052603307)(7153060)(7193020); SRVR:BLUPR0701MB1059; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1059; 3:I9mv3/lAnV4wQJAKZMtqeaXqnZDPNBA0y2RjMA33tWWPLdru8H2FmJnLjwCkG37hKZv81cxs+LUciQxwE7UAKavcddhYJ6HBOs6N9v5ZFQ4m5mt5hBs95v4sCOZvm00FxAnZEFsbRNNZqY1HHGwnsqOdHBeifQPVuARhb60k7QIJtp+/9XZ8BeABiaR6VotwjKZvudZxnp4Th9tQ6aTCIR8Xe7xQ7C1TY3wT4XR6QpXsDe0ZyhfIbYdNa/4zEAID; 25:ykRtqAH6TOvkUO/yfrDHBt6t+GDd4tMBG9NJ4XkJMMPaC3HiNFORNKnQFcmCgGDDTUdMr2H6r80b1yfpjHVV3HVD6cog/wIkh+op+1Yv6TDY54MIXRfNn7esIbf1+xrpn+EBKIHVXLNincEwlafSdP9WQqfVncrwU1ND23jXkh1ujzOw/fza2e/M4SmCdLUfdDPZMFGoKBI40keaNiwFzfE/d/e64b1juWU5+5UVdrNm5soBuD4b+8u+2effc7oGHx0b2hibBGk0S979DctYDn5vMkOkGQ5LP/O1/d6Dvk0JezZ6AR+fqmdctrw/2/FpgUp4PhF8iH72vcAhIB09Ww==; 31:qHlTQLE2eimgKl1k65QydZ3/9YCfEhItiMNc7vgLk42rT+ALUKAEWdPQ0suQ27EYEsmqPZcd3QH14Kz0koQjw8IkLXutwWdov+LG58l2ejCfhRu+od9Jdvn0yuoC80AVKYRqIdOtvOnhX+OSsxFKsrsgOrPQbr5bPZs2IWBv8AokiySfEypFi6JLyXH+zxaJVGb7JbEOD93Bff1xYGCtDBqFTeNYxcUQs3xtXEgpTMM= X-MS-TrafficTypeDiagnostic: BLUPR0701MB1059: X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1059; 20:oVgV1OMk8eWZv6+wllaLX3djrcV52QOmYZX9Phf4RMBFGI3hdHGnsRe/qrKdOCbh32LNC5bf6TuFvBiwHgsMxdBqLlR7R+paMJ10PoZbXRqF4DOO1bGeCvU9aaFxwW2+BT45yV3xaDdV/GbsFn4p9tg0DtGHDHe1MPRCPQ5bC4gueS8y4xuABpUwLUUuq/tuS3LSzX/RVRBQQ+Q2QnUcjigBHGQmdIPPgsscZ9fZuQ0LUhNqRx09u373rOBEfPnUS+3oX0HgaSIR3bFRgsD3aIf19SetgpP/KGsqhDi8cZDwB4+dl0vO7EgylMaiL6lAX1tYFLNHX/NZy43g5CHUSIiJYqcMten7XFvKBdUKFhWDB0buJCj+KDCKuMakUu98xftrLbEWJluuqdj77DJBN5r9Jml1/xRXS0QhxG//R60H9QEwTela2X1MewRsAluw/gA3yN5TASUei8ywQaetvy/RZKnmsj+30ace7RynFrfpn/4iC7tMgU1ynf8tlwFoeLCsktQPUKXnkwhg1nblM3KaYj1KLA7eC8v0UR5RwW7TIGjw1KkM6VDM/Gya/mhOFcwD+BntaEInN8uPW/QEpLEH6VYB9EgZ8sqdzDyehbs= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197)(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(93006095)(3231101)(944501161)(3002001)(10201501046)(6041288)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:BLUPR0701MB1059; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0701MB1059; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1059; 4:MIT803VhjlEAj7zM7/Nki2JCNWYzIwCNB6YlovYNYXILLBXZbJUzn0XdBrLcYdKXXI40/1Sq+VSCkMq5Q93jAxnVuJY3gToFVyW0XyMPh0BUyDFYkdX83NqS5Pd4a6In5yi8HaIaDx6u4aC0h/VLSM4L6Sn9sDUrfFos5PanRpL8Yf86myNcsDuhDS4nwqYzYQTV7knmX7JhzSX93Acf43cifyeq7T3NXpeHy9bGHy9NZNDSVmD47D/k+BVNGm4+Aj9u5oaiWa/SCL0I5Xz/6Hzu+8IhBktRTbzV9unjcD5A45u1C4FJKBqw8OI2o/PDk3fuFQY4qyliRTbM+OBvofRx5bqdKXWCfx3QQW8egYBjbBvXiN4BvLP84jjhyASe X-Forefront-PRVS: 0567A15835 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(366004)(39380400002)(346002)(39850400004)(396003)(189003)(199004)(13464003)(81166006)(65956001)(81156014)(25786009)(53416004)(478600001)(386003)(8676002)(6506007)(6246003)(53546011)(229853002)(2906002)(65806001)(23676004)(2486003)(68736007)(52146003)(52116002)(72206003)(59450400001)(76176011)(65826007)(53936002)(4326008)(2950100002)(5660300001)(186003)(230700001)(6512007)(66066001)(6666003)(42882006)(47776003)(26005)(31696002)(6486002)(55236004)(16526019)(8936002)(97736004)(58126008)(50466002)(36756003)(69596002)(561944003)(305945005)(7736002)(105586002)(64126003)(106356001)(54906003)(93886005)(83506002)(110136005)(316002)(6116002)(3846002)(31686004)(8656006)(67846002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR0701MB1059; H:hyd1ajoseph-dt.caveonetworks.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjA3MDFNQjEwNTk7MjM6SnkzNy9RQXk3QUtGMjNBN29vVXpDT0FR?= =?utf-8?B?YjgzRnB2emsvdFJQZURjTm9kcW5kb0kxd0l6Tkp0cDI3V1U0cVgvc3FCWFJm?= =?utf-8?B?NEs2SXBubVliM1dDOTBIU0JzN3prb3FTVG44SGE4WURlVS8vZWpyUmh5MElU?= =?utf-8?B?dHZCbFN1elZrSHNNRTJqcVJ0aWdndFVtckh2VWdZQnA1MVlMeCt5Y3VZdU9z?= =?utf-8?B?MU1naU1VZE14ODR1MFduQmxRTHFXdkpxemdlenQ4K3krY09HdmFYalNOVGlB?= =?utf-8?B?NGtLWXZiVjhGaUVuckNTQmUrcGpEb3QzK0FXNXhYS2NmbDhPMHkwb1Q2MzU0?= =?utf-8?B?a2FCSE1KSDVKWUswVm1vZU5aR3MyWTVmOWJNclNuNUxoN3g3UEhHVTYzdkZw?= =?utf-8?B?Z3p5Zzh2bVFnMGlPRStUUTJ3RXBCYkgzRUMzbUhUeDhoNGF3OU9ZejIyUDc0?= =?utf-8?B?ZzM3Yms0Wnh5OExpeFg0R1pPRkdrck1PTWdkUkJueWZpZ2Q0L1FUWmcvbEJ2?= =?utf-8?B?WG9hOXJVMTMvWmIyMWJaQ1hsVU9FcWhMSkZadk9QbWhxdm5pNTVqRGoxL1dO?= =?utf-8?B?WXdmdW5ZZ0ZBRXh1ajREdC9EZEd0ZmdMTFdqRGxSeHd1NlJRS3NWRUdTREdW?= =?utf-8?B?Y2FGalF4bzM5dDlNa29JdkphbnAwV3l6L2VwWkdzUlVadkk0czZGVXZYdW5v?= =?utf-8?B?NDhPaEttb08xMzJxOXFmTjh5R0NRdGVoMytQdGgxdWNTZloyZ3JFdFFqNEt6?= =?utf-8?B?RUZQRitnMUFGQ2UweTB4aUtLYUFKTWwrVFd0OE5lN2RxYUxlTVZ4bzRobGZk?= =?utf-8?B?dFQwZjRGTHFKUWlnRU9DSjN2TzBPbjlnUjBtc2NmTkpkRnZyRmcyVE5EQTlM?= =?utf-8?B?NWVpK1RQYUJNcTVJc0tBaTVINFB3Q0ZBZ1k1U1BSZ2VFbmpyNzNhcVJ4Zjdi?= =?utf-8?B?a2lLMXpPRmZCZjQ3Y0ZpdXhJbmhSZUpJazFmTERCdnZyczgvRmZJMUwzT1NV?= =?utf-8?B?enlKSm1iNE4yL1A1MlNBeVhJelV2TVh4L3pkUGU5WGpiU3huRkZsS3dCTnBT?= =?utf-8?B?SWZCM0J5TnNvcjh3d1MzQ0JPNGliek5aVzRrSTdoL000aG8vSVhZUlh1SFVp?= =?utf-8?B?Rjh2OUFyWU1mOVl1V0JObk85Nlo4T3hycGF4NWJjMUt0NUI1OUFRZHlTU0tm?= =?utf-8?B?N1Rhd3NKODROTzB3LzdhSkJLWWU3U2VKT3doMFU0QmtZalBjK1V6VVJlWWFS?= =?utf-8?B?WEZhRUZmVHZYMWJYc0hSUmxXV01WeXlySXhPTzhSb2xEWFF4WnEwb2VlekVF?= =?utf-8?B?QkZTakdtUW0wTFFoclZqZDNjZUZTaCtZbThmVGpDK1lrU2JidUo5K3Myc1Zk?= =?utf-8?B?SGt5WFQ4ZlgvME45WmhiUEQ5MGJYalZ2Tkt5dlRWajIvb3kwT0NBcndwbWEr?= =?utf-8?B?aUFJMkJuV080M0hPQmwxcWlVMkNZbWxac25Oa21MMy8yWWFCaEVvRUtvbTFE?= =?utf-8?B?dW91aTdDS1hPdmRIRmpmVFY4dUdNSzhYUWJoWEFLazVxN3pwV0g2aUtVUTZu?= =?utf-8?B?eXRlZzhpZEJMTWs4cUlTeXdaZkZmNy9RbHJlK1hWQzhZQVJSRDYxYlRlTTRh?= =?utf-8?B?U0xWczdwUjQxWEdWdVpEVFpabHFjSGs4VjBNVVlRU1FHRzh5YmE2dXdpbS8v?= =?utf-8?B?Ym11ZkZLUitPYUJVZDBCTEFJaFdOYlhMYXU4eGlHTUNZbGxQcS83ck8zcVJi?= =?utf-8?B?QzFGMlVBUUZNN3NuZlQyOXEvdkJMbnZpVlY2S2JDRERJaUhKWDRuSTRqanA0?= =?utf-8?B?MHlucTY0VTIySlM2WWpZeTcvdThTRDVHTTdOUEhaZEEyNUJXa3FPNXJLK3Jz?= =?utf-8?B?bGpZRGNzUkhWcXFPcDN4VG5zRlMvYVd5YU5mNVJWeTg1eDlFSGpsbERZVjQ1?= =?utf-8?B?YUlkYnpaZ01Mblg5Um5uUFpuMXEyVXY5b3F2YzNHdWY4SERIZGVqL0NwZFB2?= =?utf-8?B?a3cvaEFiclNpZ1lqTnNGOHNpNjNDMmJUeWxQWWtEbnV2cGI3SjdmK3crcG1O?= =?utf-8?B?V2M2Q3BZL3l5dWtRL3Uwd25MaTNSeTQyYjUzRVdBSWtwMHA4bjhyRVhWZU10?= =?utf-8?Q?S1uj2bX6FAH7Iv9YMB+cj/UJg=3D?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1059; 6:0PSwwkRxAAVllPp8TzIhd5DJC/cl/0e8DIUroV1RTzwDkI6FwQrEa8TxrRTof7U/mtJ0npFOc4hEhyM+M5gGBuByL+8ISKEu1HP5F4ht/vIA+211Bf0VGuRjIh27Mhb5o5hWpA2nmDcQXxevEs9j6UWUitKrxFyNIRDE4DZF0aV1SQAdIehCl7bY3j33pSw/wh3XtuZxCw1lrPJ+ySZ9ytPc9SnR8mIktOm4CwdQPS84Tul47OMuTPGkmgxJfFxHUD9+jlwGk+ZIvV9/ddfzg6whuTrKzW5321593aA8tGtiALI1LtHvJbyXCw18Nv+wjUYczC5TdJebIdbT8GcVAEvjo1m9KR6htkDLzscb6DM=; 5:Vt8S3bNeJY+K7trI1/bl2ZBqh+lKbfFyO4xd3gFYk2g9BecauUUONhUFqpZpZCBFw6/yKk2ZgiyN/J2S9cncp4HVB7WqJeh725P3oN4+zZSJA4K8w53rYg7wn2V8bR6Pw5drE1RYH9/7LUNEeNMxqpeDI1+/QMrlJ9nPdQMWozI=; 24:8UJp2YekFUN2fT3jSQ6psdIVIiU1sEt09D+NAgbQwhUSkelhhuiUXxXYiYtuMk+agPqFylGcnxUhvlZsZDSJPqMSW/DkY6/ORfL5d3v7I34=; 7:zGfOW3lvKT3M1nXc3IGglEYxKCQnNnIppyzV1d9Rl2AvtkrKbhmeC1RMhbtK7fcZQkRqKRvYuk6nIns9e5UWBvduLoB+E1X2DP9t08XK+H/hJ5yeJeeaj5RPU/z0YyaWXBamSoKlQk3UZt3m/hLTVI3PZ55uK9lOmbz12Jd9N3kN3NFeu6olHr9Bw7FdnsO8hB3D0GZi+FF753b5FdovdUFZD5JtsZUwRdFk87dDbnhwkrR/iXbI4nVjVnfi47rI SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Jan 2018 08:03:46.7945 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 900b310b-fa6a-40ec-e787-08d566eed524 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0701MB1059 Subject: Re: [dpdk-dev] [RFC 0/3] set protocol specific metadata using set_pkt_metadata API X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Jan 2018 08:03:54 -0000 Hi Akhil, Radu, On 01/29/2018 01:02 PM, Akhil Goyal wrote: > On 1/26/2018 8:38 PM, Nicolau, Radu wrote: >> >> >>> -----Original Message----- >>> From: Anoob Joseph [mailto:anoob.joseph@caviumnetworks.com] >>> Sent: Friday, January 26, 2018 2:38 PM >>> To: Nicolau, Radu ; Akhil Goyal >>> >>> Cc: anoob.joseph@caviumnetworks.com; Doherty, Declan >>> ; Gonzalez Monroy, Sergio >>> ; Jerin Jacob >>> ; Narayana Prasad >>> ; Nelio Laranjeiro >>> ; dev@dpdk.org >>> Subject: Re: [RFC 0/3] set protocol specific metadata using >>> set_pkt_metadata >>> API >>> >>> Hi Radu, >>> >>> On 01/26/2018 04:52 PM, Nicolau, Radu wrote: >>>> >>>>> -----Original Message----- >>>>> From: Anoob Joseph [mailto:anoob.joseph@caviumnetworks.com] >>>>> Sent: Thursday, January 25, 2018 5:13 PM >>>>> To: Akhil Goyal ; Nicolau, Radu >>>>> >>>>> Cc: Doherty, Declan ; Gonzalez Monroy, >>>>> Sergio ; >>>>> anoob.joseph@caviumnetworks.com; Jerin Jacob >>>>> ; Narayana Prasad >>>>> ; Nelio Laranjeiro >>>>> ; dev@dpdk.org >>>>> Subject: Re: [RFC 0/3] set protocol specific metadata using >>>>> set_pkt_metadata API >>>>> >>>>> Hi Akhil, Radu, >>>>> >>>>> Could you review the patch and share your thoughts on the proposed >>>>> change? >>>>> >>>> Hi, >>>> >>>> I've had a quick look. From what I can see you can do everything >>>> you do in >>> this patch with the current API. For example you can store an >>> internal struct >>> pointer in the private section of the security context and you can >>> increment >>> the ESP SN with every tx or set metadata call. >>> With the current API, PMD could store the ESN with the security >>> session, but >>> there is no means for the application to read this. Application >>> should be >>> aware of the sequence number used per packet. This is required to >>> monitor >>> sequence number overflow.In the proposal, the sequence number field is >>> IN-OUT. So application could either dictate the sequence number, or >>> read >>> the value from the PMD. >>> >>> Thanks, >>> Anoob >> >> My concern is that we are adding too much and too specific to the >> security API. >> Overflow situation can be monitored with a tx callback event or a >> crypto callback event, depending on the device type. >> > Agreed with Radu, this looks too specific information. > Instead, we can do overflow checking in the driver and add a macro in > rte_crypto_op_status for overflow. We could do the callback when sequence number over flow happens, and IPsec processing fails subsequently. But ideally, application should be able to detect that the sequence number is about to over flow and renegotiate the SA while the original SA is still valid. I agree that we would be better off by handling this in the driver. But application would need some sort of event which would say, "sequence number is about to overflow, renegotiate SA", before the current SA becomes invalid. Do we have any mechanism to register a callback (acting on mbuf), when a particular event occurs (without dropping the mbuf)? If yes, we could move to that approach. rte_crypto_op_status could be leveraged for lookaside_protocol, but can we do something similar for inline protocol? Thoughts? Anoob > > -Akhil