Hi all,

Reminder...!

If there are no concerns, I'll send the patch after adding the required changes 
in ipsec-secgw as well.

Thanks,
Anoob

> -----Original Message-----
> From: Anoob Joseph <[email protected]>
> Sent: Friday, August 2, 2019 11:05 AM
> To: Anoob Joseph <[email protected]>; Akhil Goyal
> <[email protected]>; Adrien Mazarguil <[email protected]>;
> Declan Doherty <[email protected]>; Pablo de Lara
> <[email protected]>; Thomas Monjalon
> <[email protected]>
> Cc: Jerin Jacob Kollanukkaran <[email protected]>; Narayana Prasad Raju
> Athreya <[email protected]>; Ankur Dwivedi
> <[email protected]>; Shahaf Shuler <[email protected]>;
> Hemant Agrawal <[email protected]>; Matan Azrad
> <[email protected]>; Yongseok Koh <[email protected]>; Wenzhuo
> Lu <[email protected]>; Konstantin Ananyev
> <[email protected]>; Radu Nicolau <[email protected]>;
> [email protected]
> Subject: RE: [RFC] ethdev: allow multiple security sessions to use one rte
> flow
> 
> Hi Akhil, Adrien, Declan, Pablo,
> 
> Can you review this proposal and share your feedback?
> 
> Thanks,
> Anoob
> 
> > -----Original Message-----
> > From: Anoob Joseph <[email protected]>
> > Sent: Wednesday, July 24, 2019 7:47 PM
> > To: Akhil Goyal <[email protected]>; Adrien Mazarguil
> > <[email protected]>; Declan Doherty
> > <[email protected]>; Pablo de Lara
> > <[email protected]>; Thomas Monjalon
> > <[email protected]>
> > Cc: Anoob Joseph <[email protected]>; Jerin Jacob Kollanukkaran
> > <[email protected]>; Narayana Prasad Raju Athreya
> > <[email protected]>; Ankur Dwivedi <[email protected]>;
> Shahaf
> > Shuler <[email protected]>; Hemant Agrawal
> > <[email protected]>; Matan Azrad <[email protected]>;
> Yongseok
> > Koh <[email protected]>; Wenzhuo Lu <[email protected]>;
> > Konstantin Ananyev <[email protected]>; Radu Nicolau
> > <[email protected]>; [email protected]
> > Subject: [RFC] ethdev: allow multiple security sessions to use one rte
> > flow
> >
> > The rte_security API which enables inline protocol/crypto feature
> > mandates that for every security session an rte_flow is created. This
> > would internally translate to a rule in the hardware which would do packet
> classification.
> >
> > In rte_securty, one SA would be one security session. And if an
> > rte_flow need to be created for every session, the number of SAs
> > supported by an inline implementation would be limited by the number
> > of rte_flows the PMD would be able to support.
> >
> > If the fields SPI & IP addresses are allowed to be a range, then this
> > limitation can be overcome. Multiple flows will be able to use one
> > rule for SECURITY processing. In this case, the security session provided as
> conf would be NULL.
> >
> > Application should do an rte_flow_validate() to make sure the flow is
> > supported on the PMD.
> >
> > Signed-off-by: Anoob Joseph <[email protected]>
> > ---
> >  lib/librte_ethdev/rte_flow.h | 6 ++++++
> >  1 file changed, 6 insertions(+)
> >
> > diff --git a/lib/librte_ethdev/rte_flow.h
> > b/lib/librte_ethdev/rte_flow.h index f3a8fb1..4977d3c 100644
> > --- a/lib/librte_ethdev/rte_flow.h
> > +++ b/lib/librte_ethdev/rte_flow.h
> > @@ -1879,6 +1879,12 @@ struct rte_flow_action_meter {
> >   * direction.
> >   *
> >   * Multiple flows can be configured to use the same security session.
> > + *
> > + * The NULL value is allowed for security session. If security
> > + session is NULL,
> > + * then SPI field in ESP flow item and IP addresses in flow items
> > + 'IPv4' and
> > + * 'IPv6' will be allowed to be a range. The rule thus created can
> > + enable
> > + * SECURITY processing on multiple flows.
> > + *
> >   */
> >  struct rte_flow_action_security {
> >     void *security_session; /**< Pointer to security session structure.
> > */
> > --
> > 2.7.4

Reply via email to