Hi Konstantin, Please see inline.
Thanks, Anoob > -----Original Message----- > From: Ananyev, Konstantin <konstantin.anan...@intel.com> > Sent: Wednesday, September 18, 2019 2:16 PM > To: Anoob Joseph <ano...@marvell.com>; Smoczynski, MarcinX > <marcinx.smoczyn...@intel.com>; akhil.go...@nxp.com > Cc: dev@dpdk.org; Narayana Prasad Raju Athreya <pathr...@marvell.com>; > Jerin Jacob Kollanukkaran <jer...@marvell.com>; Archana Muniganti > <march...@marvell.com> > Subject: RE: [dpdk-dev] [PATCH v2 0/3] examples/ipsec-secgw: add fallback > session > > > Hi Anoob, > > > > > Hi Marcin, > > > > Sorry for the late response. But how do you plan to handle "inline protocol" > processed packets? > > Right now that feature is supported for "inline crypto" only. [Anoob] The description says "inline processed" packets. Hence the confusion. > For the case when SA doesn't enable replay window and/or ESN current > patch should also work for "inline proto" too, but this is just my > understanding (not tested, etc.). [Anoob] In case of inline ipsec processing, the ipsec state (which would track sequence number etc) will be internal to the PMDs. So anti-replay/ESN would have to be done either in the h/w or PMD. This would mean application will not have state information regarding ipsec processing. Hence fallback handling with the above scheme will not work in that case. To address this properly for inline protocol, we will have to come up with some logic to share session private data b/w "eligible" PMDs. This would involve library changes to rte_security, etc. Once that is proposed, there will be one kind of handling for inline protocol processing and another kind for inline crypto processing. Would you be fine with that? > Konstantin > > > > > Thanks, > > Anoob > > > > > -----Original Message----- > > > From: dev <dev-boun...@dpdk.org> On Behalf Of Marcin Smoczynski > > > Sent: Wednesday, September 4, 2019 7:47 PM > > > To: konstantin.anan...@intel.com; akhil.go...@nxp.com > > > Cc: dev@dpdk.org; Marcin Smoczynski <marcinx.smoczyn...@intel.com> > > > Subject: [dpdk-dev] [PATCH v2 0/3] examples/ipsec-secgw: add > > > fallback session > > > > > > Inline processing is limited to a specified subset of traffic. It is > > > often unable to handle more complicated situations, such as > > > fragmented traffic. When using inline processing such traffic is dropped. > > > > > > Introduce multiple sessions per SA allowing to configure a fallback > > > lookaside session for packets that normally would be dropped. > > > A fallback session type in the SA configuration by adding 'fallback' > > > with 'lookaside-none' or 'lookaside-protocol' parameter to determine > > > type of session. > > > > > > Fallback session feature is available only when using librte_ipsec. > > > > > > v1 to v2 changes: > > > - disable fallback offload for outbound SAs > > > - add test scripts > > > > > > Marcin Smoczynski (3): > > > examples/ipsec-secgw: ipsec_sa structure cleanup > > > examples/ipsec-secgw: add fallback session feature > > > examples/ipsec-secgw: add offload fallback tests > > > > > > doc/guides/sample_app_ug/ipsec_secgw.rst | 17 +- > > > examples/ipsec-secgw/esp.c | 35 ++-- > > > examples/ipsec-secgw/ipsec-secgw.c | 16 +- > > > examples/ipsec-secgw/ipsec.c | 99 ++++++----- > > > examples/ipsec-secgw/ipsec.h | 61 +++++-- > > > examples/ipsec-secgw/ipsec_process.c | 113 +++++++----- > > > examples/ipsec-secgw/sa.c | 164 +++++++++++++----- > > > .../test/trs_aesgcm_common_defs.sh | 4 +- > > > .../trs_aesgcm_inline_crypto_fallback_defs.sh | 5 + > > > .../test/tun_aesgcm_common_defs.sh | 6 +- > > > .../tun_aesgcm_inline_crypto_fallback_defs.sh | 5 + > > > 11 files changed, 358 insertions(+), 167 deletions(-) create mode > > > 100644 > > > examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh > > > create mode 100644 examples/ipsec- > > > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh > > > > > > -- > > > 2.21.0.windows.1