Show a cover letter.

GET /api/covers/65940/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 65940,
    "url": "http://patches.dpdk.org/api/covers/65940/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/cover/1582185727-6749-1-git-send-email-lbartosik@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1582185727-6749-1-git-send-email-lbartosik@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1582185727-6749-1-git-send-email-lbartosik@marvell.com",
    "date": "2020-02-20T08:01:52",
    "name": "[v4,00/15] add eventmode to ipsec-secgw",
    "submitter": {
        "id": 1305,
        "url": "http://patches.dpdk.org/api/people/1305/?format=api",
        "name": "Lukas Bartosik [C]",
        "email": "lbartosik@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/cover/1582185727-6749-1-git-send-email-lbartosik@marvell.com/mbox/",
    "series": [
        {
            "id": 8627,
            "url": "http://patches.dpdk.org/api/series/8627/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=8627",
            "date": "2020-02-20T08:01:52",
            "name": "add eventmode to ipsec-secgw",
            "version": 4,
            "mbox": "http://patches.dpdk.org/series/8627/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/covers/65940/comments/",
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 593E2A0555;\n\tThu, 20 Feb 2020 09:02:17 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id A9DC51B951;\n\tThu, 20 Feb 2020 09:02:16 +0100 (CET)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174]) by dpdk.org (Postfix) with ESMTP id 02D734C81\n for <dev@dpdk.org>; Thu, 20 Feb 2020 09:02:14 +0100 (CET)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id\n 01K80fsa016141; Thu, 20 Feb 2020 00:02:14 -0800",
            "from sc-exch01.marvell.com ([199.233.58.181])\n by mx0a-0016f401.pphosted.com with ESMTP id 2y8ubhefd1-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Thu, 20 Feb 2020 00:02:13 -0800",
            "from DC5-EXCH02.marvell.com (10.69.176.39) by SC-EXCH01.marvell.com\n (10.93.176.81) with Microsoft SMTP Server (TLS) id 15.0.1497.2;\n Thu, 20 Feb 2020 00:02:12 -0800",
            "from SC-EXCH01.marvell.com (10.93.176.81) by DC5-EXCH02.marvell.com\n (10.69.176.39) with Microsoft SMTP Server (TLS) id 15.0.1497.2;\n Thu, 20 Feb 2020 00:02:11 -0800",
            "from maili.marvell.com (10.93.176.43) by SC-EXCH01.marvell.com\n (10.93.176.81) with Microsoft SMTP Server id 15.0.1497.2 via Frontend\n Transport; Thu, 20 Feb 2020 00:02:11 -0800",
            "from luke.marvell.com (unknown [10.95.130.24])\n by maili.marvell.com (Postfix) with ESMTP id 857663F7041;\n Thu, 20 Feb 2020 00:02:08 -0800 (PST)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-type; s=pfpt0818; bh=XEtIpQDgVYt0KyJeq6OdYsgrcPv6uYOSfiLldZVhqco=;\n b=YvYUdS/dTgqdHDPf6IgLV78OlhZiyu7UvAnzGXtRPmze9sGzcG9KCsisAEKoq/K5mYsg\n LGWGGW71f5Y/XBVVxIGuHZNzyDXRUNX9Un8obhwv55MyBRNdXX00Ps7yyrso8o7/0J9X\n EYeuXYXtR17ZsVH5ZoAMsINnNvLMtK9Kd9ZQ2k6BlKppGIUoUTo83lvU4oqlNA/7p1r2\n EDIs85IEgtHC0hsy6wGEi268dujBFhB9HsmEIPEGISx5Jmy5vivUa3xkpueJkaAGhev2\n tD4qcYAD1Lnb8B0x70bDIdB/679atNqZOQncMHlfJJ5wngVlJ37MfWK68/Bw5Vfsssi5 EQ==",
        "From": "Lukasz Bartosik <lbartosik@marvell.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>, Radu Nicolau <radu.nicolau@intel.com>,\n Thomas Monjalon <thomas@monjalon.net>",
        "CC": "Jerin Jacob <jerinj@marvell.com>, Narayana Prasad <pathreya@marvell.com>,\n Ankur Dwivedi <adwivedi@marvell.com>, Anoob Joseph <anoobj@marvell.com>,\n Archana Muniganti <marchana@marvell.com>, Tejasree Kondoj\n <ktejasree@marvell.com>, Vamsi Attunuru <vattunuru@marvell.com>,\n \"Konstantin Ananyev\" <konstantin.ananyev@intel.com>, <dev@dpdk.org>",
        "Date": "Thu, 20 Feb 2020 09:01:52 +0100",
        "Message-ID": "<1582185727-6749-1-git-send-email-lbartosik@marvell.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1580824721-21527-1-git-send-email-lbartosik@marvell.com>",
        "References": "<1580824721-21527-1-git-send-email-lbartosik@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Proofpoint-Virus-Version": "vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572\n definitions=2020-02-20_02:2020-02-19,\n 2020-02-20 signatures=0",
        "Subject": "[dpdk-dev] [PATCH v4 00/15] add eventmode to ipsec-secgw",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This series introduces event-mode additions to ipsec-secgw.\n\nWith this series, ipsec-secgw would be able to run in eventmode. The\nworker thread (executing loop) would be receiving events and would be\nsubmitting it back to the eventdev after the processing. This way,\nmulticore scaling and h/w assisted scheduling is achieved by making use\nof the eventdev capabilities.\n\nSince the underlying event device would be having varying capabilities,\nthe worker thread could be drafted differently to maximize performance.\nThis series introduces usage of multiple worker threads, among which the\none to be used will be determined by the operating conditions and the\nunderlying device capabilities.\n\nFor example, if an event device - eth device pair has Tx internal port,\nthen application can do tx_adapter_enqueue() instead of regular\nevent_enqueue(). So a thread making an assumption that the device pair\nhas internal port will not be the right solution for another pair. The\ninfrastructure added with these patches aims to help application to have\nmultiple worker threads, there by extracting maximum performance from\nevery device without affecting existing paths/use cases.\n\nThe eventmode configuration is predefined. All packets reaching one eth\nport will hit one event queue. All event queues will be mapped to all\nevent ports. So all cores will be able to receive traffic from all ports.\nWhen schedule_type is set as RTE_SCHED_TYPE_ORDERED/ATOMIC, event device\nwill ensure the ordering. Ordering would be lost when tried in PARALLEL.\n\nFollowing command line options are introduced,\n\n--transfer-mode: to choose between poll mode & event mode\n--event-schedule-type: to specify the scheduling type\n                 (RTE_SCHED_TYPE_ORDERED/\n                  RTE_SCHED_TYPE_ATOMIC/\n                  RTE_SCHED_TYPE_PARALLEL)\n\nAdditionally the event mode introduces two modes of processing packets:\n\nDriver-mode: This mode will have bare minimum changes in the application\n             to support ipsec. There woudn't be any lookup etc done in\n             the application. And for inline-protocol use case, the\n             thread would resemble l2fwd as the ipsec processing would be\n             done entirely in the h/w. This mode can be used to benchmark\n             the raw performance of the h/w. All the application side\n             steps (like lookup) can be redone based on the requirement\n             of the end user. Hence the need for a mode which would\n             report the raw performance.\n\nApp-mode: This mode will have all the features currently implemented with\n          ipsec-secgw (non librte_ipsec mode). All the lookups etc\n          would follow the existing methods and would report numbers\n          that can be compared against regular ipsec-secgw benchmark\n          numbers.\n\nThe driver mode is selected with existing --single-sa option\n(used also by poll mode). When --single-sa option is used\nin conjution with event mode then index passed to --single-sa\nis ignored.\n\nExample commands to execute ipsec-secgw in various modes on OCTEON TX2 platform,\n\n#Inbound and outbound app mode\nipsec-secgw -w 0002:02:00.0,ipsec_in_max_spi=128 -w 0002:03:00.0,ipsec_in_max_spi=128 -w 0002:0e:00.0 -w 0002:10:00.1 --log-level=8 -c 0x1 -- -P -p 0x3 -u 0x1 --config \"(1,0,0),(0,0,0)\" -f aes-gcm.cfg --transfer-mode event --event-schedule-type parallel\n\n#Inbound and outbound driver mode\nipsec-secgw -w 0002:02:00.0,ipsec_in_max_spi=128 -w 0002:03:00.0,ipsec_in_max_spi=128 -w 0002:0e:00.0 -w 0002:10:00.1 --log-level=8 -c 0x1 -- -P -p 0x3 -u 0x1 --config \"(1,0,0),(0,0,0)\" -f aes-gcm.cfg --transfer-mode event --event-schedule-type parallel --single-sa 0\n\nThis series adds non burst tx internal port workers only. It provides infrastructure\nfor non internal port workers, however does not define any. Also, only inline ipsec\nprotocol mode is supported by the worker threads added.\n\nFollowing are planned features,\n1. Add burst mode workers.\n2. Add non internal port workers.\n3. Verify support for Rx core (the support is added but lack of h/w to verify).\n4. Add lookaside protocol support.\n\nFollowing are features that Marvell won't be attempting.\n1. Inline crypto support.\n2. Lookaside crypto support.\n\nFor the features that Marvell won't be attempting, new workers can be\nintroduced by the respective stake holders.\n\nThis series is tested on Marvell OCTEON TX2.\nThis series is targeted for 20.05 release.\n\nChanges in v4:\n* Update ipsec-secgw documentation to describe the new options as well as\n  event mode support.\n* In event mode reserve number of crypto queues equal to number of eth ports\n  in order to meet inline protocol offload requirements.\n* Add calculate_nb_mbufs() function to calculate number of mbufs in a pool\n  and include fragments table size into the calculation.\n* Move structures ipsec_xf and ipsec_sad to ipsec.h and remove static keyword\n  from sa_out, nb_sa_out, sa_in and nb_sa_in in sa.c.\n* Update process_ipsec_ev_inbound(), process_ipsec_ev_outbound(), check_sp() \n  and prepare_out_sessions_tbl() functions as a result of changes introduced\n  by SAD feature.\n* Remove setting sa->cdev_id_qp to 0 in create_inline_session as sa_ctx \n  is created with rte_zmalloc.\n* Minor cleanup enhancements:\n- In eh_set_default_conf_eventdev() function in event_helper.c put definition\n  of int local vars in one line, remove invalid comment, put \n  \"eventdev_config->ev_queue_mode = RTE_EVENT_QUEUE_CFG_ALL_TYPES\" in one line\n  instead of two.\n- Remove extern \"C\" from event_helper.h.\n- Put local vars in reverse xmas tree order in eh_dev_has_rx_internal_port() and\n  eh_dev_has_tx_internal_port() functions in event_helper.c.\n- Put #include <rte_bitmap.h> in alphabetical order in ipsec-secgw.c.\n- Move \"extern volatile bool force_quit\" and \"#include <stdbool.h>\" to ipsec-secgw.h,\n  remove #include <rte_hash.h>.\n- Remove not needed includes in ipsec_worker.c.\n- Remove expired todo from ipsec_worker.h.\n\nChanges in v3:\n* Move eh_conf_init() and eh_conf_uninit() functions to event_helper.c\n  including minor rework.\n* Rename --schedule-type option to --event-schedule-type.\n* Replace macro UNPROTECTED_PORT with static inline function\n  is_unprotected_port().\n* Move definitions of global variables used by multiple modules\n  to .c files and add externs in .h headers.\n* Add eh_check_conf() which validates ipsec-secgw configuration\n  for event mode.\n* Add dynamic calculation of number of buffers in a pool based \n  on number of cores, ports and crypto queues.\n* Fix segmentation fault in event mode driver worker which happens\n  when there are no inline outbound sessions configured.\n* Remove change related to updating number of crypto queues\n  in cryptodevs_init(). The update of crypto queues will be handled\n  in a separate patch.\n* Fix compilation error on 32-bit platforms by using userdata instead\n  of udata64 from rte_mbuf.\n\nChanges in v2:\n* Remove --process-dir option. Instead use existing unprotected port mask\n  option (-u) to decide wheter port handles inbound or outbound traffic.\n* Remove --process-mode option. Instead use existing --single-sa option\n  to select between app and driver modes.\n* Add handling of PKT_RX_SEC_OFFLOAD_FAIL result in app worker thread.\n* Fix passing of req_rx_offload flags to create_default_ipsec_flow().\n* Move destruction of flows to a location where eth ports are stopped\n  and closed.\n* Print error and exit when event mode --schedule-type option is used\n  in poll mode.\n* Reduce number of goto statements replacing them with loop constructs.\n* Remove sec_session_fixed table and replace it with locally build\n  table in driver worker thread. Table is indexed by port identifier\n  and holds first inline session pointer found for a given port.\n* Print error and exit when sessions other than inline are configured\n  in event mode.\n* When number of event queues is less than number of eth ports then\n  map all eth ports to one event queue.\n* Cleanup and minor improvements in code as suggested by Konstantin\n\nAnkur Dwivedi (1):\n  examples/ipsec-secgw: add default rte flow for inline Rx\n\nAnoob Joseph (5):\n  examples/ipsec-secgw: add framework for eventmode helper\n  examples/ipsec-secgw: add eventdev port-lcore link\n  examples/ipsec-secgw: add Rx adapter support\n  examples/ipsec-secgw: add Tx adapter support\n  examples/ipsec-secgw: add routines to display config\n\nLukasz Bartosik (9):\n  examples/ipsec-secgw: add routines to launch workers\n  examples/ipsec-secgw: add support for internal ports\n  examples/ipsec-secgw: add event helper config init/uninit\n  examples/ipsec-secgw: add eventmode to ipsec-secgw\n  examples/ipsec-secgw: add driver mode worker\n  examples/ipsec-secgw: add app mode worker\n  examples/ipsec-secgw: make number of buffers dynamic\n  doc: add event mode support to ipsec-secgw\n  examples/ipsec-secgw: reserve crypto queues in event mode\n\n doc/guides/sample_app_ug/ipsec_secgw.rst |  138 ++-\n examples/ipsec-secgw/Makefile            |    2 +\n examples/ipsec-secgw/event_helper.c      | 1812 ++++++++++++++++++++++++++++++\n examples/ipsec-secgw/event_helper.h      |  327 ++++++\n examples/ipsec-secgw/ipsec-secgw.c       |  463 ++++++--\n examples/ipsec-secgw/ipsec-secgw.h       |   88 ++\n examples/ipsec-secgw/ipsec.c             |    5 +-\n examples/ipsec-secgw/ipsec.h             |   53 +-\n examples/ipsec-secgw/ipsec_worker.c      |  638 +++++++++++\n examples/ipsec-secgw/ipsec_worker.h      |   35 +\n examples/ipsec-secgw/meson.build         |    6 +-\n examples/ipsec-secgw/sa.c                |   21 +-\n examples/ipsec-secgw/sad.h               |    5 -\n 13 files changed, 3464 insertions(+), 129 deletions(-)\n create mode 100644 examples/ipsec-secgw/event_helper.c\n create mode 100644 examples/ipsec-secgw/event_helper.h\n create mode 100644 examples/ipsec-secgw/ipsec-secgw.h\n create mode 100644 examples/ipsec-secgw/ipsec_worker.c\n create mode 100644 examples/ipsec-secgw/ipsec_worker.h"
}