Message ID | 20170803153211.23073-1-akhil.goyal@nxp.com (mailing list archive) |
---|---|
State | Accepted, archived |
Delegated to: | Pablo de Lara Guarch |
Headers |
Return-Path: <dev-bounces@dpdk.org> X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [IPv6:::1]) by dpdk.org (Postfix) with ESMTP id 8E9DB374C; Thu, 3 Aug 2017 17:34:10 +0200 (CEST) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0084.outbound.protection.outlook.com [104.47.42.84]) by dpdk.org (Postfix) with ESMTP id A55CC325F for <dev@dpdk.org>; Thu, 3 Aug 2017 17:34:08 +0200 (CEST) Received: from CY1PR03CA0041.namprd03.prod.outlook.com (10.174.128.51) by CY1PR0301MB0906.namprd03.prod.outlook.com (10.160.165.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.22; Thu, 3 Aug 2017 15:34:07 +0000 Received: from BY2FFO11OLC005.protection.gbl (2a01:111:f400:7c0c::110) by CY1PR03CA0041.outlook.office365.com (2603:10b6:600::51) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.22 via Frontend Transport; Thu, 3 Aug 2017 15:34:07 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BY2FFO11OLC005.mail.protection.outlook.com (10.1.14.145) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1282.16 via Frontend Transport; Thu, 3 Aug 2017 15:34:06 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v73FY12F022682; Thu, 3 Aug 2017 08:34:02 -0700 From: Akhil Goyal <akhil.goyal@nxp.com> To: <dev@dpdk.org>, <declan.doherty@intel.com>, <thomas@monjalon.net>, <radu.nicolau@intel.com>, <aviadye@mellanox.com>, <borisp@mellanox.com>, <hemant.agrawal@nxp.com>, <pablo.de.lara.guarch@intel.com> CC: Akhil Goyal <akhil.goyal@nxp.com> Date: Thu, 3 Aug 2017 21:02:11 +0530 Message-ID: <20170803153211.23073-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131462480466949178; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39450400003)(39850400002)(39840400002)(39410400002)(39400400002)(39860400002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(6666003)(356003)(50226002)(81156014)(81166006)(8676002)(8936002)(68736007)(1076002)(86362001)(5003940100001)(106466001)(2906002)(305945005)(189998001)(33646002)(105606002)(104016004)(47776003)(626005)(50986999)(69596002)(5660300001)(85426001)(53936002)(4326008)(2201001)(498600001)(8656003)(38730400002)(97736004)(48376002)(50466002)(77096006)(36756003)(2101003); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR0301MB0906; H:az84smr01.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2FFO11OLC005; 1:Qz9PEw0H/A0iUREivnWPmVjFmGblSJrQ1gFEhSJz6?= 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 MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 043f3677-930c-44a4-293a-08d4da8513ea X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CY1PR0301MB0906; X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0906; 3: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 X-MS-TrafficTypeDiagnostic: CY1PR0301MB0906: X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0906; 25: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 X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0906; 31:qWG1TJuBU+Xlg8Ry3gFhnnrdMDDrTjTjYlew6r5kf1bjjbFtFgN5PBVlqUWbvmT/wdx5FpjSkmC7zGYxoD5JoSv3KHBmEGjU6N7cujljmxcv/rQDju2VzAfZ6kbyqTctFnl8ewZBUR1Vdq/8/ypo2QHxi/HAIl6Ulea11sXKKUaBag5XhYKv/KoCpXaNiPMniJByWr2hlreB0SKGSajvOnlE4wR/pAYYFbyHCyi0AZgkIFEpCWlwja+LKkaxbUEgKgD9ntbZtyiVoW2Tn8FhteDkzH1ayh34fy0CYtIDZoctAr2UhJJy2o3GLAe0/hkR3T8nPMJKJk3VIClK8hWoedkOrNriB/EB88OGJ2rNQaSInJV8WRcpyn908ld3orfqv9Vv6ip1zFtihSnA6XltQjkzh+FSGXm3GzeDwTswLJCZ9VLMH6ORBOErOLxsGYTlhT0WBvyC2TZsiBnusz+pQYnvmvlvGWleZ6wKBV+kzngXg6dZ09dWrxURl32BDCjD4pD0ZgujEUG6CLauKaYhW/fGCGKPoaCyoSPGu6QQNTzMIeMEbq05wvxSmxV/a5Ke4WtD/5ttkcb+8XJQsDimKC2DqksOkpOzJXJ95KIG0c/RS7Vamb/h92qasJlQBTyXjc4pUbtKkrCoyFgpzUnIT6/Odl8KGm7mwz7UqIphxDqC4bAYQ3HQMCS70H8BerL6EK6ZhxTAEc8MLQv65sWGdQ== X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197); X-Microsoft-Antispam-PRVS: <CY1PR0301MB09069A4237DABAE1BC5A3047E6B10@CY1PR0301MB0906.namprd03.prod.outlook.com> X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(8121501046)(13016025)(5005006)(13018025)(93006095)(93001095)(3002001)(100000703101)(100105400095)(10201501046)(6055026)(6096035)(20161123561025)(20161123556025)(20161123565025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123559100)(20161123563025)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY1PR0301MB0906; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY1PR0301MB0906; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR0301MB0906; 4:mXlE/lD17VA2vGZ6aZcaZLr6cavjhGaYliRhfl9G?= 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 X-Forefront-PRVS: 03883BD916 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR0301MB0906; 23:n+eD8Z/6/ERYTSnMLGfLuxVHNcIDpH+CqPDvbAy?= z5ATj7+BllRCxEGHUrWWyL5q8Lzxe6A3BOMDwJnPCQFb7lTESU6ivx+WpaLRGrkdJB+Mo36vrEFlSVck98ZC5mviwhk15ED9g/xi+PHewAiXPUGMZqIOmm4YeLtARZa3BvYh2jOBNM+ShKG5S9Ww8h8yGm61tBvv4Vxq+1YsZJrwaDzBAxB/H4aVhFf4fTI80L0pCxIO9BqX9yIDuvbunGgkx0tDB5GTeU0eYoLFllzzSq4jKVVJDNQmr018+FWEP16mF3A1XCL7V07CCPglhpcU9W0kvYcaz5zB/aQyl6BApvJZl2YBitJ9SG6Ul7e2+a5mtKx5mo/DD91bpNrAILo3N6FSbwVolmtqMW6XxOJJkEHstlv9H+HVJrfOU3kOwyoqL4fwMczJmbZo8NdM0G9Vff+BH88RtuoTeNMrBczirYl/mi9zcBJXRWiC9chLiCtjfbsIgMXj5cz+UzHZ1odICsKRCBbGKrOulRQ3DB1ND35uBnQvY97RSi8ilSjCOxnY+mf786ki0JFBJRRKLoYOE7PVDm/YKAc0vbnTdEI28lk0FAEMGs5uNScAjY1r7ai/wAGOLVOs4sOqT6tOstMduxpWIW8AK5lUu/98FKpinj4hyyMpfQOGedGMXl5rOeqQAPM6ofpfGUR1kfzWxCdY3Ta0liU4ZDdkwIC0Mwdu8cedQDWWiTt75bKhaqnehjlYPl5xuHjsNrnntNLGnCQVDCI2XkP4eHziiylZ5kb1u2BW0FOWKP4f0wcq1ezd04Coq95atp9QHLWPrGSm4VRy2uWQwxT3Uzgn2oZSiOlWfk+RPfPDYuVKMWhALPTyziIeQmyRIUbtL+W0uW++980szYbxMHEKa9VNEeOXjAnZVtCEPxv8R/HbpJG3RtogoGN83gxUa1jHiwi1brDR3KJ2OCFN9IKypssqPAe8/NHt/VFCIprHbqgbG+x/HsLbfeRCN97nEW3Z5BbQnzgMKoUCQb8ymRs+nZ/cGiGSsrJeniZBIDsmaSQJBcbl/irKCjfR61js1sfBlEaUjgc9LGN/vI9zH0/wJUiivhvc+eDgmVL5jzFFiHdjT4AulUIcAR9odvZK0EyJM4dgt4SazLeBBB1jxX8SgcT1ssFqscOFRIWsPrPbwp/Tz/v9BAp4crB6LqH69r9OkyBGnC8Lcp5Ftc95vyVsHYvwoeKnUK9FhMg1FRmAy3Ep5plkWTq6l5NU= X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR0301MB0906; 6:ZYGFD+PI+ayVWNDJkdQ7MHLGt32uXyThDLPxmgb7?= Khig/Sgddb25SozSUIo6KFc2LiovBKcGrpDZi4nldTYfuAGtO/HIZ6ZC4RqdNcgdcybVqiQbyAlEuz0qy8EWo81e/lSbgVykMLi4KE6zpWxghiSi/nLDcpYYaN6mCkqd8aJhz/GZWIwvduJSy8wvFDxd4agGByVF56ccCZhOCZ+RiJwV9tFrgmwDMw21ojN2IZSh+U3P22EkNSVulsF9zJij4DuNk4Df1/QYiiSY5JNAOtHQoo+9vT30nJmNh8WdIyWp1VTs2dnFquuKmy2W8oJCMHUpOsvdhA8zRkPaCgBf8nVOo13zhEEN8fISPGpMIdcfwajQm64klGWiAJl8BE2/+8U8aLDOwmAmNlNtKfnNJyXD/IEhS2/X1qCQy3VnBu/AMIR3Ychs8IsnvYQQk0i00y6jLvoYtGHRIwLk7UgadQNIqgaHk1dLLu5qdD9KqWuD7zyaP0UNn/SdRpkWYZ71bDArzGJLp+7prw1z9Ev7tHwNaSM5AnjeaFHQ6M+C5LFNjUeWcwWRLjyH0VethHogZCzfFOrUof0ziPqk6WC+cG4Lv/OTYWC473BaES7uhFwSJayKw5gb+eJkiD0xHiZF/lCyTKtPxpRVLuByKnAVl+/0RVV+NfiOl1Q4fJMP3v1fB6WyUmw0lwm6BjbYN71YY2nF5JPdn/yCrfCbyoRTa43l7TaQVFgVsGnTtv0HeP/XlbsDjLRB5xg2YrNh4C1VzFwvgjCh3phz5JUDOPtb+1qhFODuG3l0K7xtuAXjFzBNlRTwXw46PLhKgNsr4SjX0sMBx0uX4RmqTvuO4JpfvMiXLmYHOJXyAzvNKbW1LHAjUDn3PLfxgYq19pBanTnQwxUHIhPYjpbQOJJf6rYPu3A/z9i4QAAczXlgXi40Gqh+WyC/ZtamdJn7Sf3xcTZ4TNARYOnNKL41SH8un3ByiA== X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0906; 5: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; 24:HwtbLa9zk85fzip4vXXpusnbINa2Bi/eZquk+NLdathfwB1pnOlmTY95gJ5MjpavvQZ08aZXOZPHecrrpfOwY+UQyjPQVSk9bM5xMh1FmeA= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0906; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Aug 2017 15:34:06.4453 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0301MB0906 Subject: [dpdk-dev] [PATCH] doc: announce ABI change for cryptodev and ethdev X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions <dev.dpdk.org> List-Unsubscribe: <http://dpdk.org/ml/options/dev>, <mailto:dev-request@dpdk.org?subject=unsubscribe> List-Archive: <http://dpdk.org/ml/archives/dev/> List-Post: <mailto:dev@dpdk.org> List-Help: <mailto:dev-request@dpdk.org?subject=help> List-Subscribe: <http://dpdk.org/ml/listinfo/dev>, <mailto:dev-request@dpdk.org?subject=subscribe> Errors-To: dev-bounces@dpdk.org Sender: "dev" <dev-bounces@dpdk.org> |
Checks
Context | Check | Description |
---|---|---|
ci/checkpatch | success | coding style OK |
ci/Intel-compilation | success | Compilation OK |
Commit Message
Akhil Goyal
Aug. 3, 2017, 3:32 p.m. UTC
Support for security operations is planned to be added
in ethdev and cryptodev for the 17.11 release.
For this following changes are required.
- rte_cryptodev and rte_eth_dev structures need to be added
new parameter rte_security_ops which extend support for
security ops to the corresponding driver.
- rte_cryptodev_info and rte_ethd_dev_info need to be added
with rte_security_capabilities to identify the capabilities of
the corresponding driver.
Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com>
---
doc/guides/rel_notes/deprecation.rst | 10 ++++++++++
1 file changed, 10 insertions(+)
Comments
On 8/3/2017 9:02 PM, Akhil Goyal wrote: > Support for security operations is planned to be added > in ethdev and cryptodev for the 17.11 release. > > For this following changes are required. > - rte_cryptodev and rte_eth_dev structures need to be added > new parameter rte_security_ops which extend support for > security ops to the corresponding driver. > - rte_cryptodev_info and rte_ethd_dev_info need to be added > with rte_security_capabilities to identify the capabilities of > the corresponding driver. > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > --- > doc/guides/rel_notes/deprecation.rst | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/doc/guides/rel_notes/deprecation.rst b/doc/guides/rel_notes/deprecation.rst > index f6bd910..2393b4c 100644 > --- a/doc/guides/rel_notes/deprecation.rst > +++ b/doc/guides/rel_notes/deprecation.rst > @@ -69,3 +69,13 @@ Deprecation Notices > be removed in 17.11: > > - ``rte_cryptodev_create_vdev`` > + > +* cryptodev: new parameters - ``rte_security_capabilities`` and > + ``rte_security_ops`` will be added to ``rte_cryptodev_info`` and > + ``rte_cryptodev`` respectively to support security protocol offloaded > + operations. > + > +* ethdev: new parameters - ``rte_security_capabilities`` and > + ``rte_security_ops`` will be added to ``rte_eth_dev_info`` and > + ``rte_eth_dev`` respectively to support security operations like > + ipsec inline. > Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com>
> -----Original Message----- > From: Akhil Goyal [mailto:akhil.goyal@nxp.com] > Sent: Thursday, August 3, 2017 4:32 PM > To: dev@dpdk.org; Doherty, Declan <declan.doherty@intel.com>; > thomas@monjalon.net; Nicolau, Radu <radu.nicolau@intel.com>; > aviadye@mellanox.com; borisp@mellanox.com; > hemant.agrawal@nxp.com; De Lara Guarch, Pablo > <pablo.de.lara.guarch@intel.com> > Cc: Akhil Goyal <akhil.goyal@nxp.com> > Subject: [PATCH] doc: announce ABI change for cryptodev and ethdev > > Support for security operations is planned to be added in ethdev and > cryptodev for the 17.11 release. > > For this following changes are required. > - rte_cryptodev and rte_eth_dev structures need to be added new > parameter rte_security_ops which extend support for security ops to the > corresponding driver. > - rte_cryptodev_info and rte_ethd_dev_info need to be added with > rte_security_capabilities to identify the capabilities of the corresponding > driver. > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> Boris, Aviad, could you review this patch? Thanks, Pablo
> -----Original Message----- > From: Akhil Goyal [mailto:akhil.goyal@nxp.com] > Sent: Thursday, August 3, 2017 4:32 PM > To: dev@dpdk.org; Doherty, Declan <declan.doherty@intel.com>; > thomas@monjalon.net; Nicolau, Radu <radu.nicolau@intel.com>; > aviadye@mellanox.com; borisp@mellanox.com; > hemant.agrawal@nxp.com; De Lara Guarch, Pablo > <pablo.de.lara.guarch@intel.com> > Cc: Akhil Goyal <akhil.goyal@nxp.com> > Subject: [PATCH] doc: announce ABI change for cryptodev and ethdev > > Support for security operations is planned to be added in ethdev and > cryptodev for the 17.11 release. > > For this following changes are required. > - rte_cryptodev and rte_eth_dev structures need to be added new > parameter rte_security_ops which extend support for security ops to the > corresponding driver. > - rte_cryptodev_info and rte_ethd_dev_info need to be added with > rte_security_capabilities to identify the capabilities of the corresponding > driver. > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> Not sure if this needed to be split into two patches, as this affects two libraries. At least, from cryptodev side: Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
04/08/2017 07:26, Hemant Agrawal: > On 8/3/2017 9:02 PM, Akhil Goyal wrote: > > Support for security operations is planned to be added > > in ethdev and cryptodev for the 17.11 release. > > > > For this following changes are required. > > - rte_cryptodev and rte_eth_dev structures need to be added > > new parameter rte_security_ops which extend support for > > security ops to the corresponding driver. > > - rte_cryptodev_info and rte_ethd_dev_info need to be added > > with rte_security_capabilities to identify the capabilities of > > the corresponding driver. It is not explained what is the fundamental difference between rte_security and rte_crypto? It looks to be just a technical workaround. Why the ABI would be changed by rte_security additions? > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > > > Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> No more opinions outside of NXP? It seems there is not yet a consensus on how to manage IPsec offloading. I heard there were some phone calls about these stuff but nothing clear appears publicly on the mailing list. Looks to be a community failure.
> From: Thomas Monjalon [mailto:thomas@monjalon.net] > 04/08/2017 07:26, Hemant Agrawal: > > On 8/3/2017 9:02 PM, Akhil Goyal wrote: > > > Support for security operations is planned to be added in ethdev and > > > cryptodev for the 17.11 release. > > > > > > For this following changes are required. > > > - rte_cryptodev and rte_eth_dev structures need to be added new > > > parameter rte_security_ops which extend support for security ops to > > > the corresponding driver. > > > - rte_cryptodev_info and rte_ethd_dev_info need to be added with > > > rte_security_capabilities to identify the capabilities of the > > > corresponding driver. > > It is not explained what is the fundamental difference between rte_security > and rte_crypto? > It looks to be just a technical workaround. rte_security is a layer between crypto and NIC. Today crypto sessions are created exclusively against crypto devices, but they don't use network related fields, while the network namespace doesn't use crypto related fields. We expect this API to represent crypto sessions that combine network fields and allow to add/delete them for all devices. For NICs we will use rte_flow with rte_security for inline/full crypto protocol offload such as ESP. > > Why the ABI would be changed by rte_security additions? > > > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > > > > > Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> > > No more opinions outside of NXP? > It seems there is not yet a consensus on how to manage IPsec offloading. > I heard there were some phone calls about these stuff but nothing clear > appears publicly on the mailing list. > Looks to be a community failure. We agreed to go ahead with this approach on one such phone call. I hope we could use the dpdk github for development. Acked-by: Boris Pismenny <borisp@mellanox.com>
Monday, August 7, 2017 9:07 PM, Boris Pismenny: > > From: Thomas Monjalon [mailto:thomas@monjalon.net] > > 04/08/2017 07:26, Hemant Agrawal: > > > On 8/3/2017 9:02 PM, Akhil Goyal wrote: > > > > Support for security operations is planned to be added in ethdev > > > > and cryptodev for the 17.11 release. > > > > > > > > For this following changes are required. > > > > - rte_cryptodev and rte_eth_dev structures need to be added new > > > > parameter rte_security_ops which extend support for security ops > > > > to the corresponding driver. > > > > - rte_cryptodev_info and rte_ethd_dev_info need to be added with > > > > rte_security_capabilities to identify the capabilities of the > > > > corresponding driver. > > > > It is not explained what is the fundamental difference between > > rte_security and rte_crypto? > > It looks to be just a technical workaround. > > rte_security is a layer between crypto and NIC. > > Today crypto sessions are created exclusively against crypto devices, but > they don't use network related fields, while the network namespace doesn't > use crypto related fields. We expect this API to represent crypto sessions > that combine network fields and allow to add/delete them for all devices. > > For NICs we will use rte_flow with rte_security for inline/full crypto protocol > offload such as ESP. > > > > > Why the ABI would be changed by rte_security additions? > > > > > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > > > > > > > Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> > > > > No more opinions outside of NXP? > > It seems there is not yet a consensus on how to manage IPsec offloading. > > I heard there were some phone calls about these stuff but nothing > > clear appears publicly on the mailing list. > > Looks to be a community failure. > > We agreed to go ahead with this approach on one such phone call. I hope we > could use the dpdk github for development. > > Acked-by: Boris Pismenny <borisp@mellanox.com> Acked-by: Shahaf Shuler <shahafs@mellanox.com>
Hi Pablo/Declan, On 8/4/2017 8:55 PM, De Lara Guarch, Pablo wrote: > > >> -----Original Message----- >> From: Akhil Goyal [mailto:akhil.goyal@nxp.com] >> Sent: Thursday, August 3, 2017 4:32 PM >> To: dev@dpdk.org; Doherty, Declan <declan.doherty@intel.com>; >> thomas@monjalon.net; Nicolau, Radu <radu.nicolau@intel.com>; >> aviadye@mellanox.com; borisp@mellanox.com; >> hemant.agrawal@nxp.com; De Lara Guarch, Pablo >> <pablo.de.lara.guarch@intel.com> >> Cc: Akhil Goyal <akhil.goyal@nxp.com> >> Subject: [PATCH] doc: announce ABI change for cryptodev and ethdev >> >> Support for security operations is planned to be added in ethdev and >> cryptodev for the 17.11 release. >> >> For this following changes are required. >> - rte_cryptodev and rte_eth_dev structures need to be added new >> parameter rte_security_ops which extend support for security ops to the >> corresponding driver. >> - rte_cryptodev_info and rte_ethd_dev_info need to be added with >> rte_security_capabilities to identify the capabilities of the corresponding >> driver. >> >> Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > > Not sure if this needed to be split into two patches, as this affects two libraries. > At least, from cryptodev side: > > Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> > We would be needing one more ABI change, Can I send it now. I discovered it after I sent this patch. In the struct rte_crypto_sym_op, we would need to add a pointer to a security session in the union of session and xform. Also, Do I need to split this patch into two for crypto and eth? Regards, Akhil
08/08/2017 07:03, Shahaf Shuler: > Monday, August 7, 2017 9:07 PM, Boris Pismenny: > > > From: Thomas Monjalon [mailto:thomas@monjalon.net] > > > 04/08/2017 07:26, Hemant Agrawal: > > > > On 8/3/2017 9:02 PM, Akhil Goyal wrote: > > > > > Support for security operations is planned to be added in ethdev > > > > > and cryptodev for the 17.11 release. > > > > > > > > > > For this following changes are required. > > > > > - rte_cryptodev and rte_eth_dev structures need to be added new > > > > > parameter rte_security_ops which extend support for security ops > > > > > to the corresponding driver. > > > > > - rte_cryptodev_info and rte_ethd_dev_info need to be added with > > > > > rte_security_capabilities to identify the capabilities of the > > > > > corresponding driver. > > > > > > It is not explained what is the fundamental difference between > > > rte_security and rte_crypto? > > > It looks to be just a technical workaround. > > > > rte_security is a layer between crypto and NIC. > > > > Today crypto sessions are created exclusively against crypto devices, but > > they don't use network related fields, while the network namespace doesn't > > use crypto related fields. We expect this API to represent crypto sessions > > that combine network fields and allow to add/delete them for all devices. > > > > For NICs we will use rte_flow with rte_security for inline/full crypto protocol > > offload such as ESP. > > > > > > > > Why the ABI would be changed by rte_security additions? > > > > > > > > Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> > > > > > > > > > Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> > > > > > > No more opinions outside of NXP? > > > It seems there is not yet a consensus on how to manage IPsec offloading. > > > I heard there were some phone calls about these stuff but nothing > > > clear appears publicly on the mailing list. > > > Looks to be a community failure. > > > > We agreed to go ahead with this approach on one such phone call. I hope we > > could use the dpdk github for development. > > > > Acked-by: Boris Pismenny <borisp@mellanox.com> > > Acked-by: Shahaf Shuler <shahafs@mellanox.com> Applied It means you have a chance to do this change in 17.11. It does not mean you can be sure that the patches will be accepted. This is introducing a new complexity. It must be discussed with the technical board before approving the final design in 17.11.
diff --git a/doc/guides/rel_notes/deprecation.rst b/doc/guides/rel_notes/deprecation.rst index f6bd910..2393b4c 100644 --- a/doc/guides/rel_notes/deprecation.rst +++ b/doc/guides/rel_notes/deprecation.rst @@ -69,3 +69,13 @@ Deprecation Notices be removed in 17.11: - ``rte_cryptodev_create_vdev`` + +* cryptodev: new parameters - ``rte_security_capabilities`` and + ``rte_security_ops`` will be added to ``rte_cryptodev_info`` and + ``rte_cryptodev`` respectively to support security protocol offloaded + operations. + +* ethdev: new parameters - ``rte_security_capabilities`` and + ``rte_security_ops`` will be added to ``rte_eth_dev_info`` and + ``rte_eth_dev`` respectively to support security operations like + ipsec inline.