From patchwork Wed Jan 11 23:43:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Cristian Dumitrescu X-Patchwork-Id: 121854 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id BFCC14237C; Thu, 12 Jan 2023 00:44:03 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 67FF440E6E; Thu, 12 Jan 2023 00:44:03 +0100 (CET) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 53CBB40A7D for ; Thu, 12 Jan 2023 00:44:01 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673480641; x=1705016641; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=zGgJsOBDY1zeW49mNRxmFAIZ4dwXZ6Ym2Agvf/8DGAU=; b=geajNTVHvmFVJNPWtUkva85d5Ef8QTMJ2ojqg9v+MBsZ/ua0NmQd8R6G HTI4VtT3Ng9SKGW5pB3udsucMnt3Ot+Y0KGZY0uVgRlLmMrkBVZ6vy/oB 4bEz4E2eTS6t5aKNw4oGZbEFQsIvDiXC+BtD8JBW4lG1tV0lVUFxiSL4r tXtr2hc+jN9h/o5CXOifbJRNxSXrNwztWi0xkXEVmY6mWHoKZRT/Be0Kv YHvM+Xocf+rtXLQwQdM4fOMjmHI9Ca8oJ1XaIpVzWF3mpfpfWCXbc+JtB 8eHmauOYJR+QbGBbbHciZrbrPVBLOxhzFQ/Ko4JjZnkFXd7T/vZ1spKj1 w==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="307088361" X-IronPort-AV: E=Sophos;i="5.96,318,1665471600"; d="scan'208";a="307088361" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2023 15:44:00 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="688129081" X-IronPort-AV: E=Sophos;i="5.96,318,1665471600"; d="scan'208";a="688129081" Received: from silpixa00400573.ir.intel.com (HELO silpixa00400573.ger.corp.intel.com) ([10.237.222.53]) by orsmga008.jf.intel.com with ESMTP; 11 Jan 2023 15:43:59 -0800 From: Cristian Dumitrescu To: dev@dpdk.org Subject: [PATCH V2 00/11] pipeline: add IPsec support Date: Wed, 11 Jan 2023 23:43:47 +0000 Message-Id: <20230111234358.133395-1-cristian.dumitrescu@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230111205608.87953-1-cristian.dumitrescu@intel.com> References: <20230111205608.87953-1-cristian.dumitrescu@intel.com> MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org This patch set introduces a companion block for the SWX pipeline for IPsec support. The IPsec block is external to the pipeline, hence it needs to be explicitly instantiated by the user and connected to a pipeline instance through the pipeline I/O ports. Main features: * IPsec inbound (encrypted input packets -> clear text output packets) and outbound (clear text input packets -> encrypted output packets) processing support for tunnel and transport modes. Interaction of the IPsec block with the pipeline: * Each IPsec block instance has its own set of Security Associations (SAs) used to process the input packets. Each SA is identified by its unique SA ID. The IPsec inbound and outbound SAs share the same ID space. * Each input packet is first mapped to one of the existing SAs by using the SA ID and then processed according to the identified SA. The SA ID is read from input packet. The SA ID field is typically written by the pipeline before sending the packet to the IPsec block. Cristian Dumitrescu (11): pipeline: add IPsec support examples/pipeline: rework memory pool support examples/pipeline: streamline ring support examples/pipeline: streamline the Ethernet device support examples/pipeline: support crypto devices examples/pipeline: add CLI command for crypto device examples/pipeline: add IPsec CLI commands examples/pipeline: rework the thread configuration updates examples/pipeline: support blocks other than pipelines examples/pipeline: add block enable/disable CLI commands examples/pipeline: add IPsec example examples/pipeline/cli.c | 896 ++++++-- examples/pipeline/examples/fib.cli | 4 +- examples/pipeline/examples/hash_func.cli | 4 +- examples/pipeline/examples/ipsec.cli | 57 + examples/pipeline/examples/ipsec.io | 23 + examples/pipeline/examples/ipsec.spec | 138 ++ examples/pipeline/examples/ipsec_sa.txt | 216 ++ examples/pipeline/examples/l2fwd.cli | 4 +- examples/pipeline/examples/l2fwd_macswp.cli | 4 +- .../pipeline/examples/l2fwd_macswp_pcap.cli | 4 +- examples/pipeline/examples/l2fwd_pcap.cli | 4 +- examples/pipeline/examples/learner.cli | 4 +- examples/pipeline/examples/meter.cli | 4 +- examples/pipeline/examples/mirroring.cli | 4 +- examples/pipeline/examples/recirculation.cli | 4 +- examples/pipeline/examples/registers.cli | 4 +- examples/pipeline/examples/selector.cli | 4 +- examples/pipeline/examples/varbit.cli | 4 +- examples/pipeline/examples/vxlan.cli | 4 +- examples/pipeline/examples/vxlan_pcap.cli | 4 +- examples/pipeline/main.c | 12 +- examples/pipeline/obj.c | 360 +--- examples/pipeline/obj.h | 100 +- examples/pipeline/thread.c | 655 +++--- examples/pipeline/thread.h | 24 +- lib/pipeline/meson.build | 4 +- lib/pipeline/rte_swx_ipsec.c | 1851 +++++++++++++++++ lib/pipeline/rte_swx_ipsec.h | 383 ++++ lib/pipeline/version.map | 9 + 29 files changed, 3770 insertions(+), 1018 deletions(-) create mode 100644 examples/pipeline/examples/ipsec.cli create mode 100644 examples/pipeline/examples/ipsec.io create mode 100644 examples/pipeline/examples/ipsec.spec create mode 100644 examples/pipeline/examples/ipsec_sa.txt create mode 100644 lib/pipeline/rte_swx_ipsec.c create mode 100644 lib/pipeline/rte_swx_ipsec.h