|
Revision tags: v22.03, v22.03-rc4, v22.03-rc3, v22.03-rc2, v22.03-rc1, v21.11 |
|
| #
dfb0708e |
| 25-Nov-2021 |
Radu Nicolau <[email protected]> |
examples/ipsec-secgw: fix offload flag used for TSO IPv6
RTE_MBUF_F_TX_OUTER_IP_CKSUM should not be set for IPv6 packets.
Fixes: a7f32947a316 ("examples/ipsec-secgw: support TCP TSO") Cc: stable@dp
examples/ipsec-secgw: fix offload flag used for TSO IPv6
RTE_MBUF_F_TX_OUTER_IP_CKSUM should not be set for IPv6 packets.
Fixes: a7f32947a316 ("examples/ipsec-secgw: support TCP TSO") Cc: [email protected]
Signed-off-by: Radu Nicolau <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v21.11-rc4 |
|
| #
0fa4f444 |
| 24-Nov-2021 |
Radu Nicolau <[email protected]> |
examples/ipsec-secgw: fix L4 length for TSO packets
Using RTE_MBUF_F_TX_TCP_SEG requires L4 length to be set.
Fixes: a7f32947a316 ("examples/ipsec-secgw: support TCP TSO")
Signed-off-by: Radu Nico
examples/ipsec-secgw: fix L4 length for TSO packets
Using RTE_MBUF_F_TX_TCP_SEG requires L4 length to be set.
Fixes: a7f32947a316 ("examples/ipsec-secgw: support TCP TSO")
Signed-off-by: Radu Nicolau <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v21.11-rc3, v21.11-rc2 |
|
| #
a7f32947 |
| 28-Oct-2021 |
Radu Nicolau <[email protected]> |
examples/ipsec-secgw: support TCP TSO
Add support to allow user to specific MSS for TCP TSO offload on a per SA basis. MSS configuration in the context of IPsec is only supported for outbound SA's i
examples/ipsec-secgw: support TCP TSO
Add support to allow user to specific MSS for TCP TSO offload on a per SA basis. MSS configuration in the context of IPsec is only supported for outbound SA's in the context of an inline IPsec Crypto offload.
Signed-off-by: Declan Doherty <[email protected]> Signed-off-by: Radu Nicolau <[email protected]> Acked-by: Konstantin Ananyev <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v21.11-rc1, v21.08, v21.08-rc4, v21.08-rc3, v21.08-rc2, v21.08-rc1, v21.05, v21.05-rc4, v21.05-rc3, v21.05-rc2, v21.05-rc1, v21.02, v21.02-rc4, v21.02-rc3, v21.02-rc2, v21.02-rc1, v20.11, v20.11-rc5, v20.11-rc4, v20.11-rc3, v20.11-rc2, v20.11-rc1, v20.08, v20.08-rc4, v20.08-rc3, v20.08-rc2, v20.08-rc1, v20.05, v20.05-rc4, v20.05-rc3 |
|
| #
1329602b |
| 13-May-2020 |
Anoob Joseph <[email protected]> |
examples/ipsec-secgw: add per-core packet statistics
Adding per core packet handling stats to analyze traffic distribution when multiple cores are engaged.
Since aggregating the packet stats across
examples/ipsec-secgw: add per-core packet statistics
Adding per core packet handling stats to analyze traffic distribution when multiple cores are engaged.
Since aggregating the packet stats across cores would affect performance, keeping the feature disabled using compile time flags.
Signed-off-by: Anoob Joseph <[email protected]> Acked-by: Konstantin Ananyev <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v20.05-rc2, v20.05-rc1 |
|
| #
f8afd292 |
| 11-Mar-2020 |
Kevin Traynor <[email protected]> |
examples/ipsec-gw: fix gcc 10 maybe-uninitialized warning
gcc 10.0.1 reports:
../examples/ipsec-secgw/ipsec_process.c: In function ‘ipsec_process’: ../examples/ipsec-secgw/ipsec_process.c:132:34: e
examples/ipsec-gw: fix gcc 10 maybe-uninitialized warning
gcc 10.0.1 reports:
../examples/ipsec-secgw/ipsec_process.c: In function ‘ipsec_process’: ../examples/ipsec-secgw/ipsec_process.c:132:34: error: ‘grp.m’ may be used uninitialized in this function [-Werror=maybe-uninitialized] 132 | grp[n].cnt = pkts + i - grp[n].m; | ~~~~~~^~
This is a correct warning for the initial execution of the statement. However, it is the design of the loop that grp[0].cnt will later be written with the correct value using an initialized grp[0].m before it is used.
In order to remove the warning, initialize grp[0].m for the initial and unused calculation of grp[0].cnt.
Fixes: 3e5f4625dc17 ("examples/ipsec-secgw: make data-path to use IPsec library") Cc: [email protected]
Suggested-by: Konstantin Ananyev <[email protected]> Signed-off-by: Kevin Traynor <[email protected]> Acked-by: Konstantin Ananyev <[email protected]>
show more ...
|
|
Revision tags: v20.02, v20.02-rc4, v20.02-rc3, v20.02-rc2 |
|
| #
5139d5d9 |
| 04-Feb-2020 |
Marcin Smoczynski <[email protected]> |
examples/ipsec-secgw: support CPU crypto
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has been introduced in configuration allowing to use abovementioned acceleration.
Legacy mode i
examples/ipsec-secgw: support CPU crypto
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has been introduced in configuration allowing to use abovementioned acceleration.
Legacy mode is not currently supported.
Signed-off-by: Konstantin Ananyev <[email protected]> Signed-off-by: Marcin Smoczynski <[email protected]> Acked-by: Fan Zhang <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v20.02-rc1, v19.11, v19.11-rc4, v19.11-rc3, v19.11-rc2, v19.11-rc1 |
|
| #
ba66534f |
| 14-Oct-2019 |
Marcin Smoczynski <[email protected]> |
examples/ipsec-secgw: support fallback session
Inline processing is limited to a specified subset of traffic. It is often unable to handle more complicated situations, such as fragmented traffic. Wh
examples/ipsec-secgw: support fallback session
Inline processing is limited to a specified subset of traffic. It is often unable to handle more complicated situations, such as fragmented traffic. When using inline processing such traffic is dropped.
Introduce fallback session for inline crypto processing allowing handling packets that normally would be dropped. A fallback session is configured by adding 'fallback' keyword with 'lookaside-none' parameter to an SA configuration. Only 'inline-crypto-offload" as a primary session and 'lookaside-none' as a fall-back session combination is supported by this patch.
Fallback session feature is not available in the legacy mode.
Signed-off-by: Marcin Smoczynski <[email protected]> Acked-by: Konstantin Ananyev <[email protected]> Acked-by: Akhil Goyal <[email protected]> Tested-by: Bernard Iremonger <[email protected]>
show more ...
|
| #
4a67af84 |
| 14-Oct-2019 |
Marcin Smoczynski <[email protected]> |
examples/ipsec-secgw: clean SA structure
Cleanup ipsec_sa structure by removing every field that is already in the rte_ipsec_session structure: * cryptodev/security session union * action type *
examples/ipsec-secgw: clean SA structure
Cleanup ipsec_sa structure by removing every field that is already in the rte_ipsec_session structure: * cryptodev/security session union * action type * offload flags * security context References to abovementioned fields are changed to direct references to matching fields of rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature, e.g. fallback session for inline offload processing.
Signed-off-by: Marcin Smoczynski <[email protected]> Acked-by: Konstantin Ananyev <[email protected]> Acked-by: Radu Nicolau <[email protected]> Acked-by: Akhil Goyal <[email protected]> Tested-by: Bernard Iremonger <[email protected]>
show more ...
|
|
Revision tags: v19.08, v19.08-rc4, v19.08-rc3, v19.08-rc2 |
|
| #
3a690d5a |
| 19-Jul-2019 |
Bernard Iremonger <[email protected]> |
examples/ipsec-secgw: fix first packet with inline crypto
Inline crypto installs a flow rule in the NIC. This flow rule must be installed before the first inbound packet is received.
The create_ses
examples/ipsec-secgw: fix first packet with inline crypto
Inline crypto installs a flow rule in the NIC. This flow rule must be installed before the first inbound packet is received.
The create_session() function installs the flow rule, create_session() has been refactored into create_inline_session() and create_lookaside_session(). The create_inline_session() function uses the socket_ctx data and is now called at initialisation in sa_add_rules().
The max_session_size() function has been added to calculate memory requirements.
The cryprodev_init() function has been refactored to drop calls to rte_mempool_create() and to drop calculation of memory requirements.
The main() function has been refactored to call max_session_size() and to call session_pool_init() and session_priv_pool_init() earlier. The ports are started now before adding a flow rule in main(). The sa_init(), sp4_init(), sp6_init() and rt_init() functions are now called after the ports have been started.
The rte_ipsec_session_prepare() function is called in fill_ipsec_session() for inline which is called from the ipsec_sa_init() function.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload") Fixes: d299106e8e31 ("examples/ipsec-secgw: add IPsec sample application") Cc: [email protected]
Signed-off-by: Bernard Iremonger <[email protected]> Acked-by: Konstantin Ananyev <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v19.08-rc1, v19.05, v19.05-rc4, v19.05-rc3, v19.05-rc2, v19.05-rc1 |
|
| #
fd7c1172 |
| 27-Mar-2019 |
Konstantin Ananyev <[email protected]> |
examples/ipsec_secgw: fix possible null dereference
Coverity issue: 336844 Fixes: 3e5f4625dc17 ("examples/ipsec-secgw: make data-path to use IPsec library") Cc: [email protected]
Signed-off-by: Konst
examples/ipsec_secgw: fix possible null dereference
Coverity issue: 336844 Fixes: 3e5f4625dc17 ("examples/ipsec-secgw: make data-path to use IPsec library") Cc: [email protected]
Signed-off-by: Konstantin Ananyev <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
|
Revision tags: v19.02, v19.02-rc4, v19.02-rc3, v19.02-rc2 |
|
| #
3e5f4625 |
| 10-Jan-2019 |
Konstantin Ananyev <[email protected]> |
examples/ipsec-secgw: make data-path to use IPsec library
Changes to make ipsec-secgw data-path code to utilize librte_ipsec library. Note that right now by default current (non-librte_ipsec) code-p
examples/ipsec-secgw: make data-path to use IPsec library
Changes to make ipsec-secgw data-path code to utilize librte_ipsec library. Note that right now by default current (non-librte_ipsec) code-path will be used. User has to run application with new command-line option ('-l') to enable new codepath.
Signed-off-by: Mohammad Abdul Awal <[email protected]> Signed-off-by: Bernard Iremonger <[email protected]> Signed-off-by: Konstantin Ananyev <[email protected]> Acked-by: Radu Nicolau <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|