netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCHv4 net-next 0/8] pktgen IPsec support
@ 2013-12-20  2:33 Fan Du
  2013-12-20  2:33 ` [PATCHv4 net-next 1/8] {pktgen, xfrm} Correct xfrm state lock usage when transforming Fan Du
                   ` (7 more replies)
  0 siblings, 8 replies; 11+ messages in thread
From: Fan Du @ 2013-12-20  2:33 UTC (permalink / raw)
  To: davem; +Cc: steffen.klassert, hadi, netdev

Hi, Dave

Current pktgen IPsec supports only transport/ESP combinnation,
This patchset enables user to do almost any IPsec transformation,
both transport/tunnel mode, and AH/ESP/IPcomp type.

Below configuration has been tested, and using Wireshark could decrypt
out plain text in good formation without any checksum/auth errors:

Mode/TYPE   AH  ESP 
Transport   x   x   
Tunnel      x   x   

ChangeLog
v2:
  Rebase patchset against newest net-next.
  Patch1: Remove adding rebundant empty line spotted by Sergei.
  Patch2: Use only one dst pointing into itself to save space.

v3:
  Align with David's requirement, that for user depends on orignal
  a553e4a6317b2cfc7659542c10fe43184ffe53da ("IPSEC support") from
  Jamal, their testbed configuration will not need to be changed. 

  Add Patch2/7, Patch3/7 for statistic counting, as well as fixing
  lock usage issue. 

v4:
  Add Patch8/8 to document IPsec usage in pktgen, both for orignal
  implementation and this enhancement, adviced by Jamal. And comment
  format fix spoted by Sergei.

Fan Du (8):
  {pktgen, xfrm} Correct xfrm state lock usage when transforming
  {pktgen, xfrm} Add statistics counting when transforming
  {pktgen, xfrm} Correct xfrm_state_lock usage in xfrm_stateonly_find
  {pktgen, xfrm} Using "pgset spi xxx" to spedifiy SA for a given flow
  {pktgen, xfrm} Construct skb dst for tunnel mode transformation
  {pktgen, xfrm} Introduce xfrm_state_lookup_byspi for pktgen
  {pktgen, xfrm} Show spi value properly when ipsec turned on
  {pktgen, xfrm} Document IPsec usage in pktgen.txt

 Documentation/networking/pktgen.txt |   15 +++++++
 include/net/xfrm.h                  |    2 +
 net/core/pktgen.c                   |   80 +++++++++++++++++++++++++++++------
 net/xfrm/xfrm_state.c               |   26 +++++++++++-
 4 files changed, 107 insertions(+), 16 deletions(-)

-- 
1.7.9.5

^ permalink raw reply	[flat|nested] 11+ messages in thread
* [PATCHv5 net-next 0/8] pktgen IPsec support
@ 2014-01-03  3:18 Fan Du
  2014-01-03  3:18 ` [PATCHv4 net-next 6/8] {pktgen, xfrm} Introduce xfrm_state_lookup_byspi for pktgen Fan Du
  0 siblings, 1 reply; 11+ messages in thread
From: Fan Du @ 2014-01-03  3:18 UTC (permalink / raw)
  To: steffen.klassert; +Cc: davem, netdev

Hi, Dave

Current pktgen IPsec supports only transport/ESP combinnation,
This patchset enables user to do almost any IPsec transformation,
both transport/tunnel mode, and AH/ESP/IPcomp type.

Below configuration has been tested, and using Wireshark could decrypt
out plain text in good formation without any checksum/auth errors:

Mode/TYPE   AH  ESP 
Transport   x   x   
Tunnel      x   x   

ChangeLog
v2:
  Rebase patchset against newest net-next.
  Patch1: Remove adding rebundant empty line spotted by Sergei.
  Patch2: Use only one dst pointing into itself to save space.

v3:
  Align with David's requirement, that for user depends on orignal
  a553e4a6317b2cfc7659542c10fe43184ffe53da ("IPSEC support") from
  Jamal, their testbed configuration will not need to be changed. 

  Add Patch2/7, Patch3/7 for statistic counting, as well as fixing
  lock usage issue. 

v4:
  Add Patch8/8 to document IPsec usage in pktgen, both for orignal
  implementation and this enhancement, adviced by Jamal. And comment
  format fix spoted by Sergei.

v5:
  Rebase this patchset on top of xfrm locks namespace support.

Fan Du (8):
  {pktgen, xfrm} Correct xfrm state lock usage when transforming
  {pktgen, xfrm} Add statistics counting when transforming
  {pktgen, xfrm} Correct xfrm_state_lock usage in xfrm_stateonly_find
  {pktgen, xfrm} Using "pgset spi xxx" to spedifiy SA for a given flow
  {pktgen, xfrm} Construct skb dst for tunnel mode transformation
  {pktgen, xfrm} Introduce xfrm_state_lookup_byspi for pktgen
  {pktgen, xfrm} Show spi value properly when ipsec turned on
  {pktgen, xfrm} Document IPsec usage in pktgen.txt

 Documentation/networking/pktgen.txt |   15 +++++++
 include/net/xfrm.h                  |    2 +
 net/core/pktgen.c                   |   80 +++++++++++++++++++++++++++++------
 net/xfrm/xfrm_state.c               |   26 +++++++++++-
 4 files changed, 107 insertions(+), 16 deletions(-)

-- 
1.7.9.5

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2014-01-03  3:18 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-12-20  2:33 [PATCHv4 net-next 0/8] pktgen IPsec support Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 1/8] {pktgen, xfrm} Correct xfrm state lock usage when transforming Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 2/8] {pktgen, xfrm} Add statistics counting " Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 3/8] {pktgen, xfrm} Correct xfrm_state_lock usage in xfrm_stateonly_find Fan Du
2014-01-02  7:32   ` Steffen Klassert
2013-12-20  2:33 ` [PATCHv4 net-next 4/8] {pktgen, xfrm} Using "pgset spi xxx" to spedifiy SA for a given flow Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 5/8] {pktgen, xfrm} Construct skb dst for tunnel mode transformation Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 6/8] {pktgen, xfrm} Introduce xfrm_state_lookup_byspi for pktgen Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 7/8] {pktgen, xfrm} Show spi value properly when ipsec turned on Fan Du
2013-12-20  2:33 ` [PATCHv4 net-next 8/8] {pktgen, xfrm} Document IPsec usage in pktgen.txt Fan Du
  -- strict thread matches above, loose matches on Subject: below --
2014-01-03  3:18 [PATCHv5 net-next 0/8] pktgen IPsec support Fan Du
2014-01-03  3:18 ` [PATCHv4 net-next 6/8] {pktgen, xfrm} Introduce xfrm_state_lookup_byspi for pktgen Fan Du

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).