From: Christian Hopps <chopps@chopps.org>
To: devel@linux-ipsec.org
Cc: Steffen Klassert <steffen.klassert@secunet.com>,
netdev@vger.kernel.org, Christian Hopps <chopps@chopps.org>,
Christian Hopps <chopps@labn.net>
Subject: [PATCH ipsec-next v2 0/17] Add IP-TFS mode to xfrm
Date: Mon, 20 May 2024 17:45:58 -0400 [thread overview]
Message-ID: <20240520214558.2592618-1-chopps@chopps.org> (raw)
From: Christian Hopps <chopps@labn.net>
Summary of Changes
------------------
This patchset adds a new xfrm mode implementing on-demand IP-TFS. IP-TFS
(AggFrag encapsulation) has been standardized in RFC9347.
Link: https://www.rfc-editor.org/rfc/rfc9347.txt
This feature supports demand driven (i.e., non-constant send rate)
IP-TFS to take advantage of the AGGFRAG ESP payload encapsulation. This
payload type supports aggregation and fragmentation of the inner IP
packet stream which in turn yields higher small-packet bandwidth as well
as reducing MTU/PMTU issues. Congestion control is unimplementated as
the send rate is demand driven rather than constant.
In order to allow loading this fucntionality as a module a set of
callbacks xfrm_mode_cbs has been added to xfrm as well.
Patchset Changes:
-----------------
23 files changed, 3252 insertions(+), 19 deletions(-)
Documentation/networking/xfrm_sysctl.rst | 30 +
include/net/netns/xfrm.h | 6 +
include/net/xfrm.h | 40 +
include/uapi/linux/in.h | 2 +
include/uapi/linux/ip.h | 16 +
include/uapi/linux/ipsec.h | 3 +-
include/uapi/linux/snmp.h | 3 +
include/uapi/linux/xfrm.h | 9 +-
net/ipv4/esp4.c | 3 +-
net/ipv6/esp6.c | 3 +-
net/netfilter/nft_xfrm.c | 3 +-
net/xfrm/Makefile | 1 +
net/xfrm/trace_iptfs.h | 218 +++
net/xfrm/xfrm_compat.c | 10 +-
net/xfrm/xfrm_device.c | 4 +-
net/xfrm/xfrm_input.c | 14 +-
net/xfrm/xfrm_iptfs.c | 2741 ++++++++++++++++++++++++++++++
net/xfrm/xfrm_output.c | 6 +
net/xfrm/xfrm_policy.c | 26 +-
net/xfrm/xfrm_proc.c | 3 +
net/xfrm/xfrm_state.c | 60 +
net/xfrm/xfrm_sysctl.c | 38 +
net/xfrm/xfrm_user.c | 32 +
Patchset Structure:
-------------------
The first 8 commits are changes to the xfrm infrastructure to support
the callbacks as well as more generic IP-TFS additions that may be used
outside the actual IP-TFS implementation.
- iptfs: config: add CONFIG_XFRM_IPTFS
- iptfs: uapi: ip: add ip_tfs_*_hdr packet formats
- iptfs: uapi: IPPROTO_AGGFRAG AGGFRAG in ESP
- iptfs: sysctl: allow configuration of global default values
- iptfs: netlink: add config (netlink) options
- iptfs: xfrm: Add mode_cbs module functionality
- iptfs: xfrm: add generic iptfs defines and functionality
The last 9+1 commits constitute the IP-TFS implementation constructed in
layers to make review easier. The first 9 commits all apply to a single
file `net/xfrm/xfrm_iptfs.c`, the last commit adds a new tracepoint
header file along with the use of these new tracepoint calls.
- iptfs: impl: add new iptfs xfrm mode impl
- iptfs: impl: add user packet (tunnel ingress) handling
- iptfs: impl: share page fragments of inner packets
- iptfs: impl: add fragmenting of larger than MTU user packets
- iptfs: impl: add basic receive packet (tunnel egress) handling
- iptfs: impl: handle received fragmented inner packets
- iptfs: impl: add reusing received skb for the tunnel egress packet
- iptfs: impl: add skb-fragment sharing code
- iptfs: impl: handle reordering of received packets
- iptfs: impl: add tracepoint functionality
Patchset History:
-----------------
RFCv1 (11/10/2023)
RFCv1 -> RFCv2 (11/12/2023)
Updates based on feedback from Simon Horman, Antony,
Michael Richardson, and kernel test robot.
RFCv2 -> v1 (2/19/2024)
Updates based on feedback from Sabrina Dubroca, kernel test robot
v1 -> v2 (5/19/2024)
Updates based on feedback from Sabrina Dubroca, Simon Horman, Antony.
o Add handling of new netlink SA direction attribute (Antony).
o Split single patch/commit of xfrm_iptfs.c (the actual IP-TFS impl)
into 9+1 distinct layered functionality commits for aiding review.
- xfrm: fix return check on clone() callback
- xfrm: add sa_len() callback in xfrm_mode_cbs for copy to user
- iptfs: remove unneeded skb free count variable
- iptfs: remove unused variable and "breadcrumb" for future code.
- iptfs: use do_div() to avoid "__udivd13 missing" link failure.
- iptfs: remove some BUG_ON() assertions questioned in review.
next prev reply other threads:[~2024-05-20 21:46 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-05-20 21:42 [PATCH ipsec-next v1 0/8] Add IP-TFS mode to xfrm Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 01/17] xfrm: config: add CONFIG_XFRM_IPTFS Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 02/17] include: uapi: add ip_tfs_*_hdr packet formats Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 03/17] include: uapi: add IPPROTO_AGGFRAG for AGGFRAG in ESP Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 04/17] xfrm: sysctl: allow configuration of global default values Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 05/17] xfrm: netlink: add config (netlink) options Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 06/17] xfrm: add mode_cbs module functionality Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 07/17] xfrm: add generic iptfs defines and functionality Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 08/17] xfrm: iptfs: add new iptfs xfrm mode impl Christian Hopps
2024-06-03 17:14 ` [devel-ipsec] " Antony Antony
2024-06-07 5:49 ` Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 09/17] xfrm: iptfs: add user packet (tunnel ingress) handling Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 10/17] xfrm: iptfs: share page fragments of inner packets Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 11/17] xfrm: iptfs: add fragmenting of larger than MTU user packets Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 12/17] xfrm: iptfs: add basic receive packet (tunnel egress) handling Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 13/17] xfrm: iptfs: handle received fragmented inner packets Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 14/17] xfrm: iptfs: add reusing received skb for the tunnel egress packet Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 15/17] xfrm: iptfs: add skb-fragment sharing code Christian Hopps
2024-05-20 21:42 ` [PATCH ipsec-next v2 16/17] xfrm: iptfs: handle reordering of received packets Christian Hopps
2024-05-21 16:07 ` kernel test robot
2024-05-20 21:42 ` [PATCH ipsec-next v2 17/17] xfrm: iptfs: add tracepoint functionality Christian Hopps
2024-05-23 19:29 ` [PATCH ipsec-next v1 0/8] Add IP-TFS mode to xfrm Antony Antony
2024-05-20 21:45 ` Christian Hopps [this message]
2024-05-23 23:04 ` [PATCH ipsec-next v2 0/17] " Christian Hopps
2024-05-24 11:52 ` Antony Antony
2024-05-24 11:56 ` Christian Hopps
2024-05-25 5:55 ` Christian Hopps
2024-06-06 15:52 ` [devel-ipsec] " Antony Antony
2024-06-07 5:54 ` Christian Hopps
2024-06-11 6:24 ` Antony Antony
2024-06-17 15:17 ` Christian Hopps
2024-06-17 15:39 ` Nicolas Dichtel
2024-06-17 16:05 ` Christian Hopps
2024-06-17 21:24 ` Nicolas Dichtel
-- strict thread matches above, loose matches on Subject: below --
2024-06-07 5:40 Christian Hopps
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240520214558.2592618-1-chopps@chopps.org \
--to=chopps@chopps.org \
--cc=chopps@labn.net \
--cc=devel@linux-ipsec.org \
--cc=netdev@vger.kernel.org \
--cc=steffen.klassert@secunet.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).