From owner-freebsd-hackers@freebsd.org Mon Nov 9 18:44:56 2020 Return-Path: Delivered-To: freebsd-hackers@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 638BD46A84E for ; Mon, 9 Nov 2020 18:44:56 +0000 (UTC) (envelope-from ozkan.kirik@gmail.com) Received: from mail-ua1-x943.google.com (mail-ua1-x943.google.com [IPv6:2607:f8b0:4864:20::943]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CVKfv2pZBz3krH; Mon, 9 Nov 2020 18:44:55 +0000 (UTC) (envelope-from ozkan.kirik@gmail.com) Received: by mail-ua1-x943.google.com with SMTP id w3so3110283uau.2; Mon, 09 Nov 2020 10:44:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=24/2Gm4NsDIZ8Aee0ImQSei0Ly+9Ul4w5IfcfJ6glaw=; b=tnNaQysrNrfiFRw6TU9U6gF5q3zydelWWwU4wZoIRgLwPJQTy07p2/GVt8sqCiITDv PUemOWDZQFN4e2Muc47vf294UqdTHG93NKjIpxubOCdeloqx9bZFf0d372Q49tpDA9b+ Dn7laO/iveL6HCiHSjKO3xWrxF8JNQdLfqd98y4IB8gDdAaz5sQKDR6omgjs0xtLHT6o WLhYE7wBStVy4dGx+C0OjrQophXz5S0avZ/pCfHr2y0fYgEBDWAmly81Ya1ihpVLXNNd NumUiiXHBlxk8UBwlmKsS+UXN2SF4h1NluGnVMOUCfyvNurjLn11GV+1aHPXmlPSuMPg FO4g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=24/2Gm4NsDIZ8Aee0ImQSei0Ly+9Ul4w5IfcfJ6glaw=; b=C2t/llhfUCSWidVR2XgnLkxZUSSK7paQwSEJpfyI5yAzwJMqW3ZjHP+HNIhqjGN4KB STxmLDecu3PFLeMrWqkkiFphpXU+VA4ao8KefS3ymLz3tj2g4GkUdqlMcBVUWqEtSaQD sNTWy81x6BBMkWnTpK/Oi3HcWBmNUh+/l7RX1idwAABi4T7cP4q/szazG3fvO9Lhu1lI Ou8ZfxZ3NZwYFhW0UeSNcrQfmMEfHxbbEPHbSRXhvKbgAA6qZ3L2FmEqWgKUKaOpxGmP 4F55Ls2IwKQXwmg8rQdeFFvv8kcTNJmL85VwWX0lY6q1cElQsJfCbuwllWLRvfcQ5e2A dwEg== X-Gm-Message-State: AOAM5338Lv72hNZcDtp0gkoQTDG4UxP37dtzfCMTwkc/61HpoGWjLJay O+9HbnBMXpZFLKov7bhgv8QnIoq2Yd1MO3j4m5Mn0P6yBzE= X-Google-Smtp-Source: ABdhPJz3IkI6L28QgAisF+CdVWwHYizqzsSnxkzlH1PH5twdFkvM4X7ECwZzZ/kxUhLif3RdpOjLSCkspRCn+voAYH0= X-Received: by 2002:ab0:2986:: with SMTP id u6mr7780304uap.118.1604947494345; Mon, 09 Nov 2020 10:44:54 -0800 (PST) MIME-Version: 1.0 References: <20201026200059.GA66299@raichu> <723fbd7326df42ce30cd5e361db9c736@neelc.org> <20201027032720.GB31663@raichu> <20201027125508.GD31663@raichu> In-Reply-To: From: =?UTF-8?B?w5Z6a2FuIEtJUklL?= Date: Mon, 9 Nov 2020 21:44:40 +0300 Message-ID: Subject: Re: QAT driver To: John Baldwin Cc: Rick Macklem , Mark Johnston , Neel Chauhan , "freebsd-hackers@freebsd.org" X-Rspamd-Queue-Id: 4CVKfv2pZBz3krH X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=tnNaQysr; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of ozkankirik@gmail.com designates 2607:f8b0:4864:20::943 as permitted sender) smtp.mailfrom=ozkankirik@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCPT_COUNT_FIVE(0.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; R_MIXED_CHARSET(1.00)[subject]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; ARC_NA(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[2607:f8b0:4864:20::943:from]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; SPAMHAUS_ZRD(0.00)[2607:f8b0:4864:20::943:from:127.0.2.255]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::943:from]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-hackers] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.34 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Nov 2020 18:44:56 -0000 great job! thank you! Does the work supports Xeon D-2100 series ? (Exact model: Xeon D-2146NT) Regards On Fri, Oct 30, 2020 at 6:45 PM John Baldwin wrote: > On 10/27/20 2:15 PM, Rick Macklem wrote: > > Mark Johnston wrote: > >> On Tue, Oct 27, 2020 at 04:32:40AM +0000, Rick Macklem wrote: > > [stuff snipped] > >>> Can it be made to work with the KERN_TLS in head? > >>> (KERN_TLS works fine for me using the ktls_ocf and aesni modules.) > >>> I think it is only head and requires the patched OpenSSL3 that jhb@ > >>> currently has. > >> > >> I hadn't looked at ktls_ocf.c before but at a glance it looks like it > >> can make use of any hardware or software opencrypto driver that supports > >> the requested algorithms. The qat(4) port implements the algorithms > >> referenced by ktls_ocf_try(). > > Well, if you were inspired to try it out, the basic doc for NFS-over-TLS > is here: > > https://people.freebsd.org/~rmacklem/nfs-over-tls-setup.txt > > (Same file is in base/projects/nfs-over-tls on subversion.) > > For someone who is used to building/running head kernels, it should be > > pretty straightforward. > > > > You could become the first tester in the whole wide world;-) rick > > ps: Although the NFS code uses it in the kernel, I think that an > application > > that uses OpenSSL's SSL_read()/SSL_write via a patched OpenSSL > library, > > has the encrypt/decrypt done in the kernel and the userspace library > > code just does socket I/O with unencrypted data. > > pss: Hopefully jhb@ will correct me if I got this wrong. > > > >> I know nothing about it, except that it seems to work well, doing > >> the TLS application data records in the kernel for a TCP socket > >> enabled by the patched OpenSSL library. > >> I've cc'd jhb@, so hopefully he can let us know what it needs? > > qat(4) should work with KERN_TLS. I've used ccr(4) with the KERN_TLS > bits many times. It is a good throughput test, though you will need > a fast network connection to really push it (e.g. with ccr(4) I've > done about 50 Gbps of TLS traffic using nginx with the KTLS patches > to use sendfile, so that requires a 100G NIC and/or two 40G NICs.) > > -- > John Baldwin > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" >