Hi Konstantin, Thank you for the review. I will send a revised patch which addresses your comments.
Thanks, Lukasz On 19.05.2019 16:47, Ananyev, Konstantin wrote: > > Hi Lukasz, > Thanks for clarifications. > Looks good in general. > Few small comments below. > Konstantin > >> When esn is used then high-order 32 bits are included in ICV >> calculation however are not transmitted. Update packet length >> to be consistent with auth data offset and length before crypto >> operation. High-order 32 bits of esn will be removed from packet >> length in crypto post processing. >> >> Change-Id: I5ba50e341059a8d6a5e4ce7c626dfe7b9173740b >> Signed-off-by: Lukasz Bartosik <lbarto...@marvell.com> >> --- >> lib/librte_ipsec/esp_inb.c | 56 >> +++++++++++++++++++++++++++++++++++++-------- >> lib/librte_ipsec/esp_outb.c | 31 +++++++++++++++++++++++++ >> lib/librte_ipsec/sa.c | 4 ++-- >> lib/librte_ipsec/sa.h | 8 +++++++ >> 4 files changed, 87 insertions(+), 12 deletions(-) >> >> diff --git a/lib/librte_ipsec/esp_inb.c b/lib/librte_ipsec/esp_inb.c >> index 4e0e12a..eb899e3 100644 >> --- a/lib/librte_ipsec/esp_inb.c >> +++ b/lib/librte_ipsec/esp_inb.c >> @@ -16,7 +16,8 @@ >> #include "pad.h" >> >> typedef uint16_t (*esp_inb_process_t)(const struct rte_ipsec_sa *sa, >> - struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num); >> + struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num, >> + uint8_t is_inline); >> >> /* >> * helper function to fill crypto_sym op for cipher+auth algorithms. >> @@ -181,6 +182,15 @@ inb_pkt_prepare(const struct rte_ipsec_sa *sa, const >> struct replay_sqn *rsn, >> icv->va = rte_pktmbuf_mtod_offset(ml, void *, icv_ofs); >> icv->pa = rte_pktmbuf_iova_offset(ml, icv_ofs); >> >> + /* >> + * if esn is used then high-order 32 bits are also used in ICV >> + * calculation but are not transmitted, update packet length >> + * to be consistent with auth data length and offset, this will >> + * be subtracted from packet length in post crypto processing > > Here and in several other comments below - you repeat basically the same > thing. > Seems a bit excessive. I suppose just to put in in one place, or probably even > in patch description will be enough. > >> + */ >> + mb->pkt_len += sa->sqh_len; >> + ml->data_len += sa->sqh_len; >> + >> inb_pkt_xprepare(sa, sqn, icv); >> return plen; >> } >> @@ -373,14 +383,20 @@ tun_process_step3(struct rte_mbuf *mb, uint64_t >> txof_msk, uint64_t txof_val) >> */ >> static inline uint16_t >> tun_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], >> - uint32_t sqn[], uint32_t dr[], uint16_t num) >> + uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline) >> { >> uint32_t adj, i, k, tl; >> uint32_t hl[num]; >> struct esp_tail espt[num]; >> struct rte_mbuf *ml[num]; >> >> - const uint32_t tlen = sa->icv_len + sizeof(espt[0]); >> + /* >> + * remove high-order 32 bits of esn from packet length >> + * which was added before crypto processing, this doesn't >> + * apply to inline case >> + */ > > This comment seems a bit misleading, as we have remove not only sqh, > but also icv, espt, padding. > >> + const uint32_t tlen = sa->icv_len + sizeof(espt[0]) + >> + (is_inline ? 0 : sa->sqh_len); >> const uint32_t cofs = sa->ctp.cipher.offset; >> >> /* >> @@ -420,7 +436,7 @@ tun_process(const struct rte_ipsec_sa *sa, struct >> rte_mbuf *mb[], >> */ >> static inline uint16_t >> trs_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], >> - uint32_t sqn[], uint32_t dr[], uint16_t num) >> + uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline) >> { >> char *np; >> uint32_t i, k, l2, tl; >> @@ -428,7 +444,13 @@ trs_process(const struct rte_ipsec_sa *sa, struct >> rte_mbuf *mb[], >> struct esp_tail espt[num]; >> struct rte_mbuf *ml[num]; >> >> - const uint32_t tlen = sa->icv_len + sizeof(espt[0]); >> + /* >> + * remove high-order 32 bits of esn from packet length >> + * which was added before crypto processing, this doesn't >> + * apply to inline case >> + */ >> + const uint32_t tlen = sa->icv_len + sizeof(espt[0]) + >> + (is_inline ? 0 : sa->sqh_len); >> const uint32_t cofs = sa->ctp.cipher.offset; >> >> /* >> @@ -496,8 +518,8 @@ esp_inb_rsn_update(struct rte_ipsec_sa *sa, const >> uint32_t sqn[], >> * process group of ESP inbound packets. >> */ >> static inline uint16_t >> -esp_inb_pkt_process(const struct rte_ipsec_session *ss, >> - struct rte_mbuf *mb[], uint16_t num, esp_inb_process_t process) >> +esp_inb_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf >> *mb[], >> + uint16_t num, uint8_t is_inline, esp_inb_process_t process) >> { >> uint32_t k, n; >> struct rte_ipsec_sa *sa; >> @@ -507,7 +529,7 @@ esp_inb_pkt_process(const struct rte_ipsec_session *ss, >> sa = ss->sa; >> >> /* process packets, extract seq numbers */ >> - k = process(sa, mb, sqn, dr, num); >> + k = process(sa, mb, sqn, dr, num, is_inline); >> >> /* handle unprocessed mbufs */ >> if (k != num && k != 0) >> @@ -533,7 +555,14 @@ uint16_t >> esp_inb_tun_pkt_process(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], uint16_t num) >> { >> - return esp_inb_pkt_process(ss, mb, num, tun_process); >> + return esp_inb_pkt_process(ss, mb, num, 0, tun_process); > > To make things a bit cleaner, can I suggest the following: > 1. make esp_inb_pkt_process() take as a parameters: > const struct rte_ipsec_sa *sa (instead of const struct rte_ipsec_session > *ss) > uint32_t sqh_len instead of is_inlne > > So here it would become: > > sa = ss->sa; > return esp_inb_pkt_process(ss, mb, num, sa->sqh_len, tun_process); > > For inline it would be: > > sa = ss->sa; > return esp_inb_pkt_process(ss, mb, num, 0, tun_process); > > >> +} >> + >> +uint16_t >> +inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss, >> + struct rte_mbuf *mb[], uint16_t num) >> +{ >> + return esp_inb_pkt_process(ss, mb, num, 1, tun_process); >> } >> >> /* >> @@ -543,5 +572,12 @@ uint16_t >> esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], uint16_t num) >> { >> - return esp_inb_pkt_process(ss, mb, num, trs_process); >> + return esp_inb_pkt_process(ss, mb, num, 0, trs_process); >> +} >> + >> +uint16_t >> +inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss, >> + struct rte_mbuf *mb[], uint16_t num) >> +{ >> + return esp_inb_pkt_process(ss, mb, num, 1, trs_process); >> } >> diff --git a/lib/librte_ipsec/esp_outb.c b/lib/librte_ipsec/esp_outb.c >> index c798bc4..71a595e 100644 >> --- a/lib/librte_ipsec/esp_outb.c >> +++ b/lib/librte_ipsec/esp_outb.c >> @@ -221,6 +221,7 @@ esp_outb_tun_prepare(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], >> uint32_t i, k, n; >> uint64_t sqn; >> rte_be64_t sqc; >> + struct rte_mbuf *ml; >> struct rte_ipsec_sa *sa; >> struct rte_cryptodev_sym_session *cs; >> union sym_op_data icv; >> @@ -246,6 +247,19 @@ esp_outb_tun_prepare(const struct rte_ipsec_session >> *ss, struct rte_mbuf *mb[], >> >> /* success, setup crypto op */ >> if (rc >= 0) { >> + /* >> + * if esn is used then high-order 32 bits are also >> + * used in ICV calculation but are not transmitted, >> + * update packet length to be consistent with auth >> + * data length and offset, this will be subtracted >> + * from packet length in post crypto processing >> + */ >> + if (sa->sqh_len) { >> + mb[i]->pkt_len += sa->sqh_len; >> + ml = rte_pktmbuf_lastseg(mb[i]); >> + ml->data_len += sa->sqh_len; >> + } > > That means we have to go through our 'next' list once again. > Seems suboptimal. > I think would be better to make outb_tun_pkt_prepare() to take sqh_len as > extra parameter. > Then inside it we can just: > tlen = pdlen + sa->icv_len + sqh_len; > ... > if (tlen + sa->aad_len > rte_pktmbuf_tailroom(ml)) > return -ENOSPC; > ... > ml->data_len += tlen; > mb->pkt_len += tlen; > ... > pdofs += pdlen + sqh_len; > > Same for transport mode. > > >> + >> outb_pkt_xprepare(sa, sqc, &icv); >> lksd_none_cop_prepare(cop[k], cs, mb[i]); >> outb_cop_prepare(cop[k], sa, iv, &icv, 0, rc); >> @@ -356,6 +370,7 @@ esp_outb_trs_prepare(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], >> uint32_t i, k, n, l2, l3; >> uint64_t sqn; >> rte_be64_t sqc; >> + struct rte_mbuf *ml; >> struct rte_ipsec_sa *sa; >> struct rte_cryptodev_sym_session *cs; >> union sym_op_data icv; >> @@ -384,6 +399,19 @@ esp_outb_trs_prepare(const struct rte_ipsec_session >> *ss, struct rte_mbuf *mb[], >> >> /* success, setup crypto op */ >> if (rc >= 0) { >> + /* >> + * if esn is used then high-order 32 bits are also >> + * used in ICV calculation but are not transmitted, >> + * update packet length to be consistent with auth >> + * data length and offset, this will be subtracted >> + * from packet length in post crypto processing >> + */ >> + if (sa->sqh_len) { >> + mb[i]->pkt_len += sa->sqh_len; >> + ml = rte_pktmbuf_lastseg(mb[i]); >> + ml->data_len += sa->sqh_len; >> + } >> + >> outb_pkt_xprepare(sa, sqc, &icv); >> lksd_none_cop_prepare(cop[k], cs, mb[i]); >> outb_cop_prepare(cop[k], sa, iv, &icv, l2 + l3, rc); >> @@ -425,6 +453,9 @@ esp_outb_sqh_process(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], >> for (i = 0; i != num; i++) { >> if ((mb[i]->ol_flags & PKT_RX_SEC_OFFLOAD_FAILED) == 0) { >> ml = rte_pktmbuf_lastseg(mb[i]); >> + /* remove high-order 32 bits of esn from packet len */ >> + mb[i]->pkt_len -= sa->sqh_len; >> + ml->data_len -= sa->sqh_len; >> icv = rte_pktmbuf_mtod_offset(ml, void *, >> ml->data_len - icv_len); >> remove_sqh(icv, icv_len); >> diff --git a/lib/librte_ipsec/sa.c b/lib/librte_ipsec/sa.c >> index 846e317..ff01358 100644 >> --- a/lib/librte_ipsec/sa.c >> +++ b/lib/librte_ipsec/sa.c >> @@ -610,10 +610,10 @@ inline_crypto_pkt_func_select(const struct >> rte_ipsec_sa *sa, >> switch (sa->type & msk) { >> case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV4): >> case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV6): >> - pf->process = esp_inb_tun_pkt_process; >> + pf->process = inline_inb_tun_pkt_process; >> break; >> case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TRANS): >> - pf->process = esp_inb_trs_pkt_process; >> + pf->process = inline_inb_trs_pkt_process; >> break; >> case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV4): >> case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV6): >> diff --git a/lib/librte_ipsec/sa.h b/lib/librte_ipsec/sa.h >> index ffb5fb4..20c0a65 100644 >> --- a/lib/librte_ipsec/sa.h >> +++ b/lib/librte_ipsec/sa.h >> @@ -143,9 +143,17 @@ esp_inb_tun_pkt_process(const struct rte_ipsec_session >> *ss, >> struct rte_mbuf *mb[], uint16_t num); >> >> uint16_t >> +inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss, >> + struct rte_mbuf *mb[], uint16_t num); >> + >> +uint16_t >> esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss, >> struct rte_mbuf *mb[], uint16_t num); >> >> +uint16_t >> +inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss, >> + struct rte_mbuf *mb[], uint16_t num); >> + >> /* outbound processing */ >> >> uint16_t >> -- >> 2.7.4 >