> From: Ankur Dwivedi <adwiv...@marvell.com>
> 
> The default flow created would enable security processing on all ESP
> packets. If the default flow is created, SA based rte_flow creation
> would be skipped.

I suppose that one depends on:
http://patches.dpdk.org/patch/63621/
http://patches.dpdk.org/cover/63625/
to work as expected?
If so probably worth to mention in that header
or in cover letter (or both). 

> 
> Signed-off-by: Ankur Dwivedi <adwiv...@marvell.com>
> Signed-off-by: Anoob Joseph <ano...@marvell.com>
> ---
>  examples/ipsec-secgw/ipsec-secgw.c | 56 
> ++++++++++++++++++++++++++++++++++++++
>  examples/ipsec-secgw/ipsec.c       |  8 ++++++
>  examples/ipsec-secgw/ipsec.h       |  6 ++++
>  3 files changed, 70 insertions(+)
> 
> diff --git a/examples/ipsec-secgw/ipsec-secgw.c 
> b/examples/ipsec-secgw/ipsec-secgw.c
> index 3b5aaf6..7506922 100644
> --- a/examples/ipsec-secgw/ipsec-secgw.c
> +++ b/examples/ipsec-secgw/ipsec-secgw.c
> @@ -128,6 +128,8 @@ struct ethaddr_info ethaddr_tbl[RTE_MAX_ETHPORTS] = {
>       { 0, ETHADDR(0x00, 0x16, 0x3e, 0x49, 0x9e, 0xdd) }
>  };
> 
> +struct flow_info flow_info_tbl[RTE_MAX_ETHPORTS];

Need to be initialized with zeroes somewhere.

> +
>  #define CMD_LINE_OPT_CONFIG          "config"
>  #define CMD_LINE_OPT_SINGLE_SA               "single-sa"
>  #define CMD_LINE_OPT_CRYPTODEV_MASK  "cryptodev_mask"
> @@ -2406,6 +2408,55 @@ reassemble_init(void)
>       return rc;
>  }
> 
> +static int
> +create_default_ipsec_flow(uint16_t port_id, uint64_t rx_offloads)
> +{
> +     int ret = 0;
> +
> +     /* Add the default ipsec flow to detect all ESP packets for rx */
> +     if (rx_offloads & DEV_RX_OFFLOAD_SECURITY) {
> +             struct rte_flow_action action[2];
> +             struct rte_flow_item pattern[2];
> +             struct rte_flow_attr attr = {0};
> +             struct rte_flow_error err;
> +             struct rte_flow *flow;
> +
> +             pattern[0].type = RTE_FLOW_ITEM_TYPE_ESP;
> +             pattern[0].spec = NULL;
> +             pattern[0].mask = NULL;
> +             pattern[0].last = NULL;
> +             pattern[1].type = RTE_FLOW_ITEM_TYPE_END;
> +
> +             action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
> +             action[0].conf = NULL;
> +             action[1].type = RTE_FLOW_ACTION_TYPE_END;
> +             action[1].conf = NULL;
> +
> +             attr.egress = 0;
> +             attr.ingress = 1;
> +
> +             ret = rte_flow_validate(port_id, &attr, pattern, action, &err);
> +             if (ret) {

As I understand, flow_validate() is used here to query does this capability
(multiple security sessions for same flow) is supported by PMD/HW?
If so, then probably no need for error message if it doesn't. 

> +                     RTE_LOG(ERR, IPSEC,
> +                             "Failed to validate ipsec flow %s\n",
> +                             err.message);
> +                     goto exit;
> +             }
> +
> +             flow = rte_flow_create(port_id, &attr, pattern, action, &err);

Same question as for http://patches.dpdk.org/patch/63621/,
why do you need it at all?
What it will enable/disable? 

> +             if (flow == NULL) {
> +                     RTE_LOG(ERR, IPSEC,
> +                             "Failed to create ipsec flow %s\n",
> +                             err.message);
> +                     ret = -rte_errno;
> +                     goto exit;

Why not just 'return ret;' here?

> +             }
> +             flow_info_tbl[port_id].rx_def_flow = flow;
> +     }
> +exit:
> +     return ret;
> +}
> +
>  int32_t
>  main(int32_t argc, char **argv)
>  {
> @@ -2478,6 +2529,11 @@ main(int32_t argc, char **argv)
> 
>               sa_check_offloads(portid, &req_rx_offloads, &req_tx_offloads);
>               port_init(portid, req_rx_offloads, req_tx_offloads);
> +             /* Create default ipsec flow for the ethernet device */
> +             ret = create_default_ipsec_flow(portid, req_rx_offloads);
> +             if (ret)
> +                     printf("Cannot create default flow, err=%d, port=%d\n",
> +                                     ret, portid);

Again it is an optional feature, so not sure if we need to report it for every 
port.
Might be better to do visa-versa: LOG(INFO, ...) when  create_default() was 
successfull.

>       }
> 
>       cryptodevs_init();
> diff --git a/examples/ipsec-secgw/ipsec.c b/examples/ipsec-secgw/ipsec.c
> index d4b5712..e529f68 100644
> --- a/examples/ipsec-secgw/ipsec.c
> +++ b/examples/ipsec-secgw/ipsec.c
> @@ -261,6 +261,12 @@ create_inline_session(struct socket_ctx *skt_ctx, struct 
> ipsec_sa *sa,
>                       unsigned int i;
>                       unsigned int j;
> 
> +                     /*
> +                      * Don't create flow if default flow is already created
> +                      */
> +                     if (flow_info_tbl[sa->portid].rx_def_flow)
> +                             goto set_cdev_id;

As a nit: would be great to avoid introducing extra gotos.

> +

As I can see, that block of code is for RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO 
only.
Is that what intended?
BTW, for RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL, it seems rte_flow is 
never created anyway inside that function. 

>                       ret = rte_eth_dev_info_get(sa->portid, &dev_info);
>                       if (ret != 0) {
>                               RTE_LOG(ERR, IPSEC,
> @@ -396,6 +402,8 @@ create_inline_session(struct socket_ctx *skt_ctx, struct 
> ipsec_sa *sa,
>               ips->security.ol_flags = sec_cap->ol_flags;
>               ips->security.ctx = sec_ctx;
>       }
> +
> +set_cdev_id:
>       sa->cdev_id_qp = 0;
> 
>       return 0;
> diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h
> index 8e07521..28ff07d 100644
> --- a/examples/ipsec-secgw/ipsec.h
> +++ b/examples/ipsec-secgw/ipsec.h
> @@ -81,6 +81,12 @@ struct app_sa_prm {
> 
>  extern struct app_sa_prm app_sa_prm;
> 
> +struct flow_info {
> +     struct rte_flow *rx_def_flow;
> +};
> +
> +extern struct flow_info flow_info_tbl[RTE_MAX_ETHPORTS];
> +
>  enum {
>       IPSEC_SESSION_PRIMARY = 0,
>       IPSEC_SESSION_FALLBACK = 1,
> --
> 2.7.4

Reply via email to