Hi Konstantin,

Please see inline.

Thanks,
Lukasz

On 24.12.2019 14:13, Ananyev, Konstantin wrote:
> External Email
> 
> ----------------------------------------------------------------------
> 
>> --- a/examples/ipsec-secgw/ipsec_worker.c
>> +++ b/examples/ipsec-secgw/ipsec_worker.c
>> @@ -15,6 +15,7 @@
>>  #include <ctype.h>
>>  #include <stdbool.h>
>>
>> +#include <rte_acl.h>
>>  #include <rte_common.h>
>>  #include <rte_log.h>
>>  #include <rte_memcpy.h>
>> @@ -29,12 +30,51 @@
>>  #include <rte_eventdev.h>
>>  #include <rte_malloc.h>
>>  #include <rte_mbuf.h>
>> +#include <rte_lpm.h>
>> +#include <rte_lpm6.h>
>>
>>  #include "ipsec.h"
>> +#include "ipsec_worker.h"
>>  #include "event_helper.h"
>>
>>  extern volatile bool force_quit;
>>
>> +static inline enum pkt_type
>> +process_ipsec_get_pkt_type(struct rte_mbuf *pkt, uint8_t **nlp)
>> +{
>> +    struct rte_ether_hdr *eth;
>> +
>> +    eth = rte_pktmbuf_mtod(pkt, struct rte_ether_hdr *);
>> +    if (eth->ether_type == rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4)) {
>> +            *nlp = RTE_PTR_ADD(eth, RTE_ETHER_HDR_LEN +
>> +                            offsetof(struct ip, ip_p));
>> +            if (**nlp == IPPROTO_ESP)
>> +                    return PKT_TYPE_IPSEC_IPV4;
>> +            else
>> +                    return PKT_TYPE_PLAIN_IPV4;
>> +    } else if (eth->ether_type == rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV6)) {
>> +            *nlp = RTE_PTR_ADD(eth, RTE_ETHER_HDR_LEN +
>> +                            offsetof(struct ip6_hdr, ip6_nxt));
>> +            if (**nlp == IPPROTO_ESP)
>> +                    return PKT_TYPE_IPSEC_IPV6;
>> +            else
>> +                    return PKT_TYPE_PLAIN_IPV6;
>> +    }
>> +
>> +    /* Unknown/Unsupported type */
>> +    return PKT_TYPE_INVALID;
>> +}
> 
> Looking though that file, it seems like you choose to create your own set of
> helper functions, instead of trying to reuse existing ones: 
> 
> process_ipsec_get_pkt_type()  VS prepare_one_packet()
> update_mac_addrs() VS prepare_tx_pkt()
> check_sp() VS  inbound_sp_sa()
> 
> Obviously there is nothing good in code (and possible bugs) duplication.
> Any reason why you can't reuse existing functions and need to reinvent your 
> own?

[Lukasz] The prepare_one_packet() and prepare_tx_pkt() do much more than we 
need and for performance reasons
we crafted new functions. For example process_ipsec_get_pkt_type function 
returns nlp and whether
packet type is plain or IPsec. That's all. Prepare_one_packet() process packets 
in chunks and does much more -
it adjusts mbuf and ipv4 lengths then it demultiplex packet into plan and IPsec 
flows and finally does 
inline checks. This is similar for update_mac_addrs() vs prepare_tx_pkt() and 
check_sp() vs inbound_sp_sa()
that prepare_tx_pkt() and inbound_sp_sa() do more that we need in event mode.

> 
>> +
>> +static inline void
>> +update_mac_addrs(struct rte_mbuf *pkt, uint16_t portid)
>> +{
>> +    struct rte_ether_hdr *ethhdr;
>> +
>> +    ethhdr = rte_pktmbuf_mtod(pkt, struct rte_ether_hdr *);
>> +    memcpy(&ethhdr->s_addr, &ethaddr_tbl[portid].src, RTE_ETHER_ADDR_LEN);
>> +    memcpy(&ethhdr->d_addr, &ethaddr_tbl[portid].dst, RTE_ETHER_ADDR_LEN);
>> +}
>> +
>>  static inline void
>>  ipsec_event_pre_forward(struct rte_mbuf *m, unsigned int port_id)
>>  {
>> @@ -45,6 +85,177 @@ ipsec_event_pre_forward(struct rte_mbuf *m, unsigned int 
>> port_id)
>>      rte_event_eth_tx_adapter_txq_set(m, 0);
>>  }
>>
>> +static inline int
>> +check_sp(struct sp_ctx *sp, const uint8_t *nlp, uint32_t *sa_idx)
>> +{
>> +    uint32_t res;
>> +
>> +    if (unlikely(sp == NULL))
>> +            return 0;
>> +
>> +    rte_acl_classify((struct rte_acl_ctx *)sp, &nlp, &res, 1,
>> +                    DEFAULT_MAX_CATEGORIES);
>> +
>> +    if (unlikely(res == 0)) {
>> +            /* No match */
>> +            return 0;
>> +    }
>> +
>> +    if (res == DISCARD)
>> +            return 0;
>> +    else if (res == BYPASS) {
>> +            *sa_idx = 0;
>> +            return 1;
>> +    }
>> +
>> +    *sa_idx = SPI2IDX(res);
>> +    if (*sa_idx < IPSEC_SA_MAX_ENTRIES)
>> +            return 1;
>> +
>> +    /* Invalid SA IDX */
>> +    return 0;
>> +}
>> +
>> +static inline uint16_t
>> +route4_pkt(struct rte_mbuf *pkt, struct rt_ctx *rt_ctx)
>> +{
>> +    uint32_t dst_ip;
>> +    uint16_t offset;
>> +    uint32_t hop;
>> +    int ret;
>> +
>> +    offset = RTE_ETHER_HDR_LEN + offsetof(struct ip, ip_dst);
>> +    dst_ip = *rte_pktmbuf_mtod_offset(pkt, uint32_t *, offset);
>> +    dst_ip = rte_be_to_cpu_32(dst_ip);
>> +
>> +    ret = rte_lpm_lookup((struct rte_lpm *)rt_ctx, dst_ip, &hop);
>> +
>> +    if (ret == 0) {
>> +            /* We have a hit */
>> +            return hop;
>> +    }
>> +
>> +    /* else */
>> +    return RTE_MAX_ETHPORTS;
>> +}
>> +
>> +/* TODO: To be tested */
>> +static inline uint16_t
>> +route6_pkt(struct rte_mbuf *pkt, struct rt_ctx *rt_ctx)
>> +{
>> +    uint8_t dst_ip[16];
>> +    uint8_t *ip6_dst;
>> +    uint16_t offset;
>> +    uint32_t hop;
>> +    int ret;
>> +
>> +    offset = RTE_ETHER_HDR_LEN + offsetof(struct ip6_hdr, ip6_dst);
>> +    ip6_dst = rte_pktmbuf_mtod_offset(pkt, uint8_t *, offset);
>> +    memcpy(&dst_ip[0], ip6_dst, 16);
>> +
>> +    ret = rte_lpm6_lookup((struct rte_lpm6 *)rt_ctx, dst_ip, &hop);
>> +
>> +    if (ret == 0) {
>> +            /* We have a hit */
>> +            return hop;
>> +    }
>> +
>> +    /* else */
>> +    return RTE_MAX_ETHPORTS;
>> +}
>> +
>> +static inline uint16_t
>> +get_route(struct rte_mbuf *pkt, struct route_table *rt, enum pkt_type type)
>> +{
>> +    if (type == PKT_TYPE_PLAIN_IPV4 || type == PKT_TYPE_IPSEC_IPV4)
>> +            return route4_pkt(pkt, rt->rt4_ctx);
>> +    else if (type == PKT_TYPE_PLAIN_IPV6 || type == PKT_TYPE_IPSEC_IPV6)
>> +            return route6_pkt(pkt, rt->rt6_ctx);
>> +
>> +    return RTE_MAX_ETHPORTS;
>> +}
>> +
>> +static inline int
>> +process_ipsec_ev_inbound(struct ipsec_ctx *ctx, struct route_table *rt,
>> +            struct rte_event *ev)
>> +{
>> +    struct ipsec_sa *sa = NULL;
>> +    struct rte_mbuf *pkt;
>> +    uint16_t port_id = 0;
>> +    enum pkt_type type;
>> +    uint32_t sa_idx;
>> +    uint8_t *nlp;
>> +
>> +    /* Get pkt from event */
>> +    pkt = ev->mbuf;
>> +
>> +    /* Check the packet type */
>> +    type = process_ipsec_get_pkt_type(pkt, &nlp);
>> +
>> +    switch (type) {
>> +    case PKT_TYPE_PLAIN_IPV4:
>> +            if (pkt->ol_flags & PKT_RX_SEC_OFFLOAD)
>> +                    sa = (struct ipsec_sa *) pkt->udata64;
>> +
>> +            /* Check if we have a match */
>> +            if (check_sp(ctx->sp4_ctx, nlp, &sa_idx) == 0) {
>> +                    /* No valid match */
>> +                    goto drop_pkt_and_exit;
>> +            }
>> +            break;
>> +
>> +    case PKT_TYPE_PLAIN_IPV6:
>> +            if (pkt->ol_flags & PKT_RX_SEC_OFFLOAD)
>> +                    sa = (struct ipsec_sa *) pkt->udata64;
>> +
>> +            /* Check if we have a match */
>> +            if (check_sp(ctx->sp6_ctx, nlp, &sa_idx) == 0) {
>> +                    /* No valid match */
>> +                    goto drop_pkt_and_exit;
>> +            }
>> +            break;
>> +
>> +    default:
>> +            RTE_LOG(ERR, IPSEC, "Unsupported packet type = %d\n", type);
>> +            goto drop_pkt_and_exit;
>> +    }
>> +
>> +    /* Check if the packet has to be bypassed */
>> +    if (sa_idx == 0)
>> +            goto route_and_send_pkt;
>> +
>> +    /* Else the packet has to be protected with SA */
>> +
>> +    /* If the packet was IPsec processed, then SA pointer should be set */
>> +    if (sa == NULL)
>> +            goto drop_pkt_and_exit;
>> +
>> +    /* SPI on the packet should match with the one in SA */
>> +    if (unlikely(sa->spi != sa_idx))
>> +            goto drop_pkt_and_exit;
>> +
>> +route_and_send_pkt:
>> +    port_id = get_route(pkt, rt, type);
>> +    if (unlikely(port_id == RTE_MAX_ETHPORTS)) {
>> +            /* no match */
>> +            goto drop_pkt_and_exit;
>> +    }
>> +    /* else, we have a matching route */
>> +
>> +    /* Update mac addresses */
>> +    update_mac_addrs(pkt, port_id);
>> +
>> +    /* Update the event with the dest port */
>> +    ipsec_event_pre_forward(pkt, port_id);
>> +    return 1;
>> +
>> +drop_pkt_and_exit:
>> +    RTE_LOG(ERR, IPSEC, "Inbound packet dropped\n");
>> +    rte_pktmbuf_free(pkt);
>> +    ev->mbuf = NULL;
>> +    return 0;
>> +}
>> +
>>  /*
>>   * Event mode exposes various operating modes depending on the
>>   * capabilities of the event device and the operating mode
>> @@ -134,11 +345,11 @@ static void
>>  ipsec_wrkr_non_burst_int_port_app_mode_inb(struct eh_event_link_info *links,
>>              uint8_t nb_links)
>>  {
>> +    struct lcore_conf_ev_tx_int_port_wrkr lconf;
>>      unsigned int nb_rx = 0;
>> -    unsigned int port_id;
>> -    struct rte_mbuf *pkt;
>>      struct rte_event ev;
>>      uint32_t lcore_id;
>> +    int32_t socket_id;
>>
>>      /* Check if we have links registered for this lcore */
>>      if (nb_links == 0) {
>> @@ -151,6 +362,21 @@ ipsec_wrkr_non_burst_int_port_app_mode_inb(struct 
>> eh_event_link_info *links,
>>      /* Get core ID */
>>      lcore_id = rte_lcore_id();
>>
>> +    /* Get socket ID */
>> +    socket_id = rte_lcore_to_socket_id(lcore_id);
>> +
>> +    /* Save routing table */
>> +    lconf.rt.rt4_ctx = socket_ctx[socket_id].rt_ip4;
>> +    lconf.rt.rt6_ctx = socket_ctx[socket_id].rt_ip6;
>> +    lconf.inbound.sp4_ctx = socket_ctx[socket_id].sp_ip4_in;
>> +    lconf.inbound.sp6_ctx = socket_ctx[socket_id].sp_ip6_in;
>> +    lconf.inbound.sa_ctx = socket_ctx[socket_id].sa_in;
>> +    lconf.inbound.session_pool = socket_ctx[socket_id].session_pool;
>> +    lconf.outbound.sp4_ctx = socket_ctx[socket_id].sp_ip4_out;
>> +    lconf.outbound.sp6_ctx = socket_ctx[socket_id].sp_ip6_out;
>> +    lconf.outbound.sa_ctx = socket_ctx[socket_id].sa_out;
>> +    lconf.outbound.session_pool = socket_ctx[socket_id].session_pool;
>> +
>>      RTE_LOG(INFO, IPSEC,
>>              "Launching event mode worker (non-burst - Tx internal port - "
>>              "app mode - inbound) on lcore %d\n", lcore_id);
>> @@ -175,13 +401,11 @@ ipsec_wrkr_non_burst_int_port_app_mode_inb(struct 
>> eh_event_link_info *links,
>>              if (nb_rx == 0)
>>                      continue;
>>
>> -            port_id = ev.queue_id;
>> -            pkt = ev.mbuf;
>> -
>> -            rte_prefetch0(rte_pktmbuf_mtod(pkt, void *));
>> -
>> -            /* Process packet */
>> -            ipsec_event_pre_forward(pkt, port_id);
>> +            if (process_ipsec_ev_inbound(&lconf.inbound,
>> +                            &lconf.rt, &ev) != 1) {
>> +                    /* The pkt has been dropped */
>> +                    continue;
>> +            }
>>
>>              /*
>>               * Since tx internal port is available, events can be
>> diff --git a/examples/ipsec-secgw/ipsec_worker.h 
>> b/examples/ipsec-secgw/ipsec_worker.h
>> new file mode 100644
>> index 0000000..fd18a2e
>> --- /dev/null
>> +++ b/examples/ipsec-secgw/ipsec_worker.h
>> @@ -0,0 +1,39 @@
>> +/* SPDX-License-Identifier: BSD-3-Clause
>> + * Copyright(c) 2018 Cavium, Inc
>> + */
>> +#ifndef _IPSEC_WORKER_H_
>> +#define _IPSEC_WORKER_H_
>> +
>> +#include "ipsec.h"
>> +
>> +enum pkt_type {
>> +    PKT_TYPE_PLAIN_IPV4 = 1,
>> +    PKT_TYPE_IPSEC_IPV4,
>> +    PKT_TYPE_PLAIN_IPV6,
>> +    PKT_TYPE_IPSEC_IPV6,
>> +    PKT_TYPE_INVALID
>> +};
>> +
>> +struct route_table {
>> +    struct rt_ctx *rt4_ctx;
>> +    struct rt_ctx *rt6_ctx;
>> +};
>> +
>> +/*
>> + * Conf required by event mode worker with tx internal port
>> + */
>> +struct lcore_conf_ev_tx_int_port_wrkr {
>> +    struct ipsec_ctx inbound;
>> +    struct ipsec_ctx outbound;
>> +    struct route_table rt;
>> +} __rte_cache_aligned;
>> +
>> +/* TODO
>> + *
>> + * Move this function to ipsec_worker.c
>> + */
>> +void ipsec_poll_mode_worker(void);
>> +
>> +int ipsec_launch_one_lcore(void *args);
>> +
>> +#endif /* _IPSEC_WORKER_H_ */
>> diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
>> index 7f046e3..9e17ba0 100644
>> --- a/examples/ipsec-secgw/sa.c
>> +++ b/examples/ipsec-secgw/sa.c
>> @@ -772,17 +772,6 @@ print_one_sa_rule(const struct ipsec_sa *sa, int 
>> inbound)
>>      printf("\n");
>>  }
>>
>> -struct sa_ctx {
>> -    void *satbl; /* pointer to array of rte_ipsec_sa objects*/
>> -    struct ipsec_sa sa[IPSEC_SA_MAX_ENTRIES];
>> -    union {
>> -            struct {
>> -                    struct rte_crypto_sym_xform a;
>> -                    struct rte_crypto_sym_xform b;
>> -            };
>> -    } xf[IPSEC_SA_MAX_ENTRIES];
>> -};
>> -
>>  static struct sa_ctx *
>>  sa_create(const char *name, int32_t socket_id)
>>  {
>> --
>> 2.7.4
> 

Reply via email to