On 10/26/20 8:20 AM, Thomas Monjalon wrote:
> The device-specific metadata was stored in the deprecated field udata64.
> It is moved to a dynamic mbuf field in order to allow removal of udata64.
> 
> Signed-off-by: Thomas Monjalon <tho...@monjalon.net>

[snip]

> diff --git a/drivers/net/ixgbe/ixgbe_ipsec.c b/drivers/net/ixgbe/ixgbe_ipsec.c
> index 48f5082d49..0232db20ed 100644
> --- a/drivers/net/ixgbe/ixgbe_ipsec.c
> +++ b/drivers/net/ixgbe/ixgbe_ipsec.c
> @@ -484,7 +484,8 @@ ixgbe_crypto_update_mb(void *device __rte_unused,
>                       get_sec_session_private_data(session);
>       if (ic_session->op == IXGBE_OP_AUTHENTICATED_ENCRYPTION) {
>               union ixgbe_crypto_tx_desc_md *mdata =
> -                     (union ixgbe_crypto_tx_desc_md *)&m->udata64;
> +                     (union ixgbe_crypto_tx_desc_md *)
> +                     rte_security_dynfield(m);

IMHO alignment looks a bit confusing here, may be add one more
TAB?

>               mdata->enc = 1;
>               mdata->sa_idx = ic_session->sa_index;
>               mdata->pad_len = ixgbe_crypto_compute_pad_len(m);
> @@ -751,5 +752,7 @@ ixgbe_ipsec_ctx_create(struct rte_eth_dev *dev)
>                       return -ENOMEM;
>               }
>       }
> +     if (rte_security_dynfield_register() < 0)
> +             return -rte_errno;
>       return 0;
>  }

[snip]

> diff --git a/examples/ipsec-secgw/ipsec_worker.c 
> b/examples/ipsec-secgw/ipsec_worker.c
> index b6c851f257..72f698893d 100644
> --- a/examples/ipsec-secgw/ipsec_worker.c
> +++ b/examples/ipsec-secgw/ipsec_worker.c
> @@ -208,7 +208,8 @@ process_ipsec_ev_inbound(struct ipsec_ctx *ctx, struct 
> route_table *rt,
>                                       "Inbound security offload failed\n");
>                               goto drop_pkt_and_exit;
>                       }
> -                     sa = pkt->userdata;
> +                     sa = RTE_MBUF_DYNFIELD(pkt, security_dynfield_offset,
> +                                     struct ipsec_sa *);

I think it should be de-reference above, i.e.
sa = (struct ipsec_sa *)*RTE_MBUF_DYNFIELD(pkt,
security_dynfield_offset, RTE_SECURITY_DYNFIELD_TYPE *);
or just
sa = *RTE_MBUF_DYNFIELD(pkt, security_dynfield_offset, struct ipsec_sa **);

and why not rte_security_dynfield()?

It all looks very fragile. May be at least add
   RTE_BUILD_BUG_ON(sizeof(RTE_SECURITY_DYNFIELD_TYPE) ==
                    sizeof(ipsec_sa *));
and similar checks when an application or a library does
lookup for a dynamic field.

In general since lookup should not happen on data path,
may be lookup should return size of the field which must
be checked by the caller for consistency.

>               }
>  
>               /* Check if we have a match */
> @@ -226,7 +227,8 @@ process_ipsec_ev_inbound(struct ipsec_ctx *ctx, struct 
> route_table *rt,
>                                       "Inbound security offload failed\n");
>                               goto drop_pkt_and_exit;
>                       }
> -                     sa = pkt->userdata;
> +                     sa = RTE_MBUF_DYNFIELD(pkt, security_dynfield_offset,
> +                                     struct ipsec_sa *);

same

>               }
>  
>               /* Check if we have a match */
> @@ -357,7 +359,8 @@ process_ipsec_ev_outbound(struct ipsec_ctx *ctx, struct 
> route_table *rt,
>       }
>  
>       if (sess->security.ol_flags & RTE_SECURITY_TX_OLOAD_NEED_MDATA)
> -             pkt->userdata = sess->security.ses;
> +             *RTE_MBUF_DYNFIELD(pkt, security_dynfield_offset,
> +                     struct rte_security_session **) = sess->security.ses;

rte_security_dynfield() ?

Is it really different types of value in one example
application? It looks like it should be different
dynamic fields. Otherwise, I don't understand how
to work with it.

In fact may be above is out of scope of the patch series...

>  
>       /* Mark the packet for Tx security offload */
>       pkt->ol_flags |= PKT_TX_SEC_OFFLOAD;
> @@ -465,7 +468,9 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct 
> eh_event_link_info *links,
>                       }
>  
>                       /* Save security session */
> -                     pkt->userdata = sess_tbl[port_id];
> +                     *RTE_MBUF_DYNFIELD(pkt, security_dynfield_offset,
> +                                     struct rte_security_session **) =
> +                             sess_tbl[port_id];

rte_security_dynfield() ?

>  
>                       /* Mark the packet for Tx security offload */
>                       pkt->ol_flags |= PKT_TX_SEC_OFFLOAD;

[snip]

Reply via email to