From: Nithin Dabilpuram <ndabilpu...@marvell.com>

Align event mode path for Tx inline IPsec processing to adhere to
security spec. Call rte_security_set_pkt_metadata() only with
mbuf containing L3 header and above. Also update mbuf.l2_len
with L2 header size.

This patch also fixes a bug in arg parsing.

Signed-off-by: Nithin Dabilpuram <ndabilpu...@marvell.com>
Reviewed-by: Akhil Goyal <gak...@marvell.com>
---
 examples/ipsec-secgw/ipsec-secgw.c  |  2 ++
 examples/ipsec-secgw/ipsec_worker.c | 50 +++++++++++++++++++++--------
 2 files changed, 38 insertions(+), 14 deletions(-)

diff --git a/examples/ipsec-secgw/ipsec-secgw.c 
b/examples/ipsec-secgw/ipsec-secgw.c
index f252d3498..7ad94cb82 100644
--- a/examples/ipsec-secgw/ipsec-secgw.c
+++ b/examples/ipsec-secgw/ipsec-secgw.c
@@ -1495,6 +1495,8 @@ parse_portmask(const char *portmask)
        char *end = NULL;
        unsigned long pm;
 
+       errno = 0;
+
        /* parse hexadecimal string */
        pm = strtoul(portmask, &end, 16);
        if ((portmask[0] == '\0') || (end == NULL) || (*end != '\0'))
diff --git a/examples/ipsec-secgw/ipsec_worker.c 
b/examples/ipsec-secgw/ipsec_worker.c
index 647e22df5..401fd6186 100644
--- a/examples/ipsec-secgw/ipsec_worker.c
+++ b/examples/ipsec-secgw/ipsec_worker.c
@@ -12,6 +12,11 @@
 #include "ipsec-secgw.h"
 #include "ipsec_worker.h"
 
+struct port_drv_mode_data {
+       struct rte_security_session *sess;
+       struct rte_security_ctx *ctx;
+};
+
 static inline enum pkt_type
 process_ipsec_get_pkt_type(struct rte_mbuf *pkt, uint8_t **nlp)
 {
@@ -43,6 +48,8 @@ update_mac_addrs(struct rte_mbuf *pkt, uint16_t portid)
 {
        struct rte_ether_hdr *ethhdr;
 
+       pkt->l2_len = RTE_ETHER_HDR_LEN;
+
        ethhdr = rte_pktmbuf_mtod(pkt, struct rte_ether_hdr *);
        memcpy(&ethhdr->s_addr, &ethaddr_tbl[portid].src, RTE_ETHER_ADDR_LEN);
        memcpy(&ethhdr->d_addr, &ethaddr_tbl[portid].dst, RTE_ETHER_ADDR_LEN);
@@ -60,7 +67,8 @@ ipsec_event_pre_forward(struct rte_mbuf *m, unsigned int 
port_id)
 
 static inline void
 prepare_out_sessions_tbl(struct sa_ctx *sa_out,
-               struct rte_security_session **sess_tbl, uint16_t size)
+                        struct port_drv_mode_data *data,
+                        uint16_t size)
 {
        struct rte_ipsec_session *pri_sess;
        struct ipsec_sa *sa;
@@ -95,9 +103,10 @@ prepare_out_sessions_tbl(struct sa_ctx *sa_out,
                }
 
                /* Use only first inline session found for a given port */
-               if (sess_tbl[sa->portid])
+               if (data[sa->portid].sess)
                        continue;
-               sess_tbl[sa->portid] = pri_sess->security.ses;
+               data[sa->portid].sess = pri_sess->security.ses;
+               data[sa->portid].ctx = pri_sess->security.ctx;
        }
 }
 
@@ -356,9 +365,11 @@ process_ipsec_ev_outbound(struct ipsec_ctx *ctx, struct 
route_table *rt,
                goto drop_pkt_and_exit;
        }
 
-       if (sess->security.ol_flags & RTE_SECURITY_TX_OLOAD_NEED_MDATA)
-               *(struct rte_security_session **)rte_security_dynfield(pkt) =
-                               sess->security.ses;
+       /* Remove L2 header before metadata set */
+       rte_pktmbuf_adj(pkt, RTE_ETHER_HDR_LEN);
+
+       rte_security_set_pkt_metadata(sess->security.ctx,
+                                     sess->security.ses, pkt, NULL);
 
        /* Mark the packet for Tx security offload */
        pkt->ol_flags |= PKT_TX_SEC_OFFLOAD;
@@ -366,6 +377,9 @@ process_ipsec_ev_outbound(struct ipsec_ctx *ctx, struct 
route_table *rt,
        /* Get the port to which this pkt need to be submitted */
        port_id = sa->portid;
 
+       /* Add L2 header for processing */
+       rte_pktmbuf_prepend(pkt, RTE_ETHER_HDR_LEN);
+
 send_pkt:
        /* Update mac addresses */
        update_mac_addrs(pkt, port_id);
@@ -398,7 +412,7 @@ static void
 ipsec_wrkr_non_burst_int_port_drv_mode(struct eh_event_link_info *links,
                uint8_t nb_links)
 {
-       struct rte_security_session *sess_tbl[RTE_MAX_ETHPORTS] = { NULL };
+       struct port_drv_mode_data data[RTE_MAX_ETHPORTS];
        unsigned int nb_rx = 0;
        struct rte_mbuf *pkt;
        struct rte_event ev;
@@ -412,6 +426,8 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct 
eh_event_link_info *links,
                return;
        }
 
+       memset(&data, 0, sizeof(struct port_drv_mode_data));
+
        /* Get core ID */
        lcore_id = rte_lcore_id();
 
@@ -422,8 +438,8 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct 
eh_event_link_info *links,
         * Prepare security sessions table. In outbound driver mode
         * we always use first session configured for a given port
         */
-       prepare_out_sessions_tbl(socket_ctx[socket_id].sa_out, sess_tbl,
-                       RTE_MAX_ETHPORTS);
+       prepare_out_sessions_tbl(socket_ctx[socket_id].sa_out, data,
+                                RTE_MAX_ETHPORTS);
 
        RTE_LOG(INFO, IPSEC,
                "Launching event mode worker (non-burst - Tx internal port - "
@@ -460,19 +476,25 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct 
eh_event_link_info *links,
 
                if (!is_unprotected_port(port_id)) {
 
-                       if (unlikely(!sess_tbl[port_id])) {
+                       if (unlikely(!data[port_id].sess)) {
                                rte_pktmbuf_free(pkt);
                                continue;
                        }
 
+                       /* Remove L2 header before metadata set */
+                       rte_pktmbuf_adj(pkt, RTE_ETHER_HDR_LEN);
+
                        /* Save security session */
-                       if (rte_security_dynfield_is_registered())
-                               *(struct rte_security_session **)
-                                       rte_security_dynfield(pkt) =
-                                               sess_tbl[port_id];
+                       rte_security_set_pkt_metadata(data[port_id].ctx,
+                                                     data[port_id].sess, pkt,
+                                                     NULL);
 
                        /* Mark the packet for Tx security offload */
                        pkt->ol_flags |= PKT_TX_SEC_OFFLOAD;
+
+                       /* Add L2 header for processing */
+                       rte_pktmbuf_prepend(pkt, RTE_ETHER_HDR_LEN);
+                       pkt->l2_len = RTE_ETHER_HDR_LEN;
                }
 
                /*
-- 
2.25.1

Reply via email to