> Update mbuf.l2_len with L2 header size for outbound > inline processing. > > This patch also fixes a bug in arg parsing. > > Signed-off-by: Nithin Dabilpuram <ndabilpu...@marvell.com> > Acked-by: Akhil Goyal <gak...@marvell.com> > --- > examples/ipsec-secgw/ipsec-secgw.c | 2 ++ > examples/ipsec-secgw/ipsec_worker.c | 41 > ++++++++++++++++++++++++------------- > 2 files changed, 29 insertions(+), 14 deletions(-) > > diff --git a/examples/ipsec-secgw/ipsec-secgw.c > b/examples/ipsec-secgw/ipsec-secgw.c > index f252d34..7ad94cb 100644 > --- a/examples/ipsec-secgw/ipsec-secgw.c > +++ b/examples/ipsec-secgw/ipsec-secgw.c > @@ -1495,6 +1495,8 @@ parse_portmask(const char *portmask) > char *end = NULL; > unsigned long pm; > > + errno = 0; > + > /* parse hexadecimal string */ > pm = strtoul(portmask, &end, 16); > if ((portmask[0] == '\0') || (end == NULL) || (*end != '\0')) > diff --git a/examples/ipsec-secgw/ipsec_worker.c > b/examples/ipsec-secgw/ipsec_worker.c > index 647e22d..c545497 100644 > --- a/examples/ipsec-secgw/ipsec_worker.c > +++ b/examples/ipsec-secgw/ipsec_worker.c > @@ -12,6 +12,11 @@ > #include "ipsec-secgw.h" > #include "ipsec_worker.h" > > +struct port_drv_mode_data { > + struct rte_security_session *sess; > + struct rte_security_ctx *ctx; > +}; > + > static inline enum pkt_type > process_ipsec_get_pkt_type(struct rte_mbuf *pkt, uint8_t **nlp) > { > @@ -60,7 +65,8 @@ ipsec_event_pre_forward(struct rte_mbuf *m, unsigned int > port_id) > > static inline void > prepare_out_sessions_tbl(struct sa_ctx *sa_out, > - struct rte_security_session **sess_tbl, uint16_t size) > + struct port_drv_mode_data *data, > + uint16_t size) > { > struct rte_ipsec_session *pri_sess; > struct ipsec_sa *sa; > @@ -95,9 +101,10 @@ prepare_out_sessions_tbl(struct sa_ctx *sa_out, > } > > /* Use only first inline session found for a given port */ > - if (sess_tbl[sa->portid]) > + if (data[sa->portid].sess) > continue; > - sess_tbl[sa->portid] = pri_sess->security.ses; > + data[sa->portid].sess = pri_sess->security.ses; > + data[sa->portid].ctx = pri_sess->security.ctx; > } > } > > @@ -356,9 +363,8 @@ process_ipsec_ev_outbound(struct ipsec_ctx *ctx, struct > route_table *rt, > goto drop_pkt_and_exit; > } > > - if (sess->security.ol_flags & RTE_SECURITY_TX_OLOAD_NEED_MDATA) > - *(struct rte_security_session **)rte_security_dynfield(pkt) = > - sess->security.ses; > + rte_security_set_pkt_metadata(sess->security.ctx, > + sess->security.ses, pkt, NULL); > > /* Mark the packet for Tx security offload */ > pkt->ol_flags |= PKT_TX_SEC_OFFLOAD; > @@ -367,6 +373,9 @@ process_ipsec_ev_outbound(struct ipsec_ctx *ctx, struct > route_table *rt, > port_id = sa->portid; > > send_pkt: > + /* Provide L2 len for Outbound processing */ > + pkt->l2_len = RTE_ETHER_HDR_LEN; > + > /* Update mac addresses */ > update_mac_addrs(pkt, port_id); > > @@ -398,7 +407,7 @@ static void > ipsec_wrkr_non_burst_int_port_drv_mode(struct eh_event_link_info *links, > uint8_t nb_links) > { > - struct rte_security_session *sess_tbl[RTE_MAX_ETHPORTS] = { NULL }; > + struct port_drv_mode_data data[RTE_MAX_ETHPORTS]; > unsigned int nb_rx = 0; > struct rte_mbuf *pkt; > struct rte_event ev; > @@ -412,6 +421,8 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct > eh_event_link_info *links, > return; > } > > + memset(&data, 0, sizeof(struct port_drv_mode_data)); > + > /* Get core ID */ > lcore_id = rte_lcore_id(); > > @@ -422,8 +433,8 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct > eh_event_link_info *links, > * Prepare security sessions table. In outbound driver mode > * we always use first session configured for a given port > */ > - prepare_out_sessions_tbl(socket_ctx[socket_id].sa_out, sess_tbl, > - RTE_MAX_ETHPORTS); > + prepare_out_sessions_tbl(socket_ctx[socket_id].sa_out, data, > + RTE_MAX_ETHPORTS); > > RTE_LOG(INFO, IPSEC, > "Launching event mode worker (non-burst - Tx internal port - " > @@ -460,19 +471,21 @@ ipsec_wrkr_non_burst_int_port_drv_mode(struct > eh_event_link_info *links, > > if (!is_unprotected_port(port_id)) { > > - if (unlikely(!sess_tbl[port_id])) { > + if (unlikely(!data[port_id].sess)) { > rte_pktmbuf_free(pkt); > continue; > } > > /* Save security session */ > - if (rte_security_dynfield_is_registered()) > - *(struct rte_security_session **) > - rte_security_dynfield(pkt) = > - sess_tbl[port_id]; > + rte_security_set_pkt_metadata(data[port_id].ctx, > + data[port_id].sess, pkt, > + NULL); > > /* Mark the packet for Tx security offload */ > pkt->ol_flags |= PKT_TX_SEC_OFFLOAD; > + > + /* Provide L2 len for Outbound processing */ > + pkt->l2_len = RTE_ETHER_HDR_LEN; > } > > /* > --
Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com> > 2.8.4