Hi Nelio,

Agreed. Those can be addressed in other patches. I just wanted your opinion on how the present patch can be finalized keeping in mind the situations that we should address. And yeah, with the change in commit log, this should be enough.

Thanks,

Anoob


On 15-12-2017 22:23, Nelio Laranjeiro wrote:
Hi Anoob,

Seems you want to address a lot of stuff where is should be done in
a different series, please see below,

On Fri, Dec 15, 2017 at 09:09:00PM +0530, Anoob Joseph wrote:
Hi Nelio,


On 15-12-2017 19:23, Nelio Laranjeiro wrote:
Hi Anoob,

On Fri, Dec 15, 2017 at 02:35:12PM +0530, Anoob Joseph wrote:
Hi Nelio,

On 12/14/2017 08:44 PM, Nelio Laranjeiro wrote:
Add Egress flow create for devices supporting
RTE_SECURITY_TX_HW_TRAILER_OFFLOAD.

Signed-off-by: Nelio Laranjeiro <nelio.laranje...@6wind.com>
---
    examples/ipsec-secgw/ipsec.c | 8 ++++++++
    1 file changed, 8 insertions(+)

diff --git a/examples/ipsec-secgw/ipsec.c b/examples/ipsec-secgw/ipsec.c
index 8e8dc6df7..d49970ad8 100644
--- a/examples/ipsec-secgw/ipsec.c
+++ b/examples/ipsec-secgw/ipsec.c
@@ -201,6 +201,7 @@ create_session(struct ipsec_ctx *ipsec_ctx, struct ipsec_sa 
*sa)
                        sa->action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
                        sa->action[0].conf = sa->sec_session;
+                       sa->action[1].type = RTE_FLOW_ACTION_TYPE_END;
                        sa->attr.egress = (sa->direction ==
                                        RTE_SECURITY_IPSEC_SA_DIR_EGRESS);
@@ -253,6 +254,13 @@ create_session(struct ipsec_ctx *ipsec_ctx, struct 
ipsec_sa *sa)
                                                        &err);
                                if (ret)
                                        goto flow_create_failure;
+                       } else if (sa->attr.egress &&
+                                  (sa->ol_flags &
+                                   RTE_SECURITY_TX_HW_TRAILER_OFFLOAD)) {
If this flag is not set, the following code won't be executed, but it would
still try to create the flow.
Right, with actions Security + END as the original code.

And if the flow create fails in that case then create_session would fail.
Do you mean the original code is also wrong?
I would say it's not handling all the cases. Just like how we finalized the
ingress, egress might also need some work. Or may be we can retain the
original behavior with this patch and take up this issue separately.
It is better to not mix everything, the final work can be done after.

I would suggest moving the flow_create also into the block (for
ingress and egress). Or may be initialize the flow with
actions END+END+END, and add SECURITY+<RSS/QUEUE/PASSTHRU>+END as it hits
various conditions. I'm not sure what the flow_create would do for such an
action. This would look ugly in any case. See if you get any better ideas!
I think this comment is related to second patch where the
"sa->action[1].type = RTE_FLOW_ACTION_TYPE_END;" is wrongly removed.

Can you confirm before I send a new revision?
No. I was suggesting an alternate algorithm to handle the situation when
egress may/may not create flow while ingress would need flow by default.
What I suggested is something like this,
The default behavior of this function for
RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO is to call a flow in both side
Ingress and Egress.  Default behavior coded in main repository in this
file [1].

This series is only adding final actions to respect the generic flow
API.

sa->action[0].type = RTE_FLOW_ACTION_TYPE_END;
sa->action[1].type = RTE_FLOW_ACTION_TYPE_END;
sa->action[2].type = RTE_FLOW_ACTION_TYPE_END;
An END is final independently of what is after, as the extra actions are
only handled in their respective if branches, no need to initialize
everything to END.

if (ingress) {
     sa->action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
     ...
} else if (egress && FLAG_ENABLED) {
     sa->action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
     ...
}

flow_create();

On second thought, this may not work well. Another suggestion is,

if (ingress) {
     sa->action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
     ...
     flow_create();
} else if (egress && FLAG_ENABLED) {
     sa->action[0].type = RTE_FLOW_ACTION_TYPE_SECURITY;
     ...
     flow_create();
}
// Here if flow_create fails, create_session should fail.
// Either flow or metadata flag is required
if (sa->flow == NULL && !(NEEDS_METADATA)) {
     return -1;
}
This patch scope is done to respect generic flow API calls for
RTE_SECURITY_TX_HW_TRAILER_OFFLOAD devices as written in the commit log.
For RTE_SECURITY_TX_OLOAD_NEED_MDATA devices, it should be handled in a
separate patch/series, the default behavior is maintained for them.

+                                       sa->action[1].type =
+                                               RTE_FLOW_ACTION_TYPE_PASSTHRU;
+                                       sa->action[2].type =
+                                               RTE_FLOW_ACTION_TYPE_END;
                        }
    flow_create:
                        sa->flow = rte_flow_create(sa->portid,
Thanks,

Thanks,

[1] https://dpdk.org/browse/dpdk/tree/examples/ipsec-secgw/ipsec.c#n132


Reply via email to