Hi Qi,
>
> Hi Konstantin and Awal:
>
> I have couple questions for this patch.
> please forgive me if they are obvious, since I don't have much insight
> on IPsec, but I may work on related stuff in future :)
>
> > +static inline int32_t
> > +esp_outb_tun_pkt_prepare(struct rte_ipsec_sa *sa, rte_be64_t sqc,
> > + const uint64_t ivp[IPSEC_MAX_IV_QWORD], struct rte_mbuf *mb,
> > + union sym_op_data *icv)
> > +{
> > + uint32_t clen, hlen, pdlen, pdofs, tlen;
> > + struct rte_mbuf *ml;
> > + struct esp_hdr *esph;
> > + struct esp_tail *espt;
> > + char *ph, *pt;
> > + uint64_t *iv;
> > +
> > + /* calculate extra header space required */
> > + hlen = sa->hdr_len + sa->iv_len + sizeof(*esph);
> > +
> > + /* number of bytes to encrypt */
> > + clen = mb->pkt_len + sizeof(*espt);
> > + clen = RTE_ALIGN_CEIL(clen, sa->pad_align);
> > +
> > + /* pad length + esp tail */
> > + pdlen = clen - mb->pkt_len;
> > + tlen = pdlen + sa->icv_len;
> > +
> > + /* do append and prepend */
> > + ml = rte_pktmbuf_lastseg(mb);
> > + if (tlen + sa->sqh_len + sa->aad_len > rte_pktmbuf_tailroom(ml))
> > + return -ENOSPC;
> > +
> > + /* prepend header */
> > + ph = rte_pktmbuf_prepend(mb, hlen);
> > + if (ph == NULL)
> > + return -ENOSPC;
> > +
> > + /* append tail */
> > + pdofs = ml->data_len;
> > + ml->data_len += tlen;
> > + mb->pkt_len += tlen;
> > + pt = rte_pktmbuf_mtod_offset(ml, typeof(pt), pdofs);
> > +
> > + /* update pkt l2/l3 len */
> > + mb->l2_len = sa->hdr_l3_off;
> > + mb->l3_len = sa->hdr_len - sa->hdr_l3_off;
> > +
> > + /* copy tunnel pkt header */
> > + rte_memcpy(ph, sa->hdr, sa->hdr_len);
>
> I didn't get this, my understand is:
>
> for tunnel mode if an original packet is
>
> Eth + IP + UDP/TCP + data,
It is assumed that input mbuf doesn't contain L2 header already (only
L3/L4/...)
That's why we don't shift L2 header.
Probably have to put that into public API comments.
>
> after encap, it should become
>
> Eth + encap header (IP or IP + UDP) + ESP Header + IP + UDP/TCP + Data
> + ESP Tailer...
>
> So after rte_pktmbuf_prepend shouldn't we do below
>
> 1) shift L2 HEAD (Eth) ahead
> 2) copy encap header and ESP header to the hole.
> ?
>
> But now we just copy the sa->hdr on the pre-pend space directly? What is the
> sa->hdr supposed to be?
Optional L2 header and new L3 header.
> but no matter what is it, we encap
> everything before the packet?
> BTW, is UDP encapsulation also be considered here?
Right now - no.
Might be later, if there would be a request for it.
>, I didn't figure out how a IP + UDP header should be configured with sa->hdr
>, sa-
> >hdr_l3_off, sa->hdr_len for this case
>
> > +static inline int
> > +esp_inb_tun_single_pkt_process(struct rte_ipsec_sa *sa, struct rte_mbuf
> > *mb,
> > + uint32_t *sqn)
> > +{
> > + uint32_t hlen, icv_len, tlen;
> > + struct esp_hdr *esph;
> > + struct esp_tail *espt;
> > + struct rte_mbuf *ml;
> > + char *pd;
> > +
> > + if (mb->ol_flags & PKT_RX_SEC_OFFLOAD_FAILED)
> > + return -EBADMSG;
> > +
> > + icv_len = sa->icv_len;
> > +
> > + ml = rte_pktmbuf_lastseg(mb);
> > + espt = rte_pktmbuf_mtod_offset(ml, struct esp_tail *,
> > + ml->data_len - icv_len - sizeof(*espt));
>
> What kind of mechanism is to guarantee that last segment will always cover
> the esp tail?( data_len >= icv_len + sizeof (*espt))
> Is that possible the esp tail be split into multi-segment for jumbo frames
> caes?
It is possible, though right now we don't support such cases.
Right now it is up to the caller to make sure last segment contains espt+icv
(plus enough free space for AAD, ESN.hi, etc.).
Plan to add proper multi-seg support later (most likely 19.05).
Konstantin