DPDK patches and discussions
 help / color / mirror / Atom feed
From: Radu Nicolau <radu.nicolau@intel.com>
To: Akhil Goyal <gakhil@marvell.com>, "dev@dpdk.org" <dev@dpdk.org>
Cc: "kai.ji@intel.com" <kai.ji@intel.com>,
	Fan Zhang <fanzhang.oss@gmail.com>
Subject: Re: [EXTERNAL] [RFC] lib/cryptodev: update API documentation for aux_flags
Date: Tue, 23 Sep 2025 15:04:04 +0100	[thread overview]
Message-ID: <905bfd08-821d-49ea-bd66-e4ddd0969dde@intel.com> (raw)
In-Reply-To: <6157cf0d-4a9e-4f4d-9278-24dd0507ed77@intel.com>

Hi Akhil, I will take this RFC down, thanks for the feedback.


On 12-Sep-25 4:14 PM, Radu Nicolau wrote:
>
> On 12-Sep-25 3:56 PM, Akhil Goyal wrote:
>>> On 12-Sep-25 2:05 PM, Akhil Goyal wrote:
>>>> Hi Radu,
>>>>
>>>>> Update the API documentation description of rte_crypto_op field
>>>>> aux_flags as to allow PMDs to define driver-specific flags.
>>>> Can you give examples of the flags that you want to add for driver 
>>>> specific
>>> work?
>>>> I believe adding driver specific things here may not be good.
>>>> May be we can discuss the specific flags and define them as common 
>>>> for all
>>> PMDs.
>>>
>>> The flags we have in mind are very PMD specific i.e. controlling
>>> specific hardware behavior so they will not be suitable to be added to
>>> the common flags.
>>>
>>> Seeing that aux_flags are not that strongly defined and seeing that 
>>> they
>>> are already potentially used for PMD specific values my reasoning 
>>> was to
>>> formalize this possibility of usage
>>>
>>> aux_flags are used here to potentially carry a value that is not 
>>> covered
>>> in the common API aux_flags definitions:
>>>
>>> https://git.dpdk.org/dpdk/tree/drivers/crypto/cnxk/cn20k_cryptodev_ops.c#n857 
>>>
>>>
>> The aux flags that are currently defined are for soft expiry(out 
>> param) and TLS padding(in param).
>> These are not PMD specific and are defined as generic flags passed by 
>> application
>>   Or getting more info about the crypto operation such as soft expiry 
>> which is not an error
>> but will be useful for application to trigger rekeying in advance.
>>
>> In your case, these flags need to be exposed if application is 
>> required to set.
> The application is not required to set these flags, the RFC change 
> specifically states "optional auxiliary flags".
>> And we cannot define pmd specific flags in rte_crypto.h.
>> Please specify use case if it can be useful for other PMDs also and 
>> we can add another flag.
>>
>> For PMD specific flags, is it not possible for you to use mbuf 
>> dynamic fields if it is an IPsec case?
>> Or we can also explore to introduce dynfields in crypto_op.
> Yes, we can use dynfields and we can explore adding them to the crypto 
> op, but since we already have these flags we can make use of them.
>>
>> In above link, cop->aux_flags = res->uc_compcode;
>> is set to give debug information to application, as warning codes are 
>> not exposed in crypto_op status.
>> Application is not required to take any action based on the values 
>> other than the ones defined in rte_crypto.h.
> My proposal is very similar to this use case, just in the other 
> direction. The PMD is not required to take any action on the value of 
> aux_flags, and the application is not required to set anything.
>>
>> -Akhil

      parent reply	other threads:[~2025-09-23 14:04 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-27  9:43 Radu Nicolau
2025-09-12 13:05 ` [EXTERNAL] " Akhil Goyal
2025-09-12 14:01   ` Radu Nicolau
2025-09-12 14:56     ` Akhil Goyal
2025-09-12 15:14       ` Radu Nicolau
2025-09-12 17:08         ` Akhil Goyal
2025-09-23 14:04         ` Radu Nicolau [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=905bfd08-821d-49ea-bd66-e4ddd0969dde@intel.com \
    --to=radu.nicolau@intel.com \
    --cc=dev@dpdk.org \
    --cc=fanzhang.oss@gmail.com \
    --cc=gakhil@marvell.com \
    --cc=kai.ji@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).