From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id AFB7F45610 for ; Fri, 12 Jul 2024 12:51:55 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A831D42EEB; Fri, 12 Jul 2024 12:51:55 +0200 (CEST) Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2054.outbound.protection.outlook.com [40.107.236.54]) by mails.dpdk.org (Postfix) with ESMTP id C0A7242F0C for ; Fri, 12 Jul 2024 12:51:53 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cAx2Czk13g3+ireRR+Qnspv1+e5BHRvfMXUUdUu8KpvDlsUoZD8ziAQt0LgAPGeEunv9l/ee1rtiV28FCd4OuvxQD9o6kNTXWcBFuasoiaXzI7vdhYMrkMa8NVFP6IhkzZtK2wTWm/AMBw7FT7Icogzo0swjffk3EIkv/2m+iog2AeXLSglC2jgyX89hXX6HmRpT238RaOSqrzVH493ys89pdLwihHGcnnhumXeQlTfyk1cmSZuyWFQy8/vEoAn/QGukhxGV7puGhX9WfON20Vx8Bus/VsaFznvsdppwwMv4K/ZLSTZXn05mW6D3KcMPXouo67KoIIZndRVoCruX8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WX5IHWsv/GvVQxBi2Z4pgJIQKI8fgszg48YFR/kfERE=; b=W0H68/NsPLvj7jRQ/j2JZ1i8pgxXBN44gSYHaGHWjgW4iR4HSO+rD2XwZMrBy2zhL0r71DVpO0iSnFr126ic+1aIfSH3hwtF/BFSFjcVSqhvUG5UyiXvdJFwkg+DyOXhEgI3/36fbEBIa7ATP74mh2agtaRw1Re8i0IDOTvpZBMrnVdsyqjgR02rS6TZcs4YvgCqaTwGUwc47Ru4rsn4rxMc4bjYnsvM+3Kl6tDlGXTohg9KL7gGp0Ha16ENgEfWqBooomH1y7qBAl2UiIzh4FJQOXkdO/VH2OzovsAdusYJ9ubaMKWt1HBmFhCkEtpTVPeA+EZ+SOdiNAjhmCbNpw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=intel.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WX5IHWsv/GvVQxBi2Z4pgJIQKI8fgszg48YFR/kfERE=; b=sOhkzryG/3IwMJubUh5V4b5EfBXDGHtH5XBX7HWKdXsR/qIo1kJypy9OSpdg9sirLL7a3BeZEqjua+g6B22naQNloDohjtWYb40MwdlZwsyWF/xpWUsqt2dMSW3GiDVcdmaDb6l6cziUcQx3MpIws/oasvj2M4rmonvf35AXULxAjFofS0JNw8X3WMwz0ujff6ndKOKFVEMH74lfu4zGaqsaZbZn4Rz0gV73HPIkiVk4dNi6aqtuR23v55SKXV8HPYZy4dgRRUdMZn/Ns+t9bIKrGo/NTE6NyH1vXxw5mt/vZAiFq9UBWAfwyN7jAqeMTNsLV4ZxIA3Yl79yUhkMIA== Received: from BYAPR21CA0012.namprd21.prod.outlook.com (2603:10b6:a03:114::22) by DS0PR12MB8527.namprd12.prod.outlook.com (2603:10b6:8:161::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.34; Fri, 12 Jul 2024 10:51:48 +0000 Received: from SJ5PEPF000001D1.namprd05.prod.outlook.com (2603:10b6:a03:114:cafe::1b) by BYAPR21CA0012.outlook.office365.com (2603:10b6:a03:114::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.6 via Frontend Transport; Fri, 12 Jul 2024 10:51:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by SJ5PEPF000001D1.mail.protection.outlook.com (10.167.242.53) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.17 via Frontend Transport; Fri, 12 Jul 2024 10:51:47 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 12 Jul 2024 03:51:32 -0700 Received: from nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 12 Jul 2024 03:51:30 -0700 From: Xueming Li To: Ganapati Kundapura CC: Abhinandan Gujjar , dpdk stable Subject: patch 'eventdev/crypto: fix opaque field handling' has been queued to stable release 23.11.2 Date: Fri, 12 Jul 2024 18:44:45 +0800 Message-ID: <20240712104528.308638-60-xuemingl@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240712104528.308638-1-xuemingl@nvidia.com> References: <20240712104528.308638-1-xuemingl@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF000001D1:EE_|DS0PR12MB8527:EE_ X-MS-Office365-Filtering-Correlation-Id: 1d4dc3ba-c09c-44fd-d098-08dca260a0ca X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|1800799024|36860700013|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?3SVcyZscXW9vY3CdE0jF4WIEQdtzUVUUf6cnBrzouusrmSEeUL8dmabRY1Jb?= =?us-ascii?Q?dw2GON3+K5ttUBmUId+7ohi8hJS9TsGboJDDS5MUyfrSNBl092jjI6tKaJBi?= =?us-ascii?Q?1/o9V6GebzLi9euagHBc2022P7N8rq//c3ypPRMzvOQw9CYSHblJOMuHZPKF?= =?us-ascii?Q?veM4kXAUef+Dfca2ZQtpRpjMBNg+ZMpgZ17E7+jJ5nsoIIwWO7hKT4TS8zTq?= =?us-ascii?Q?1A6AsNeaKjAQinlFRd7WTrnb9F93k7duJuMmEnKLT1vctlsHAZbA6aDfDhix?= =?us-ascii?Q?91L5ZQ3Euom7tZgHLFtGO3oYKqc7c78H7T4yEbiltEI6UbCDVIxKTWkKoNUN?= =?us-ascii?Q?4iFM+3FB1L7rviJBBMoOV6oJrcbKTzXmhN0KU+NS7868o+qgQe1hufwp0oWI?= =?us-ascii?Q?lytIyx0v0bkx5aBTF/+CS6KoQvnVR5VSGnP5U9RYKtyE51wyDZa/9AgYhF71?= =?us-ascii?Q?USFvUxbTrqy86F4mTnWiXZVej1KY1ot13DlJZ34EACjPjkft3HIxwLyCNP68?= =?us-ascii?Q?tDouvdAawP8Uuj3/TerITYttxQtulV3F+jJTYeEdeICsg/NIbz7D5tiYEKPg?= =?us-ascii?Q?Vy3sU+ZgIO4HP9pwQWYJ3wIBkl4w+htHNH0A2WYWgI6HKYDvG6pz/a7RxV+j?= =?us-ascii?Q?8Hic9f/NIw6ezqAWgsVD4W64FnuE4rSh/rV9qPyEOpyMSjsl8vm6t4NVaBye?= =?us-ascii?Q?thjOEB8gOnwJ+3bx7g5sXh745Yfm+f15Yl1DSpEKYxtAVnSBhBUg1GtISBOV?= =?us-ascii?Q?TQfRQwVvvQ5ZMPJLkBwCI1ohuSH8Hq2rIsCkHv/uQceJ4QiJFC165jrp8A7W?= =?us-ascii?Q?xxmRlifNRuFdxwriUBE/ljcixnK5oqNqcNQoj8MqbrkQQBVWsykIqSWOEpzI?= =?us-ascii?Q?Re2JzJppfJDSd0bIK+1wy5DT5/gTgWn/R6QU19Rujl2xAnVZ0YhJBZMgIsbb?= =?us-ascii?Q?MpPTbxFhFZvaQ+YALacg1f6RisiEL7mUKIBdFBY2y33qrsJtmLkJWk1kvKls?= =?us-ascii?Q?PjNIqyGL5e1mk89Wf9OWMzXCziICBH/1oteXO1YtaJHi5m+u7IpFAhN6f67x?= =?us-ascii?Q?J+lEfAIeTNS8wYOD2nSvdfsO+Gs2hIcu7h+5j28CHO9GJNJlinNffwo2bQxc?= =?us-ascii?Q?tROXcKti7Tpu3zKmylQQ4RsYv9V4z4n8euBifbOI0PFDRM9XPDGz+9WHHbiP?= =?us-ascii?Q?iRowpRfP3+dRGlyvknwGByly30TaYSi37WJWoUYQqhBaw7KPUIXG+d4+zO62?= =?us-ascii?Q?xC/4qZ/yqaZpSApiJP4j5YVcIJZse8271RxmEruWsqkXCus4EpLCSDcyraSe?= =?us-ascii?Q?/EGwSb4WGssmNwYXlDaMm9grCQFJ87i7FphuQNONhdbTgcsZa9jbiggIi+s5?= =?us-ascii?Q?Tgu3YhPU5e8MCWdkq8Aw86IrvEwuz+ImP6DVbWA65wGK5xvMJfQDRtmFDcwU?= =?us-ascii?Q?lKsMc0Q/xyUIoAoi4xp9PUQTR92b8dLW?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(1800799024)(36860700013)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jul 2024 10:51:47.7505 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1d4dc3ba-c09c-44fd-d098-08dca260a0ca X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF000001D1.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB8527 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 23.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 07/14/24. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://git.dpdk.org/dpdk-stable/log/?h=23.11-staging This queued commit can be viewed at: https://git.dpdk.org/dpdk-stable/commit/?h=23.11-staging&id=706a8e4cee38fe3664f77ab14febbfbd192a464a Thanks. Xueming Li --- >From 706a8e4cee38fe3664f77ab14febbfbd192a464a Mon Sep 17 00:00:00 2001 From: Ganapati Kundapura Date: Thu, 6 Jun 2024 08:48:00 -0500 Subject: [PATCH] eventdev/crypto: fix opaque field handling Cc: Xueming Li [ upstream commit ad12d08f05db8323ac1fb655b75dcef69e536a04 ] For session-less crypto operations, event info is contained in crypto op metadata for each event which is restored in event from the crypto op metadata response info. For session based crypto operations, crypto op contains per session based event info in crypto op metadata. If any PMD passes any implementation specific data in "struct rte_event::impl_opaque" on each event, it's not getting restored. This patch stores "struct rte_event::impl_opaque" in mbuf dynamic field before enqueueing to cryptodev and restores "struct rte_event::impl_opaque" from mbuf dynamic field after dequeueing crypto op from cryptodev for session based crypto operations. Fixes: 7901eac3409a ("eventdev: add crypto adapter implementation") Signed-off-by: Ganapati Kundapura Acked-by: Abhinandan Gujjar --- lib/eventdev/rte_event_crypto_adapter.c | 68 +++++++++++++++++++++++++ 1 file changed, 68 insertions(+) diff --git a/lib/eventdev/rte_event_crypto_adapter.c b/lib/eventdev/rte_event_crypto_adapter.c index 9903f96695..d11c0d4be8 100644 --- a/lib/eventdev/rte_event_crypto_adapter.c +++ b/lib/eventdev/rte_event_crypto_adapter.c @@ -138,6 +138,28 @@ static struct event_crypto_adapter **event_crypto_adapter; } \ } while (0) +#define ECA_DYNFIELD_NAME "eca_ev_opaque_data" +/* Device-specific metadata field type */ +typedef uint8_t eca_dynfield_t; + +/* mbuf dynamic field offset for device-specific metadata */ +int eca_dynfield_offset = -1; + +static int +eca_dynfield_register(void) +{ + static const struct rte_mbuf_dynfield eca_dynfield_desc = { + .name = ECA_DYNFIELD_NAME, + .size = sizeof(eca_dynfield_t), + .align = __alignof__(eca_dynfield_t), + .flags = 0, + }; + + eca_dynfield_offset = + rte_mbuf_dynfield_register(&eca_dynfield_desc); + return eca_dynfield_offset; +} + static inline int eca_valid_id(uint8_t id) { @@ -491,6 +513,25 @@ eca_enq_to_cryptodev(struct event_crypto_adapter *adapter, struct rte_event *ev, crypto_op = ev[i].event_ptr; if (crypto_op == NULL) continue; + + /** "struct rte_event::impl_opaque" field passed on from + * eventdev PMD could have different value per event. + * For session-based crypto operations retain + * "struct rte_event::impl_opaque" into mbuf dynamic field and + * restore it back after copying event information from + * session event metadata. + * For session-less, each crypto operation carries event + * metadata and retains "struct rte_event:impl_opaque" + * information to be passed back to eventdev PMD. + */ + if (crypto_op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) { + struct rte_mbuf *mbuf = crypto_op->sym->m_src; + + *RTE_MBUF_DYNFIELD(mbuf, + eca_dynfield_offset, + eca_dynfield_t *) = ev[i].impl_opaque; + } + m_data = rte_cryptodev_session_event_mdata_get(crypto_op); if (m_data == NULL) { rte_pktmbuf_free(crypto_op->sym->m_src); @@ -657,6 +698,21 @@ eca_ops_enqueue_burst(struct event_crypto_adapter *adapter, rte_memcpy(ev, &m_data->response_info, sizeof(*ev)); ev->event_ptr = ops[i]; + + /** Restore "struct rte_event::impl_opaque" from mbuf + * dynamic field for session based crypto operation. + * For session-less, each crypto operations carries event + * metadata and retains "struct rte_event::impl_opaque" + * information to be passed back to eventdev PMD. + */ + if (ops[i]->sess_type == RTE_CRYPTO_OP_WITH_SESSION) { + struct rte_mbuf *mbuf = ops[i]->sym->m_src; + + ev->impl_opaque = *RTE_MBUF_DYNFIELD(mbuf, + eca_dynfield_offset, + eca_dynfield_t *); + } + ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; if (adapter->implicit_release_disabled) ev->op = RTE_EVENT_OP_FORWARD; @@ -895,6 +951,18 @@ eca_init_service(struct event_crypto_adapter *adapter, uint8_t id) } adapter->implicit_release_disabled = (uint8_t)impl_rel; + + /** Register for mbuf dyn field to store/restore + * "struct rte_event::impl_opaque" + */ + eca_dynfield_offset = eca_dynfield_register(); + if (eca_dynfield_offset < 0) { + RTE_EDEV_LOG_ERR("Failed to register eca mbuf dyn field"); + eca_circular_buffer_free(&adapter->ebuf); + rte_free(adapter); + return -EINVAL; + } + adapter->service_inited = 1; return ret; -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2024-07-12 18:40:16.867911195 +0800 +++ 0059-eventdev-crypto-fix-opaque-field-handling.patch 2024-07-12 18:40:14.116594226 +0800 @@ -1 +1 @@ -From ad12d08f05db8323ac1fb655b75dcef69e536a04 Mon Sep 17 00:00:00 2001 +From 706a8e4cee38fe3664f77ab14febbfbd192a464a Mon Sep 17 00:00:00 2001 @@ -4,0 +5,3 @@ +Cc: Xueming Li + +[ upstream commit ad12d08f05db8323ac1fb655b75dcef69e536a04 ] @@ -21 +23,0 @@ -Cc: stable@dpdk.org @@ -30 +32 @@ -index db1c7f3906..939ca1cad9 100644 +index 9903f96695..d11c0d4be8 100644 @@ -50 +52 @@ -+ .align = alignof(eca_dynfield_t), ++ .align = __alignof__(eca_dynfield_t),