From patchwork Tue Oct 24 02:54:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Hemminger X-Patchwork-Id: 133253 X-Patchwork-Delegate: david.marchand@redhat.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 22F69431EB; Tue, 24 Oct 2023 04:56:36 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8704A42E37; Tue, 24 Oct 2023 04:55:01 +0200 (CEST) Received: from mail-oi1-f179.google.com (mail-oi1-f179.google.com [209.85.167.179]) by mails.dpdk.org (Postfix) with ESMTP id 7A98C42E11 for ; Tue, 24 Oct 2023 04:54:51 +0200 (CEST) Received: by mail-oi1-f179.google.com with SMTP id 5614622812f47-3b2b1ad7ee6so2591388b6e.2 for ; Mon, 23 Oct 2023 19:54:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20230601.gappssmtp.com; s=20230601; t=1698116090; x=1698720890; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=oCyKuP3WHccT1kMMiYmVUPULxJ8KwxrljgIf57c0LHA=; b=0Ex1m8ueCSQh3gkiPIRk4H7B8vhyCTW+0iBokEu0w5sVHkz8TfgsA+AmeIQCzFNOo6 YVvzdV0e/loAMRfDrZPohKVhFzW9gDWeX1xC/eC01erEEfek5AK0sUO2YKWJRrRDuRjU 294VGe8d1gI4IgPwlEcpfQhy44n9fC3N7IY+Xa54ujjwkC90loU/MN7wg0y3dzoABESn //4vhSraNuMcpGTnsC7TCLsjNBfJi5c/XazJQXJ5p25OFWJ+aUJhwyN07OE5SKT2okPT 5NMSSXSPYu1lu0o87PkIwFsFzJ8vcPGQnhAMYT/LgA0SsNYBtLuTwc8YSUtKWSfbFD+O gklQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698116090; x=1698720890; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oCyKuP3WHccT1kMMiYmVUPULxJ8KwxrljgIf57c0LHA=; b=Dy5TvGEKLRK/v2z/QFVcXvdza0+XkMVrotX7XZqblalqxTL5IFshqzQeAZ29z8Yd3S DTHznJ2jwTeUb0A83XfozleOuNHhx2DnRcoJouVuMzUicxF2OPZ3PhPLspKh+0/a2fKy nVdAwObrNML4Ljv2A/L7197jQDLDWyBo21OsU2Hl6TsauOgs7Nocj/+QD2HGdbJv1nlV teSpvwlmuBrpEUIKWXaDQDW9COs5yPDDqbV3BPE7sJGYfGW36NEm2DCKDNjgbUtGCjwO sxEVYbp6b/HmV2Hkzx5COn5UbO6B2Syb5yK6To2kuPqPDjPxFzLVyMmhw6hZyZiaAAmz FYOA== X-Gm-Message-State: AOJu0YzR0H1B7S/Y/ByBGKknWduyfaEzUduTIk440Yn9UZ4teykLnKSv QUVa1oichzxK/gX6/vyWsOy5bGnpjkCDoVlBwiQUtA== X-Google-Smtp-Source: AGHT+IEsZqtVRih9plN+Pi7obxcrC41Jd/PFAwJziZNomcYp5seKOrsdn9LCyH+fXHqS1kFmptuLrg== X-Received: by 2002:a05:6870:4e0b:b0:1e9:f06f:b25 with SMTP id pl11-20020a0568704e0b00b001e9f06f0b25mr15081927oab.8.1698116090615; Mon, 23 Oct 2023 19:54:50 -0700 (PDT) Received: from hermes.local (204-195-126-68.wavecable.com. [204.195.126.68]) by smtp.gmail.com with ESMTPSA id b22-20020aa79516000000b0069b772c4325sm6802348pfp.87.2023.10.23.19.54.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Oct 2023 19:54:49 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Akhil Goyal Subject: [PATCH v7 19/25] security: remove experimental flag Date: Mon, 23 Oct 2023 19:54:16 -0700 Message-Id: <20231024025422.126021-20-stephen@networkplumber.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20231024025422.126021-1-stephen@networkplumber.org> References: <20230808173527.186042-1-stephen@networkplumber.org> <20231024025422.126021-1-stephen@networkplumber.org> MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Update security API's to stable: __rte_security_set_pkt_metadata 21.11 rte_security_dynfield_offset 20.11 rte_security_macsec_XXX 22.11 rte_security_session_stats_get 18.11 Signed-off-by: Stephen Hemminger Acked-by: Akhil Goyal --- lib/security/rte_security.h | 35 ----------------------------------- lib/security/version.map | 18 +++++++++--------- 2 files changed, 9 insertions(+), 44 deletions(-) diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index d2d2af23d5d2..1c8474b74f93 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -815,7 +815,6 @@ rte_security_session_create(void *instance, * - On success returns 0 * - On failure returns a negative errno value. */ -__rte_experimental int rte_security_session_update(void *instance, void *sess, @@ -851,9 +850,6 @@ int rte_security_session_destroy(void *instance, void *sess); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Create MACsec security channel (SC). * * @param instance security instance @@ -865,15 +861,11 @@ rte_security_session_destroy(void *instance, void *sess); * - -ENOMEM if PMD is not capable to create more SC. * - other negative value for other errors. */ -__rte_experimental int rte_security_macsec_sc_create(void *instance, struct rte_security_macsec_sc *conf); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Destroy MACsec security channel (SC). * * @param instance security instance @@ -884,15 +876,11 @@ rte_security_macsec_sc_create(void *instance, * - -EINVAL if sc_id is invalid or instance is NULL. * - -EBUSY if sc is being used by some session. */ -__rte_experimental int rte_security_macsec_sc_destroy(void *instance, uint16_t sc_id, enum rte_security_macsec_direction dir); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Create MACsec security association (SA). * * @param instance security instance @@ -904,15 +892,11 @@ rte_security_macsec_sc_destroy(void *instance, uint16_t sc_id, * - -ENOMEM if PMD is not capable to create more SAs. * - other negative value for other errors. */ -__rte_experimental int rte_security_macsec_sa_create(void *instance, struct rte_security_macsec_sa *conf); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Destroy MACsec security association (SA). * * @param instance security instance @@ -923,7 +907,6 @@ rte_security_macsec_sa_create(void *instance, * - -EINVAL if sa_id is invalid or instance is NULL. * - -EBUSY if sa is being used by some session. */ -__rte_experimental int rte_security_macsec_sa_destroy(void *instance, uint16_t sa_id, enum rte_security_macsec_direction dir); @@ -941,9 +924,6 @@ typedef struct rte_mbuf *rte_security_oop_dynfield_t; extern int rte_security_oop_dynfield_offset; /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get pointer to mbuf field for device-specific metadata. * * For performance reason, no check is done, @@ -953,7 +933,6 @@ extern int rte_security_oop_dynfield_offset; * @param mbuf packet to access * @return pointer to mbuf field */ -__rte_experimental static inline rte_security_dynfield_t * rte_security_dynfield(struct rte_mbuf *mbuf) { @@ -982,14 +961,10 @@ rte_security_oop_dynfield(struct rte_mbuf *mbuf) } /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Check whether the dynamic field is registered. * * @return true if rte_security_dynfield_register() has been called. */ -__rte_experimental static inline bool rte_security_dynfield_is_registered(void) { return rte_security_dynfield_offset >= 0; @@ -1059,7 +1034,6 @@ rte_security_session_fast_mdata_set(void *sess, uint64_t fdata) } /** Function to call PMD specific function pointer set_pkt_metadata() */ -__rte_experimental int __rte_security_set_pkt_metadata(void *instance, void *sess, struct rte_mbuf *m, void *params); @@ -1230,16 +1204,12 @@ struct rte_security_stats { * - On success, return 0 * - On failure, a negative value */ -__rte_experimental int rte_security_session_stats_get(void *instance, void *sess, struct rte_security_stats *stats); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get MACsec SA statistics. * * @param instance security instance @@ -1250,16 +1220,12 @@ rte_security_session_stats_get(void *instance, * - On success, return 0. * - On failure, a negative value. */ -__rte_experimental int rte_security_macsec_sa_stats_get(void *instance, uint16_t sa_id, enum rte_security_macsec_direction dir, struct rte_security_macsec_sa_stats *stats); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get MACsec SC statistics. * * @param instance security instance @@ -1270,7 +1236,6 @@ rte_security_macsec_sa_stats_get(void *instance, * - On success, return 0. * - On failure, a negative value. */ -__rte_experimental int rte_security_macsec_sc_stats_get(void *instance, uint16_t sc_id, enum rte_security_macsec_direction dir, diff --git a/lib/security/version.map b/lib/security/version.map index e07fca33a1e6..54c9a556798d 100644 --- a/lib/security/version.map +++ b/lib/security/version.map @@ -1,19 +1,12 @@ DPDK_24 { global: + __rte_security_set_pkt_metadata; rte_security_capabilities_get; rte_security_capability_get; rte_security_session_create; rte_security_session_destroy; rte_security_session_get_size; - - local: *; -}; - -EXPERIMENTAL { - global: - - __rte_security_set_pkt_metadata; rte_security_dynfield_offset; rte_security_macsec_sa_create; rte_security_macsec_sa_destroy; @@ -23,8 +16,15 @@ EXPERIMENTAL { rte_security_macsec_sc_stats_get; rte_security_session_stats_get; rte_security_session_update; - rte_security_oop_dynfield_offset; + local: *; +}; + +EXPERIMENTAL { + global: + + # Added in 23.11 + rte_security_oop_dynfield_offset; rte_security_rx_inject_configure; rte_security_inb_pkt_rx_inject; };