[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [RFC 04/10] virtio-crypto: remove virtio_crypto_op_data_req
From: |
Longpeng(Mike) |
Subject: |
[Qemu-devel] [RFC 04/10] virtio-crypto: remove virtio_crypto_op_data_req structure |
Date: |
Mon, 6 Nov 2017 14:56:56 +0800 |
The struct virtio_crypto_op_data_req is not needed, we can
use 'header + payload' instead. This makes the code simpler
to add MUX-mode support in the next patch.
Signed-off-by: Longpeng(Mike) <address@hidden>
---
hw/virtio/virtio-crypto.c | 34 ++++++++++++++++++--------
include/standard-headers/linux/virtio_crypto.h | 13 +---------
2 files changed, 25 insertions(+), 22 deletions(-)
diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
index 9ffe26d..828d7ef 100644
--- a/hw/virtio/virtio-crypto.c
+++ b/hw/virtio/virtio-crypto.c
@@ -611,7 +611,7 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
VirtIODevice *vdev = VIRTIO_DEVICE(vcrypto);
VirtQueueElement *elem = &request->elem;
int queue_index = virtio_crypto_vq2q(virtio_get_queue_index(request->vq));
- struct virtio_crypto_op_data_req req;
+ struct virtio_crypto_op_header hdr;
int ret;
struct iovec *in_iov;
struct iovec *out_iov;
@@ -622,6 +622,7 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
uint64_t session_id;
CryptoDevBackendSymOpInfo *sym_op_info = NULL;
Error *local_err = NULL;
+ size_t s;
if (elem->out_num < 1 || elem->in_num < 1) {
virtio_error(vdev, "virtio-crypto dataq missing headers");
@@ -632,12 +633,13 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
out_iov = elem->out_sg;
in_num = elem->in_num;
in_iov = elem->in_sg;
- if (unlikely(iov_to_buf(out_iov, out_num, 0, &req, sizeof(req))
- != sizeof(req))) {
+
+ s = sizeof(hdr);
+ if (unlikely(s != iov_to_buf(out_iov, out_num, 0, &hdr, s))) {
virtio_error(vdev, "virtio-crypto request outhdr too short");
return -1;
}
- iov_discard_front(&out_iov, &out_num, sizeof(req));
+ iov_discard_front(&out_iov, &out_num, s);
if (in_iov[in_num - 1].iov_len <
sizeof(struct virtio_crypto_inhdr)) {
@@ -658,16 +660,27 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
request->in_num = in_num;
request->in_iov = in_iov;
- opcode = ldl_le_p(&req.header.opcode);
- session_id = ldq_le_p(&req.header.session_id);
+ opcode = ldl_le_p(&hdr.opcode);
+ session_id = ldq_le_p(&hdr.session_id);
switch (opcode) {
case VIRTIO_CRYPTO_CIPHER_ENCRYPT:
case VIRTIO_CRYPTO_CIPHER_DECRYPT:
- ret = virtio_crypto_handle_sym_req(vcrypto,
- &req.u.sym_req,
- &sym_op_info,
- out_iov, out_num);
+ {
+ struct virtio_crypto_sym_data_req req;
+
+ iov_to_buf(out_iov, out_num, 0, &req, sizeof(req));
+ /* The unused part of the req will be ingored */
+ s = VIRTIO_CRYPTO_DATA_REQ_PAYLOAD_SIZE_NONMUX;
+ if (unlikely(s != iov_discard_front(&out_iov, &out_num, s))) {
+ virtio_error(vdev, "virtio-crypto request additional "
+ "parameters too short");
+ return -1;
+ }
+
+ ret = virtio_crypto_handle_sym_req(vcrypto, &req,
+ &sym_op_info,
+ out_iov, out_num);
/* Serious errors, need to reset virtio crypto device */
if (ret == -EFAULT) {
return -1;
@@ -694,6 +707,7 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
virtio_crypto_free_request(request);
}
break;
+ }
case VIRTIO_CRYPTO_HASH:
case VIRTIO_CRYPTO_MAC:
case VIRTIO_CRYPTO_AEAD_ENCRYPT:
diff --git a/include/standard-headers/linux/virtio_crypto.h
b/include/standard-headers/linux/virtio_crypto.h
index 5e586e5..81357e5 100644
--- a/include/standard-headers/linux/virtio_crypto.h
+++ b/include/standard-headers/linux/virtio_crypto.h
@@ -379,18 +379,7 @@ struct virtio_crypto_aead_data_req {
uint8_t padding[32];
};
-/* The request of the data virtqueue's packet */
-struct virtio_crypto_op_data_req {
- struct virtio_crypto_op_header header;
-
- union {
- struct virtio_crypto_sym_data_req sym_req;
- struct virtio_crypto_hash_data_req hash_req;
- struct virtio_crypto_mac_data_req mac_req;
- struct virtio_crypto_aead_data_req aead_req;
- uint8_t padding[48];
- } u;
-};
+#define VIRTIO_CRYPTO_DATA_REQ_PAYLOAD_SIZE_NONMUX 48
#define VIRTIO_CRYPTO_OK 0
#define VIRTIO_CRYPTO_ERR 1
--
1.8.3.1
- [Qemu-devel] [RFC 00/10] virtio-crypto: add multiplexing mode support, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 03/10] virtio-crypto: remove queue_id field in ctrl header, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 01/10] virtio-crypto: remove virtio_crypto_op_ctrl_req structure, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 06/10] cryptodev: add stateless mode cipher support, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 08/10] cryptodev: extract one util function, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 07/10] virtio-crypto: add stateless crypto request handler, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 10/10] virtio-crypto: add host feature bits support, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 04/10] virtio-crypto: remove virtio_crypto_op_data_req structure,
Longpeng(Mike) <=
- [Qemu-devel] [RFC 09/10] cryptodev-builtin: add stateless cipher support, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 02/10] virtio-crypto: add session creation logic for mux mode, Longpeng(Mike), 2017/11/06
- [Qemu-devel] [RFC 05/10] virtio-crypto: add dataq operation logic for mux mode, Longpeng(Mike), 2017/11/06
- Re: [Qemu-devel] [RFC 00/10] virtio-crypto: add multiplexing mode support, no-reply, 2017/11/06