2016-11-25 13:36:12 +00:00
|
|
|
/*
|
|
|
|
*------------------------------------------------------------------
|
|
|
|
* crypto_node.c - DPDK Cryptodev input node
|
|
|
|
*
|
2017-08-26 15:22:05 +01:00
|
|
|
* Copyright (c) 2017 Intel and/or its affiliates.
|
2016-11-25 13:36:12 +00:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
2017-08-26 15:22:05 +01:00
|
|
|
* You may obtain a opy of the License at:
|
2016-11-25 13:36:12 +00:00
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*------------------------------------------------------------------
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <vlib/vlib.h>
|
|
|
|
#include <vnet/ip/ip.h>
|
|
|
|
#include <vnet/ethernet/ethernet.h>
|
|
|
|
#include <vnet/ipsec/ipsec.h>
|
|
|
|
|
2019-01-20 02:02:51 +01:00
|
|
|
#include <dpdk/buffer.h>
|
2017-02-28 19:22:22 +01:00
|
|
|
#include <dpdk/device/dpdk.h>
|
|
|
|
#include <dpdk/device/dpdk_priv.h>
|
|
|
|
#include <dpdk/ipsec/ipsec.h>
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
#define foreach_dpdk_crypto_input_error \
|
|
|
|
_(DQ_COPS, "Crypto ops dequeued") \
|
2018-12-22 03:17:15 -05:00
|
|
|
_(AUTH_FAILED, "Crypto verification failed") \
|
2017-08-26 15:22:05 +01:00
|
|
|
_(STATUS, "Crypto operation failed")
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
typedef enum
|
|
|
|
{
|
|
|
|
#define _(f,s) DPDK_CRYPTO_INPUT_ERROR_##f,
|
|
|
|
foreach_dpdk_crypto_input_error
|
|
|
|
#undef _
|
|
|
|
DPDK_CRYPTO_INPUT_N_ERROR,
|
|
|
|
} dpdk_crypto_input_error_t;
|
|
|
|
|
|
|
|
static char *dpdk_crypto_input_error_strings[] = {
|
|
|
|
#define _(n, s) s,
|
|
|
|
foreach_dpdk_crypto_input_error
|
|
|
|
#undef _
|
|
|
|
};
|
|
|
|
|
2018-11-28 02:10:35 -05:00
|
|
|
extern vlib_node_registration_t dpdk_crypto_input_node;
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
2019-01-25 05:18:51 -05:00
|
|
|
/* dev id of this cryptodev */
|
|
|
|
u16 dev_id;
|
|
|
|
u16 next_index;
|
2016-11-25 13:36:12 +00:00
|
|
|
} dpdk_crypto_input_trace_t;
|
|
|
|
|
|
|
|
static u8 *
|
|
|
|
format_dpdk_crypto_input_trace (u8 * s, va_list * args)
|
|
|
|
{
|
|
|
|
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
|
|
|
|
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
|
|
|
|
dpdk_crypto_input_trace_t *t = va_arg (*args, dpdk_crypto_input_trace_t *);
|
|
|
|
|
2019-01-25 05:18:51 -05:00
|
|
|
s = format (s, "cryptodev-id %d next-index %d", t->dev_id, t->next_index);
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2018-12-22 03:17:15 -05:00
|
|
|
static_always_inline void
|
2018-12-23 23:54:19 -05:00
|
|
|
dpdk_crypto_input_check_op (vlib_main_t * vm, vlib_node_runtime_t * node,
|
2018-12-22 03:17:15 -05:00
|
|
|
struct rte_crypto_op *op0, u16 * next)
|
|
|
|
{
|
|
|
|
if (PREDICT_FALSE (op0->status != RTE_CRYPTO_OP_STATUS_SUCCESS))
|
|
|
|
{
|
|
|
|
next[0] = DPDK_CRYPTO_INPUT_NEXT_DROP;
|
|
|
|
vlib_node_increment_counter (vm,
|
|
|
|
node->node_index,
|
|
|
|
DPDK_CRYPTO_INPUT_ERROR_STATUS, 1);
|
|
|
|
/* if auth failed */
|
|
|
|
if (op0->status == RTE_CRYPTO_OP_STATUS_AUTH_FAILED)
|
|
|
|
vlib_node_increment_counter (vm,
|
|
|
|
node->node_index,
|
|
|
|
DPDK_CRYPTO_INPUT_ERROR_AUTH_FAILED, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
always_inline void
|
|
|
|
dpdk_crypto_input_trace (vlib_main_t * vm, vlib_node_runtime_t * node,
|
2019-01-25 05:18:51 -05:00
|
|
|
u8 dev_id, u32 * bis, u16 * nexts, u32 n_deq)
|
2018-12-22 03:17:15 -05:00
|
|
|
{
|
|
|
|
u32 n_left, n_trace;
|
2019-01-25 05:18:51 -05:00
|
|
|
|
2018-12-22 03:17:15 -05:00
|
|
|
if (PREDICT_FALSE ((n_trace = vlib_get_trace_count (vm, node))))
|
|
|
|
{
|
|
|
|
n_left = n_deq;
|
|
|
|
|
|
|
|
while (n_trace && n_left)
|
|
|
|
{
|
|
|
|
vlib_buffer_t *b0;
|
|
|
|
u16 next;
|
2019-01-25 05:18:51 -05:00
|
|
|
u32 bi;
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-01-25 05:18:51 -05:00
|
|
|
bi = bis[0];
|
|
|
|
next = nexts[0];
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-01-25 05:18:51 -05:00
|
|
|
b0 = vlib_get_buffer (vm, bi);
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2020-10-02 19:36:57 +02:00
|
|
|
if (PREDICT_TRUE
|
|
|
|
(vlib_trace_buffer (vm, node, next, b0, /* follow_chain */ 0)))
|
|
|
|
{
|
|
|
|
dpdk_crypto_input_trace_t *tr =
|
|
|
|
vlib_add_trace (vm, node, b0, sizeof (*tr));
|
|
|
|
tr->dev_id = dev_id;
|
|
|
|
tr->next_index = next;
|
|
|
|
n_trace--;
|
|
|
|
}
|
2018-12-22 03:17:15 -05:00
|
|
|
|
|
|
|
n_left--;
|
2019-01-25 05:18:51 -05:00
|
|
|
nexts++;
|
|
|
|
bis++;
|
2018-12-22 03:17:15 -05:00
|
|
|
}
|
|
|
|
vlib_set_trace_count (vm, node, n_trace);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-25 13:36:12 +00:00
|
|
|
static_always_inline u32
|
2019-02-13 02:48:41 -05:00
|
|
|
dpdk_crypto_dequeue (vlib_main_t * vm, crypto_worker_main_t * cwm,
|
|
|
|
vlib_node_runtime_t * node, crypto_resource_t * res)
|
2016-11-25 13:36:12 +00:00
|
|
|
{
|
2017-08-26 15:22:05 +01:00
|
|
|
u8 numa = rte_socket_id ();
|
2019-05-06 22:44:14 +02:00
|
|
|
u32 n_ops, total_n_deq, n_deq[2];
|
2018-12-22 03:17:15 -05:00
|
|
|
u32 bis[VLIB_FRAME_SIZE], *bi;
|
|
|
|
u16 nexts[VLIB_FRAME_SIZE], *next;
|
2017-08-26 15:22:05 +01:00
|
|
|
struct rte_crypto_op **ops;
|
2016-11-25 13:36:12 +00:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
n_deq[0] = 0;
|
|
|
|
n_deq[1] = 0;
|
2018-12-22 03:17:15 -05:00
|
|
|
bi = bis;
|
|
|
|
next = nexts;
|
|
|
|
ops = cwm->ops;
|
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
n_ops = total_n_deq = rte_cryptodev_dequeue_burst (res->dev_id,
|
|
|
|
res->qp_id,
|
|
|
|
ops, VLIB_FRAME_SIZE);
|
2018-12-25 21:31:28 -05:00
|
|
|
/* no op dequeued, do not proceed */
|
2019-05-06 22:44:14 +02:00
|
|
|
if (n_ops == 0)
|
2018-12-25 21:31:28 -05:00
|
|
|
return 0;
|
|
|
|
|
2018-12-22 03:17:15 -05:00
|
|
|
while (n_ops >= 4)
|
|
|
|
{
|
|
|
|
struct rte_crypto_op *op0, *op1, *op2, *op3;
|
|
|
|
|
|
|
|
/* Prefetch next iteration. */
|
|
|
|
if (n_ops >= 8)
|
|
|
|
{
|
|
|
|
CLIB_PREFETCH (ops[4], CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (ops[5], CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (ops[6], CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (ops[7], CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
|
2018-12-25 21:31:28 -05:00
|
|
|
CLIB_PREFETCH (crypto_op_get_priv (ops[4]),
|
|
|
|
CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (crypto_op_get_priv (ops[5]),
|
|
|
|
CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (crypto_op_get_priv (ops[6]),
|
|
|
|
CLIB_CACHE_LINE_BYTES, LOAD);
|
|
|
|
CLIB_PREFETCH (crypto_op_get_priv (ops[7]),
|
|
|
|
CLIB_CACHE_LINE_BYTES, LOAD);
|
2018-12-22 03:17:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
op0 = ops[0];
|
|
|
|
op1 = ops[1];
|
|
|
|
op2 = ops[2];
|
|
|
|
op3 = ops[3];
|
|
|
|
|
|
|
|
next[0] = crypto_op_get_priv (op0)->next;
|
|
|
|
next[1] = crypto_op_get_priv (op1)->next;
|
|
|
|
next[2] = crypto_op_get_priv (op2)->next;
|
|
|
|
next[3] = crypto_op_get_priv (op3)->next;
|
|
|
|
|
2019-02-13 02:48:41 -05:00
|
|
|
bi[0] = crypto_op_get_priv (op0)->bi;
|
|
|
|
bi[1] = crypto_op_get_priv (op1)->bi;
|
|
|
|
bi[2] = crypto_op_get_priv (op2)->bi;
|
|
|
|
bi[3] = crypto_op_get_priv (op3)->bi;
|
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
|
|
|
|
n_deq[crypto_op_get_priv (op1)->encrypt] += 1;
|
|
|
|
n_deq[crypto_op_get_priv (op2)->encrypt] += 1;
|
|
|
|
n_deq[crypto_op_get_priv (op3)->encrypt] += 1;
|
|
|
|
|
2018-12-23 23:54:19 -05:00
|
|
|
dpdk_crypto_input_check_op (vm, node, op0, next + 0);
|
|
|
|
dpdk_crypto_input_check_op (vm, node, op1, next + 1);
|
|
|
|
dpdk_crypto_input_check_op (vm, node, op2, next + 2);
|
|
|
|
dpdk_crypto_input_check_op (vm, node, op3, next + 3);
|
2018-12-22 03:17:15 -05:00
|
|
|
|
|
|
|
op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
|
|
|
|
op1->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
|
|
|
|
op2->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
|
|
|
|
op3->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
|
|
|
|
|
|
|
|
/* next */
|
|
|
|
next += 4;
|
|
|
|
n_ops -= 4;
|
|
|
|
ops += 4;
|
|
|
|
bi += 4;
|
|
|
|
}
|
|
|
|
while (n_ops > 0)
|
|
|
|
{
|
|
|
|
struct rte_crypto_op *op0;
|
|
|
|
|
|
|
|
op0 = ops[0];
|
|
|
|
|
|
|
|
next[0] = crypto_op_get_priv (op0)->next;
|
2019-02-13 02:48:41 -05:00
|
|
|
bi[0] = crypto_op_get_priv (op0)->bi;
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
|
|
|
|
|
2018-12-23 23:54:19 -05:00
|
|
|
dpdk_crypto_input_check_op (vm, node, op0, next + 0);
|
2018-12-22 03:17:15 -05:00
|
|
|
|
|
|
|
op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
|
|
|
|
|
|
|
|
/* next */
|
|
|
|
next += 1;
|
|
|
|
n_ops -= 1;
|
|
|
|
ops += 1;
|
|
|
|
bi += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
vlib_node_increment_counter (vm, node->node_index,
|
2019-05-06 22:44:14 +02:00
|
|
|
DPDK_CRYPTO_INPUT_ERROR_DQ_COPS, total_n_deq);
|
|
|
|
|
|
|
|
res->inflights[0] -= n_deq[0];
|
|
|
|
res->inflights[1] -= n_deq[1];
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
vlib_buffer_enqueue_to_next (vm, node, bis, nexts, total_n_deq);
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
dpdk_crypto_input_trace (vm, node, res->dev_id, bis, nexts, total_n_deq);
|
2019-01-25 05:18:51 -05:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
crypto_free_ops (numa, cwm->ops, total_n_deq);
|
2018-12-22 03:17:15 -05:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
return total_n_deq;
|
2016-11-25 13:36:12 +00:00
|
|
|
}
|
|
|
|
|
2018-11-28 02:10:35 -05:00
|
|
|
static_always_inline uword
|
|
|
|
dpdk_crypto_input_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
|
|
|
|
vlib_frame_t * frame)
|
2016-11-25 13:36:12 +00:00
|
|
|
{
|
|
|
|
dpdk_crypto_main_t *dcm = &dpdk_crypto_main;
|
2019-02-13 02:48:41 -05:00
|
|
|
crypto_worker_main_t *cwm = &dcm->workers_main[vm->thread_index];
|
2017-08-26 15:22:05 +01:00
|
|
|
crypto_resource_t *res;
|
2016-11-25 13:36:12 +00:00
|
|
|
u32 n_deq = 0;
|
2017-08-26 15:22:05 +01:00
|
|
|
u16 *remove = NULL, *res_idx;
|
|
|
|
word i;
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
/* *INDENT-OFF* */
|
2017-08-26 15:22:05 +01:00
|
|
|
vec_foreach (res_idx, cwm->resource_idx)
|
|
|
|
{
|
|
|
|
res = vec_elt_at_index (dcm->resource, res_idx[0]);
|
2019-05-06 22:44:14 +02:00
|
|
|
u32 inflights = res->inflights[0] + res->inflights[1];
|
2017-08-26 15:22:05 +01:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
if (inflights)
|
2019-02-13 02:48:41 -05:00
|
|
|
n_deq += dpdk_crypto_dequeue (vm, cwm, node, res);
|
2017-08-26 15:22:05 +01:00
|
|
|
|
2019-05-06 22:44:14 +02:00
|
|
|
inflights = res->inflights[0] + res->inflights[1];
|
|
|
|
if (PREDICT_FALSE (res->remove && !(inflights)))
|
2017-08-26 15:22:05 +01:00
|
|
|
vec_add1 (remove, res_idx[0]);
|
|
|
|
}
|
2016-11-25 13:36:12 +00:00
|
|
|
/* *INDENT-ON* */
|
|
|
|
|
2017-08-26 15:22:05 +01:00
|
|
|
/* TODO removal on master thread? */
|
|
|
|
if (PREDICT_FALSE (remove != NULL))
|
|
|
|
{
|
|
|
|
/* *INDENT-OFF* */
|
|
|
|
vec_foreach (res_idx, remove)
|
|
|
|
{
|
|
|
|
i = vec_search (cwm->resource_idx, res_idx[0]);
|
|
|
|
vec_del1 (cwm->resource_idx, i);
|
|
|
|
|
|
|
|
res = vec_elt_at_index (dcm->resource, res_idx[0]);
|
|
|
|
res->thread_idx = (u16) ~0;
|
|
|
|
res->remove = 0;
|
|
|
|
|
|
|
|
i = vec_search (dcm->dev[res->dev_id].used_resources, res_idx[0]);
|
|
|
|
ASSERT (i != (u16) ~0);
|
|
|
|
vec_del1 (dcm->dev[res->dev_id].used_resources, i);
|
|
|
|
vec_add1 (dcm->dev[res->dev_id].free_resources, res_idx[0]);
|
|
|
|
}
|
|
|
|
/* *INDENT-ON* */
|
|
|
|
|
|
|
|
vec_free (remove);
|
|
|
|
}
|
|
|
|
|
2016-11-25 13:36:12 +00:00
|
|
|
return n_deq;
|
|
|
|
}
|
|
|
|
|
2018-11-28 02:10:35 -05:00
|
|
|
VLIB_NODE_FN (dpdk_crypto_input_node) (vlib_main_t * vm,
|
|
|
|
vlib_node_runtime_t * node,
|
|
|
|
vlib_frame_t * from_frame)
|
|
|
|
{
|
|
|
|
return dpdk_crypto_input_inline (vm, node, from_frame);
|
|
|
|
}
|
|
|
|
|
2017-01-20 15:35:23 +00:00
|
|
|
/* *INDENT-OFF* */
|
2016-11-25 13:36:12 +00:00
|
|
|
VLIB_REGISTER_NODE (dpdk_crypto_input_node) =
|
|
|
|
{
|
2017-01-20 15:35:23 +00:00
|
|
|
.name = "dpdk-crypto-input",
|
2019-09-24 18:10:49 +02:00
|
|
|
.flags = VLIB_NODE_FLAG_TRACE_SUPPORTED,
|
2017-01-20 15:35:23 +00:00
|
|
|
.format_trace = format_dpdk_crypto_input_trace,
|
|
|
|
.type = VLIB_NODE_TYPE_INPUT,
|
|
|
|
.state = VLIB_NODE_STATE_DISABLED,
|
|
|
|
.n_errors = DPDK_CRYPTO_INPUT_N_ERROR,
|
|
|
|
.error_strings = dpdk_crypto_input_error_strings,
|
|
|
|
.n_next_nodes = DPDK_CRYPTO_INPUT_N_NEXT,
|
|
|
|
.next_nodes =
|
2016-11-25 13:36:12 +00:00
|
|
|
{
|
|
|
|
#define _(s,n) [DPDK_CRYPTO_INPUT_NEXT_##s] = n,
|
|
|
|
foreach_dpdk_crypto_input_next
|
|
|
|
#undef _
|
2017-01-20 15:35:23 +00:00
|
|
|
},
|
|
|
|
};
|
|
|
|
/* *INDENT-ON* */
|
2016-11-25 13:36:12 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* fd.io coding-style-patch-verification: ON
|
|
|
|
*
|
|
|
|
* Local Variables:
|
|
|
|
* eval: (c-set-style "gnu")
|
|
|
|
* End:
|
|
|
|
*/
|