blob: 893848c05b61731f4ddc228f3666a47c7f23ca39 [file] [log] [blame]
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +00001/*
2 *------------------------------------------------------------------
3 * crypto_node.c - DPDK Cryptodev input node
4 *
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +01005 * Copyright (c) 2017 Intel and/or its affiliates.
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +00006 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +01008 * You may obtain a opy of the License at:
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +00009 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 *------------------------------------------------------------------
18 */
19
20#include <vlib/vlib.h>
21#include <vnet/ip/ip.h>
22#include <vnet/ethernet/ethernet.h>
23#include <vnet/ipsec/ipsec.h>
24
Damjan Mariona5c308e2019-01-20 02:02:51 +010025#include <dpdk/buffer.h>
Damjan Marionc3a814b2017-02-28 19:22:22 +010026#include <dpdk/device/dpdk.h>
27#include <dpdk/device/dpdk_priv.h>
28#include <dpdk/ipsec/ipsec.h>
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000029
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000030#define foreach_dpdk_crypto_input_error \
31 _(DQ_COPS, "Crypto ops dequeued") \
Kingwel Xieb9894ee2018-12-22 03:17:15 -050032 _(AUTH_FAILED, "Crypto verification failed") \
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +010033 _(STATUS, "Crypto operation failed")
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000034
35typedef enum
36{
37#define _(f,s) DPDK_CRYPTO_INPUT_ERROR_##f,
38 foreach_dpdk_crypto_input_error
39#undef _
40 DPDK_CRYPTO_INPUT_N_ERROR,
41} dpdk_crypto_input_error_t;
42
43static char *dpdk_crypto_input_error_strings[] = {
44#define _(n, s) s,
45 foreach_dpdk_crypto_input_error
46#undef _
47};
48
Kingwel Xie040950a2018-11-28 02:10:35 -050049extern vlib_node_registration_t dpdk_crypto_input_node;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000050
51typedef struct
52{
Kingwel Xieb8999b12019-01-25 05:18:51 -050053 /* dev id of this cryptodev */
54 u16 dev_id;
55 u16 next_index;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000056} dpdk_crypto_input_trace_t;
57
58static u8 *
59format_dpdk_crypto_input_trace (u8 * s, va_list * args)
60{
61 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
62 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
63 dpdk_crypto_input_trace_t *t = va_arg (*args, dpdk_crypto_input_trace_t *);
64
Kingwel Xieb8999b12019-01-25 05:18:51 -050065 s = format (s, "cryptodev-id %d next-index %d", t->dev_id, t->next_index);
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +000066
67 return s;
68}
69
Kingwel Xieb9894ee2018-12-22 03:17:15 -050070static_always_inline void
Kingwel Xie42708082018-12-23 23:54:19 -050071dpdk_crypto_input_check_op (vlib_main_t * vm, vlib_node_runtime_t * node,
Kingwel Xieb9894ee2018-12-22 03:17:15 -050072 struct rte_crypto_op *op0, u16 * next)
73{
74 if (PREDICT_FALSE (op0->status != RTE_CRYPTO_OP_STATUS_SUCCESS))
75 {
76 next[0] = DPDK_CRYPTO_INPUT_NEXT_DROP;
77 vlib_node_increment_counter (vm,
78 node->node_index,
79 DPDK_CRYPTO_INPUT_ERROR_STATUS, 1);
80 /* if auth failed */
81 if (op0->status == RTE_CRYPTO_OP_STATUS_AUTH_FAILED)
82 vlib_node_increment_counter (vm,
83 node->node_index,
84 DPDK_CRYPTO_INPUT_ERROR_AUTH_FAILED, 1);
85 }
86}
87
88always_inline void
89dpdk_crypto_input_trace (vlib_main_t * vm, vlib_node_runtime_t * node,
Kingwel Xieb8999b12019-01-25 05:18:51 -050090 u8 dev_id, u32 * bis, u16 * nexts, u32 n_deq)
Kingwel Xieb9894ee2018-12-22 03:17:15 -050091{
92 u32 n_left, n_trace;
Kingwel Xieb8999b12019-01-25 05:18:51 -050093
Kingwel Xieb9894ee2018-12-22 03:17:15 -050094 if (PREDICT_FALSE ((n_trace = vlib_get_trace_count (vm, node))))
95 {
96 n_left = n_deq;
97
98 while (n_trace && n_left)
99 {
100 vlib_buffer_t *b0;
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500101 u16 next;
Kingwel Xieb8999b12019-01-25 05:18:51 -0500102 u32 bi;
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500103
Kingwel Xieb8999b12019-01-25 05:18:51 -0500104 bi = bis[0];
105 next = nexts[0];
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500106
Kingwel Xieb8999b12019-01-25 05:18:51 -0500107 b0 = vlib_get_buffer (vm, bi);
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500108
BenoƮt Ganne9a3973e2020-10-02 19:36:57 +0200109 if (PREDICT_TRUE
110 (vlib_trace_buffer (vm, node, next, b0, /* follow_chain */ 0)))
111 {
112 dpdk_crypto_input_trace_t *tr =
113 vlib_add_trace (vm, node, b0, sizeof (*tr));
114 tr->dev_id = dev_id;
115 tr->next_index = next;
116 n_trace--;
117 }
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500118
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500119 n_left--;
Kingwel Xieb8999b12019-01-25 05:18:51 -0500120 nexts++;
121 bis++;
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500122 }
123 vlib_set_trace_count (vm, node, n_trace);
124 }
125}
126
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000127static_always_inline u32
Kingwel Xie3b3464e2019-02-13 02:48:41 -0500128dpdk_crypto_dequeue (vlib_main_t * vm, crypto_worker_main_t * cwm,
129 vlib_node_runtime_t * node, crypto_resource_t * res)
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000130{
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100131 u8 numa = rte_socket_id ();
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200132 u32 n_ops, total_n_deq, n_deq[2];
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500133 u32 bis[VLIB_FRAME_SIZE], *bi;
134 u16 nexts[VLIB_FRAME_SIZE], *next;
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100135 struct rte_crypto_op **ops;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000136
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200137 n_deq[0] = 0;
138 n_deq[1] = 0;
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500139 bi = bis;
140 next = nexts;
141 ops = cwm->ops;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000142
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200143 n_ops = total_n_deq = rte_cryptodev_dequeue_burst (res->dev_id,
144 res->qp_id,
145 ops, VLIB_FRAME_SIZE);
Kingwel Xie955ee282018-12-25 21:31:28 -0500146 /* no op dequeued, do not proceed */
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200147 if (n_ops == 0)
Kingwel Xie955ee282018-12-25 21:31:28 -0500148 return 0;
149
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500150 while (n_ops >= 4)
151 {
152 struct rte_crypto_op *op0, *op1, *op2, *op3;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000153
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500154 /* Prefetch next iteration. */
155 if (n_ops >= 8)
156 {
157 CLIB_PREFETCH (ops[4], CLIB_CACHE_LINE_BYTES, LOAD);
158 CLIB_PREFETCH (ops[5], CLIB_CACHE_LINE_BYTES, LOAD);
159 CLIB_PREFETCH (ops[6], CLIB_CACHE_LINE_BYTES, LOAD);
160 CLIB_PREFETCH (ops[7], CLIB_CACHE_LINE_BYTES, LOAD);
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100161
Kingwel Xie955ee282018-12-25 21:31:28 -0500162 CLIB_PREFETCH (crypto_op_get_priv (ops[4]),
163 CLIB_CACHE_LINE_BYTES, LOAD);
164 CLIB_PREFETCH (crypto_op_get_priv (ops[5]),
165 CLIB_CACHE_LINE_BYTES, LOAD);
166 CLIB_PREFETCH (crypto_op_get_priv (ops[6]),
167 CLIB_CACHE_LINE_BYTES, LOAD);
168 CLIB_PREFETCH (crypto_op_get_priv (ops[7]),
169 CLIB_CACHE_LINE_BYTES, LOAD);
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500170 }
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100171
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500172 op0 = ops[0];
173 op1 = ops[1];
174 op2 = ops[2];
175 op3 = ops[3];
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100176
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500177 next[0] = crypto_op_get_priv (op0)->next;
178 next[1] = crypto_op_get_priv (op1)->next;
179 next[2] = crypto_op_get_priv (op2)->next;
180 next[3] = crypto_op_get_priv (op3)->next;
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100181
Kingwel Xie3b3464e2019-02-13 02:48:41 -0500182 bi[0] = crypto_op_get_priv (op0)->bi;
183 bi[1] = crypto_op_get_priv (op1)->bi;
184 bi[2] = crypto_op_get_priv (op2)->bi;
185 bi[3] = crypto_op_get_priv (op3)->bi;
186
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200187 n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
188 n_deq[crypto_op_get_priv (op1)->encrypt] += 1;
189 n_deq[crypto_op_get_priv (op2)->encrypt] += 1;
190 n_deq[crypto_op_get_priv (op3)->encrypt] += 1;
191
Kingwel Xie42708082018-12-23 23:54:19 -0500192 dpdk_crypto_input_check_op (vm, node, op0, next + 0);
193 dpdk_crypto_input_check_op (vm, node, op1, next + 1);
194 dpdk_crypto_input_check_op (vm, node, op2, next + 2);
195 dpdk_crypto_input_check_op (vm, node, op3, next + 3);
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100196
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500197 op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
198 op1->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
199 op2->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
200 op3->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100201
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500202 /* next */
203 next += 4;
204 n_ops -= 4;
205 ops += 4;
206 bi += 4;
207 }
208 while (n_ops > 0)
209 {
210 struct rte_crypto_op *op0;
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100211
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500212 op0 = ops[0];
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000213
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500214 next[0] = crypto_op_get_priv (op0)->next;
Kingwel Xie3b3464e2019-02-13 02:48:41 -0500215 bi[0] = crypto_op_get_priv (op0)->bi;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000216
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200217 n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
218
Kingwel Xie42708082018-12-23 23:54:19 -0500219 dpdk_crypto_input_check_op (vm, node, op0, next + 0);
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500220
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500221 op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
222
223 /* next */
224 next += 1;
225 n_ops -= 1;
226 ops += 1;
227 bi += 1;
228 }
229
230 vlib_node_increment_counter (vm, node->node_index,
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200231 DPDK_CRYPTO_INPUT_ERROR_DQ_COPS, total_n_deq);
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500232
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200233 res->inflights[0] -= n_deq[0];
234 res->inflights[1] -= n_deq[1];
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500235
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200236 vlib_buffer_enqueue_to_next (vm, node, bis, nexts, total_n_deq);
Kingwel Xieb8999b12019-01-25 05:18:51 -0500237
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200238 dpdk_crypto_input_trace (vm, node, res->dev_id, bis, nexts, total_n_deq);
Kingwel Xieb9894ee2018-12-22 03:17:15 -0500239
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200240 crypto_free_ops (numa, cwm->ops, total_n_deq);
241
242 return total_n_deq;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000243}
244
Kingwel Xie040950a2018-11-28 02:10:35 -0500245static_always_inline uword
246dpdk_crypto_input_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
247 vlib_frame_t * frame)
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000248{
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000249 dpdk_crypto_main_t *dcm = &dpdk_crypto_main;
Kingwel Xie3b3464e2019-02-13 02:48:41 -0500250 crypto_worker_main_t *cwm = &dcm->workers_main[vm->thread_index];
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100251 crypto_resource_t *res;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000252 u32 n_deq = 0;
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100253 u16 *remove = NULL, *res_idx;
254 word i;
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000255
256 /* *INDENT-OFF* */
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100257 vec_foreach (res_idx, cwm->resource_idx)
258 {
259 res = vec_elt_at_index (dcm->resource, res_idx[0]);
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200260 u32 inflights = res->inflights[0] + res->inflights[1];
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100261
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200262 if (inflights)
Kingwel Xie3b3464e2019-02-13 02:48:41 -0500263 n_deq += dpdk_crypto_dequeue (vm, cwm, node, res);
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100264
Sergio Gonzalez Monroyd8a34a52019-05-06 22:44:14 +0200265 inflights = res->inflights[0] + res->inflights[1];
266 if (PREDICT_FALSE (res->remove && !(inflights)))
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100267 vec_add1 (remove, res_idx[0]);
268 }
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000269 /* *INDENT-ON* */
270
Sergio Gonzalez Monroydb93cd92017-08-26 15:22:05 +0100271 /* TODO removal on master thread? */
272 if (PREDICT_FALSE (remove != NULL))
273 {
274 /* *INDENT-OFF* */
275 vec_foreach (res_idx, remove)
276 {
277 i = vec_search (cwm->resource_idx, res_idx[0]);
278 vec_del1 (cwm->resource_idx, i);
279
280 res = vec_elt_at_index (dcm->resource, res_idx[0]);
281 res->thread_idx = (u16) ~0;
282 res->remove = 0;
283
284 i = vec_search (dcm->dev[res->dev_id].used_resources, res_idx[0]);
285 ASSERT (i != (u16) ~0);
286 vec_del1 (dcm->dev[res->dev_id].used_resources, i);
287 vec_add1 (dcm->dev[res->dev_id].free_resources, res_idx[0]);
288 }
289 /* *INDENT-ON* */
290
291 vec_free (remove);
292 }
293
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000294 return n_deq;
295}
296
Kingwel Xie040950a2018-11-28 02:10:35 -0500297VLIB_NODE_FN (dpdk_crypto_input_node) (vlib_main_t * vm,
298 vlib_node_runtime_t * node,
299 vlib_frame_t * from_frame)
300{
301 return dpdk_crypto_input_inline (vm, node, from_frame);
302}
303
Sergio Gonzalez Monroyd04b60b2017-01-20 15:35:23 +0000304/* *INDENT-OFF* */
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000305VLIB_REGISTER_NODE (dpdk_crypto_input_node) =
306{
Sergio Gonzalez Monroyd04b60b2017-01-20 15:35:23 +0000307 .name = "dpdk-crypto-input",
Damjan Marion7ca5aaa2019-09-24 18:10:49 +0200308 .flags = VLIB_NODE_FLAG_TRACE_SUPPORTED,
Sergio Gonzalez Monroyd04b60b2017-01-20 15:35:23 +0000309 .format_trace = format_dpdk_crypto_input_trace,
310 .type = VLIB_NODE_TYPE_INPUT,
311 .state = VLIB_NODE_STATE_DISABLED,
312 .n_errors = DPDK_CRYPTO_INPUT_N_ERROR,
313 .error_strings = dpdk_crypto_input_error_strings,
314 .n_next_nodes = DPDK_CRYPTO_INPUT_N_NEXT,
315 .next_nodes =
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000316 {
317#define _(s,n) [DPDK_CRYPTO_INPUT_NEXT_##s] = n,
318 foreach_dpdk_crypto_input_next
319#undef _
Sergio Gonzalez Monroyd04b60b2017-01-20 15:35:23 +0000320 },
321};
322/* *INDENT-ON* */
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000323
Sergio Gonzalez Monroya10f62b2016-11-25 13:36:12 +0000324/*
325 * fd.io coding-style-patch-verification: ON
326 *
327 * Local Variables:
328 * eval: (c-set-style "gnu")
329 * End:
330 */