2 *------------------------------------------------------------------
3 * crypto_node.c - DPDK Cryptodev input node
5 * Copyright (c) 2017 Intel and/or its affiliates.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a opy of the License at:
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 *------------------------------------------------------------------
20 #include <vlib/vlib.h>
21 #include <vnet/ip/ip.h>
22 #include <vnet/ethernet/ethernet.h>
23 #include <vnet/ipsec/ipsec.h>
25 #include <dpdk/buffer.h>
26 #include <dpdk/device/dpdk.h>
27 #include <dpdk/device/dpdk_priv.h>
28 #include <dpdk/ipsec/ipsec.h>
30 #define foreach_dpdk_crypto_input_error \
31 _(DQ_COPS, "Crypto ops dequeued") \
32 _(AUTH_FAILED, "Crypto verification failed") \
33 _(STATUS, "Crypto operation failed")
37 #define _(f,s) DPDK_CRYPTO_INPUT_ERROR_##f,
38 foreach_dpdk_crypto_input_error
40 DPDK_CRYPTO_INPUT_N_ERROR,
41 } dpdk_crypto_input_error_t;
43 static char *dpdk_crypto_input_error_strings[] = {
45 foreach_dpdk_crypto_input_error
49 extern vlib_node_registration_t dpdk_crypto_input_node;
53 /* dev id of this cryptodev */
56 } dpdk_crypto_input_trace_t;
59 format_dpdk_crypto_input_trace (u8 * s, va_list * args)
61 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
62 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
63 dpdk_crypto_input_trace_t *t = va_arg (*args, dpdk_crypto_input_trace_t *);
65 s = format (s, "cryptodev-id %d next-index %d", t->dev_id, t->next_index);
70 static_always_inline void
71 dpdk_crypto_input_check_op (vlib_main_t * vm, vlib_node_runtime_t * node,
72 struct rte_crypto_op *op0, u16 * next)
74 if (PREDICT_FALSE (op0->status != RTE_CRYPTO_OP_STATUS_SUCCESS))
76 next[0] = DPDK_CRYPTO_INPUT_NEXT_DROP;
77 vlib_node_increment_counter (vm,
79 DPDK_CRYPTO_INPUT_ERROR_STATUS, 1);
81 if (op0->status == RTE_CRYPTO_OP_STATUS_AUTH_FAILED)
82 vlib_node_increment_counter (vm,
84 DPDK_CRYPTO_INPUT_ERROR_AUTH_FAILED, 1);
89 dpdk_crypto_input_trace (vlib_main_t * vm, vlib_node_runtime_t * node,
90 u8 dev_id, u32 * bis, u16 * nexts, u32 n_deq)
94 if (PREDICT_FALSE ((n_trace = vlib_get_trace_count (vm, node))))
98 while (n_trace && n_left)
107 b0 = vlib_get_buffer (vm, bi);
109 vlib_trace_buffer (vm, node, next, b0, /* follow_chain */ 0);
111 dpdk_crypto_input_trace_t *tr =
112 vlib_add_trace (vm, node, b0, sizeof (*tr));
114 tr->next_index = next;
121 vlib_set_trace_count (vm, node, n_trace);
125 static_always_inline u32
126 dpdk_crypto_dequeue (vlib_main_t * vm, crypto_worker_main_t * cwm,
127 vlib_node_runtime_t * node, crypto_resource_t * res)
129 u8 numa = rte_socket_id ();
130 u32 n_ops, total_n_deq, n_deq[2];
131 u32 bis[VLIB_FRAME_SIZE], *bi;
132 u16 nexts[VLIB_FRAME_SIZE], *next;
133 struct rte_crypto_op **ops;
141 n_ops = total_n_deq = rte_cryptodev_dequeue_burst (res->dev_id,
143 ops, VLIB_FRAME_SIZE);
144 /* no op dequeued, do not proceed */
150 struct rte_crypto_op *op0, *op1, *op2, *op3;
152 /* Prefetch next iteration. */
155 CLIB_PREFETCH (ops[4], CLIB_CACHE_LINE_BYTES, LOAD);
156 CLIB_PREFETCH (ops[5], CLIB_CACHE_LINE_BYTES, LOAD);
157 CLIB_PREFETCH (ops[6], CLIB_CACHE_LINE_BYTES, LOAD);
158 CLIB_PREFETCH (ops[7], CLIB_CACHE_LINE_BYTES, LOAD);
160 CLIB_PREFETCH (crypto_op_get_priv (ops[4]),
161 CLIB_CACHE_LINE_BYTES, LOAD);
162 CLIB_PREFETCH (crypto_op_get_priv (ops[5]),
163 CLIB_CACHE_LINE_BYTES, LOAD);
164 CLIB_PREFETCH (crypto_op_get_priv (ops[6]),
165 CLIB_CACHE_LINE_BYTES, LOAD);
166 CLIB_PREFETCH (crypto_op_get_priv (ops[7]),
167 CLIB_CACHE_LINE_BYTES, LOAD);
175 next[0] = crypto_op_get_priv (op0)->next;
176 next[1] = crypto_op_get_priv (op1)->next;
177 next[2] = crypto_op_get_priv (op2)->next;
178 next[3] = crypto_op_get_priv (op3)->next;
180 bi[0] = crypto_op_get_priv (op0)->bi;
181 bi[1] = crypto_op_get_priv (op1)->bi;
182 bi[2] = crypto_op_get_priv (op2)->bi;
183 bi[3] = crypto_op_get_priv (op3)->bi;
185 n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
186 n_deq[crypto_op_get_priv (op1)->encrypt] += 1;
187 n_deq[crypto_op_get_priv (op2)->encrypt] += 1;
188 n_deq[crypto_op_get_priv (op3)->encrypt] += 1;
190 dpdk_crypto_input_check_op (vm, node, op0, next + 0);
191 dpdk_crypto_input_check_op (vm, node, op1, next + 1);
192 dpdk_crypto_input_check_op (vm, node, op2, next + 2);
193 dpdk_crypto_input_check_op (vm, node, op3, next + 3);
195 op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
196 op1->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
197 op2->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
198 op3->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
208 struct rte_crypto_op *op0;
212 next[0] = crypto_op_get_priv (op0)->next;
213 bi[0] = crypto_op_get_priv (op0)->bi;
215 n_deq[crypto_op_get_priv (op0)->encrypt] += 1;
217 dpdk_crypto_input_check_op (vm, node, op0, next + 0);
219 op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
228 vlib_node_increment_counter (vm, node->node_index,
229 DPDK_CRYPTO_INPUT_ERROR_DQ_COPS, total_n_deq);
231 res->inflights[0] -= n_deq[0];
232 res->inflights[1] -= n_deq[1];
234 vlib_buffer_enqueue_to_next (vm, node, bis, nexts, total_n_deq);
236 dpdk_crypto_input_trace (vm, node, res->dev_id, bis, nexts, total_n_deq);
238 crypto_free_ops (numa, cwm->ops, total_n_deq);
243 static_always_inline uword
244 dpdk_crypto_input_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
245 vlib_frame_t * frame)
247 dpdk_crypto_main_t *dcm = &dpdk_crypto_main;
248 crypto_worker_main_t *cwm = &dcm->workers_main[vm->thread_index];
249 crypto_resource_t *res;
251 u16 *remove = NULL, *res_idx;
255 vec_foreach (res_idx, cwm->resource_idx)
257 res = vec_elt_at_index (dcm->resource, res_idx[0]);
258 u32 inflights = res->inflights[0] + res->inflights[1];
261 n_deq += dpdk_crypto_dequeue (vm, cwm, node, res);
263 inflights = res->inflights[0] + res->inflights[1];
264 if (PREDICT_FALSE (res->remove && !(inflights)))
265 vec_add1 (remove, res_idx[0]);
269 /* TODO removal on master thread? */
270 if (PREDICT_FALSE (remove != NULL))
273 vec_foreach (res_idx, remove)
275 i = vec_search (cwm->resource_idx, res_idx[0]);
276 vec_del1 (cwm->resource_idx, i);
278 res = vec_elt_at_index (dcm->resource, res_idx[0]);
279 res->thread_idx = (u16) ~0;
282 i = vec_search (dcm->dev[res->dev_id].used_resources, res_idx[0]);
283 ASSERT (i != (u16) ~0);
284 vec_del1 (dcm->dev[res->dev_id].used_resources, i);
285 vec_add1 (dcm->dev[res->dev_id].free_resources, res_idx[0]);
295 VLIB_NODE_FN (dpdk_crypto_input_node) (vlib_main_t * vm,
296 vlib_node_runtime_t * node,
297 vlib_frame_t * from_frame)
299 return dpdk_crypto_input_inline (vm, node, from_frame);
303 VLIB_REGISTER_NODE (dpdk_crypto_input_node) =
305 .name = "dpdk-crypto-input",
306 .flags = VLIB_NODE_FLAG_TRACE_SUPPORTED,
307 .format_trace = format_dpdk_crypto_input_trace,
308 .type = VLIB_NODE_TYPE_INPUT,
309 .state = VLIB_NODE_STATE_DISABLED,
310 .n_errors = DPDK_CRYPTO_INPUT_N_ERROR,
311 .error_strings = dpdk_crypto_input_error_strings,
312 .n_next_nodes = DPDK_CRYPTO_INPUT_N_NEXT,
315 #define _(s,n) [DPDK_CRYPTO_INPUT_NEXT_##s] = n,
316 foreach_dpdk_crypto_input_next
323 * fd.io coding-style-patch-verification: ON
326 * eval: (c-set-style "gnu")