2 *------------------------------------------------------------------
3 * crypto_node.c - DPDK Cryptodev input node
5 * Copyright (c) 2017 Intel and/or its affiliates.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a opy of the License at:
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 *------------------------------------------------------------------
20 #include <vlib/vlib.h>
21 #include <vnet/ip/ip.h>
22 #include <vnet/ethernet/ethernet.h>
23 #include <vnet/ipsec/ipsec.h>
25 #include <dpdk/device/dpdk.h>
26 #include <dpdk/device/dpdk_priv.h>
27 #include <dpdk/ipsec/ipsec.h>
29 #define foreach_dpdk_crypto_input_error \
30 _(DQ_COPS, "Crypto ops dequeued") \
31 _(STATUS, "Crypto operation failed")
35 #define _(f,s) DPDK_CRYPTO_INPUT_ERROR_##f,
36 foreach_dpdk_crypto_input_error
38 DPDK_CRYPTO_INPUT_N_ERROR,
39 } dpdk_crypto_input_error_t;
41 static char *dpdk_crypto_input_error_strings[] = {
43 foreach_dpdk_crypto_input_error
47 vlib_node_registration_t dpdk_crypto_input_node;
52 } dpdk_crypto_input_trace_t;
54 #define foreach_cryptodev_status \
55 _(SUCCESS, "success") \
56 _(NOT_PROCESSED, "not processed") \
57 _(AUTH_FAILED, "auth failed") \
58 _(INVALID_SESSION, "invalid session") \
59 _(INVALID_ARGS, "invalid arguments") \
63 format_cryptodev_status (u8 * s, va_list * args)
65 u32 status = va_arg (*args, u32);
70 #define _(x, z) case RTE_CRYPTO_OP_STATUS_##x: str = z; break;
71 foreach_cryptodev_status
74 s = format (s, "%s", str);
80 format_dpdk_crypto_input_trace (u8 * s, va_list * args)
82 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
83 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
84 dpdk_crypto_input_trace_t *t = va_arg (*args, dpdk_crypto_input_trace_t *);
86 s = format (s, "status: %U", format_cryptodev_status, t->status);
91 static_always_inline u32
92 dpdk_crypto_dequeue (vlib_main_t * vm, vlib_node_runtime_t * node,
93 crypto_resource_t * res, u8 outbound)
95 u32 n_deq, total_n_deq = 0, *to_next = 0, n_ops, next_index;
96 u32 thread_idx = vlib_get_thread_index ();
97 dpdk_crypto_main_t *dcm = &dpdk_crypto_main;
98 u8 numa = rte_socket_id ();
99 crypto_worker_main_t *cwm =
100 vec_elt_at_index (dcm->workers_main, thread_idx);
101 struct rte_crypto_op **ops;
103 next_index = node->cached_next_index;
108 n_ops = rte_cryptodev_dequeue_burst (res->dev_id,
109 res->qp_id + outbound,
110 ops, VLIB_FRAME_SIZE);
111 res->inflights[outbound] -= n_ops;
112 ASSERT (res->inflights >= 0);
115 total_n_deq += n_ops;
121 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
123 while (n_ops > 0 && n_left_to_next > 0)
126 vlib_buffer_t *b0 = 0;
127 struct rte_crypto_op *op;
134 dpdk_op_priv_t *priv = crypto_op_get_priv (op);
137 if (PREDICT_FALSE (op->status != RTE_CRYPTO_OP_STATUS_SUCCESS))
139 next0 = DPDK_CRYPTO_INPUT_NEXT_DROP;
140 vlib_node_increment_counter (vm,
141 dpdk_crypto_input_node.index,
142 DPDK_CRYPTO_INPUT_ERROR_STATUS,
146 /* XXX store bi0 and next0 in op private? */
148 b0 = vlib_buffer_from_rte_mbuf (op->sym[0].m_src);
149 bi0 = vlib_get_buffer_index (vm, b0);
154 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
156 vlib_trace_next_frame (vm, node, next0);
157 dpdk_crypto_input_trace_t *tr =
158 vlib_add_trace (vm, node, b0, sizeof (*tr));
159 tr->status = op->status;
162 op->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
164 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
165 n_left_to_next, bi0, next0);
167 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
170 crypto_free_ops (numa, cwm->ops, n_deq);
172 while (n_deq == VLIB_FRAME_SIZE && res->inflights[outbound]);
174 vlib_node_increment_counter (vm, dpdk_crypto_input_node.index,
175 DPDK_CRYPTO_INPUT_ERROR_DQ_COPS, total_n_deq);
180 dpdk_crypto_input_fn (vlib_main_t * vm, vlib_node_runtime_t * node,
181 vlib_frame_t * frame)
183 u32 thread_index = vlib_get_thread_index ();
184 dpdk_crypto_main_t *dcm = &dpdk_crypto_main;
185 crypto_worker_main_t *cwm = &dcm->workers_main[thread_index];
186 crypto_resource_t *res;
189 u16 *remove = NULL, *res_idx;
193 vec_foreach (res_idx, cwm->resource_idx)
195 res = vec_elt_at_index (dcm->resource, res_idx[0]);
198 if (res->inflights[outbound])
199 n_deq += dpdk_crypto_dequeue (vm, node, res, outbound);
202 if (res->inflights[outbound])
203 n_deq += dpdk_crypto_dequeue (vm, node, res, outbound);
205 if (unlikely(res->remove && !(res->inflights[0] || res->inflights[1])))
206 vec_add1 (remove, res_idx[0]);
210 /* TODO removal on master thread? */
211 if (PREDICT_FALSE (remove != NULL))
214 vec_foreach (res_idx, remove)
216 i = vec_search (cwm->resource_idx, res_idx[0]);
217 vec_del1 (cwm->resource_idx, i);
219 res = vec_elt_at_index (dcm->resource, res_idx[0]);
220 res->thread_idx = (u16) ~0;
223 i = vec_search (dcm->dev[res->dev_id].used_resources, res_idx[0]);
224 ASSERT (i != (u16) ~0);
225 vec_del1 (dcm->dev[res->dev_id].used_resources, i);
226 vec_add1 (dcm->dev[res->dev_id].free_resources, res_idx[0]);
233 /* TODO Clear all sessions in device */
239 VLIB_REGISTER_NODE (dpdk_crypto_input_node) =
241 .function = dpdk_crypto_input_fn,
242 .name = "dpdk-crypto-input",
243 .format_trace = format_dpdk_crypto_input_trace,
244 .type = VLIB_NODE_TYPE_INPUT,
245 .state = VLIB_NODE_STATE_DISABLED,
246 .n_errors = DPDK_CRYPTO_INPUT_N_ERROR,
247 .error_strings = dpdk_crypto_input_error_strings,
248 .n_next_nodes = DPDK_CRYPTO_INPUT_N_NEXT,
251 #define _(s,n) [DPDK_CRYPTO_INPUT_NEXT_##s] = n,
252 foreach_dpdk_crypto_input_next
258 VLIB_NODE_FUNCTION_MULTIARCH (dpdk_crypto_input_node, dpdk_crypto_input_fn)
260 * fd.io coding-style-patch-verification: ON
263 * eval: (c-set-style "gnu")