New upstream version 18.11-rc1
[deb_dpdk.git] / drivers / crypto / aesni_mb / rte_aesni_mb_pmd_ops.c
1 /* SPDX-License-Identifier: BSD-3-Clause
2  * Copyright(c) 2015-2017 Intel Corporation
3  */
4
5 #include <string.h>
6
7 #include <rte_common.h>
8 #include <rte_malloc.h>
9 #include <rte_cryptodev_pmd.h>
10
11 #include "rte_aesni_mb_pmd_private.h"
12
13
14 static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {
15         {       /* MD5 HMAC */
16                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
17                 {.sym = {
18                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
19                         {.auth = {
20                                 .algo = RTE_CRYPTO_AUTH_MD5_HMAC,
21                                 .block_size = 64,
22                                 .key_size = {
23                                         .min = 1,
24                                         .max = 64,
25                                         .increment = 1
26                                 },
27                                 .digest_size = {
28 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
29                                         .min = 1,
30                                         .max = 16,
31                                         .increment = 1
32 #else
33                                         .min = 12,
34                                         .max = 12,
35                                         .increment = 0
36 #endif
37                                 },
38                                 .iv_size = { 0 }
39                         }, }
40                 }, }
41         },
42         {       /* SHA1 HMAC */
43                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
44                 {.sym = {
45                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
46                         {.auth = {
47                                 .algo = RTE_CRYPTO_AUTH_SHA1_HMAC,
48                                 .block_size = 64,
49                                 .key_size = {
50                                         .min = 1,
51 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
52                                         .max = 65535,
53 #else
54                                         .max = 64,
55 #endif
56                                         .increment = 1
57                                 },
58                                 .digest_size = {
59 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
60                                         .min = 1,
61                                         .max = 20,
62                                         .increment = 1
63 #else
64                                         .min = 12,
65                                         .max = 12,
66                                         .increment = 0
67 #endif
68                                 },
69                                 .iv_size = { 0 }
70                         }, }
71                 }, }
72         },
73         {       /* SHA224 HMAC */
74                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
75                 {.sym = {
76                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
77                         {.auth = {
78                                 .algo = RTE_CRYPTO_AUTH_SHA224_HMAC,
79                                 .block_size = 64,
80                                 .key_size = {
81                                         .min = 1,
82 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
83                                         .max = 65535,
84 #else
85                                         .max = 64,
86 #endif
87                                         .increment = 1
88                                 },
89                                 .digest_size = {
90 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
91                                         .min = 1,
92                                         .max = 28,
93                                         .increment = 1
94 #else
95                                         .min = 14,
96                                         .max = 14,
97                                         .increment = 0
98 #endif
99                                 },
100                                 .iv_size = { 0 }
101                         }, }
102                 }, }
103         },
104         {       /* SHA256 HMAC */
105                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
106                 {.sym = {
107                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
108                         {.auth = {
109                                 .algo = RTE_CRYPTO_AUTH_SHA256_HMAC,
110                                 .block_size = 64,
111                                 .key_size = {
112                                         .min = 1,
113 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
114                                         .max = 65535,
115 #else
116                                         .max = 64,
117 #endif
118                                         .increment = 1
119                                 },
120                                 .digest_size = {
121 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
122                                         .min = 1,
123                                         .max = 32,
124                                         .increment = 1
125 #else
126                                         .min = 16,
127                                         .max = 16,
128                                         .increment = 0
129 #endif
130                                 },
131                                 .iv_size = { 0 }
132                         }, }
133                 }, }
134         },
135         {       /* SHA384 HMAC */
136                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
137                 {.sym = {
138                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
139                         {.auth = {
140                                 .algo = RTE_CRYPTO_AUTH_SHA384_HMAC,
141                                 .block_size = 128,
142                                 .key_size = {
143                                         .min = 1,
144 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
145                                         .max = 65535,
146 #else
147                                         .max = 128,
148 #endif
149                                         .increment = 1
150                                 },
151                                 .digest_size = {
152 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
153                                         .min = 1,
154                                         .max = 48,
155                                         .increment = 1
156 #else
157                                         .min = 24,
158                                         .max = 24,
159                                         .increment = 0
160 #endif
161                                 },
162                                 .iv_size = { 0 }
163                         }, }
164                 }, }
165         },
166         {       /* SHA512 HMAC */
167                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
168                 {.sym = {
169                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
170                         {.auth = {
171                                 .algo = RTE_CRYPTO_AUTH_SHA512_HMAC,
172                                 .block_size = 128,
173                                 .key_size = {
174                                         .min = 1,
175 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
176                                         .max = 65535,
177 #else
178                                         .max = 128,
179 #endif
180                                         .increment = 1
181                                 },
182                                 .digest_size = {
183 #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0)
184                                         .min = 1,
185                                         .max = 64,
186                                         .increment = 1
187 #else
188                                         .min = 32,
189                                         .max = 32,
190                                         .increment = 0
191 #endif
192                                 },
193                                 .iv_size = { 0 }
194                         }, }
195                 }, }
196         },
197         {       /* AES XCBC HMAC */
198                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
199                 {.sym = {
200                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
201                         {.auth = {
202                                 .algo = RTE_CRYPTO_AUTH_AES_XCBC_MAC,
203                                 .block_size = 16,
204                                 .key_size = {
205                                         .min = 16,
206                                         .max = 16,
207                                         .increment = 0
208                                 },
209                                 .digest_size = {
210                                         .min = 12,
211                                         .max = 12,
212                                         .increment = 0
213                                 },
214                                 .iv_size = { 0 }
215                         }, }
216                 }, }
217         },
218         {       /* AES CBC */
219                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
220                 {.sym = {
221                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
222                         {.cipher = {
223                                 .algo = RTE_CRYPTO_CIPHER_AES_CBC,
224                                 .block_size = 16,
225                                 .key_size = {
226                                         .min = 16,
227                                         .max = 32,
228                                         .increment = 8
229                                 },
230                                 .iv_size = {
231                                         .min = 16,
232                                         .max = 16,
233                                         .increment = 0
234                                 }
235                         }, }
236                 }, }
237         },
238         {       /* AES CTR */
239                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
240                 {.sym = {
241                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
242                         {.cipher = {
243                                 .algo = RTE_CRYPTO_CIPHER_AES_CTR,
244                                 .block_size = 16,
245                                 .key_size = {
246                                         .min = 16,
247                                         .max = 32,
248                                         .increment = 8
249                                 },
250                                 .iv_size = {
251                                         .min = 12,
252                                         .max = 16,
253                                         .increment = 4
254                                 }
255                         }, }
256                 }, }
257         },
258         {       /* AES DOCSIS BPI */
259                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
260                 {.sym = {
261                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
262                         {.cipher = {
263                                 .algo = RTE_CRYPTO_CIPHER_AES_DOCSISBPI,
264                                 .block_size = 16,
265                                 .key_size = {
266                                         .min = 16,
267                                         .max = 16,
268                                         .increment = 0
269                                 },
270                                 .iv_size = {
271                                         .min = 16,
272                                         .max = 16,
273                                         .increment = 0
274                                 }
275                         }, }
276                 }, }
277         },
278         {       /* DES CBC */
279                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
280                 {.sym = {
281                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
282                         {.cipher = {
283                                 .algo = RTE_CRYPTO_CIPHER_DES_CBC,
284                                 .block_size = 8,
285                                 .key_size = {
286                                         .min = 8,
287                                         .max = 8,
288                                         .increment = 0
289                                 },
290                                 .iv_size = {
291                                         .min = 8,
292                                         .max = 8,
293                                         .increment = 0
294                                 }
295                         }, }
296                 }, }
297         },
298         {       /*  3DES CBC */
299                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
300                 {.sym = {
301                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
302                         {.cipher = {
303                                 .algo = RTE_CRYPTO_CIPHER_3DES_CBC,
304                                 .block_size = 8,
305                                 .key_size = {
306                                         .min = 8,
307                                         .max = 24,
308                                         .increment = 8
309                                 },
310                                 .iv_size = {
311                                         .min = 8,
312                                         .max = 8,
313                                         .increment = 0
314                                 }
315                         }, }
316                 }, }
317         },
318         {       /* DES DOCSIS BPI */
319                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
320                 {.sym = {
321                         .xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,
322                         {.cipher = {
323                                 .algo = RTE_CRYPTO_CIPHER_DES_DOCSISBPI,
324                                 .block_size = 8,
325                                 .key_size = {
326                                         .min = 8,
327                                         .max = 8,
328                                         .increment = 0
329                                 },
330                                 .iv_size = {
331                                         .min = 8,
332                                         .max = 8,
333                                         .increment = 0
334                                 }
335                         }, }
336                 }, }
337         },
338         {       /* AES CCM */
339                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
340                 {.sym = {
341                         .xform_type = RTE_CRYPTO_SYM_XFORM_AEAD,
342                         {.aead = {
343                                 .algo = RTE_CRYPTO_AEAD_AES_CCM,
344                                 .block_size = 16,
345                                 .key_size = {
346                                         .min = 16,
347                                         .max = 16,
348                                         .increment = 0
349                                 },
350                                 .digest_size = {
351                                         .min = 4,
352                                         .max = 16,
353                                         .increment = 2
354                                 },
355                                 .aad_size = {
356                                         .min = 0,
357                                         .max = 46,
358                                         .increment = 1
359                                 },
360                                 .iv_size = {
361                                         .min = 7,
362                                         .max = 13,
363                                         .increment = 1
364                                 },
365                         }, }
366                 }, }
367         },
368         {       /* AES CMAC */
369                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
370                 {.sym = {
371                         .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,
372                         {.auth = {
373                                 .algo = RTE_CRYPTO_AUTH_AES_CMAC,
374                                 .block_size = 16,
375                                 .key_size = {
376                                         .min = 16,
377                                         .max = 16,
378                                         .increment = 0
379                                 },
380                                 .digest_size = {
381                                         .min = 1,
382                                         .max = 16,
383                                         .increment = 1
384                                 },
385                                 .iv_size = { 0 }
386                         }, }
387                 }, }
388         },
389         {       /* AES GCM */
390                 .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,
391                 {.sym = {
392                         .xform_type = RTE_CRYPTO_SYM_XFORM_AEAD,
393                         {.aead = {
394                                 .algo = RTE_CRYPTO_AEAD_AES_GCM,
395                                 .block_size = 16,
396                                 .key_size = {
397                                         .min = 16,
398                                         .max = 32,
399                                         .increment = 8
400                                 },
401                                 .digest_size = {
402                                         .min = 8,
403                                         .max = 16,
404                                         .increment = 4
405                                 },
406                                 .aad_size = {
407                                         .min = 0,
408                                         .max = 65535,
409                                         .increment = 1
410                                 },
411                                 .iv_size = {
412                                         .min = 12,
413                                         .max = 12,
414                                         .increment = 0
415                                 }
416                         }, }
417                 }, }
418         },
419         RTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()
420 };
421
422
423 /** Configure device */
424 static int
425 aesni_mb_pmd_config(__rte_unused struct rte_cryptodev *dev,
426                 __rte_unused struct rte_cryptodev_config *config)
427 {
428         return 0;
429 }
430
431 /** Start device */
432 static int
433 aesni_mb_pmd_start(__rte_unused struct rte_cryptodev *dev)
434 {
435         return 0;
436 }
437
438 /** Stop device */
439 static void
440 aesni_mb_pmd_stop(__rte_unused struct rte_cryptodev *dev)
441 {
442 }
443
444 /** Close device */
445 static int
446 aesni_mb_pmd_close(__rte_unused struct rte_cryptodev *dev)
447 {
448         return 0;
449 }
450
451
452 /** Get device statistics */
453 static void
454 aesni_mb_pmd_stats_get(struct rte_cryptodev *dev,
455                 struct rte_cryptodev_stats *stats)
456 {
457         int qp_id;
458
459         for (qp_id = 0; qp_id < dev->data->nb_queue_pairs; qp_id++) {
460                 struct aesni_mb_qp *qp = dev->data->queue_pairs[qp_id];
461
462                 stats->enqueued_count += qp->stats.enqueued_count;
463                 stats->dequeued_count += qp->stats.dequeued_count;
464
465                 stats->enqueue_err_count += qp->stats.enqueue_err_count;
466                 stats->dequeue_err_count += qp->stats.dequeue_err_count;
467         }
468 }
469
470 /** Reset device statistics */
471 static void
472 aesni_mb_pmd_stats_reset(struct rte_cryptodev *dev)
473 {
474         int qp_id;
475
476         for (qp_id = 0; qp_id < dev->data->nb_queue_pairs; qp_id++) {
477                 struct aesni_mb_qp *qp = dev->data->queue_pairs[qp_id];
478
479                 memset(&qp->stats, 0, sizeof(qp->stats));
480         }
481 }
482
483
484 /** Get device info */
485 static void
486 aesni_mb_pmd_info_get(struct rte_cryptodev *dev,
487                 struct rte_cryptodev_info *dev_info)
488 {
489         struct aesni_mb_private *internals = dev->data->dev_private;
490
491         if (dev_info != NULL) {
492                 dev_info->driver_id = dev->driver_id;
493                 dev_info->feature_flags = dev->feature_flags;
494                 dev_info->capabilities = aesni_mb_pmd_capabilities;
495                 dev_info->max_nb_queue_pairs = internals->max_nb_queue_pairs;
496                 /* No limit of number of sessions */
497                 dev_info->sym.max_nb_sessions = 0;
498         }
499 }
500
501 /** Release queue pair */
502 static int
503 aesni_mb_pmd_qp_release(struct rte_cryptodev *dev, uint16_t qp_id)
504 {
505         struct aesni_mb_qp *qp = dev->data->queue_pairs[qp_id];
506         struct rte_ring *r = NULL;
507
508         if (qp != NULL) {
509                 r = rte_ring_lookup(qp->name);
510                 if (r)
511                         rte_ring_free(r);
512                 if (qp->mb_mgr)
513                         free_mb_mgr(qp->mb_mgr);
514                 rte_free(qp);
515                 dev->data->queue_pairs[qp_id] = NULL;
516         }
517         return 0;
518 }
519
520 /** set a unique name for the queue pair based on it's name, dev_id and qp_id */
521 static int
522 aesni_mb_pmd_qp_set_unique_name(struct rte_cryptodev *dev,
523                 struct aesni_mb_qp *qp)
524 {
525         unsigned n = snprintf(qp->name, sizeof(qp->name),
526                         "aesni_mb_pmd_%u_qp_%u",
527                         dev->data->dev_id, qp->id);
528
529         if (n >= sizeof(qp->name))
530                 return -1;
531
532         return 0;
533 }
534
535 /** Create a ring to place processed operations on */
536 static struct rte_ring *
537 aesni_mb_pmd_qp_create_processed_ops_ring(struct aesni_mb_qp *qp,
538                 const char *str, unsigned int ring_size, int socket_id)
539 {
540         struct rte_ring *r;
541         char ring_name[RTE_CRYPTODEV_NAME_MAX_LEN];
542
543         unsigned int n = snprintf(ring_name, sizeof(ring_name),
544                                 "%s_%s",
545                                 qp->name, str);
546
547         if (n >= sizeof(ring_name))
548                 return NULL;
549
550         r = rte_ring_lookup(ring_name);
551         if (r) {
552                 if (rte_ring_get_size(r) >= ring_size) {
553                         AESNI_MB_LOG(INFO, "Reusing existing ring %s for processed ops",
554                         ring_name);
555                         return r;
556                 }
557
558                 AESNI_MB_LOG(ERR, "Unable to reuse existing ring %s for processed ops",
559                         ring_name);
560                 return NULL;
561         }
562
563         return rte_ring_create(ring_name, ring_size, socket_id,
564                         RING_F_SP_ENQ | RING_F_SC_DEQ);
565 }
566
567 /** Setup a queue pair */
568 static int
569 aesni_mb_pmd_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id,
570                 const struct rte_cryptodev_qp_conf *qp_conf,
571                 int socket_id, struct rte_mempool *session_pool)
572 {
573         struct aesni_mb_qp *qp = NULL;
574         struct aesni_mb_private *internals = dev->data->dev_private;
575         int ret = -1;
576
577         /* Free memory prior to re-allocation if needed. */
578         if (dev->data->queue_pairs[qp_id] != NULL)
579                 aesni_mb_pmd_qp_release(dev, qp_id);
580
581         /* Allocate the queue pair data structure. */
582         qp = rte_zmalloc_socket("AES-NI PMD Queue Pair", sizeof(*qp),
583                                         RTE_CACHE_LINE_SIZE, socket_id);
584         if (qp == NULL)
585                 return -ENOMEM;
586
587         qp->id = qp_id;
588         dev->data->queue_pairs[qp_id] = qp;
589
590         if (aesni_mb_pmd_qp_set_unique_name(dev, qp))
591                 goto qp_setup_cleanup;
592
593
594         qp->mb_mgr = alloc_mb_mgr(0);
595         if (qp->mb_mgr == NULL) {
596                 ret = -ENOMEM;
597                 goto qp_setup_cleanup;
598         }
599
600         qp->op_fns = &job_ops[internals->vector_mode];
601
602         qp->ingress_queue = aesni_mb_pmd_qp_create_processed_ops_ring(qp,
603                         "ingress", qp_conf->nb_descriptors, socket_id);
604         if (qp->ingress_queue == NULL) {
605                 ret = -1;
606                 goto qp_setup_cleanup;
607         }
608
609         qp->sess_mp = session_pool;
610
611         memset(&qp->stats, 0, sizeof(qp->stats));
612
613         char mp_name[RTE_MEMPOOL_NAMESIZE];
614
615         snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
616                                 "digest_mp_%u_%u", dev->data->dev_id, qp_id);
617
618         /* Initialise multi-buffer manager */
619         (*qp->op_fns->job.init_mgr)(qp->mb_mgr);
620         return 0;
621
622 qp_setup_cleanup:
623         if (qp) {
624                 if (qp->mb_mgr == NULL)
625                         free_mb_mgr(qp->mb_mgr);
626                 rte_free(qp);
627         }
628
629         return ret;
630 }
631
632 /** Return the number of allocated queue pairs */
633 static uint32_t
634 aesni_mb_pmd_qp_count(struct rte_cryptodev *dev)
635 {
636         return dev->data->nb_queue_pairs;
637 }
638
639 /** Returns the size of the aesni multi-buffer session structure */
640 static unsigned
641 aesni_mb_pmd_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)
642 {
643         return sizeof(struct aesni_mb_session);
644 }
645
646 /** Configure a aesni multi-buffer session from a crypto xform chain */
647 static int
648 aesni_mb_pmd_sym_session_configure(struct rte_cryptodev *dev,
649                 struct rte_crypto_sym_xform *xform,
650                 struct rte_cryptodev_sym_session *sess,
651                 struct rte_mempool *mempool)
652 {
653         void *sess_private_data;
654         struct aesni_mb_private *internals = dev->data->dev_private;
655         int ret;
656
657         if (unlikely(sess == NULL)) {
658                 AESNI_MB_LOG(ERR, "invalid session struct");
659                 return -EINVAL;
660         }
661
662         if (rte_mempool_get(mempool, &sess_private_data)) {
663                 AESNI_MB_LOG(ERR,
664                                 "Couldn't get object from session mempool");
665                 return -ENOMEM;
666         }
667
668         ret = aesni_mb_set_session_parameters(&job_ops[internals->vector_mode],
669                         sess_private_data, xform);
670         if (ret != 0) {
671                 AESNI_MB_LOG(ERR, "failed configure session parameters");
672
673                 /* Return session to mempool */
674                 rte_mempool_put(mempool, sess_private_data);
675                 return ret;
676         }
677
678         set_sym_session_private_data(sess, dev->driver_id,
679                         sess_private_data);
680
681         return 0;
682 }
683
684 /** Clear the memory of session so it doesn't leave key material behind */
685 static void
686 aesni_mb_pmd_sym_session_clear(struct rte_cryptodev *dev,
687                 struct rte_cryptodev_sym_session *sess)
688 {
689         uint8_t index = dev->driver_id;
690         void *sess_priv = get_sym_session_private_data(sess, index);
691
692         /* Zero out the whole structure */
693         if (sess_priv) {
694                 memset(sess_priv, 0, sizeof(struct aesni_mb_session));
695                 struct rte_mempool *sess_mp = rte_mempool_from_obj(sess_priv);
696                 set_sym_session_private_data(sess, index, NULL);
697                 rte_mempool_put(sess_mp, sess_priv);
698         }
699 }
700
701 struct rte_cryptodev_ops aesni_mb_pmd_ops = {
702                 .dev_configure          = aesni_mb_pmd_config,
703                 .dev_start              = aesni_mb_pmd_start,
704                 .dev_stop               = aesni_mb_pmd_stop,
705                 .dev_close              = aesni_mb_pmd_close,
706
707                 .stats_get              = aesni_mb_pmd_stats_get,
708                 .stats_reset            = aesni_mb_pmd_stats_reset,
709
710                 .dev_infos_get          = aesni_mb_pmd_info_get,
711
712                 .queue_pair_setup       = aesni_mb_pmd_qp_setup,
713                 .queue_pair_release     = aesni_mb_pmd_qp_release,
714                 .queue_pair_count       = aesni_mb_pmd_qp_count,
715
716                 .sym_session_get_size   = aesni_mb_pmd_sym_session_get_size,
717                 .sym_session_configure  = aesni_mb_pmd_sym_session_configure,
718                 .sym_session_clear      = aesni_mb_pmd_sym_session_clear
719 };
720
721 struct rte_cryptodev_ops *rte_aesni_mb_pmd_ops = &aesni_mb_pmd_ops;