common/mlx5: fix user mode register access command
[dpdk.git] / lib / librte_security / rte_security.c
index 6461dba..515c29e 100644 (file)
@@ -1,42 +1,28 @@
-/*-
- *   BSD LICENSE
- *
- *   Copyright 2017 NXP.
- *   Copyright(c) 2017 Intel Corporation. All rights reserved.
- *
- *   Redistribution and use in source and binary forms, with or without
- *   modification, are permitted provided that the following conditions
- *   are met:
- *
- *     * Redistributions of source code must retain the above copyright
- *       notice, this list of conditions and the following disclaimer.
- *     * Redistributions in binary form must reproduce the above copyright
- *       notice, this list of conditions and the following disclaimer in
- *       the documentation and/or other materials provided with the
- *       distribution.
- *     * Neither the name of NXP nor the names of its
- *       contributors may be used to endorse or promote products derived
- *       from this software without specific prior written permission.
- *
- *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+/* SPDX-License-Identifier: BSD-3-Clause
+ * Copyright 2017 NXP.
+ * Copyright(c) 2017 Intel Corporation.
+ * Copyright (c) 2020 Samsung Electronics Co., Ltd All Rights Reserved
  */
 
 #include <rte_malloc.h>
 #include <rte_dev.h>
-
+#include "rte_compat.h"
 #include "rte_security.h"
 #include "rte_security_driver.h"
 
+/* Macro to check for invalid pointers */
+#define RTE_PTR_OR_ERR_RET(ptr, retval) do {   \
+       if ((ptr) == NULL)                      \
+               return retval;                  \
+} while (0)
+
+/* Macro to check for invalid pointers chains */
+#define RTE_PTR_CHAIN3_OR_ERR_RET(p1, p2, p3, retval, last_retval) do {        \
+       RTE_PTR_OR_ERR_RET(p1, retval);                                 \
+       RTE_PTR_OR_ERR_RET(p1->p2, retval);                             \
+       RTE_PTR_OR_ERR_RET(p1->p2->p3, last_retval);                    \
+} while (0)
+
 struct rte_security_session *
 rte_security_session_create(struct rte_security_ctx *instance,
                            struct rte_security_session_conf *conf,
@@ -44,12 +30,11 @@ rte_security_session_create(struct rte_security_ctx *instance,
 {
        struct rte_security_session *sess = NULL;
 
-       if (conf == NULL)
-               return NULL;
-
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_create, NULL);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_create, NULL, NULL);
+       RTE_PTR_OR_ERR_RET(conf, NULL);
+       RTE_PTR_OR_ERR_RET(mp, NULL);
 
-       if (rte_mempool_get(mp, (void *)&sess))
+       if (rte_mempool_get(mp, (void **)&sess))
                return NULL;
 
        if (instance->ops->session_create(instance->device, conf, sess, mp)) {
@@ -66,14 +51,19 @@ rte_security_session_update(struct rte_security_ctx *instance,
                            struct rte_security_session *sess,
                            struct rte_security_session_conf *conf)
 {
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_update, -ENOTSUP);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_update, -EINVAL,
+                       -ENOTSUP);
+       RTE_PTR_OR_ERR_RET(sess, -EINVAL);
+       RTE_PTR_OR_ERR_RET(conf, -EINVAL);
+
        return instance->ops->session_update(instance->device, sess, conf);
 }
 
 unsigned int
 rte_security_session_get_size(struct rte_security_ctx *instance)
 {
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_get_size, 0);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_get_size, 0, 0);
+
        return instance->ops->session_get_size(instance->device);
 }
 
@@ -82,7 +72,11 @@ rte_security_session_stats_get(struct rte_security_ctx *instance,
                               struct rte_security_session *sess,
                               struct rte_security_stats *stats)
 {
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_stats_get, -ENOTSUP);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_stats_get, -EINVAL,
+                       -ENOTSUP);
+       /* Parameter sess can be NULL in case of getting global statistics. */
+       RTE_PTR_OR_ERR_RET(stats, -EINVAL);
+
        return instance->ops->session_stats_get(instance->device, sess, stats);
 }
 
@@ -91,18 +85,21 @@ rte_security_session_destroy(struct rte_security_ctx *instance,
                             struct rte_security_session *sess)
 {
        int ret;
-       struct rte_mempool *mp = rte_mempool_from_obj(sess);
 
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_destroy, -ENOTSUP);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_destroy, -EINVAL,
+                       -ENOTSUP);
+       RTE_PTR_OR_ERR_RET(sess, -EINVAL);
+
+       ret = instance->ops->session_destroy(instance->device, sess);
+       if (ret != 0)
+               return ret;
+
+       rte_mempool_put(rte_mempool_from_obj(sess), (void *)sess);
 
        if (instance->sess_cnt)
                instance->sess_cnt--;
 
-       ret = instance->ops->session_destroy(instance->device, sess);
-       if (!ret)
-               rte_mempool_put(mp, (void *)sess);
-
-       return ret;
+       return 0;
 }
 
 int
@@ -110,6 +107,11 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *instance,
                              struct rte_security_session *sess,
                              struct rte_mbuf *m, void *params)
 {
+#ifdef RTE_DEBUG
+       RTE_PTR_OR_ERR_RET(sess, -EINVAL);
+       RTE_PTR_OR_ERR_RET(instance, -EINVAL);
+       RTE_PTR_OR_ERR_RET(instance->ops, -EINVAL);
+#endif
        RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->set_pkt_metadata, -ENOTSUP);
        return instance->ops->set_pkt_metadata(instance->device,
                                               sess, m, params);
@@ -120,6 +122,10 @@ rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md)
 {
        void *userdata = NULL;
 
+#ifdef RTE_DEBUG
+       RTE_PTR_OR_ERR_RET(instance, NULL);
+       RTE_PTR_OR_ERR_RET(instance->ops, NULL);
+#endif
        RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->get_userdata, NULL);
        if (instance->ops->get_userdata(instance->device, md, &userdata))
                return NULL;
@@ -130,7 +136,8 @@ rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md)
 const struct rte_security_capability *
 rte_security_capabilities_get(struct rte_security_ctx *instance)
 {
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->capabilities_get, NULL);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
+
        return instance->ops->capabilities_get(instance->device);
 }
 
@@ -142,7 +149,9 @@ rte_security_capability_get(struct rte_security_ctx *instance,
        const struct rte_security_capability *capability;
        uint16_t i = 0;
 
-       RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->capabilities_get, NULL);
+       RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
+       RTE_PTR_OR_ERR_RET(idx, NULL);
+
        capabilities = instance->ops->capabilities_get(instance->device);
 
        if (capabilities == NULL)
@@ -150,7 +159,7 @@ rte_security_capability_get(struct rte_security_ctx *instance,
 
        while ((capability = &capabilities[i++])->action
                        != RTE_SECURITY_ACTION_TYPE_NONE) {
-               if (capability->action  == idx->action &&
+               if (capability->action == idx->action &&
                                capability->protocol == idx->protocol) {
                        if (idx->protocol == RTE_SECURITY_PROTOCOL_IPSEC) {
                                if (capability->ipsec.proto ==
@@ -160,6 +169,15 @@ rte_security_capability_get(struct rte_security_ctx *instance,
                                        capability->ipsec.direction ==
                                                        idx->ipsec.direction)
                                        return capability;
+                       } else if (idx->protocol == RTE_SECURITY_PROTOCOL_PDCP) {
+                               if (capability->pdcp.domain ==
+                                                       idx->pdcp.domain)
+                                       return capability;
+                       } else if (idx->protocol ==
+                                               RTE_SECURITY_PROTOCOL_DOCSIS) {
+                               if (capability->docsis.direction ==
+                                                       idx->docsis.direction)
+                                       return capability;
                        }
                }
        }