1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(C) 2021 Marvell.
5 #include <rte_cryptodev.h>
6 #include <cryptodev_pmd.h>
7 #include <rte_event_crypto_adapter.h>
10 #include "cn10k_cryptodev.h"
11 #include "cn10k_cryptodev_ops.h"
12 #include "cn10k_ipsec_la_ops.h"
13 #include "cn10k_ipsec.h"
15 #include "cnxk_cryptodev.h"
16 #include "cnxk_cryptodev_ops.h"
21 static inline struct cnxk_se_sess *
22 cn10k_cpt_sym_temp_sess_create(struct cnxk_cpt_qp *qp, struct rte_crypto_op *op)
24 const int driver_id = cn10k_cryptodev_driver_id;
25 struct rte_crypto_sym_op *sym_op = op->sym;
26 struct rte_cryptodev_sym_session *sess;
27 struct cnxk_se_sess *priv;
30 /* Create temporary session */
31 sess = rte_cryptodev_sym_session_create(qp->sess_mp);
35 ret = sym_session_configure(qp->lf.roc_cpt, driver_id, sym_op->xform,
36 sess, qp->sess_mp_priv);
40 priv = get_sym_session_private_data(sess, driver_id);
42 sym_op->session = sess;
47 rte_mempool_put(qp->sess_mp, sess);
51 static __rte_always_inline int __rte_hot
52 cpt_sec_inst_fill(struct cnxk_cpt_qp *qp, struct rte_crypto_op *op,
53 struct cn10k_sec_session *sess, struct cpt_inst_s *inst)
55 struct rte_crypto_sym_op *sym_op = op->sym;
56 struct cn10k_ipsec_sa *sa;
59 if (unlikely(sym_op->m_dst && sym_op->m_dst != sym_op->m_src)) {
60 plt_dp_err("Out of place is not supported");
64 if (unlikely(!rte_pktmbuf_is_contiguous(sym_op->m_src))) {
65 plt_dp_err("Scatter Gather mode is not supported");
72 ret = process_outb_sa(&qp->lf, op, sa, inst);
74 ret = process_inb_sa(op, sa, inst);
79 static __rte_always_inline int __rte_hot
80 cpt_sym_inst_fill(struct cnxk_cpt_qp *qp, struct rte_crypto_op *op,
81 struct cnxk_se_sess *sess, struct cpt_inflight_req *infl_req,
82 struct cpt_inst_s *inst)
87 cpt_op = sess->cpt_op;
89 if (cpt_op & ROC_SE_OP_CIPHER_MASK)
90 ret = fill_fc_params(op, sess, &qp->meta_info, infl_req, inst);
92 ret = fill_digest_params(op, sess, &qp->meta_info, infl_req,
99 cn10k_cpt_fill_inst(struct cnxk_cpt_qp *qp, struct rte_crypto_op *ops[],
100 struct cpt_inst_s inst[], struct cpt_inflight_req *infl_req)
102 struct cn10k_sec_session *sec_sess;
103 struct rte_crypto_asym_op *asym_op;
104 struct rte_crypto_sym_op *sym_op;
105 struct cnxk_ae_sess *ae_sess;
106 struct cnxk_se_sess *sess;
107 struct rte_crypto_op *op;
111 const union cpt_res_s res = {
112 .cn10k.compcode = CPT_COMP_NOT_DONE,
123 if (op->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
124 if (op->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
125 sec_sess = get_sec_session_private_data(
126 sym_op->sec_session);
127 ret = cpt_sec_inst_fill(qp, op, sec_sess, &inst[0]);
130 w7 = sec_sess->sa.inst.w7;
131 } else if (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
132 sess = get_sym_session_private_data(
133 sym_op->session, cn10k_cryptodev_driver_id);
134 ret = cpt_sym_inst_fill(qp, op, sess, infl_req,
138 w7 = sess->cpt_inst_w7;
140 sess = cn10k_cpt_sym_temp_sess_create(qp, op);
141 if (unlikely(sess == NULL)) {
142 plt_dp_err("Could not create temp session");
146 ret = cpt_sym_inst_fill(qp, op, sess, infl_req,
149 sym_session_clear(cn10k_cryptodev_driver_id,
151 rte_mempool_put(qp->sess_mp, op->sym->session);
154 w7 = sess->cpt_inst_w7;
156 } else if (op->type == RTE_CRYPTO_OP_TYPE_ASYMMETRIC) {
158 if (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
160 ae_sess = (struct cnxk_ae_sess *)
161 asym_op->session->sess_private_data;
162 ret = cnxk_ae_enqueue(qp, op, infl_req, &inst[0],
166 w7 = ae_sess->cpt_inst_w7;
168 plt_dp_err("Not supported Asym op without session");
172 plt_dp_err("Unsupported op type");
176 inst[0].res_addr = (uint64_t)&infl_req->res;
177 __atomic_store_n(&infl_req->res.u64[0], res.u64[0], __ATOMIC_RELAXED);
185 #define PKTS_PER_LOOP 32
186 #define PKTS_PER_STEORL 16
189 cn10k_cpt_enqueue_burst(void *qptr, struct rte_crypto_op **ops, uint16_t nb_ops)
191 uint64_t lmt_base, lmt_arg, io_addr;
192 struct cpt_inflight_req *infl_req;
193 uint16_t nb_allowed, count = 0;
194 struct cnxk_cpt_qp *qp = qptr;
195 struct pending_queue *pend_q;
196 struct cpt_inst_s *inst;
201 pend_q = &qp->pend_q;
203 const uint64_t pq_mask = pend_q->pq_mask;
206 nb_allowed = pending_queue_free_cnt(head, pend_q->tail, pq_mask);
207 nb_ops = RTE_MIN(nb_ops, nb_allowed);
209 if (unlikely(nb_ops == 0))
212 lmt_base = qp->lmtline.lmt_base;
213 io_addr = qp->lmtline.io_addr;
215 ROC_LMT_BASE_ID_GET(lmt_base, lmt_id);
216 inst = (struct cpt_inst_s *)lmt_base;
219 for (i = 0; i < RTE_MIN(PKTS_PER_LOOP, nb_ops); i++) {
220 infl_req = &pend_q->req_queue[head];
221 infl_req->op_flags = 0;
223 ret = cn10k_cpt_fill_inst(qp, ops + i, &inst[2 * i], infl_req);
224 if (unlikely(ret != 1)) {
225 plt_dp_err("Could not process op: %p", ops + i);
231 pending_queue_advance(&head, pq_mask);
234 if (i > PKTS_PER_STEORL) {
235 lmt_arg = ROC_CN10K_CPT_LMT_ARG | (PKTS_PER_STEORL - 1) << 12 |
237 roc_lmt_submit_steorl(lmt_arg, io_addr);
238 lmt_arg = ROC_CN10K_CPT_LMT_ARG |
239 (i - PKTS_PER_STEORL - 1) << 12 |
240 (uint64_t)(lmt_id + PKTS_PER_STEORL);
241 roc_lmt_submit_steorl(lmt_arg, io_addr);
243 lmt_arg = ROC_CN10K_CPT_LMT_ARG | (i - 1) << 12 |
245 roc_lmt_submit_steorl(lmt_arg, io_addr);
250 if (nb_ops - i > 0 && i == PKTS_PER_LOOP) {
258 rte_atomic_thread_fence(__ATOMIC_RELEASE);
261 pend_q->time_out = rte_get_timer_cycles() +
262 DEFAULT_COMMAND_TIMEOUT * rte_get_timer_hz();
268 cn10k_cpt_crypto_adapter_ev_mdata_set(struct rte_cryptodev *dev __rte_unused,
270 enum rte_crypto_op_type op_type,
271 enum rte_crypto_op_sess_type sess_type,
274 union rte_event_crypto_metadata *ec_mdata = mdata;
275 struct rte_event *rsp_info;
276 struct cnxk_cpt_qp *qp;
282 cdev_id = ec_mdata->request_info.cdev_id;
283 qp_id = ec_mdata->request_info.queue_pair_id;
284 qp = rte_cryptodevs[cdev_id].data->queue_pairs[qp_id];
287 rsp_info = &ec_mdata->response_info;
288 w2 = CNXK_CPT_INST_W2(
289 (RTE_EVENT_TYPE_CRYPTODEV << 28) | rsp_info->flow_id,
290 rsp_info->sched_type, rsp_info->queue_id, 0);
292 /* Set meta according to session type */
293 if (op_type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
294 if (sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
295 struct cn10k_sec_session *priv;
296 struct cn10k_ipsec_sa *sa;
298 priv = get_sec_session_private_data(sess);
302 } else if (sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
303 struct cnxk_se_sess *priv;
305 priv = get_sym_session_private_data(
306 sess, cn10k_cryptodev_driver_id);
308 priv->cpt_inst_w2 = w2;
311 } else if (op_type == RTE_CRYPTO_OP_TYPE_ASYMMETRIC) {
312 if (sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
313 struct rte_cryptodev_asym_session *asym_sess = sess;
314 struct cnxk_ae_sess *priv;
316 priv = (struct cnxk_ae_sess *)asym_sess->sess_private_data;
318 priv->cpt_inst_w2 = w2;
328 cn10k_ca_meta_info_extract(struct rte_crypto_op *op,
329 struct cnxk_cpt_qp **qp, uint64_t *w2)
331 if (op->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
332 if (op->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
333 struct cn10k_sec_session *priv;
334 struct cn10k_ipsec_sa *sa;
336 priv = get_sec_session_private_data(op->sym->sec_session);
340 } else if (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
341 struct cnxk_se_sess *priv;
343 priv = get_sym_session_private_data(
344 op->sym->session, cn10k_cryptodev_driver_id);
346 *w2 = priv->cpt_inst_w2;
348 union rte_event_crypto_metadata *ec_mdata;
349 struct rte_event *rsp_info;
353 ec_mdata = (union rte_event_crypto_metadata *)
354 ((uint8_t *)op + op->private_data_offset);
357 rsp_info = &ec_mdata->response_info;
358 cdev_id = ec_mdata->request_info.cdev_id;
359 qp_id = ec_mdata->request_info.queue_pair_id;
360 *qp = rte_cryptodevs[cdev_id].data->queue_pairs[qp_id];
361 *w2 = CNXK_CPT_INST_W2(
362 (RTE_EVENT_TYPE_CRYPTODEV << 28) | rsp_info->flow_id,
363 rsp_info->sched_type, rsp_info->queue_id, 0);
365 } else if (op->type == RTE_CRYPTO_OP_TYPE_ASYMMETRIC) {
366 if (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
367 struct rte_cryptodev_asym_session *asym_sess;
368 struct cnxk_ae_sess *priv;
370 asym_sess = op->asym->session;
371 priv = (struct cnxk_ae_sess *)asym_sess->sess_private_data;
373 *w2 = priv->cpt_inst_w2;
383 cn10k_cpt_crypto_adapter_enqueue(uintptr_t base, struct rte_crypto_op *op)
385 struct cpt_inflight_req *infl_req;
386 uint64_t lmt_base, lmt_arg, w2;
387 struct cpt_inst_s *inst;
388 struct cnxk_cpt_qp *qp;
392 ret = cn10k_ca_meta_info_extract(op, &qp, &w2);
398 if (unlikely(!qp->ca.enabled)) {
403 if (unlikely(rte_mempool_get(qp->ca.req_mp, (void **)&infl_req))) {
407 infl_req->op_flags = 0;
409 lmt_base = qp->lmtline.lmt_base;
410 ROC_LMT_BASE_ID_GET(lmt_base, lmt_id);
411 inst = (struct cpt_inst_s *)lmt_base;
413 ret = cn10k_cpt_fill_inst(qp, &op, inst, infl_req);
414 if (unlikely(ret != 1)) {
415 plt_dp_err("Could not process op: %p", op);
416 rte_mempool_put(qp->ca.req_mp, infl_req);
421 infl_req->res.cn10k.compcode = CPT_COMP_NOT_DONE;
424 inst->res_addr = (uint64_t)&infl_req->res;
426 inst->w3.u64 = CNXK_CPT_INST_W3(1, infl_req);
428 if (roc_cpt_is_iq_full(&qp->lf)) {
429 rte_mempool_put(qp->ca.req_mp, infl_req);
434 if (inst->w2.s.tt == RTE_SCHED_TYPE_ORDERED)
435 roc_sso_hws_head_wait(base);
437 lmt_arg = ROC_CN10K_CPT_LMT_ARG | (uint64_t)lmt_id;
438 roc_lmt_submit_steorl(lmt_arg, qp->lmtline.io_addr);
446 cn10k_cpt_sec_post_process(struct rte_crypto_op *cop,
447 struct cpt_cn10k_res_s *res)
449 struct rte_mbuf *mbuf = cop->sym->m_src;
450 const uint16_t m_len = res->rlen;
452 mbuf->data_len = m_len;
453 mbuf->pkt_len = m_len;
455 switch (res->uc_compcode) {
456 case ROC_IE_OT_UCC_SUCCESS:
458 case ROC_IE_OT_UCC_SUCCESS_PKT_IP_BADCSUM:
459 mbuf->ol_flags |= RTE_MBUF_F_RX_IP_CKSUM_BAD;
461 case ROC_IE_OT_UCC_SUCCESS_PKT_L4_GOODCSUM:
462 mbuf->ol_flags |= RTE_MBUF_F_RX_L4_CKSUM_GOOD |
463 RTE_MBUF_F_RX_IP_CKSUM_GOOD;
465 case ROC_IE_OT_UCC_SUCCESS_PKT_L4_BADCSUM:
466 mbuf->ol_flags |= RTE_MBUF_F_RX_L4_CKSUM_BAD |
467 RTE_MBUF_F_RX_IP_CKSUM_GOOD;
469 case ROC_IE_OT_UCC_SUCCESS_PKT_IP_GOODCSUM:
470 mbuf->ol_flags |= RTE_MBUF_F_RX_IP_CKSUM_GOOD;
472 case ROC_IE_OT_UCC_SUCCESS_SA_SOFTEXP_FIRST:
473 cop->aux_flags = RTE_CRYPTO_OP_AUX_FLAGS_IPSEC_SOFT_EXPIRY;
476 plt_dp_err("Success with unknown microcode completion code");
482 cn10k_cpt_dequeue_post_process(struct cnxk_cpt_qp *qp,
483 struct rte_crypto_op *cop,
484 struct cpt_inflight_req *infl_req,
485 struct cpt_cn10k_res_s *res)
487 const uint8_t uc_compcode = res->uc_compcode;
488 const uint8_t compcode = res->compcode;
491 cop->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
493 if (cop->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC &&
494 cop->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
495 if (likely(compcode == CPT_COMP_WARN)) {
496 /* Success with additional info */
497 cn10k_cpt_sec_post_process(cop, res);
499 cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
500 plt_dp_info("HW completion code 0x%x", res->compcode);
501 if (compcode == CPT_COMP_GOOD) {
503 "Request failed with microcode error");
504 plt_dp_info("MC completion code 0x%x",
512 if (likely(compcode == CPT_COMP_GOOD || compcode == CPT_COMP_WARN)) {
513 if (unlikely(uc_compcode)) {
514 if (uc_compcode == ROC_SE_ERR_GC_ICV_MISCOMPARE)
515 cop->status = RTE_CRYPTO_OP_STATUS_AUTH_FAILED;
517 cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
519 plt_dp_info("Request failed with microcode error");
520 plt_dp_info("MC completion code 0x%x",
525 if (cop->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
526 /* Verify authentication data if required */
527 if (unlikely(infl_req->op_flags &
528 CPT_OP_FLAGS_AUTH_VERIFY)) {
529 uintptr_t *rsp = infl_req->mdata;
530 compl_auth_verify(cop, (uint8_t *)rsp[0],
533 } else if (cop->type == RTE_CRYPTO_OP_TYPE_ASYMMETRIC) {
534 struct rte_crypto_asym_op *op = cop->asym;
535 uintptr_t *mdata = infl_req->mdata;
536 struct cnxk_ae_sess *sess;
538 sess = (struct cnxk_ae_sess *)
539 op->session->sess_private_data;
541 cnxk_ae_post_process(cop, sess, (uint8_t *)mdata[0]);
544 cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
545 plt_dp_info("HW completion code 0x%x", res->compcode);
548 case CPT_COMP_INSTERR:
549 plt_dp_err("Request failed with instruction error");
552 plt_dp_err("Request failed with DMA fault");
555 plt_dp_err("Request failed with hardware error");
559 "Request failed with unknown completion code");
564 if (unlikely(cop->sess_type == RTE_CRYPTO_OP_SESSIONLESS)) {
565 if (cop->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
566 sym_session_clear(cn10k_cryptodev_driver_id,
568 sz = rte_cryptodev_sym_get_existing_header_session_size(
570 memset(cop->sym->session, 0, sz);
571 rte_mempool_put(qp->sess_mp, cop->sym->session);
572 cop->sym->session = NULL;
578 cn10k_cpt_crypto_adapter_dequeue(uintptr_t get_work1)
580 struct cpt_inflight_req *infl_req;
581 struct rte_crypto_op *cop;
582 struct cnxk_cpt_qp *qp;
585 infl_req = (struct cpt_inflight_req *)(get_work1);
589 res.u64[0] = __atomic_load_n(&infl_req->res.u64[0], __ATOMIC_RELAXED);
591 cn10k_cpt_dequeue_post_process(qp, infl_req->cop, infl_req, &res.cn10k);
593 if (unlikely(infl_req->op_flags & CPT_OP_FLAGS_METABUF))
594 rte_mempool_put(qp->meta_info.pool, infl_req->mdata);
596 rte_mempool_put(qp->ca.req_mp, infl_req);
597 return (uintptr_t)cop;
601 cn10k_cpt_dequeue_burst(void *qptr, struct rte_crypto_op **ops, uint16_t nb_ops)
603 struct cpt_inflight_req *infl_req;
604 struct cnxk_cpt_qp *qp = qptr;
605 struct pending_queue *pend_q;
606 uint64_t infl_cnt, pq_tail;
607 struct rte_crypto_op *cop;
611 pend_q = &qp->pend_q;
613 const uint64_t pq_mask = pend_q->pq_mask;
615 pq_tail = pend_q->tail;
616 infl_cnt = pending_queue_infl_cnt(pend_q->head, pq_tail, pq_mask);
617 nb_ops = RTE_MIN(nb_ops, infl_cnt);
619 /* Ensure infl_cnt isn't read before data lands */
620 rte_atomic_thread_fence(__ATOMIC_ACQUIRE);
622 for (i = 0; i < nb_ops; i++) {
623 infl_req = &pend_q->req_queue[pq_tail];
625 res.u64[0] = __atomic_load_n(&infl_req->res.u64[0],
628 if (unlikely(res.cn10k.compcode == CPT_COMP_NOT_DONE)) {
629 if (unlikely(rte_get_timer_cycles() >
631 plt_err("Request timed out");
632 cnxk_cpt_dump_on_err(qp);
633 pend_q->time_out = rte_get_timer_cycles() +
634 DEFAULT_COMMAND_TIMEOUT *
640 pending_queue_advance(&pq_tail, pq_mask);
646 cn10k_cpt_dequeue_post_process(qp, cop, infl_req, &res.cn10k);
648 if (unlikely(infl_req->op_flags & CPT_OP_FLAGS_METABUF))
649 rte_mempool_put(qp->meta_info.pool, infl_req->mdata);
652 pend_q->tail = pq_tail;
658 cn10k_cpt_set_enqdeq_fns(struct rte_cryptodev *dev)
660 dev->enqueue_burst = cn10k_cpt_enqueue_burst;
661 dev->dequeue_burst = cn10k_cpt_dequeue_burst;
667 cn10k_cpt_dev_info_get(struct rte_cryptodev *dev,
668 struct rte_cryptodev_info *info)
671 cnxk_cpt_dev_info_get(dev, info);
672 info->driver_id = cn10k_cryptodev_driver_id;
676 struct rte_cryptodev_ops cn10k_cpt_ops = {
677 /* Device control ops */
678 .dev_configure = cnxk_cpt_dev_config,
679 .dev_start = cnxk_cpt_dev_start,
680 .dev_stop = cnxk_cpt_dev_stop,
681 .dev_close = cnxk_cpt_dev_close,
682 .dev_infos_get = cn10k_cpt_dev_info_get,
686 .queue_pair_setup = cnxk_cpt_queue_pair_setup,
687 .queue_pair_release = cnxk_cpt_queue_pair_release,
689 /* Symmetric crypto ops */
690 .sym_session_get_size = cnxk_cpt_sym_session_get_size,
691 .sym_session_configure = cnxk_cpt_sym_session_configure,
692 .sym_session_clear = cnxk_cpt_sym_session_clear,
694 /* Asymmetric crypto ops */
695 .asym_session_get_size = cnxk_ae_session_size_get,
696 .asym_session_configure = cnxk_ae_session_cfg,
697 .asym_session_clear = cnxk_ae_session_clear,
699 /* Event crypto ops */
700 .session_ev_mdata_set = cn10k_cpt_crypto_adapter_ev_mdata_set,