1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(C) 2021 Marvell.
5 #include <rte_cryptodev.h>
6 #include <rte_cryptodev_pmd.h>
9 #include "cn10k_cryptodev.h"
10 #include "cn10k_cryptodev_ops.h"
11 #include "cn10k_ipsec_la_ops.h"
12 #include "cn10k_ipsec.h"
13 #include "cnxk_cryptodev.h"
14 #include "cnxk_cryptodev_ops.h"
17 static inline struct cnxk_se_sess *
18 cn10k_cpt_sym_temp_sess_create(struct cnxk_cpt_qp *qp, struct rte_crypto_op *op)
20 const int driver_id = cn10k_cryptodev_driver_id;
21 struct rte_crypto_sym_op *sym_op = op->sym;
22 struct rte_cryptodev_sym_session *sess;
23 struct cnxk_se_sess *priv;
26 /* Create temporary session */
27 sess = rte_cryptodev_sym_session_create(qp->sess_mp);
31 ret = sym_session_configure(qp->lf.roc_cpt, driver_id, sym_op->xform,
32 sess, qp->sess_mp_priv);
36 priv = get_sym_session_private_data(sess, driver_id);
38 sym_op->session = sess;
43 rte_mempool_put(qp->sess_mp, sess);
47 static __rte_always_inline int __rte_hot
48 cpt_sec_inst_fill(struct rte_crypto_op *op, struct cn10k_sec_session *sess,
49 struct cpt_inflight_req *infl_req, struct cpt_inst_s *inst)
51 struct rte_crypto_sym_op *sym_op = op->sym;
52 union roc_ot_ipsec_sa_word2 *w2;
53 struct cn10k_ipsec_sa *sa;
56 if (unlikely(sym_op->m_dst && sym_op->m_dst != sym_op->m_src)) {
57 plt_dp_err("Out of place is not supported");
61 if (unlikely(!rte_pktmbuf_is_contiguous(sym_op->m_src))) {
62 plt_dp_err("Scatter Gather mode is not supported");
67 w2 = (union roc_ot_ipsec_sa_word2 *)&sa->in_sa.w2;
69 if (w2->s.dir == ROC_IE_OT_SA_DIR_OUTBOUND)
70 ret = process_outb_sa(op, sa, inst);
72 infl_req->op_flags |= CPT_OP_FLAGS_IPSEC_DIR_INBOUND;
73 ret = process_inb_sa(op, sa, inst);
79 static __rte_always_inline int __rte_hot
80 cpt_sym_inst_fill(struct cnxk_cpt_qp *qp, struct rte_crypto_op *op,
81 struct cnxk_se_sess *sess, struct cpt_inflight_req *infl_req,
82 struct cpt_inst_s *inst)
87 cpt_op = sess->cpt_op;
89 if (cpt_op & ROC_SE_OP_CIPHER_MASK)
90 ret = fill_fc_params(op, sess, &qp->meta_info, infl_req, inst);
92 ret = fill_digest_params(op, sess, &qp->meta_info, infl_req,
99 cn10k_cpt_fill_inst(struct cnxk_cpt_qp *qp, struct rte_crypto_op *ops[],
100 struct cpt_inst_s inst[], struct cpt_inflight_req *infl_req)
102 struct cn10k_sec_session *sec_sess;
103 struct rte_crypto_sym_op *sym_op;
104 struct cnxk_se_sess *sess;
105 struct rte_crypto_op *op;
117 if (op->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
118 if (op->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
119 sec_sess = get_sec_session_private_data(
120 sym_op->sec_session);
121 ret = cpt_sec_inst_fill(op, sec_sess, infl_req,
125 w7 = sec_sess->sa.inst.w7;
126 } else if (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {
127 sess = get_sym_session_private_data(
128 sym_op->session, cn10k_cryptodev_driver_id);
129 ret = cpt_sym_inst_fill(qp, op, sess, infl_req,
133 w7 = sess->cpt_inst_w7;
135 sess = cn10k_cpt_sym_temp_sess_create(qp, op);
136 if (unlikely(sess == NULL)) {
137 plt_dp_err("Could not create temp session");
141 ret = cpt_sym_inst_fill(qp, op, sess, infl_req,
144 sym_session_clear(cn10k_cryptodev_driver_id,
146 rte_mempool_put(qp->sess_mp, op->sym->session);
149 w7 = sess->cpt_inst_w7;
152 plt_dp_err("Unsupported op type");
156 inst[0].res_addr = (uint64_t)&infl_req->res;
157 infl_req->res.cn10k.compcode = CPT_COMP_NOT_DONE;
165 #define PKTS_PER_LOOP 32
166 #define PKTS_PER_STEORL 16
169 cn10k_cpt_enqueue_burst(void *qptr, struct rte_crypto_op **ops, uint16_t nb_ops)
171 uint64_t lmt_base, lmt_arg, io_addr;
172 struct cpt_inflight_req *infl_req;
173 uint16_t nb_allowed, count = 0;
174 struct cnxk_cpt_qp *qp = qptr;
175 struct pending_queue *pend_q;
176 struct cpt_inst_s *inst;
180 pend_q = &qp->pend_q;
182 nb_allowed = qp->lf.nb_desc - pend_q->pending_count;
183 nb_ops = RTE_MIN(nb_ops, nb_allowed);
185 if (unlikely(nb_ops == 0))
188 lmt_base = qp->lmtline.lmt_base;
189 io_addr = qp->lmtline.io_addr;
191 ROC_LMT_BASE_ID_GET(lmt_base, lmt_id);
192 inst = (struct cpt_inst_s *)lmt_base;
195 for (i = 0; i < RTE_MIN(PKTS_PER_LOOP, nb_ops); i++) {
196 infl_req = &pend_q->req_queue[pend_q->enq_tail];
197 infl_req->op_flags = 0;
199 ret = cn10k_cpt_fill_inst(qp, ops + i, &inst[2 * i], infl_req);
200 if (unlikely(ret != 1)) {
201 plt_dp_err("Could not process op: %p", ops + i);
207 MOD_INC(pend_q->enq_tail, qp->lf.nb_desc);
210 if (i > PKTS_PER_STEORL) {
211 lmt_arg = ROC_CN10K_CPT_LMT_ARG | (PKTS_PER_STEORL - 1) << 12 |
213 roc_lmt_submit_steorl(lmt_arg, io_addr);
214 lmt_arg = ROC_CN10K_CPT_LMT_ARG |
215 (i - PKTS_PER_STEORL - 1) << 12 |
216 (uint64_t)(lmt_id + PKTS_PER_STEORL);
217 roc_lmt_submit_steorl(lmt_arg, io_addr);
219 lmt_arg = ROC_CN10K_CPT_LMT_ARG | (i - 1) << 12 |
221 roc_lmt_submit_steorl(lmt_arg, io_addr);
226 if (nb_ops - i > 0 && i == PKTS_PER_LOOP) {
234 pend_q->pending_count += count + i;
236 pend_q->time_out = rte_get_timer_cycles() +
237 DEFAULT_COMMAND_TIMEOUT * rte_get_timer_hz();
243 cn10k_cpt_sec_post_process(struct rte_crypto_op *cop,
244 struct cpt_inflight_req *infl_req)
246 struct rte_crypto_sym_op *sym_op = cop->sym;
247 struct rte_mbuf *m = sym_op->m_src;
248 struct rte_ipv6_hdr *ip6;
249 struct rte_ipv4_hdr *ip;
252 if (infl_req->op_flags & CPT_OP_FLAGS_IPSEC_DIR_INBOUND) {
253 ip = (struct rte_ipv4_hdr *)rte_pktmbuf_mtod(m, char *);
255 if (((ip->version_ihl & 0xf0) >> RTE_IPV4_IHL_MULTIPLIER) ==
257 m_len = rte_be_to_cpu_16(ip->total_length);
259 PLT_ASSERT(((ip->version_ihl & 0xf0) >>
260 RTE_IPV4_IHL_MULTIPLIER) == IPV6_VERSION);
261 ip6 = (struct rte_ipv6_hdr *)ip;
262 m_len = rte_be_to_cpu_16(ip6->payload_len) +
263 sizeof(struct rte_ipv6_hdr);
271 cn10k_cpt_dequeue_post_process(struct cnxk_cpt_qp *qp,
272 struct rte_crypto_op *cop,
273 struct cpt_inflight_req *infl_req)
275 struct cpt_cn10k_res_s *res = (struct cpt_cn10k_res_s *)&infl_req->res;
278 if (likely(res->compcode == CPT_COMP_GOOD ||
279 res->compcode == CPT_COMP_WARN)) {
280 if (unlikely(res->uc_compcode)) {
281 if (res->uc_compcode == ROC_SE_ERR_GC_ICV_MISCOMPARE)
282 cop->status = RTE_CRYPTO_OP_STATUS_AUTH_FAILED;
284 cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
286 plt_dp_info("Request failed with microcode error");
287 plt_dp_info("MC completion code 0x%x",
292 cop->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
293 if (cop->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
294 if (cop->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) {
295 cn10k_cpt_sec_post_process(cop, infl_req);
299 /* Verify authentication data if required */
300 if (unlikely(infl_req->op_flags &
301 CPT_OP_FLAGS_AUTH_VERIFY)) {
302 uintptr_t *rsp = infl_req->mdata;
303 compl_auth_verify(cop, (uint8_t *)rsp[0],
308 cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
309 plt_dp_info("HW completion code 0x%x", res->compcode);
311 switch (res->compcode) {
312 case CPT_COMP_INSTERR:
313 plt_dp_err("Request failed with instruction error");
316 plt_dp_err("Request failed with DMA fault");
319 plt_dp_err("Request failed with hardware error");
323 "Request failed with unknown completion code");
328 if (unlikely(cop->sess_type == RTE_CRYPTO_OP_SESSIONLESS)) {
329 if (cop->type == RTE_CRYPTO_OP_TYPE_SYMMETRIC) {
330 sym_session_clear(cn10k_cryptodev_driver_id,
332 sz = rte_cryptodev_sym_get_existing_header_session_size(
334 memset(cop->sym->session, 0, sz);
335 rte_mempool_put(qp->sess_mp, cop->sym->session);
336 cop->sym->session = NULL;
342 cn10k_cpt_dequeue_burst(void *qptr, struct rte_crypto_op **ops, uint16_t nb_ops)
344 struct cpt_inflight_req *infl_req;
345 struct cnxk_cpt_qp *qp = qptr;
346 struct pending_queue *pend_q;
347 struct cpt_cn10k_res_s *res;
348 struct rte_crypto_op *cop;
351 pend_q = &qp->pend_q;
353 nb_pending = pend_q->pending_count;
355 if (nb_ops > nb_pending)
358 for (i = 0; i < nb_ops; i++) {
359 infl_req = &pend_q->req_queue[pend_q->deq_head];
361 res = (struct cpt_cn10k_res_s *)&infl_req->res;
363 if (unlikely(res->compcode == CPT_COMP_NOT_DONE)) {
364 if (unlikely(rte_get_timer_cycles() >
366 plt_err("Request timed out");
367 pend_q->time_out = rte_get_timer_cycles() +
368 DEFAULT_COMMAND_TIMEOUT *
374 MOD_INC(pend_q->deq_head, qp->lf.nb_desc);
380 cn10k_cpt_dequeue_post_process(qp, cop, infl_req);
382 if (unlikely(infl_req->op_flags & CPT_OP_FLAGS_METABUF))
383 rte_mempool_put(qp->meta_info.pool, infl_req->mdata);
386 pend_q->pending_count -= i;
392 cn10k_cpt_set_enqdeq_fns(struct rte_cryptodev *dev)
394 dev->enqueue_burst = cn10k_cpt_enqueue_burst;
395 dev->dequeue_burst = cn10k_cpt_dequeue_burst;
401 cn10k_cpt_dev_info_get(struct rte_cryptodev *dev,
402 struct rte_cryptodev_info *info)
405 cnxk_cpt_dev_info_get(dev, info);
406 info->driver_id = cn10k_cryptodev_driver_id;
410 struct rte_cryptodev_ops cn10k_cpt_ops = {
411 /* Device control ops */
412 .dev_configure = cnxk_cpt_dev_config,
413 .dev_start = cnxk_cpt_dev_start,
414 .dev_stop = cnxk_cpt_dev_stop,
415 .dev_close = cnxk_cpt_dev_close,
416 .dev_infos_get = cn10k_cpt_dev_info_get,
420 .queue_pair_setup = cnxk_cpt_queue_pair_setup,
421 .queue_pair_release = cnxk_cpt_queue_pair_release,
423 /* Symmetric crypto ops */
424 .sym_session_get_size = cnxk_cpt_sym_session_get_size,
425 .sym_session_configure = cnxk_cpt_sym_session_configure,
426 .sym_session_clear = cnxk_cpt_sym_session_clear,
428 /* Asymmetric crypto ops */
429 .asym_session_get_size = cnxk_ae_session_size_get,
430 .asym_session_configure = cnxk_ae_session_cfg,
431 .asym_session_clear = cnxk_ae_session_clear,