crypto/cnxk: add more info on command timeout
[dpdk.git] / drivers / crypto / cnxk / cnxk_cryptodev_ops.c
index 21ee09f..67a2d9b 100644 (file)
@@ -418,84 +418,121 @@ cnxk_cpt_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)
 }
 
 static int
-sym_xform_verify(struct rte_crypto_sym_xform *xform)
+cnxk_sess_fill(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)
 {
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->auth.algo == RTE_CRYPTO_AUTH_NULL &&
-           xform->auth.op == RTE_CRYPTO_AUTH_OP_VERIFY)
-               return -ENOTSUP;
+       struct rte_crypto_sym_xform *aead_xfrm = NULL;
+       struct rte_crypto_sym_xform *c_xfrm = NULL;
+       struct rte_crypto_sym_xform *a_xfrm = NULL;
+       bool ciph_then_auth = false;
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && xform->next == NULL)
-               return CNXK_CPT_CIPHER;
+       if (xform == NULL)
+               return -EINVAL;
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && xform->next == NULL)
-               return CNXK_CPT_AUTH;
+       if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {
+               c_xfrm = xform;
+               a_xfrm = xform->next;
+               ciph_then_auth = true;
+       } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH) {
+               c_xfrm = xform->next;
+               a_xfrm = xform;
+               ciph_then_auth = false;
+       } else {
+               aead_xfrm = xform;
+       }
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AEAD && xform->next == NULL)
-               return CNXK_CPT_AEAD;
+       if (c_xfrm != NULL && c_xfrm->type != RTE_CRYPTO_SYM_XFORM_CIPHER) {
+               plt_dp_err("Invalid type in cipher xform");
+               return -EINVAL;
+       }
 
-       if (xform->next == NULL)
-               return -EIO;
+       if (a_xfrm != NULL && a_xfrm->type != RTE_CRYPTO_SYM_XFORM_AUTH) {
+               plt_dp_err("Invalid type in auth xform");
+               return -EINVAL;
+       }
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->cipher.algo == RTE_CRYPTO_CIPHER_3DES_CBC &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->next->auth.algo == RTE_CRYPTO_AUTH_SHA1)
+       if (aead_xfrm != NULL && aead_xfrm->type != RTE_CRYPTO_SYM_XFORM_AEAD) {
+               plt_dp_err("Invalid type in AEAD xform");
+               return -EINVAL;
+       }
+
+       if ((c_xfrm == NULL || c_xfrm->cipher.algo == RTE_CRYPTO_CIPHER_NULL) &&
+           a_xfrm != NULL && a_xfrm->auth.algo == RTE_CRYPTO_AUTH_NULL &&
+           a_xfrm->auth.op == RTE_CRYPTO_AUTH_OP_VERIFY) {
+               plt_dp_err("Null cipher + null auth verify is not supported");
                return -ENOTSUP;
+       }
+
+       /* Cipher only */
+       if (c_xfrm != NULL &&
+           (a_xfrm == NULL || a_xfrm->auth.algo == RTE_CRYPTO_AUTH_NULL)) {
+               if (fill_sess_cipher(c_xfrm, sess))
+                       return -ENOTSUP;
+               else
+                       return 0;
+       }
+
+       /* Auth only */
+       if (a_xfrm != NULL &&
+           (c_xfrm == NULL || c_xfrm->cipher.algo == RTE_CRYPTO_CIPHER_NULL)) {
+               if (fill_sess_auth(a_xfrm, sess))
+                       return -ENOTSUP;
+               else
+                       return 0;
+       }
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->auth.algo == RTE_CRYPTO_AUTH_SHA1 &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->next->cipher.algo == RTE_CRYPTO_CIPHER_3DES_CBC)
+       /* AEAD */
+       if (aead_xfrm != NULL) {
+               if (fill_sess_aead(aead_xfrm, sess))
+                       return -ENOTSUP;
+               else
+                       return 0;
+       }
+
+       /* Chained ops */
+       if (c_xfrm == NULL || a_xfrm == NULL) {
+               plt_dp_err("Invalid xforms");
+               return -EINVAL;
+       }
+
+       if (c_xfrm->cipher.algo == RTE_CRYPTO_CIPHER_3DES_CBC &&
+           a_xfrm->auth.algo == RTE_CRYPTO_AUTH_SHA1) {
+               plt_dp_err("3DES-CBC + SHA1 is not supported");
                return -ENOTSUP;
+       }
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->next->auth.op == RTE_CRYPTO_AUTH_OP_GENERATE)
-               return CNXK_CPT_CIPHER_ENC_AUTH_GEN;
-
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->auth.op == RTE_CRYPTO_AUTH_OP_VERIFY &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->next->cipher.op == RTE_CRYPTO_CIPHER_OP_DECRYPT)
-               return CNXK_CPT_AUTH_VRFY_CIPHER_DEC;
-
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->auth.op == RTE_CRYPTO_AUTH_OP_GENERATE &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->next->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {
-               switch (xform->auth.algo) {
-               case RTE_CRYPTO_AUTH_SHA1_HMAC:
-                       switch (xform->next->cipher.algo) {
-                       case RTE_CRYPTO_CIPHER_AES_CBC:
-                               return CNXK_CPT_AUTH_GEN_CIPHER_ENC;
-                       default:
-                               return -ENOTSUP;
-                       }
-               default:
+       /* Cipher then auth */
+       if (ciph_then_auth) {
+               if (fill_sess_cipher(c_xfrm, sess))
                        return -ENOTSUP;
-               }
+               if (fill_sess_auth(a_xfrm, sess))
+                       return -ENOTSUP;
+               else
+                       return 0;
        }
 
-       if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
-           xform->cipher.op == RTE_CRYPTO_CIPHER_OP_DECRYPT &&
-           xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
-           xform->next->auth.op == RTE_CRYPTO_AUTH_OP_VERIFY) {
-               switch (xform->cipher.algo) {
-               case RTE_CRYPTO_CIPHER_AES_CBC:
-                       switch (xform->next->auth.algo) {
-                       case RTE_CRYPTO_AUTH_SHA1_HMAC:
-                               return CNXK_CPT_CIPHER_DEC_AUTH_VRFY;
+       /* else */
+
+       if (c_xfrm->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {
+               switch (a_xfrm->auth.algo) {
+               case RTE_CRYPTO_AUTH_SHA1_HMAC:
+                       switch (c_xfrm->cipher.algo) {
+                       case RTE_CRYPTO_CIPHER_AES_CBC:
+                               break;
                        default:
                                return -ENOTSUP;
                        }
+                       break;
                default:
                        return -ENOTSUP;
                }
        }
 
-       return -ENOTSUP;
+       if (fill_sess_auth(a_xfrm, sess))
+               return -ENOTSUP;
+       if (fill_sess_cipher(c_xfrm, sess))
+               return -ENOTSUP;
+       else
+               return 0;
 }
 
 static uint64_t
@@ -524,10 +561,6 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,
        void *priv;
        int ret;
 
-       ret = sym_xform_verify(xform);
-       if (unlikely(ret < 0))
-               return ret;
-
        if (unlikely(rte_mempool_get(pool, &priv))) {
                plt_dp_err("Could not allocate session private data");
                return -ENOMEM;
@@ -537,37 +570,7 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,
 
        sess_priv = priv;
 
-       switch (ret) {
-       case CNXK_CPT_CIPHER:
-               ret = fill_sess_cipher(xform, sess_priv);
-               break;
-       case CNXK_CPT_AUTH:
-               if (xform->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC)
-                       ret = fill_sess_gmac(xform, sess_priv);
-               else
-                       ret = fill_sess_auth(xform, sess_priv);
-               break;
-       case CNXK_CPT_AEAD:
-               ret = fill_sess_aead(xform, sess_priv);
-               break;
-       case CNXK_CPT_CIPHER_ENC_AUTH_GEN:
-       case CNXK_CPT_CIPHER_DEC_AUTH_VRFY:
-               ret = fill_sess_cipher(xform, sess_priv);
-               if (ret < 0)
-                       break;
-               ret = fill_sess_auth(xform->next, sess_priv);
-               break;
-       case CNXK_CPT_AUTH_VRFY_CIPHER_DEC:
-       case CNXK_CPT_AUTH_GEN_CIPHER_ENC:
-               ret = fill_sess_auth(xform, sess_priv);
-               if (ret < 0)
-                       break;
-               ret = fill_sess_cipher(xform->next, sess_priv);
-               break;
-       default:
-               ret = -1;
-       }
-
+       ret = cnxk_sess_fill(xform, sess_priv);
        if (ret)
                goto priv_put;
 
@@ -592,7 +595,7 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,
 priv_put:
        rte_mempool_put(pool, priv);
 
-       return -ENOTSUP;
+       return ret;
 }
 
 int
@@ -700,3 +703,46 @@ cnxk_ae_session_cfg(struct rte_cryptodev *dev,
 
        return 0;
 }
+
+void
+cnxk_cpt_dump_on_err(struct cnxk_cpt_qp *qp)
+{
+       struct pending_queue *pend_q = &qp->pend_q;
+       uint64_t inflight, enq_ptr, deq_ptr, insts;
+       union cpt_lf_q_inst_ptr inst_ptr;
+       union cpt_lf_inprog lf_inprog;
+
+       plt_print("Lcore ID: %d, LF/QP ID: %d", rte_lcore_id(), qp->lf.lf_id);
+       plt_print("");
+       plt_print("S/w pending queue:");
+       plt_print("\tHead: %"PRIu64"", pend_q->head);
+       plt_print("\tTail: %"PRIu64"", pend_q->tail);
+       plt_print("\tMask: 0x%"PRIx64"", pend_q->pq_mask);
+       plt_print("\tInflight count: %"PRIu64"",
+                 pending_queue_infl_cnt(pend_q->head, pend_q->tail,
+                                        pend_q->pq_mask));
+
+       plt_print("");
+       plt_print("H/w pending queue:");
+
+       lf_inprog.u = plt_read64(qp->lf.rbase + CPT_LF_INPROG);
+       inflight = lf_inprog.s.inflight;
+       plt_print("\tInflight in engines: %"PRIu64"", inflight);
+
+       inst_ptr.u = plt_read64(qp->lf.rbase + CPT_LF_Q_INST_PTR);
+
+       enq_ptr = inst_ptr.s.nq_ptr;
+       deq_ptr = inst_ptr.s.dq_ptr;
+
+       if (enq_ptr >= deq_ptr)
+               insts = enq_ptr - deq_ptr;
+       else
+               insts = (enq_ptr + pend_q->pq_mask + 1 + 320 + 40) - deq_ptr;
+
+       plt_print("\tNQ ptr: 0x%"PRIx64"", enq_ptr);
+       plt_print("\tDQ ptr: 0x%"PRIx64"", deq_ptr);
+       plt_print("Insts waiting in CPT: %"PRIu64"", insts);
+
+       plt_print("");
+       roc_cpt_afs_print(qp->lf.roc_cpt);
+}