FD.io VPP  v19.04-6-g6f05f72
Vector Packet Processing
crypto_node.c
Go to the documentation of this file.
1 /*
2  *------------------------------------------------------------------
3  * crypto_node.c - DPDK Cryptodev input node
4  *
5  * Copyright (c) 2017 Intel and/or its affiliates.
6  * Licensed under the Apache License, Version 2.0 (the "License");
7  * you may not use this file except in compliance with the License.
8  * You may obtain a opy of the License at:
9  *
10  * http://www.apache.org/licenses/LICENSE-2.0
11  *
12  * Unless required by applicable law or agreed to in writing, software
13  * distributed under the License is distributed on an "AS IS" BASIS,
14  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15  * See the License for the specific language governing permissions and
16  * limitations under the License.
17  *------------------------------------------------------------------
18  */
19 
20 #include <vlib/vlib.h>
21 #include <vnet/ip/ip.h>
22 #include <vnet/ethernet/ethernet.h>
23 #include <vnet/ipsec/ipsec.h>
24 
25 #include <dpdk/buffer.h>
26 #include <dpdk/device/dpdk.h>
27 #include <dpdk/device/dpdk_priv.h>
28 #include <dpdk/ipsec/ipsec.h>
29 
30 #define foreach_dpdk_crypto_input_error \
31  _(DQ_COPS, "Crypto ops dequeued") \
32  _(AUTH_FAILED, "Crypto verification failed") \
33  _(STATUS, "Crypto operation failed")
34 
35 typedef enum
36 {
37 #define _(f,s) DPDK_CRYPTO_INPUT_ERROR_##f,
39 #undef _
42 
44 #define _(n, s) s,
46 #undef _
47 };
48 
50 
51 typedef struct
52 {
53  /* dev id of this cryptodev */
57 
58 static u8 *
59 format_dpdk_crypto_input_trace (u8 * s, va_list * args)
60 {
61  CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
62  CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
64 
65  s = format (s, "cryptodev-id %d next-index %d", t->dev_id, t->next_index);
66 
67  return s;
68 }
69 
72  struct rte_crypto_op *op0, u16 * next)
73 {
74  if (PREDICT_FALSE (op0->status != RTE_CRYPTO_OP_STATUS_SUCCESS))
75  {
76  next[0] = DPDK_CRYPTO_INPUT_NEXT_DROP;
78  node->node_index,
79  DPDK_CRYPTO_INPUT_ERROR_STATUS, 1);
80  /* if auth failed */
81  if (op0->status == RTE_CRYPTO_OP_STATUS_AUTH_FAILED)
83  node->node_index,
84  DPDK_CRYPTO_INPUT_ERROR_AUTH_FAILED, 1);
85  }
86 }
87 
88 always_inline void
90  u8 dev_id, u32 * bis, u16 * nexts, u32 n_deq)
91 {
92  u32 n_left, n_trace;
93 
94  if (PREDICT_FALSE ((n_trace = vlib_get_trace_count (vm, node))))
95  {
96  n_left = n_deq;
97 
98  while (n_trace && n_left)
99  {
100  vlib_buffer_t *b0;
101  u16 next;
102  u32 bi;
103 
104  bi = bis[0];
105  next = nexts[0];
106 
107  b0 = vlib_get_buffer (vm, bi);
108 
109  vlib_trace_buffer (vm, node, next, b0, /* follow_chain */ 0);
110 
112  vlib_add_trace (vm, node, b0, sizeof (*tr));
113  tr->dev_id = dev_id;
114  tr->next_index = next;
115 
116  n_trace--;
117  n_left--;
118  nexts++;
119  bis++;
120  }
121  vlib_set_trace_count (vm, node, n_trace);
122  }
123 }
124 
128 {
129  u8 numa = rte_socket_id ();
130  u32 n_ops, n_deq;
131  u32 bis[VLIB_FRAME_SIZE], *bi;
132  u16 nexts[VLIB_FRAME_SIZE], *next;
133  struct rte_crypto_op **ops;
134 
135  bi = bis;
136  next = nexts;
137  ops = cwm->ops;
138 
139  n_ops = n_deq = rte_cryptodev_dequeue_burst (res->dev_id,
140  res->qp_id,
141  ops, VLIB_FRAME_SIZE);
142 
143  /* no op dequeued, do not proceed */
144  if (n_deq == 0)
145  return 0;
146 
147  res->inflights -= n_ops;
148 
149  while (n_ops >= 4)
150  {
151  struct rte_crypto_op *op0, *op1, *op2, *op3;
152 
153  /* Prefetch next iteration. */
154  if (n_ops >= 8)
155  {
156  CLIB_PREFETCH (ops[4], CLIB_CACHE_LINE_BYTES, LOAD);
157  CLIB_PREFETCH (ops[5], CLIB_CACHE_LINE_BYTES, LOAD);
158  CLIB_PREFETCH (ops[6], CLIB_CACHE_LINE_BYTES, LOAD);
159  CLIB_PREFETCH (ops[7], CLIB_CACHE_LINE_BYTES, LOAD);
160 
162  CLIB_CACHE_LINE_BYTES, LOAD);
164  CLIB_CACHE_LINE_BYTES, LOAD);
166  CLIB_CACHE_LINE_BYTES, LOAD);
168  CLIB_CACHE_LINE_BYTES, LOAD);
169  }
170 
171  op0 = ops[0];
172  op1 = ops[1];
173  op2 = ops[2];
174  op3 = ops[3];
175 
176  next[0] = crypto_op_get_priv (op0)->next;
177  next[1] = crypto_op_get_priv (op1)->next;
178  next[2] = crypto_op_get_priv (op2)->next;
179  next[3] = crypto_op_get_priv (op3)->next;
180 
181  bi[0] = crypto_op_get_priv (op0)->bi;
182  bi[1] = crypto_op_get_priv (op1)->bi;
183  bi[2] = crypto_op_get_priv (op2)->bi;
184  bi[3] = crypto_op_get_priv (op3)->bi;
185 
186  dpdk_crypto_input_check_op (vm, node, op0, next + 0);
187  dpdk_crypto_input_check_op (vm, node, op1, next + 1);
188  dpdk_crypto_input_check_op (vm, node, op2, next + 2);
189  dpdk_crypto_input_check_op (vm, node, op3, next + 3);
190 
191  op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
192  op1->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
193  op2->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
194  op3->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
195 
196  /* next */
197  next += 4;
198  n_ops -= 4;
199  ops += 4;
200  bi += 4;
201  }
202  while (n_ops > 0)
203  {
204  struct rte_crypto_op *op0;
205 
206  op0 = ops[0];
207 
208  next[0] = crypto_op_get_priv (op0)->next;
209  bi[0] = crypto_op_get_priv (op0)->bi;
210 
211  dpdk_crypto_input_check_op (vm, node, op0, next + 0);
212 
213  op0->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;
214 
215  /* next */
216  next += 1;
217  n_ops -= 1;
218  ops += 1;
219  bi += 1;
220  }
221 
223  DPDK_CRYPTO_INPUT_ERROR_DQ_COPS, n_deq);
224 
225  vlib_buffer_enqueue_to_next (vm, node, bis, nexts, n_deq);
226 
227  dpdk_crypto_input_trace (vm, node, res->dev_id, bis, nexts, n_deq);
228 
229  crypto_free_ops (numa, cwm->ops, n_deq);
230 
231  return n_deq;
232 }
233 
236  vlib_frame_t * frame)
237 {
240  crypto_resource_t *res;
241  u32 n_deq = 0;
242  u16 *remove = NULL, *res_idx;
243  word i;
244 
245  /* *INDENT-OFF* */
246  vec_foreach (res_idx, cwm->resource_idx)
247  {
248  res = vec_elt_at_index (dcm->resource, res_idx[0]);
249 
250  if (res->inflights)
251  n_deq += dpdk_crypto_dequeue (vm, cwm, node, res);
252 
253  if (PREDICT_FALSE (res->remove && !(res->inflights)))
254  vec_add1 (remove, res_idx[0]);
255  }
256  /* *INDENT-ON* */
257 
258  /* TODO removal on master thread? */
259  if (PREDICT_FALSE (remove != NULL))
260  {
261  /* *INDENT-OFF* */
262  vec_foreach (res_idx, remove)
263  {
264  i = vec_search (cwm->resource_idx, res_idx[0]);
265  vec_del1 (cwm->resource_idx, i);
266 
267  res = vec_elt_at_index (dcm->resource, res_idx[0]);
268  res->thread_idx = (u16) ~0;
269  res->remove = 0;
270 
271  i = vec_search (dcm->dev[res->dev_id].used_resources, res_idx[0]);
272  ASSERT (i != (u16) ~0);
273  vec_del1 (dcm->dev[res->dev_id].used_resources, i);
274  vec_add1 (dcm->dev[res->dev_id].free_resources, res_idx[0]);
275  }
276  /* *INDENT-ON* */
277 
278  vec_free (remove);
279  }
280 
281  return n_deq;
282 }
283 
285  vlib_node_runtime_t * node,
286  vlib_frame_t * from_frame)
287 {
288  return dpdk_crypto_input_inline (vm, node, from_frame);
289 }
290 
291 /* *INDENT-OFF* */
293 {
294  .name = "dpdk-crypto-input",
295  .format_trace = format_dpdk_crypto_input_trace,
296  .type = VLIB_NODE_TYPE_INPUT,
297  .state = VLIB_NODE_STATE_DISABLED,
298  .n_errors = DPDK_CRYPTO_INPUT_N_ERROR,
299  .error_strings = dpdk_crypto_input_error_strings,
300  .n_next_nodes = DPDK_CRYPTO_INPUT_N_NEXT,
301  .next_nodes =
302  {
303 #define _(s,n) [DPDK_CRYPTO_INPUT_NEXT_##s] = n,
305 #undef _
306  },
307 };
308 /* *INDENT-ON* */
309 
310 /*
311  * fd.io coding-style-patch-verification: ON
312  *
313  * Local Variables:
314  * eval: (c-set-style "gnu")
315  * End:
316  */
dpdk_crypto_input_error_t
Definition: crypto_node.c:35
#define CLIB_UNUSED(x)
Definition: clib.h:82
static u32 vlib_get_trace_count(vlib_main_t *vm, vlib_node_runtime_t *rt)
Definition: trace_funcs.h:156
#define foreach_dpdk_crypto_input_next
Definition: ipsec.h:33
static_always_inline u32 dpdk_crypto_dequeue(vlib_main_t *vm, crypto_worker_main_t *cwm, vlib_node_runtime_t *node, crypto_resource_t *res)
Definition: crypto_node.c:126
#define NULL
Definition: clib.h:58
u32 thread_index
Definition: main.h:197
#define vec_add1(V, E)
Add 1 element to end of vector (unspecified alignment).
Definition: vec.h:522
int i
u8 * format(u8 *s, const char *fmt,...)
Definition: format.c:424
#define VLIB_NODE_FN(node)
Definition: node.h:201
vlib_node_registration_t dpdk_crypto_input_node
(constructor) VLIB_REGISTER_NODE (dpdk_crypto_input_node)
Definition: crypto_node.c:292
unsigned char u8
Definition: types.h:56
static void vlib_trace_buffer(vlib_main_t *vm, vlib_node_runtime_t *r, u32 next_index, vlib_buffer_t *b, int follow_chain)
Definition: trace_funcs.h:114
u16 * resource_idx
Definition: ipsec.h:69
static_always_inline void crypto_free_ops(u8 numa, struct rte_crypto_op **ops, u32 n)
Definition: ipsec.h:293
#define static_always_inline
Definition: clib.h:99
i64 word
Definition: types.h:111
dpdk_crypto_main_t dpdk_crypto_main
Definition: ipsec.c:25
#define always_inline
Definition: clib.h:98
static_always_inline uword dpdk_crypto_input_inline(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame)
Definition: crypto_node.c:235
#define vec_elt_at_index(v, i)
Get vector value at index i checking that i is in bounds.
u16 * free_resources
Definition: ipsec.h:92
unsigned int u32
Definition: types.h:88
#define vec_search(v, E)
Search a vector for the index of the entry that matches.
Definition: vec.h:940
#define VLIB_FRAME_SIZE
Definition: node.h:376
u32 next
Definition: ipsec.h:60
#define foreach_dpdk_crypto_input_error
Definition: crypto_node.c:30
u16 * used_resources
Definition: ipsec.h:93
unsigned short u16
Definition: types.h:57
#define PREDICT_FALSE(x)
Definition: clib.h:111
#define vec_del1(v, i)
Delete the element at index I.
Definition: vec.h:804
u32 node_index
Node index.
Definition: node.h:495
static void vlib_node_increment_counter(vlib_main_t *vm, u32 node_index, u32 counter_index, u64 increment)
Definition: node_funcs.h:1180
#define VLIB_REGISTER_NODE(x,...)
Definition: node.h:169
#define CLIB_PREFETCH(addr, size, type)
Definition: cache.h:80
vlib_main_t * vm
Definition: buffer.c:312
static_always_inline void dpdk_crypto_input_check_op(vlib_main_t *vm, vlib_node_runtime_t *node, struct rte_crypto_op *op0, u16 *next)
Definition: crypto_node.c:71
static_always_inline void vlib_buffer_enqueue_to_next(vlib_main_t *vm, vlib_node_runtime_t *node, u32 *buffers, u16 *nexts, uword count)
Definition: buffer_node.h:332
#define vec_free(V)
Free vector&#39;s memory (no header).
Definition: vec.h:341
static char * dpdk_crypto_input_error_strings[]
Definition: crypto_node.c:43
#define ASSERT(truth)
crypto_worker_main_t * workers_main
Definition: ipsec.h:156
static void dpdk_crypto_input_trace(vlib_main_t *vm, vlib_node_runtime_t *node, u8 dev_id, u32 *bis, u16 *nexts, u32 n_deq)
Definition: crypto_node.c:89
crypto_resource_t * resource
Definition: ipsec.h:158
static void * vlib_add_trace(vlib_main_t *vm, vlib_node_runtime_t *r, vlib_buffer_t *b, u32 n_data_bytes)
Definition: trace_funcs.h:57
struct _vlib_node_registration vlib_node_registration_t
static u8 * format_dpdk_crypto_input_trace(u8 *s, va_list *args)
Definition: crypto_node.c:59
VLIB buffer representation.
Definition: buffer.h:102
u64 uword
Definition: types.h:112
struct rte_crypto_op ** ops
Definition: ipsec.h:70
crypto_dev_t * dev
Definition: ipsec.h:157
#define vec_foreach(var, vec)
Vector iterator.
static void vlib_set_trace_count(vlib_main_t *vm, vlib_node_runtime_t *rt, u32 count)
Definition: trace_funcs.h:172
#define CLIB_CACHE_LINE_BYTES
Definition: cache.h:59
static vlib_buffer_t * vlib_get_buffer(vlib_main_t *vm, u32 buffer_index)
Translate buffer index into buffer pointer.
Definition: buffer_funcs.h:85
static_always_inline dpdk_op_priv_t * crypto_op_get_priv(struct rte_crypto_op *op)
Definition: ipsec.h:201