From patchwork Fri Jul 16 08:47:04 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: AMARANATH SOMALAPURAM X-Patchwork-Id: 95967 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 19B4AA0C51; Fri, 16 Jul 2021 10:47:37 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8C50B40151; Fri, 16 Jul 2021 10:47:36 +0200 (CEST) Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2080.outbound.protection.outlook.com [40.107.93.80]) by mails.dpdk.org (Postfix) with ESMTP id B995E4014D for ; Fri, 16 Jul 2021 10:47:35 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MiYKhsBHjBNmZDTCV//ufk6xlUdw/O3YBiqj3IHmBFAz91f9YTXncC6XNcYjBwFc+VAcJWUWfmS2Q+nvTDWQmvPnln0U/lZugFpwRv7UQ24BbrbhvY3YONL45x8CdGXvmeO1SkWlOo1OV/HZizg50Qya82Y5CBsQjd/PZryZk8E+ArmUhOPryp7IlZqFHpkGEIovOS8423/rsNj80nFjUWLLPTGdK/NYpXcVVY8wPUtaI7oWk35tHGKTq9VUPUDdTRtNaTtXbJpFsfW1BPubLR3VZgyJjsBmhjNf+u6PwHtN5RKG0Pv8S4pVNaUUpFLkj1yGb7Lc9tBzQxHfLdny/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LqcacoIcN2U8DtPUaAHATlvme4rYJw5qu2+6auTglHM=; b=Gv+fFbTHZgCcqMVe7w0EN/TK34u18XagKH803emsJ4QGPNyMHv4H2VQle9JpmQ/1QSn3rgs4eDjtv42QdMf/tsoztff+bVfloIHALcKKz1yV0Qrx+yCkzaNpDoyyX+a5iqO+6GT4WGzKf8c+aS8/aMTyzCQz5VWF1RdxY7qX+HZzh+0O4CsJqLEsSHm2Uz/s2/41f2hhNIlXhUzrT/l9QeCaMr7iNx9vV2Po0APTto4y623SAOUhkTxmsZGfcsXGGWZ/3cFumhghBYqKDX9Wf4D9bM2AzcEYo24Ptas2D/x0CG/R/EBUyipz2257yMGzv7CFX702tQu2g7fRpJRHKg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LqcacoIcN2U8DtPUaAHATlvme4rYJw5qu2+6auTglHM=; b=axgreIlQR7jPj4f4s3D6dpVG7Et6BvMxtYaL/e+M9elrMkGbXU8TnoKNU7LbnAtlrIQWXpW3dLG2MghyCFTa6KoGNZ7TPghvU+5bjs/agIo7LSdSQ172SjsOMYKF6DBYVFfGhy66hl5qgtVRXb4+ItbH+HIUVs1l3N9wnykXQfU= Authentication-Results: dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=none action=none header.from=amd.com; Received: from BYAPR12MB2821.namprd12.prod.outlook.com (2603:10b6:a03:9b::30) by BY5PR12MB4888.namprd12.prod.outlook.com (2603:10b6:a03:1d8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21; Fri, 16 Jul 2021 08:47:30 +0000 Received: from BYAPR12MB2821.namprd12.prod.outlook.com ([fe80::7d70:4f93:e25e:ebf4]) by BYAPR12MB2821.namprd12.prod.outlook.com ([fe80::7d70:4f93:e25e:ebf4%5]) with mapi id 15.20.4308.027; Fri, 16 Jul 2021 08:47:30 +0000 From: asomalap@amd.com To: dev@dpdk.org Date: Fri, 16 Jul 2021 14:17:04 +0530 Message-Id: <20210716084704.3403712-1-asomalap@amd.com> X-Mailer: git-send-email 2.25.1 X-ClientProxiedBy: MA1PR01CA0076.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00::16) To BYAPR12MB2821.namprd12.prod.outlook.com (2603:10b6:a03:9b::30) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from cae-Wallaby.amd.com (165.204.157.251) by MA1PR01CA0076.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.23 via Frontend Transport; Fri, 16 Jul 2021 08:47:28 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 4a38600b-c0ab-4ecf-da80-08d948365859 X-MS-TrafficTypeDiagnostic: BY5PR12MB4888: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:446; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: jBdyvbJ73WqzdRxvGS90SIHHtyTmuNmFolC43dRZV24awhMMw5yAj5A/VqAeupLsmJxPpBYQr1HyHA4abfIp58ihDif2gWKZYp+XEUyoOqgW8yolGD6lJPdbyA9k8rFJh3fa8oR3GQ9UpQMhrXkxhvddmmPRESPkYaXawL+G6EBWhTU31u7gkb1Uv/PxEKLxZmnPX6aERFx1wzbSpqlAmRZwXJV7/t6V8WN3KsYL+1IZjIJybMqEhVWEzoUmsw7zAPGUgJ3LE24XCyVGl8/5/0c0BBQbI4soccZj3AfXMIn6ofCdH9Jihm7rSRmEeFIE0TOeWEukLH6BJDtT7Cy+512IooRxHpWIsZi94RTotQ0ybOdH4wQekWTy5HfsRYmCtormH6NojOmLBtvNFdV0sIZFrZoOJDnqAPuaM5Gv0WIX40uPvpKZfXGbJAUVKE1c9qm77LUWt6PS6cH2QCn2vMlRtDtimCxOqZIxpWhRW32C3A2eWAhSTlbNHH4oeYHjRZslmuJNWj0Om02eB/JOyYYqcv4oAVEd2WqUrNuUKBZMdAzTfCYqk71yq8eLVadA3obDs/ucNIfV19Bbp8U7Ivfyi/cm6ik41zNIwXvn5j3ltKwOywLzkFpASA7kDfzPgYnBTgcpcghZNJ8D0IguZ7yD16FRKmVXxksrfj6ZPQMWiY/ANnmhso7gzDJQr6/NjUZ58uVZm/7QHF2LauK4Lw== X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR12MB2821.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(66476007)(66556008)(186003)(66946007)(6916009)(26005)(52116002)(7696005)(38100700002)(38350700002)(6486002)(83380400001)(316002)(9686003)(1076003)(5660300002)(2616005)(8676002)(956004)(478600001)(36756003)(2906002)(30864003)(6666004)(8936002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4a38600b-c0ab-4ecf-da80-08d948365859 X-MS-Exchange-CrossTenant-AuthSource: BYAPR12MB2821.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jul 2021 08:47:30.4039 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: sUyME40l3l08sqP4Q9RuNcAME7on5/g/Ld4lLyEnH6Boyn7GZp0W3vNC4VKkbEN+fqip1jsIZOf4dsSF6iQZxA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4888 Subject: [dpdk-dev] [PATCH v1] crypto/ccp: moving vdev to PCI driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Amaranath Somalapuram drop all the code duplicating the PCI bus driver develped for Enable IOMMU in vdev. Signed-off-by: Amaranath Somalapuram --- drivers/crypto/ccp/ccp_dev.c | 67 ++----------- drivers/crypto/ccp/ccp_dev.h | 3 +- drivers/crypto/ccp/rte_ccp_pmd.c | 156 +++++++------------------------ 3 files changed, 41 insertions(+), 185 deletions(-) diff --git a/drivers/crypto/ccp/ccp_dev.c b/drivers/crypto/ccp/ccp_dev.c index ee6882b8a4..be2cefbec9 100644 --- a/drivers/crypto/ccp/ccp_dev.c +++ b/drivers/crypto/ccp/ccp_dev.c @@ -604,6 +604,7 @@ ccp_add_device(struct ccp_device *dev, int type) } TAILQ_INSERT_TAIL(&ccp_list, dev, next); + return 0; } @@ -650,73 +651,17 @@ is_ccp_device(const char *dirname, } static int -ccp_probe_device(const char *dirname, uint16_t domain, - uint8_t bus, uint8_t devid, - uint8_t function, int ccp_type) +ccp_probe_device(int ccp_type, struct rte_pci_device *pci_dev) { struct ccp_device *ccp_dev = NULL; - struct rte_pci_device *pci; - char filename[PATH_MAX]; - unsigned long tmp; int uio_fd = -1; ccp_dev = rte_zmalloc("ccp_device", sizeof(*ccp_dev), RTE_CACHE_LINE_SIZE); if (ccp_dev == NULL) goto fail; - pci = &(ccp_dev->pci); - - pci->addr.domain = domain; - pci->addr.bus = bus; - pci->addr.devid = devid; - pci->addr.function = function; - - /* get vendor id */ - snprintf(filename, sizeof(filename), "%s/vendor", dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.vendor_id = (uint16_t)tmp; - - /* get device id */ - snprintf(filename, sizeof(filename), "%s/device", dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.device_id = (uint16_t)tmp; - - /* get subsystem_vendor id */ - snprintf(filename, sizeof(filename), "%s/subsystem_vendor", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.subsystem_vendor_id = (uint16_t)tmp; - - /* get subsystem_device id */ - snprintf(filename, sizeof(filename), "%s/subsystem_device", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.subsystem_device_id = (uint16_t)tmp; - - /* get class_id */ - snprintf(filename, sizeof(filename), "%s/class", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - /* the least 24 bits are valid: class, subclass, program interface */ - pci->id.class_id = (uint32_t)tmp & RTE_CLASS_ANY_ID; - - /* parse resources */ - snprintf(filename, sizeof(filename), "%s/resource", dirname); - if (ccp_pci_parse_sysfs_resource(filename, pci) < 0) - goto fail; - if (iommu_mode == 2) - pci->kdrv = RTE_PCI_KDRV_VFIO; - else if (iommu_mode == 0) - pci->kdrv = RTE_PCI_KDRV_IGB_UIO; - else if (iommu_mode == 1) - pci->kdrv = RTE_PCI_KDRV_UIO_GENERIC; - rte_pci_map_device(pci); + ccp_dev->pci = *pci_dev; /* device is valid, add in list */ if (ccp_add_device(ccp_dev, ccp_type)) { @@ -735,7 +680,8 @@ ccp_probe_device(const char *dirname, uint16_t domain, } int -ccp_probe_devices(const struct rte_pci_id *ccp_id) +ccp_probe_devices(struct rte_pci_device *pci_dev, + const struct rte_pci_id *ccp_id) { int dev_cnt = 0; int ccp_type = 0; @@ -767,8 +713,7 @@ ccp_probe_devices(const struct rte_pci_id *ccp_id) if (is_ccp_device(dirname, ccp_id, &ccp_type)) { printf("CCP : Detected CCP device with ID = 0x%x\n", ccp_id[ccp_type].device_id); - ret = ccp_probe_device(dirname, domain, bus, devid, - function, ccp_type); + ret = ccp_probe_device(ccp_type, pci_dev); if (ret == 0) dev_cnt++; } diff --git a/drivers/crypto/ccp/ccp_dev.h b/drivers/crypto/ccp/ccp_dev.h index 37e04218ce..ca5145c278 100644 --- a/drivers/crypto/ccp/ccp_dev.h +++ b/drivers/crypto/ccp/ccp_dev.h @@ -473,7 +473,8 @@ int ccp_dev_start(struct rte_cryptodev *dev); * @param ccp_id rte_pci_id list for supported CCP devices * @return no. of successfully initialized CCP devices */ -int ccp_probe_devices(const struct rte_pci_id *ccp_id); +int ccp_probe_devices(struct rte_pci_device *pci_dev, + const struct rte_pci_id *ccp_id); /** * allocate a ccp command queue diff --git a/drivers/crypto/ccp/rte_ccp_pmd.c b/drivers/crypto/ccp/rte_ccp_pmd.c index ba379a19f3..7fc87892fb 100644 --- a/drivers/crypto/ccp/rte_ccp_pmd.c +++ b/drivers/crypto/ccp/rte_ccp_pmd.c @@ -47,111 +47,6 @@ enum ccp_pmd_auth_opt { CCP_PMD_AUTH_OPT_CPU, }; -/** parse integer from integer argument */ -static int -parse_integer_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - int *i = (int *) extra_args; - - *i = atoi(value); - if (*i < 0) { - CCP_LOG_ERR("Argument has to be positive.\n"); - return -EINVAL; - } - - return 0; -} - -/** parse name argument */ -static int -parse_name_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - struct rte_cryptodev_pmd_init_params *params = extra_args; - - if (strlen(value) >= RTE_CRYPTODEV_NAME_MAX_LEN - 1) { - CCP_LOG_ERR("Invalid name %s, should be less than " - "%u bytes.\n", value, - RTE_CRYPTODEV_NAME_MAX_LEN - 1); - return -EINVAL; - } - - strncpy(params->name, value, RTE_CRYPTODEV_NAME_MAX_LEN); - - return 0; -} - -/** parse authentication operation option */ -static int -parse_auth_opt_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - struct ccp_pmd_init_params *params = extra_args; - int i; - - i = atoi(value); - if (i < CCP_PMD_AUTH_OPT_CCP || i > CCP_PMD_AUTH_OPT_CPU) { - CCP_LOG_ERR("Invalid ccp pmd auth option. " - "0->auth on CCP(default), " - "1->auth on CPU\n"); - return -EINVAL; - } - params->auth_opt = i; - return 0; -} - -static int -ccp_pmd_parse_input_args(struct ccp_pmd_init_params *params, - const char *input_args) -{ - struct rte_kvargs *kvlist = NULL; - int ret = 0; - - if (params == NULL) - return -EINVAL; - - if (input_args) { - kvlist = rte_kvargs_parse(input_args, - ccp_pmd_valid_params); - if (kvlist == NULL) - return -1; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_MAX_NB_QP, - &parse_integer_arg, - ¶ms->def_p.max_nb_queue_pairs); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_SOCKET_ID, - &parse_integer_arg, - ¶ms->def_p.socket_id); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_NAME, - &parse_name_arg, - ¶ms->def_p); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_AUTH_OPT, - &parse_auth_opt_arg, - params); - if (ret < 0) - goto free_kvlist; - - } - -free_kvlist: - rte_kvargs_free(kvlist); - return ret; -} - static struct ccp_session * get_ccp_session(struct ccp_qp *qp, struct rte_crypto_op *op) { @@ -300,12 +195,21 @@ static struct rte_pci_id ccp_pci_id[] = { /** Remove ccp pmd */ static int -cryptodev_ccp_remove(struct rte_vdev_device *dev) +cryptodev_ccp_remove(struct rte_pci_device *pci_dev) { - const char *name; + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; + struct rte_cryptodev *dev; + + if (pci_dev == NULL) + return -EINVAL; + + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + dev = rte_cryptodev_pmd_get_named_dev(name); + if (dev == NULL) + return -ENODEV; ccp_pmd_init_done = 0; - name = rte_vdev_device_name(dev); rte_free(sha_ctx); if (name == NULL) return -EINVAL; @@ -313,14 +217,15 @@ cryptodev_ccp_remove(struct rte_vdev_device *dev) RTE_LOG(INFO, PMD, "Closing ccp device %s on numa socket %u\n", name, rte_socket_id()); - return 0; + return rte_cryptodev_pmd_destroy(dev); } /** Create crypto device */ static int cryptodev_ccp_create(const char *name, - struct rte_vdev_device *vdev, - struct ccp_pmd_init_params *init_params) + struct rte_pci_device *pci_dev, + struct ccp_pmd_init_params *init_params, + struct rte_pci_driver *pci_drv) { struct rte_cryptodev *dev; struct ccp_private *internals; @@ -330,14 +235,14 @@ cryptodev_ccp_create(const char *name, sizeof(init_params->def_p.name)); dev = rte_cryptodev_pmd_create(init_params->def_p.name, - &vdev->device, + &pci_dev->device, &init_params->def_p); if (dev == NULL) { CCP_LOG_ERR("failed to create cryptodev vdev"); goto init_error; } - cryptodev_cnt = ccp_probe_devices(ccp_pci_id); + cryptodev_cnt = ccp_probe_devices(pci_dev, ccp_pci_id); if (cryptodev_cnt == 0) { CCP_LOG_ERR("failed to detect CCP crypto device"); @@ -345,6 +250,8 @@ cryptodev_ccp_create(const char *name, } printf("CCP : Crypto device count = %d\n", cryptodev_cnt); + dev->device = &pci_dev->device; + dev->device->driver = &pci_drv->driver; dev->driver_id = ccp_cryptodev_driver_id; /* register rx/tx burst functions for data path */ @@ -368,17 +275,18 @@ cryptodev_ccp_create(const char *name, init_error: CCP_LOG_ERR("driver %s: %s() failed", init_params->def_p.name, __func__); - cryptodev_ccp_remove(vdev); + cryptodev_ccp_remove(pci_dev); return -EFAULT; } /** Probe ccp pmd */ static int -cryptodev_ccp_probe(struct rte_vdev_device *vdev) +cryptodev_ccp_probe(struct rte_pci_driver *pci_drv __rte_unused, + struct rte_pci_device *pci_dev) { int rc = 0; - const char *name; + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; struct ccp_pmd_init_params init_params = { .def_p = { "", @@ -388,19 +296,16 @@ cryptodev_ccp_probe(struct rte_vdev_device *vdev) }, .auth_opt = CCP_PMD_AUTH_OPT_CCP, }; - const char *input_args; sha_ctx = (void *)rte_malloc(NULL, SHA512_DIGEST_SIZE, 64); if (ccp_pmd_init_done) { RTE_LOG(INFO, PMD, "CCP PMD already initialized\n"); return -EFAULT; } - name = rte_vdev_device_name(vdev); + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); if (name == NULL) return -EINVAL; - input_args = rte_vdev_device_args(vdev); - ccp_pmd_parse_input_args(&init_params, input_args); init_params.def_p.max_nb_queue_pairs = CCP_PMD_MAX_QUEUE_PAIRS; RTE_LOG(INFO, PMD, "Initialising %s on NUMA node %d\n", name, @@ -410,21 +315,26 @@ cryptodev_ccp_probe(struct rte_vdev_device *vdev) RTE_LOG(INFO, PMD, "Authentication offload to %s\n", ((init_params.auth_opt == 0) ? "CCP" : "CPU")); - rc = cryptodev_ccp_create(name, vdev, &init_params); + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + rc = cryptodev_ccp_create(name, pci_dev, &init_params, pci_drv); if (rc) return rc; ccp_pmd_init_done = 1; return 0; } -static struct rte_vdev_driver cryptodev_ccp_pmd_drv = { +static struct rte_pci_driver cryptodev_ccp_pmd_drv = { + .id_table = ccp_pci_id, + .drv_flags = RTE_PCI_DRV_NEED_MAPPING, .probe = cryptodev_ccp_probe, .remove = cryptodev_ccp_remove }; static struct cryptodev_driver ccp_crypto_drv; -RTE_PMD_REGISTER_VDEV(CRYPTODEV_NAME_CCP_PMD, cryptodev_ccp_pmd_drv); +RTE_PMD_REGISTER_PCI(CRYPTODEV_NAME_CCP_PMD, cryptodev_ccp_pmd_drv); +RTE_PMD_REGISTER_KMOD_DEP(CRYPTODEV_NAME_CCP_PMD, "* igb_uio | uio_pci_generic | vfio-pci"); RTE_PMD_REGISTER_PARAM_STRING(CRYPTODEV_NAME_CCP_PMD, "max_nb_queue_pairs= " "socket_id= "