From patchwork Fri Jul 16 10:49:08 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: AMARANATH SOMALAPURAM X-Patchwork-Id: 95974 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 98E89A0C4A; Fri, 16 Jul 2021 12:49:35 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7A2714067B; Fri, 16 Jul 2021 12:49:35 +0200 (CEST) Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2060.outbound.protection.outlook.com [40.107.223.60]) by mails.dpdk.org (Postfix) with ESMTP id 0ECFF40151 for ; Fri, 16 Jul 2021 12:49:33 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A6M/T3MCvLC92ZKisTgDEc0apeZgz7CzhNMpom2JP3uaEGDh/MO/qKD9bHjTVnCe9PU9kZXXZCAftQoEJnGMAyH7zGPjtkPRY0yeuh7DjPNiGijJMxEN8LJZsyh3suoKsPYnsqj3Pl5rgDC4RF9xd3IMigdpuJfxfZENCSlAXL7AePoLG3nh6L1ubk1CQJeQSQgF74m7Yx61W5lShP8HKyxZB+fVa7WShNc81M+g0p1l9YIwmdaHCKZMK9Fk4j74fbaqBklI4/Xx//XPpJUvtRnhKy/yU4UD2hbhVwZzISQ1wz0gnEBRrEYdDwMk52Yy7B6qCIehbvnhfOpH6hI6Ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vUbRfvlQm1PpZo0/HdHNA0+kENpff/4ZNPvGoNb9x70=; b=nKexoIUOwzLWPgHr+ylI0V9yZMA4DxzpkJLoKnSCmQD4Mpnh+8qKtmEKIgko4DXQDMwj1BKqrxM4A/N5MioboXrGAO+Pgco7/4rb6S5PB79F2eTwhh+oTrQW6n9SmUckerMgbGGlFF0udJQhip7opNaw04oWJnuAmFfkzAAbeaXi/gLBkMHlqkwDEkJdWKnqWsoAIPm2PJvuQTBCgq3JvE0mRKQjNDn6WknsX2y91g/jwF/ExapsGxhHNzHz3jiJLH52eQVWvx+5VPfP0fOr+K2HP/qhxYLcCZzc1JXz2zPsNjNJp3x8G359qrcXXXnadEZBW3+NjekiFPDS6Hh6zA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vUbRfvlQm1PpZo0/HdHNA0+kENpff/4ZNPvGoNb9x70=; b=ZtK0SP7BsC2YXYeTwh+SEMujsDU0YrDWMrZsBbxD9yiAWHyQzUsWLNVEQ/CSVi+5vaGecRJ2uXbCVAObiSGz0kJtP5PYqTgNXkd/zjJq73M1YYN09GWVDHPFOsO+JGwtWxfvgjq5DIs9o7CkwJy4c4cHaAu8v9xOj4pDAHMlDig= Authentication-Results: dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=none action=none header.from=amd.com; Received: from BYAPR12MB2821.namprd12.prod.outlook.com (2603:10b6:a03:9b::30) by BYAPR12MB2727.namprd12.prod.outlook.com (2603:10b6:a03:71::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21; Fri, 16 Jul 2021 10:49:30 +0000 Received: from BYAPR12MB2821.namprd12.prod.outlook.com ([fe80::7d70:4f93:e25e:ebf4]) by BYAPR12MB2821.namprd12.prod.outlook.com ([fe80::7d70:4f93:e25e:ebf4%5]) with mapi id 15.20.4308.027; Fri, 16 Jul 2021 10:49:30 +0000 From: asomalap@amd.com To: dev@dpdk.org Date: Fri, 16 Jul 2021 16:19:08 +0530 Message-Id: <20210716104908.3449061-1-asomalap@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210716104110.3445921-1-asomalap@amd.com> References: <20210716104110.3445921-1-asomalap@amd.com> X-ClientProxiedBy: MA1PR01CA0164.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:71::34) To BYAPR12MB2821.namprd12.prod.outlook.com (2603:10b6:a03:9b::30) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from cae-Wallaby.amd.com (165.204.157.251) by MA1PR01CA0164.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:71::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21 via Frontend Transport; Fri, 16 Jul 2021 10:49:28 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: eaf9952e-1382-463c-d197-08d948476322 X-MS-TrafficTypeDiagnostic: BYAPR12MB2727: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:446; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR12MB2821.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(346002)(39860400002)(376002)(396003)(366004)(6486002)(478600001)(8676002)(316002)(9686003)(36756003)(6916009)(8936002)(83380400001)(2906002)(52116002)(7696005)(2616005)(1076003)(38100700002)(38350700002)(66476007)(66556008)(186003)(956004)(6666004)(5660300002)(66946007)(30864003)(26005); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: eaf9952e-1382-463c-d197-08d948476322 X-MS-Exchange-CrossTenant-AuthSource: BYAPR12MB2821.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jul 2021 10:49:30.0985 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Q2hovrS9gyXrsAAx+hXFHupOpUlwBg+BbSUf3/f5XaXptdMciD1j7zoF5DiDkGFSf3L/lnjIqbDMuSKJAogCPg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR12MB2727 Subject: [dpdk-dev] [PATCH v3] crypto/ccp: moving vdev to PCI driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Amaranath Somalapuram drop all the code duplicating the PCI bus driver develped for Enable IOMMU in vdev. Signed-off-by: Amaranath Somalapuram --- drivers/crypto/ccp/ccp_dev.c | 66 +------------ drivers/crypto/ccp/ccp_dev.h | 3 +- drivers/crypto/ccp/rte_ccp_pmd.c | 158 +++++++------------------------ 3 files changed, 41 insertions(+), 186 deletions(-) diff --git a/drivers/crypto/ccp/ccp_dev.c b/drivers/crypto/ccp/ccp_dev.c index ee6882b8a4..0eb1b0328e 100644 --- a/drivers/crypto/ccp/ccp_dev.c +++ b/drivers/crypto/ccp/ccp_dev.c @@ -650,73 +650,17 @@ is_ccp_device(const char *dirname, } static int -ccp_probe_device(const char *dirname, uint16_t domain, - uint8_t bus, uint8_t devid, - uint8_t function, int ccp_type) +ccp_probe_device(int ccp_type, struct rte_pci_device *pci_dev) { struct ccp_device *ccp_dev = NULL; - struct rte_pci_device *pci; - char filename[PATH_MAX]; - unsigned long tmp; int uio_fd = -1; ccp_dev = rte_zmalloc("ccp_device", sizeof(*ccp_dev), RTE_CACHE_LINE_SIZE); if (ccp_dev == NULL) goto fail; - pci = &(ccp_dev->pci); - - pci->addr.domain = domain; - pci->addr.bus = bus; - pci->addr.devid = devid; - pci->addr.function = function; - - /* get vendor id */ - snprintf(filename, sizeof(filename), "%s/vendor", dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.vendor_id = (uint16_t)tmp; - - /* get device id */ - snprintf(filename, sizeof(filename), "%s/device", dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.device_id = (uint16_t)tmp; - - /* get subsystem_vendor id */ - snprintf(filename, sizeof(filename), "%s/subsystem_vendor", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.subsystem_vendor_id = (uint16_t)tmp; - - /* get subsystem_device id */ - snprintf(filename, sizeof(filename), "%s/subsystem_device", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - pci->id.subsystem_device_id = (uint16_t)tmp; - - /* get class_id */ - snprintf(filename, sizeof(filename), "%s/class", - dirname); - if (ccp_pci_parse_sysfs_value(filename, &tmp) < 0) - goto fail; - /* the least 24 bits are valid: class, subclass, program interface */ - pci->id.class_id = (uint32_t)tmp & RTE_CLASS_ANY_ID; - - /* parse resources */ - snprintf(filename, sizeof(filename), "%s/resource", dirname); - if (ccp_pci_parse_sysfs_resource(filename, pci) < 0) - goto fail; - if (iommu_mode == 2) - pci->kdrv = RTE_PCI_KDRV_VFIO; - else if (iommu_mode == 0) - pci->kdrv = RTE_PCI_KDRV_IGB_UIO; - else if (iommu_mode == 1) - pci->kdrv = RTE_PCI_KDRV_UIO_GENERIC; - rte_pci_map_device(pci); + ccp_dev->pci = *pci_dev; /* device is valid, add in list */ if (ccp_add_device(ccp_dev, ccp_type)) { @@ -735,7 +679,8 @@ ccp_probe_device(const char *dirname, uint16_t domain, } int -ccp_probe_devices(const struct rte_pci_id *ccp_id) +ccp_probe_devices(struct rte_pci_device *pci_dev, + const struct rte_pci_id *ccp_id) { int dev_cnt = 0; int ccp_type = 0; @@ -767,8 +712,7 @@ ccp_probe_devices(const struct rte_pci_id *ccp_id) if (is_ccp_device(dirname, ccp_id, &ccp_type)) { printf("CCP : Detected CCP device with ID = 0x%x\n", ccp_id[ccp_type].device_id); - ret = ccp_probe_device(dirname, domain, bus, devid, - function, ccp_type); + ret = ccp_probe_device(ccp_type, pci_dev); if (ret == 0) dev_cnt++; } diff --git a/drivers/crypto/ccp/ccp_dev.h b/drivers/crypto/ccp/ccp_dev.h index 37e04218ce..ca5145c278 100644 --- a/drivers/crypto/ccp/ccp_dev.h +++ b/drivers/crypto/ccp/ccp_dev.h @@ -473,7 +473,8 @@ int ccp_dev_start(struct rte_cryptodev *dev); * @param ccp_id rte_pci_id list for supported CCP devices * @return no. of successfully initialized CCP devices */ -int ccp_probe_devices(const struct rte_pci_id *ccp_id); +int ccp_probe_devices(struct rte_pci_device *pci_dev, + const struct rte_pci_id *ccp_id); /** * allocate a ccp command queue diff --git a/drivers/crypto/ccp/rte_ccp_pmd.c b/drivers/crypto/ccp/rte_ccp_pmd.c index ba379a19f3..84a650d9f5 100644 --- a/drivers/crypto/ccp/rte_ccp_pmd.c +++ b/drivers/crypto/ccp/rte_ccp_pmd.c @@ -47,111 +47,6 @@ enum ccp_pmd_auth_opt { CCP_PMD_AUTH_OPT_CPU, }; -/** parse integer from integer argument */ -static int -parse_integer_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - int *i = (int *) extra_args; - - *i = atoi(value); - if (*i < 0) { - CCP_LOG_ERR("Argument has to be positive.\n"); - return -EINVAL; - } - - return 0; -} - -/** parse name argument */ -static int -parse_name_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - struct rte_cryptodev_pmd_init_params *params = extra_args; - - if (strlen(value) >= RTE_CRYPTODEV_NAME_MAX_LEN - 1) { - CCP_LOG_ERR("Invalid name %s, should be less than " - "%u bytes.\n", value, - RTE_CRYPTODEV_NAME_MAX_LEN - 1); - return -EINVAL; - } - - strncpy(params->name, value, RTE_CRYPTODEV_NAME_MAX_LEN); - - return 0; -} - -/** parse authentication operation option */ -static int -parse_auth_opt_arg(const char *key __rte_unused, - const char *value, void *extra_args) -{ - struct ccp_pmd_init_params *params = extra_args; - int i; - - i = atoi(value); - if (i < CCP_PMD_AUTH_OPT_CCP || i > CCP_PMD_AUTH_OPT_CPU) { - CCP_LOG_ERR("Invalid ccp pmd auth option. " - "0->auth on CCP(default), " - "1->auth on CPU\n"); - return -EINVAL; - } - params->auth_opt = i; - return 0; -} - -static int -ccp_pmd_parse_input_args(struct ccp_pmd_init_params *params, - const char *input_args) -{ - struct rte_kvargs *kvlist = NULL; - int ret = 0; - - if (params == NULL) - return -EINVAL; - - if (input_args) { - kvlist = rte_kvargs_parse(input_args, - ccp_pmd_valid_params); - if (kvlist == NULL) - return -1; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_MAX_NB_QP, - &parse_integer_arg, - ¶ms->def_p.max_nb_queue_pairs); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_SOCKET_ID, - &parse_integer_arg, - ¶ms->def_p.socket_id); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_NAME, - &parse_name_arg, - ¶ms->def_p); - if (ret < 0) - goto free_kvlist; - - ret = rte_kvargs_process(kvlist, - CCP_CRYPTODEV_PARAM_AUTH_OPT, - &parse_auth_opt_arg, - params); - if (ret < 0) - goto free_kvlist; - - } - -free_kvlist: - rte_kvargs_free(kvlist); - return ret; -} - static struct ccp_session * get_ccp_session(struct ccp_qp *qp, struct rte_crypto_op *op) { @@ -300,12 +195,21 @@ static struct rte_pci_id ccp_pci_id[] = { /** Remove ccp pmd */ static int -cryptodev_ccp_remove(struct rte_vdev_device *dev) +cryptodev_ccp_remove(struct rte_pci_device *pci_dev) { - const char *name; + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; + struct rte_cryptodev *dev; + + if (pci_dev == NULL) + return -EINVAL; + + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + dev = rte_cryptodev_pmd_get_named_dev(name); + if (dev == NULL) + return -ENODEV; ccp_pmd_init_done = 0; - name = rte_vdev_device_name(dev); rte_free(sha_ctx); if (name == NULL) return -EINVAL; @@ -313,14 +217,15 @@ cryptodev_ccp_remove(struct rte_vdev_device *dev) RTE_LOG(INFO, PMD, "Closing ccp device %s on numa socket %u\n", name, rte_socket_id()); - return 0; + return rte_cryptodev_pmd_destroy(dev); } /** Create crypto device */ static int cryptodev_ccp_create(const char *name, - struct rte_vdev_device *vdev, - struct ccp_pmd_init_params *init_params) + struct rte_pci_device *pci_dev, + struct ccp_pmd_init_params *init_params, + struct rte_pci_driver *pci_drv) { struct rte_cryptodev *dev; struct ccp_private *internals; @@ -330,14 +235,14 @@ cryptodev_ccp_create(const char *name, sizeof(init_params->def_p.name)); dev = rte_cryptodev_pmd_create(init_params->def_p.name, - &vdev->device, + &pci_dev->device, &init_params->def_p); if (dev == NULL) { CCP_LOG_ERR("failed to create cryptodev vdev"); goto init_error; } - cryptodev_cnt = ccp_probe_devices(ccp_pci_id); + cryptodev_cnt = ccp_probe_devices(pci_dev, ccp_pci_id); if (cryptodev_cnt == 0) { CCP_LOG_ERR("failed to detect CCP crypto device"); @@ -345,6 +250,8 @@ cryptodev_ccp_create(const char *name, } printf("CCP : Crypto device count = %d\n", cryptodev_cnt); + dev->device = &pci_dev->device; + dev->device->driver = &pci_drv->driver; dev->driver_id = ccp_cryptodev_driver_id; /* register rx/tx burst functions for data path */ @@ -368,17 +275,18 @@ cryptodev_ccp_create(const char *name, init_error: CCP_LOG_ERR("driver %s: %s() failed", init_params->def_p.name, __func__); - cryptodev_ccp_remove(vdev); + cryptodev_ccp_remove(pci_dev); return -EFAULT; } /** Probe ccp pmd */ static int -cryptodev_ccp_probe(struct rte_vdev_device *vdev) +cryptodev_ccp_probe(struct rte_pci_driver *pci_drv __rte_unused, + struct rte_pci_device *pci_dev) { int rc = 0; - const char *name; + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; struct ccp_pmd_init_params init_params = { .def_p = { "", @@ -388,19 +296,16 @@ cryptodev_ccp_probe(struct rte_vdev_device *vdev) }, .auth_opt = CCP_PMD_AUTH_OPT_CCP, }; - const char *input_args; sha_ctx = (void *)rte_malloc(NULL, SHA512_DIGEST_SIZE, 64); if (ccp_pmd_init_done) { RTE_LOG(INFO, PMD, "CCP PMD already initialized\n"); return -EFAULT; } - name = rte_vdev_device_name(vdev); - if (name == NULL) + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + if (name[0] == '\0') return -EINVAL; - input_args = rte_vdev_device_args(vdev); - ccp_pmd_parse_input_args(&init_params, input_args); init_params.def_p.max_nb_queue_pairs = CCP_PMD_MAX_QUEUE_PAIRS; RTE_LOG(INFO, PMD, "Initialising %s on NUMA node %d\n", name, @@ -410,21 +315,26 @@ cryptodev_ccp_probe(struct rte_vdev_device *vdev) RTE_LOG(INFO, PMD, "Authentication offload to %s\n", ((init_params.auth_opt == 0) ? "CCP" : "CPU")); - rc = cryptodev_ccp_create(name, vdev, &init_params); + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + rc = cryptodev_ccp_create(name, pci_dev, &init_params, pci_drv); if (rc) return rc; ccp_pmd_init_done = 1; return 0; } -static struct rte_vdev_driver cryptodev_ccp_pmd_drv = { +static struct rte_pci_driver cryptodev_ccp_pmd_drv = { + .id_table = ccp_pci_id, + .drv_flags = RTE_PCI_DRV_NEED_MAPPING, .probe = cryptodev_ccp_probe, .remove = cryptodev_ccp_remove }; static struct cryptodev_driver ccp_crypto_drv; -RTE_PMD_REGISTER_VDEV(CRYPTODEV_NAME_CCP_PMD, cryptodev_ccp_pmd_drv); +RTE_PMD_REGISTER_PCI(CRYPTODEV_NAME_CCP_PMD, cryptodev_ccp_pmd_drv); +RTE_PMD_REGISTER_KMOD_DEP(CRYPTODEV_NAME_CCP_PMD, "* igb_uio | uio_pci_generic | vfio-pci"); RTE_PMD_REGISTER_PARAM_STRING(CRYPTODEV_NAME_CCP_PMD, "max_nb_queue_pairs= " "socket_id= "