mirror of https://github.com/F-Stack/f-stack.git
783 lines
20 KiB
C
783 lines
20 KiB
C
/* SPDX-License-Identifier: BSD-3-Clause
|
|
* Copyright(c) 2017 Intel Corporation
|
|
*/
|
|
#include <rte_string_fns.h>
|
|
#include <rte_reorder.h>
|
|
#include <rte_cryptodev.h>
|
|
#include <cryptodev_pmd.h>
|
|
#include <rte_security_driver.h>
|
|
#include <rte_malloc.h>
|
|
|
|
#include "rte_cryptodev_scheduler.h"
|
|
#include "scheduler_pmd_private.h"
|
|
|
|
#define MAX_CAPS 256
|
|
|
|
/** update the scheduler pmd's capability with attaching device's
|
|
* capability.
|
|
* For each device to be attached, the scheduler's capability should be
|
|
* the common capability set of all workers
|
|
**/
|
|
static uint32_t
|
|
sync_caps(struct rte_cryptodev_capabilities *caps,
|
|
uint32_t nb_caps,
|
|
const struct rte_cryptodev_capabilities *worker_caps)
|
|
{
|
|
uint32_t sync_nb_caps = nb_caps, nb_worker_caps = 0;
|
|
uint32_t i;
|
|
|
|
while (worker_caps[nb_worker_caps].op != RTE_CRYPTO_OP_TYPE_UNDEFINED)
|
|
nb_worker_caps++;
|
|
|
|
if (nb_caps == 0) {
|
|
rte_memcpy(caps, worker_caps, sizeof(*caps) * nb_worker_caps);
|
|
return nb_worker_caps;
|
|
}
|
|
|
|
for (i = 0; i < sync_nb_caps; i++) {
|
|
struct rte_cryptodev_capabilities *cap = &caps[i];
|
|
uint32_t j;
|
|
|
|
for (j = 0; j < nb_worker_caps; j++) {
|
|
const struct rte_cryptodev_capabilities *s_cap =
|
|
&worker_caps[j];
|
|
|
|
if (s_cap->op != cap->op || s_cap->sym.xform_type !=
|
|
cap->sym.xform_type)
|
|
continue;
|
|
|
|
if (s_cap->sym.xform_type ==
|
|
RTE_CRYPTO_SYM_XFORM_AUTH) {
|
|
if (s_cap->sym.auth.algo !=
|
|
cap->sym.auth.algo)
|
|
continue;
|
|
|
|
cap->sym.auth.digest_size.min =
|
|
s_cap->sym.auth.digest_size.min <
|
|
cap->sym.auth.digest_size.min ?
|
|
s_cap->sym.auth.digest_size.min :
|
|
cap->sym.auth.digest_size.min;
|
|
cap->sym.auth.digest_size.max =
|
|
s_cap->sym.auth.digest_size.max <
|
|
cap->sym.auth.digest_size.max ?
|
|
s_cap->sym.auth.digest_size.max :
|
|
cap->sym.auth.digest_size.max;
|
|
}
|
|
|
|
if (s_cap->sym.xform_type ==
|
|
RTE_CRYPTO_SYM_XFORM_CIPHER)
|
|
if (s_cap->sym.cipher.algo !=
|
|
cap->sym.cipher.algo)
|
|
continue;
|
|
|
|
/* no common cap found */
|
|
break;
|
|
}
|
|
|
|
if (j < nb_worker_caps)
|
|
continue;
|
|
|
|
/* remove a uncommon cap from the array */
|
|
for (j = i; j < sync_nb_caps - 1; j++)
|
|
rte_memcpy(&caps[j], &caps[j+1], sizeof(*cap));
|
|
|
|
memset(&caps[sync_nb_caps - 1], 0, sizeof(*cap));
|
|
sync_nb_caps--;
|
|
i--;
|
|
}
|
|
|
|
return sync_nb_caps;
|
|
}
|
|
|
|
static int
|
|
check_sec_cap_equal(const struct rte_security_capability *sec_cap1,
|
|
struct rte_security_capability *sec_cap2)
|
|
{
|
|
if (sec_cap1->action != sec_cap2->action ||
|
|
sec_cap1->protocol != sec_cap2->protocol ||
|
|
sec_cap1->ol_flags != sec_cap2->ol_flags)
|
|
return 0;
|
|
|
|
if (sec_cap1->protocol == RTE_SECURITY_PROTOCOL_DOCSIS)
|
|
return !memcmp(&sec_cap1->docsis, &sec_cap2->docsis,
|
|
sizeof(sec_cap1->docsis));
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
copy_sec_cap(struct rte_security_capability *dst_sec_cap,
|
|
struct rte_security_capability *src_sec_cap)
|
|
{
|
|
dst_sec_cap->action = src_sec_cap->action;
|
|
dst_sec_cap->protocol = src_sec_cap->protocol;
|
|
if (src_sec_cap->protocol == RTE_SECURITY_PROTOCOL_DOCSIS)
|
|
dst_sec_cap->docsis = src_sec_cap->docsis;
|
|
dst_sec_cap->ol_flags = src_sec_cap->ol_flags;
|
|
}
|
|
|
|
static uint32_t
|
|
sync_sec_crypto_caps(struct rte_cryptodev_capabilities *tmp_sec_crypto_caps,
|
|
const struct rte_cryptodev_capabilities *sec_crypto_caps,
|
|
const struct rte_cryptodev_capabilities *worker_sec_crypto_caps)
|
|
{
|
|
uint8_t nb_caps = 0;
|
|
|
|
nb_caps = sync_caps(tmp_sec_crypto_caps, nb_caps, sec_crypto_caps);
|
|
sync_caps(tmp_sec_crypto_caps, nb_caps, worker_sec_crypto_caps);
|
|
|
|
return nb_caps;
|
|
}
|
|
|
|
/** update the scheduler pmd's security capability with attaching device's
|
|
* security capability.
|
|
* For each device to be attached, the scheduler's security capability should
|
|
* be the common capability set of all workers
|
|
**/
|
|
static uint32_t
|
|
sync_sec_caps(uint32_t worker_idx,
|
|
struct rte_security_capability *sec_caps,
|
|
struct rte_cryptodev_capabilities sec_crypto_caps[][MAX_CAPS],
|
|
uint32_t nb_sec_caps,
|
|
const struct rte_security_capability *worker_sec_caps)
|
|
{
|
|
uint32_t nb_worker_sec_caps = 0, i;
|
|
|
|
if (worker_sec_caps == NULL)
|
|
return 0;
|
|
|
|
while (worker_sec_caps[nb_worker_sec_caps].action !=
|
|
RTE_SECURITY_ACTION_TYPE_NONE)
|
|
nb_worker_sec_caps++;
|
|
|
|
/* Handle first worker */
|
|
if (worker_idx == 0) {
|
|
uint32_t nb_worker_sec_crypto_caps = 0;
|
|
uint32_t nb_worker_supp_sec_caps = 0;
|
|
|
|
for (i = 0; i < nb_worker_sec_caps; i++) {
|
|
/* Check for supported security protocols */
|
|
if (!scheduler_check_sec_proto_supp(worker_sec_caps[i].action,
|
|
worker_sec_caps[i].protocol))
|
|
continue;
|
|
|
|
sec_caps[nb_worker_supp_sec_caps] = worker_sec_caps[i];
|
|
|
|
while (worker_sec_caps[i].crypto_capabilities[
|
|
nb_worker_sec_crypto_caps].op !=
|
|
RTE_CRYPTO_OP_TYPE_UNDEFINED)
|
|
nb_worker_sec_crypto_caps++;
|
|
|
|
rte_memcpy(&sec_crypto_caps[nb_worker_supp_sec_caps][0],
|
|
&worker_sec_caps[i].crypto_capabilities[0],
|
|
sizeof(sec_crypto_caps[nb_worker_supp_sec_caps][0]) *
|
|
nb_worker_sec_crypto_caps);
|
|
|
|
nb_worker_supp_sec_caps++;
|
|
}
|
|
return nb_worker_supp_sec_caps;
|
|
}
|
|
|
|
for (i = 0; i < nb_sec_caps; i++) {
|
|
struct rte_security_capability *sec_cap = &sec_caps[i];
|
|
uint32_t j;
|
|
|
|
for (j = 0; j < nb_worker_sec_caps; j++) {
|
|
struct rte_cryptodev_capabilities
|
|
tmp_sec_crypto_caps[MAX_CAPS] = { {0} };
|
|
uint32_t nb_sec_crypto_caps = 0;
|
|
const struct rte_security_capability *worker_sec_cap =
|
|
&worker_sec_caps[j];
|
|
|
|
if (!check_sec_cap_equal(worker_sec_cap, sec_cap))
|
|
continue;
|
|
|
|
/* Sync the crypto caps of the common security cap */
|
|
nb_sec_crypto_caps = sync_sec_crypto_caps(
|
|
tmp_sec_crypto_caps,
|
|
&sec_crypto_caps[i][0],
|
|
&worker_sec_cap->crypto_capabilities[0]);
|
|
|
|
memset(&sec_crypto_caps[i][0], 0,
|
|
sizeof(sec_crypto_caps[i][0]) * MAX_CAPS);
|
|
|
|
rte_memcpy(&sec_crypto_caps[i][0],
|
|
&tmp_sec_crypto_caps[0],
|
|
sizeof(sec_crypto_caps[i][0]) * nb_sec_crypto_caps);
|
|
|
|
break;
|
|
}
|
|
|
|
if (j < nb_worker_sec_caps)
|
|
continue;
|
|
|
|
/*
|
|
* Remove an uncommon security cap, and it's associated crypto
|
|
* caps, from the arrays
|
|
*/
|
|
for (j = i; j < nb_sec_caps - 1; j++) {
|
|
rte_memcpy(&sec_caps[j], &sec_caps[j+1],
|
|
sizeof(*sec_cap));
|
|
|
|
rte_memcpy(&sec_crypto_caps[j][0],
|
|
&sec_crypto_caps[j+1][0],
|
|
sizeof(*&sec_crypto_caps[j][0]) *
|
|
MAX_CAPS);
|
|
}
|
|
memset(&sec_caps[nb_sec_caps - 1], 0, sizeof(*sec_cap));
|
|
memset(&sec_crypto_caps[nb_sec_caps - 1][0], 0,
|
|
sizeof(*&sec_crypto_caps[nb_sec_caps - 1][0]) *
|
|
MAX_CAPS);
|
|
nb_sec_caps--;
|
|
i--;
|
|
}
|
|
|
|
return nb_sec_caps;
|
|
}
|
|
|
|
static int
|
|
update_scheduler_capability(struct scheduler_ctx *sched_ctx)
|
|
{
|
|
struct rte_cryptodev_capabilities tmp_caps[MAX_CAPS] = { {0} };
|
|
struct rte_security_capability tmp_sec_caps[MAX_CAPS] = { {0} };
|
|
struct rte_cryptodev_capabilities
|
|
tmp_sec_crypto_caps[MAX_CAPS][MAX_CAPS] = { {{0}} };
|
|
uint32_t nb_caps = 0, nb_sec_caps = 0, i;
|
|
struct rte_cryptodev_info dev_info;
|
|
|
|
/* Free any previously allocated capability memory */
|
|
scheduler_free_capabilities(sched_ctx);
|
|
|
|
/* Determine the new cryptodev capabilities for the scheduler */
|
|
for (i = 0; i < sched_ctx->nb_workers; i++) {
|
|
rte_cryptodev_info_get(sched_ctx->workers[i].dev_id, &dev_info);
|
|
|
|
nb_caps = sync_caps(tmp_caps, nb_caps, dev_info.capabilities);
|
|
if (nb_caps == 0)
|
|
return -1;
|
|
}
|
|
|
|
sched_ctx->capabilities = rte_zmalloc_socket(NULL,
|
|
sizeof(struct rte_cryptodev_capabilities) *
|
|
(nb_caps + 1), 0, SOCKET_ID_ANY);
|
|
if (!sched_ctx->capabilities)
|
|
return -ENOMEM;
|
|
|
|
rte_memcpy(sched_ctx->capabilities, tmp_caps,
|
|
sizeof(struct rte_cryptodev_capabilities) * nb_caps);
|
|
|
|
/* Determine the new security capabilities for the scheduler */
|
|
for (i = 0; i < sched_ctx->nb_workers; i++) {
|
|
struct rte_cryptodev *dev =
|
|
&rte_cryptodevs[sched_ctx->workers[i].dev_id];
|
|
struct rte_security_ctx *sec_ctx = dev->security_ctx;
|
|
|
|
nb_sec_caps = sync_sec_caps(i, tmp_sec_caps, tmp_sec_crypto_caps,
|
|
nb_sec_caps, rte_security_capabilities_get(sec_ctx));
|
|
}
|
|
|
|
sched_ctx->sec_capabilities = rte_zmalloc_socket(NULL,
|
|
sizeof(struct rte_security_capability) *
|
|
(nb_sec_caps + 1), 0, SOCKET_ID_ANY);
|
|
if (!sched_ctx->sec_capabilities)
|
|
return -ENOMEM;
|
|
|
|
sched_ctx->sec_crypto_capabilities = rte_zmalloc_socket(NULL,
|
|
sizeof(struct rte_cryptodev_capabilities *) *
|
|
(nb_sec_caps + 1),
|
|
0, SOCKET_ID_ANY);
|
|
if (!sched_ctx->sec_crypto_capabilities)
|
|
return -ENOMEM;
|
|
|
|
for (i = 0; i < nb_sec_caps; i++) {
|
|
uint16_t nb_sec_crypto_caps = 0;
|
|
|
|
copy_sec_cap(&sched_ctx->sec_capabilities[i], &tmp_sec_caps[i]);
|
|
|
|
while (tmp_sec_crypto_caps[i][nb_sec_crypto_caps].op !=
|
|
RTE_CRYPTO_OP_TYPE_UNDEFINED)
|
|
nb_sec_crypto_caps++;
|
|
|
|
sched_ctx->sec_crypto_capabilities[i] =
|
|
rte_zmalloc_socket(NULL,
|
|
sizeof(struct rte_cryptodev_capabilities) *
|
|
(nb_sec_crypto_caps + 1), 0, SOCKET_ID_ANY);
|
|
if (!sched_ctx->sec_crypto_capabilities[i])
|
|
return -ENOMEM;
|
|
|
|
rte_memcpy(sched_ctx->sec_crypto_capabilities[i],
|
|
&tmp_sec_crypto_caps[i][0],
|
|
sizeof(struct rte_cryptodev_capabilities)
|
|
* nb_sec_crypto_caps);
|
|
|
|
sched_ctx->sec_capabilities[i].crypto_capabilities =
|
|
sched_ctx->sec_crypto_capabilities[i];
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
update_scheduler_feature_flag(struct rte_cryptodev *dev)
|
|
{
|
|
struct scheduler_ctx *sched_ctx = dev->data->dev_private;
|
|
uint32_t i;
|
|
|
|
dev->feature_flags = 0;
|
|
|
|
for (i = 0; i < sched_ctx->nb_workers; i++) {
|
|
struct rte_cryptodev_info dev_info;
|
|
|
|
rte_cryptodev_info_get(sched_ctx->workers[i].dev_id, &dev_info);
|
|
|
|
dev->feature_flags |= dev_info.feature_flags;
|
|
}
|
|
}
|
|
|
|
static void
|
|
update_max_nb_qp(struct scheduler_ctx *sched_ctx)
|
|
{
|
|
uint32_t i;
|
|
uint32_t max_nb_qp;
|
|
|
|
if (!sched_ctx->nb_workers)
|
|
return;
|
|
|
|
max_nb_qp = sched_ctx->nb_workers ? UINT32_MAX : 0;
|
|
|
|
for (i = 0; i < sched_ctx->nb_workers; i++) {
|
|
struct rte_cryptodev_info dev_info;
|
|
|
|
rte_cryptodev_info_get(sched_ctx->workers[i].dev_id, &dev_info);
|
|
max_nb_qp = dev_info.max_nb_queue_pairs < max_nb_qp ?
|
|
dev_info.max_nb_queue_pairs : max_nb_qp;
|
|
}
|
|
|
|
sched_ctx->max_nb_queue_pairs = max_nb_qp;
|
|
}
|
|
|
|
/** Attach a device to the scheduler. */
|
|
int
|
|
rte_cryptodev_scheduler_worker_attach(uint8_t scheduler_id, uint8_t worker_id)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
struct scheduler_worker *worker;
|
|
struct rte_cryptodev_info dev_info;
|
|
uint32_t i;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
if (sched_ctx->nb_workers >=
|
|
RTE_CRYPTODEV_SCHEDULER_MAX_NB_WORKERS) {
|
|
CR_SCHED_LOG(ERR, "Too many workers attached");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
for (i = 0; i < sched_ctx->nb_workers; i++)
|
|
if (sched_ctx->workers[i].dev_id == worker_id) {
|
|
CR_SCHED_LOG(ERR, "Worker already added");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
worker = &sched_ctx->workers[sched_ctx->nb_workers];
|
|
|
|
rte_cryptodev_info_get(worker_id, &dev_info);
|
|
|
|
worker->dev_id = worker_id;
|
|
worker->driver_id = dev_info.driver_id;
|
|
sched_ctx->nb_workers++;
|
|
|
|
if (update_scheduler_capability(sched_ctx) < 0) {
|
|
scheduler_free_capabilities(sched_ctx);
|
|
worker->dev_id = 0;
|
|
worker->driver_id = 0;
|
|
sched_ctx->nb_workers--;
|
|
|
|
CR_SCHED_LOG(ERR, "capabilities update failed");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
update_scheduler_feature_flag(dev);
|
|
|
|
update_max_nb_qp(sched_ctx);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_worker_detach(uint8_t scheduler_id, uint8_t worker_id)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
uint32_t i, worker_pos;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
for (worker_pos = 0; worker_pos < sched_ctx->nb_workers; worker_pos++)
|
|
if (sched_ctx->workers[worker_pos].dev_id == worker_id)
|
|
break;
|
|
if (worker_pos == sched_ctx->nb_workers) {
|
|
CR_SCHED_LOG(ERR, "Cannot find worker");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (sched_ctx->ops.worker_detach(dev, worker_id) < 0) {
|
|
CR_SCHED_LOG(ERR, "Failed to detach worker");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
for (i = worker_pos; i < sched_ctx->nb_workers - 1; i++) {
|
|
memcpy(&sched_ctx->workers[i], &sched_ctx->workers[i+1],
|
|
sizeof(struct scheduler_worker));
|
|
}
|
|
memset(&sched_ctx->workers[sched_ctx->nb_workers - 1], 0,
|
|
sizeof(struct scheduler_worker));
|
|
sched_ctx->nb_workers--;
|
|
|
|
if (update_scheduler_capability(sched_ctx) < 0) {
|
|
scheduler_free_capabilities(sched_ctx);
|
|
CR_SCHED_LOG(ERR, "capabilities update failed");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
update_scheduler_feature_flag(dev);
|
|
|
|
update_max_nb_qp(sched_ctx);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_mode_set(uint8_t scheduler_id,
|
|
enum rte_cryptodev_scheduler_mode mode)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
if (mode == sched_ctx->mode)
|
|
return 0;
|
|
|
|
switch (mode) {
|
|
case CDEV_SCHED_MODE_ROUNDROBIN:
|
|
if (rte_cryptodev_scheduler_load_user_scheduler(scheduler_id,
|
|
crypto_scheduler_roundrobin) < 0) {
|
|
CR_SCHED_LOG(ERR, "Failed to load scheduler");
|
|
return -1;
|
|
}
|
|
break;
|
|
case CDEV_SCHED_MODE_PKT_SIZE_DISTR:
|
|
if (rte_cryptodev_scheduler_load_user_scheduler(scheduler_id,
|
|
crypto_scheduler_pkt_size_based_distr) < 0) {
|
|
CR_SCHED_LOG(ERR, "Failed to load scheduler");
|
|
return -1;
|
|
}
|
|
break;
|
|
case CDEV_SCHED_MODE_FAILOVER:
|
|
if (rte_cryptodev_scheduler_load_user_scheduler(scheduler_id,
|
|
crypto_scheduler_failover) < 0) {
|
|
CR_SCHED_LOG(ERR, "Failed to load scheduler");
|
|
return -1;
|
|
}
|
|
break;
|
|
case CDEV_SCHED_MODE_MULTICORE:
|
|
if (rte_cryptodev_scheduler_load_user_scheduler(scheduler_id,
|
|
crypto_scheduler_multicore) < 0) {
|
|
CR_SCHED_LOG(ERR, "Failed to load scheduler");
|
|
return -1;
|
|
}
|
|
break;
|
|
default:
|
|
CR_SCHED_LOG(ERR, "Not yet supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
enum rte_cryptodev_scheduler_mode
|
|
rte_cryptodev_scheduler_mode_get(uint8_t scheduler_id)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
return sched_ctx->mode;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_ordering_set(uint8_t scheduler_id,
|
|
uint32_t enable_reorder)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
sched_ctx->reordering_enabled = enable_reorder;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_ordering_get(uint8_t scheduler_id)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
return (int)sched_ctx->reordering_enabled;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_load_user_scheduler(uint8_t scheduler_id,
|
|
struct rte_cryptodev_scheduler *scheduler) {
|
|
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
if (strlen(scheduler->name) > RTE_CRYPTODEV_NAME_MAX_LEN - 1) {
|
|
CR_SCHED_LOG(ERR, "Invalid name %s, should be less than "
|
|
"%u bytes.", scheduler->name,
|
|
RTE_CRYPTODEV_NAME_MAX_LEN);
|
|
return -EINVAL;
|
|
}
|
|
strlcpy(sched_ctx->name, scheduler->name, sizeof(sched_ctx->name));
|
|
|
|
if (strlen(scheduler->description) >
|
|
RTE_CRYPTODEV_SCHEDULER_DESC_MAX_LEN - 1) {
|
|
CR_SCHED_LOG(ERR, "Invalid description %s, should be less than "
|
|
"%u bytes.", scheduler->description,
|
|
RTE_CRYPTODEV_SCHEDULER_DESC_MAX_LEN - 1);
|
|
return -EINVAL;
|
|
}
|
|
strlcpy(sched_ctx->description, scheduler->description,
|
|
sizeof(sched_ctx->description));
|
|
|
|
/* load scheduler instance operations functions */
|
|
sched_ctx->ops.config_queue_pair = scheduler->ops->config_queue_pair;
|
|
sched_ctx->ops.create_private_ctx = scheduler->ops->create_private_ctx;
|
|
sched_ctx->ops.scheduler_start = scheduler->ops->scheduler_start;
|
|
sched_ctx->ops.scheduler_stop = scheduler->ops->scheduler_stop;
|
|
sched_ctx->ops.worker_attach = scheduler->ops->worker_attach;
|
|
sched_ctx->ops.worker_detach = scheduler->ops->worker_detach;
|
|
sched_ctx->ops.option_set = scheduler->ops->option_set;
|
|
sched_ctx->ops.option_get = scheduler->ops->option_get;
|
|
|
|
if (sched_ctx->private_ctx) {
|
|
rte_free(sched_ctx->private_ctx);
|
|
sched_ctx->private_ctx = NULL;
|
|
}
|
|
|
|
if (sched_ctx->ops.create_private_ctx) {
|
|
int ret = (*sched_ctx->ops.create_private_ctx)(dev);
|
|
|
|
if (ret < 0) {
|
|
CR_SCHED_LOG(ERR, "Unable to create scheduler private "
|
|
"context");
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
sched_ctx->mode = scheduler->mode;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_workers_get(uint8_t scheduler_id, uint8_t *workers)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
uint32_t nb_workers = 0;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
nb_workers = sched_ctx->nb_workers;
|
|
|
|
if (workers && nb_workers) {
|
|
uint32_t i;
|
|
|
|
for (i = 0; i < nb_workers; i++)
|
|
workers[i] = sched_ctx->workers[i].dev_id;
|
|
}
|
|
|
|
return (int)nb_workers;
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_option_set(uint8_t scheduler_id,
|
|
enum rte_cryptodev_schedule_option_type option_type,
|
|
void *option)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (option_type == CDEV_SCHED_OPTION_NOT_SET ||
|
|
option_type >= CDEV_SCHED_OPTION_COUNT) {
|
|
CR_SCHED_LOG(ERR, "Invalid option parameter");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (!option) {
|
|
CR_SCHED_LOG(ERR, "Invalid option parameter");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (dev->data->dev_started) {
|
|
CR_SCHED_LOG(ERR, "Illegal operation");
|
|
return -EBUSY;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
if (*sched_ctx->ops.option_set == NULL)
|
|
return -ENOTSUP;
|
|
|
|
return (*sched_ctx->ops.option_set)(dev, option_type, option);
|
|
}
|
|
|
|
int
|
|
rte_cryptodev_scheduler_option_get(uint8_t scheduler_id,
|
|
enum rte_cryptodev_schedule_option_type option_type,
|
|
void *option)
|
|
{
|
|
struct rte_cryptodev *dev = rte_cryptodev_pmd_get_dev(scheduler_id);
|
|
struct scheduler_ctx *sched_ctx;
|
|
|
|
if (!dev) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (!option) {
|
|
CR_SCHED_LOG(ERR, "Invalid option parameter");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (dev->driver_id != cryptodev_scheduler_driver_id) {
|
|
CR_SCHED_LOG(ERR, "Operation not supported");
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
sched_ctx = dev->data->dev_private;
|
|
|
|
if (*sched_ctx->ops.option_get == NULL)
|
|
return -ENOTSUP;
|
|
|
|
return (*sched_ctx->ops.option_get)(dev, option_type, option);
|
|
}
|
|
|
|
|
|
RTE_LOG_REGISTER_DEFAULT(scheduler_logtype_driver, INFO);
|