1
2
3
4
5
6
7#include <rte_cryptodev.h>
8#include <rte_dev.h>
9#include <rte_telemetry.h>
10#include "rte_security.h"
11#include "rte_security_driver.h"
12
13
14#define RTE_PTR_OR_ERR_RET(ptr, retval) do { \
15 if ((ptr) == NULL) \
16 return retval; \
17} while (0)
18
19
20#define RTE_PTR_CHAIN3_OR_ERR_RET(p1, p2, p3, retval, last_retval) do { \
21 RTE_PTR_OR_ERR_RET(p1, retval); \
22 RTE_PTR_OR_ERR_RET(p1->p2, retval); \
23 RTE_PTR_OR_ERR_RET(p1->p2->p3, last_retval); \
24} while (0)
25
26#define RTE_SECURITY_DYNFIELD_NAME "rte_security_dynfield_metadata"
27int rte_security_dynfield_offset = -1;
28
29int
30rte_security_dynfield_register(void)
31{
32 static const struct rte_mbuf_dynfield dynfield_desc = {
33 .name = RTE_SECURITY_DYNFIELD_NAME,
34 .size = sizeof(rte_security_dynfield_t),
35 .align = __alignof__(rte_security_dynfield_t),
36 };
37 rte_security_dynfield_offset =
38 rte_mbuf_dynfield_register(&dynfield_desc);
39 return rte_security_dynfield_offset;
40}
41
42struct rte_security_session *
43rte_security_session_create(struct rte_security_ctx *instance,
44 struct rte_security_session_conf *conf,
45 struct rte_mempool *mp,
46 struct rte_mempool *priv_mp)
47{
48 struct rte_security_session *sess = NULL;
49
50 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_create, NULL, NULL);
51 RTE_PTR_OR_ERR_RET(conf, NULL);
52 RTE_PTR_OR_ERR_RET(mp, NULL);
53 RTE_PTR_OR_ERR_RET(priv_mp, NULL);
54
55 if (rte_mempool_get(mp, (void **)&sess))
56 return NULL;
57
58 if (instance->ops->session_create(instance->device, conf,
59 sess, priv_mp)) {
60 rte_mempool_put(mp, (void *)sess);
61 return NULL;
62 }
63 instance->sess_cnt++;
64
65 return sess;
66}
67
68int
69rte_security_session_update(struct rte_security_ctx *instance,
70 struct rte_security_session *sess,
71 struct rte_security_session_conf *conf)
72{
73 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_update, -EINVAL,
74 -ENOTSUP);
75 RTE_PTR_OR_ERR_RET(sess, -EINVAL);
76 RTE_PTR_OR_ERR_RET(conf, -EINVAL);
77
78 return instance->ops->session_update(instance->device, sess, conf);
79}
80
81unsigned int
82rte_security_session_get_size(struct rte_security_ctx *instance)
83{
84 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_get_size, 0, 0);
85
86 return instance->ops->session_get_size(instance->device);
87}
88
89int
90rte_security_session_stats_get(struct rte_security_ctx *instance,
91 struct rte_security_session *sess,
92 struct rte_security_stats *stats)
93{
94 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_stats_get, -EINVAL,
95 -ENOTSUP);
96
97 RTE_PTR_OR_ERR_RET(stats, -EINVAL);
98
99 return instance->ops->session_stats_get(instance->device, sess, stats);
100}
101
102int
103rte_security_session_destroy(struct rte_security_ctx *instance,
104 struct rte_security_session *sess)
105{
106 int ret;
107
108 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_destroy, -EINVAL,
109 -ENOTSUP);
110 RTE_PTR_OR_ERR_RET(sess, -EINVAL);
111
112 ret = instance->ops->session_destroy(instance->device, sess);
113 if (ret != 0)
114 return ret;
115
116 rte_mempool_put(rte_mempool_from_obj(sess), (void *)sess);
117
118 if (instance->sess_cnt)
119 instance->sess_cnt--;
120
121 return 0;
122}
123
124int
125__rte_security_set_pkt_metadata(struct rte_security_ctx *instance,
126 struct rte_security_session *sess,
127 struct rte_mbuf *m, void *params)
128{
129#ifdef RTE_DEBUG
130 RTE_PTR_OR_ERR_RET(sess, -EINVAL);
131 RTE_PTR_OR_ERR_RET(instance, -EINVAL);
132 RTE_PTR_OR_ERR_RET(instance->ops, -EINVAL);
133#endif
134 RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->set_pkt_metadata, -ENOTSUP);
135 return instance->ops->set_pkt_metadata(instance->device,
136 sess, m, params);
137}
138
139void *
140__rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md)
141{
142 void *userdata = NULL;
143
144#ifdef RTE_DEBUG
145 RTE_PTR_OR_ERR_RET(instance, NULL);
146 RTE_PTR_OR_ERR_RET(instance->ops, NULL);
147#endif
148 RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->get_userdata, NULL);
149 if (instance->ops->get_userdata(instance->device, md, &userdata))
150 return NULL;
151
152 return userdata;
153}
154
155const struct rte_security_capability *
156rte_security_capabilities_get(struct rte_security_ctx *instance)
157{
158 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
159
160 return instance->ops->capabilities_get(instance->device);
161}
162
163const struct rte_security_capability *
164rte_security_capability_get(struct rte_security_ctx *instance,
165 struct rte_security_capability_idx *idx)
166{
167 const struct rte_security_capability *capabilities;
168 const struct rte_security_capability *capability;
169 uint16_t i = 0;
170
171 RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
172 RTE_PTR_OR_ERR_RET(idx, NULL);
173
174 capabilities = instance->ops->capabilities_get(instance->device);
175
176 if (capabilities == NULL)
177 return NULL;
178
179 while ((capability = &capabilities[i++])->action
180 != RTE_SECURITY_ACTION_TYPE_NONE) {
181 if (capability->action == idx->action &&
182 capability->protocol == idx->protocol) {
183 if (idx->protocol == RTE_SECURITY_PROTOCOL_IPSEC) {
184 if (capability->ipsec.proto ==
185 idx->ipsec.proto &&
186 capability->ipsec.mode ==
187 idx->ipsec.mode &&
188 capability->ipsec.direction ==
189 idx->ipsec.direction)
190 return capability;
191 } else if (idx->protocol == RTE_SECURITY_PROTOCOL_PDCP) {
192 if (capability->pdcp.domain ==
193 idx->pdcp.domain)
194 return capability;
195 } else if (idx->protocol ==
196 RTE_SECURITY_PROTOCOL_DOCSIS) {
197 if (capability->docsis.direction ==
198 idx->docsis.direction)
199 return capability;
200 }
201 }
202 }
203
204 return NULL;
205}
206
207static int
208security_handle_cryptodev_list(const char *cmd __rte_unused,
209 const char *params __rte_unused,
210 struct rte_tel_data *d)
211{
212 int dev_id;
213
214 if (rte_cryptodev_count() < 1)
215 return -1;
216
217 rte_tel_data_start_array(d, RTE_TEL_INT_VAL);
218 for (dev_id = 0; dev_id < RTE_CRYPTO_MAX_DEVS; dev_id++)
219 if (rte_cryptodev_is_valid_dev(dev_id) &&
220 rte_cryptodev_get_sec_ctx(dev_id))
221 rte_tel_data_add_array_int(d, dev_id);
222
223 return 0;
224}
225
226#define CRYPTO_CAPS_SZ \
227 (RTE_ALIGN_CEIL(sizeof(struct rte_cryptodev_capabilities), \
228 sizeof(uint64_t)) / sizeof(uint64_t))
229
230static int
231crypto_caps_array(struct rte_tel_data *d,
232 const struct rte_cryptodev_capabilities *capabilities)
233{
234 const struct rte_cryptodev_capabilities *dev_caps;
235 uint64_t caps_val[CRYPTO_CAPS_SZ];
236 unsigned int i = 0, j;
237
238 rte_tel_data_start_array(d, RTE_TEL_U64_VAL);
239
240 while ((dev_caps = &capabilities[i++])->op !=
241 RTE_CRYPTO_OP_TYPE_UNDEFINED) {
242 memset(&caps_val, 0, CRYPTO_CAPS_SZ * sizeof(caps_val[0]));
243 rte_memcpy(caps_val, dev_caps, sizeof(capabilities[0]));
244 for (j = 0; j < CRYPTO_CAPS_SZ; j++)
245 rte_tel_data_add_array_u64(d, caps_val[j]);
246 }
247
248 return (i - 1);
249}
250
251#define SEC_CAPS_SZ \
252 (RTE_ALIGN_CEIL(sizeof(struct rte_security_capability), \
253 sizeof(uint64_t)) / sizeof(uint64_t))
254
255static int
256sec_caps_array(struct rte_tel_data *d,
257 const struct rte_security_capability *capabilities)
258{
259 const struct rte_security_capability *dev_caps;
260 uint64_t caps_val[SEC_CAPS_SZ];
261 unsigned int i = 0, j;
262
263 rte_tel_data_start_array(d, RTE_TEL_U64_VAL);
264
265 while ((dev_caps = &capabilities[i++])->action !=
266 RTE_SECURITY_ACTION_TYPE_NONE) {
267 memset(&caps_val, 0, SEC_CAPS_SZ * sizeof(caps_val[0]));
268 rte_memcpy(caps_val, dev_caps, sizeof(capabilities[0]));
269 for (j = 0; j < SEC_CAPS_SZ; j++)
270 rte_tel_data_add_array_u64(d, caps_val[j]);
271 }
272
273 return i - 1;
274}
275
276static const struct rte_security_capability *
277security_capability_by_index(const struct rte_security_capability *capabilities,
278 int index)
279{
280 const struct rte_security_capability *dev_caps = NULL;
281 int i = 0;
282
283 while ((dev_caps = &capabilities[i])->action !=
284 RTE_SECURITY_ACTION_TYPE_NONE) {
285 if (i == index)
286 return dev_caps;
287
288 ++i;
289 }
290
291 return NULL;
292}
293
294static int
295security_capabilities_from_dev_id(int dev_id, const void **caps)
296{
297 const struct rte_security_capability *capabilities;
298 struct rte_security_ctx *sec_ctx;
299
300 if (rte_cryptodev_is_valid_dev(dev_id) == 0)
301 return -EINVAL;
302
303 sec_ctx = (struct rte_security_ctx *)rte_cryptodev_get_sec_ctx(dev_id);
304 RTE_PTR_OR_ERR_RET(sec_ctx, -EINVAL);
305
306 capabilities = rte_security_capabilities_get(sec_ctx);
307 RTE_PTR_OR_ERR_RET(capabilities, -EINVAL);
308
309 *caps = capabilities;
310 return 0;
311}
312
313static int
314security_handle_cryptodev_sec_caps(const char *cmd __rte_unused, const char *params,
315 struct rte_tel_data *d)
316{
317 const struct rte_security_capability *capabilities;
318 struct rte_tel_data *sec_caps;
319 char *end_param;
320 int sec_caps_n;
321 int dev_id;
322 int rc;
323
324 if (!params || strlen(params) == 0 || !isdigit(*params))
325 return -EINVAL;
326
327 dev_id = strtoul(params, &end_param, 0);
328 if (*end_param != '\0')
329 CDEV_LOG_ERR("Extra parameters passed to command, ignoring");
330
331 rc = security_capabilities_from_dev_id(dev_id, (void *)&capabilities);
332 if (rc < 0)
333 return rc;
334
335 sec_caps = rte_tel_data_alloc();
336 RTE_PTR_OR_ERR_RET(sec_caps, -ENOMEM);
337
338 rte_tel_data_start_dict(d);
339 sec_caps_n = sec_caps_array(sec_caps, capabilities);
340 rte_tel_data_add_dict_container(d, "sec_caps", sec_caps, 0);
341 rte_tel_data_add_dict_int(d, "sec_caps_n", sec_caps_n);
342
343 return 0;
344}
345
346static int
347security_handle_cryptodev_crypto_caps(const char *cmd __rte_unused, const char *params,
348 struct rte_tel_data *d)
349{
350 const struct rte_security_capability *capabilities;
351 struct rte_tel_data *crypto_caps;
352 const char *capa_param;
353 int dev_id, capa_id;
354 int crypto_caps_n;
355 char *end_param;
356 int rc;
357
358 if (!params || strlen(params) == 0 || !isdigit(*params))
359 return -EINVAL;
360
361 dev_id = strtoul(params, &end_param, 0);
362 capa_param = strtok(end_param, ",");
363 if (!capa_param || strlen(capa_param) == 0 || !isdigit(*capa_param))
364 return -EINVAL;
365
366 capa_id = strtoul(capa_param, &end_param, 0);
367 if (*end_param != '\0')
368 CDEV_LOG_ERR("Extra parameters passed to command, ignoring");
369
370 rc = security_capabilities_from_dev_id(dev_id, (void *)&capabilities);
371 if (rc < 0)
372 return rc;
373
374 capabilities = security_capability_by_index(capabilities, capa_id);
375 RTE_PTR_OR_ERR_RET(capabilities, -EINVAL);
376
377 crypto_caps = rte_tel_data_alloc();
378 RTE_PTR_OR_ERR_RET(crypto_caps, -ENOMEM);
379
380 rte_tel_data_start_dict(d);
381 crypto_caps_n = crypto_caps_array(crypto_caps, capabilities->crypto_capabilities);
382
383 rte_tel_data_add_dict_container(d, "crypto_caps", crypto_caps, 0);
384 rte_tel_data_add_dict_int(d, "crypto_caps_n", crypto_caps_n);
385
386 return 0;
387}
388
389RTE_INIT(security_init_telemetry)
390{
391 rte_telemetry_register_cmd("/security/cryptodev/list",
392 security_handle_cryptodev_list,
393 "Returns list of available crypto devices by IDs. No parameters.");
394
395 rte_telemetry_register_cmd("/security/cryptodev/sec_caps",
396 security_handle_cryptodev_sec_caps,
397 "Returns security capabilities for a cryptodev. Parameters: int dev_id");
398
399 rte_telemetry_register_cmd("/security/cryptodev/crypto_caps",
400 security_handle_cryptodev_crypto_caps,
401 "Returns crypto capabilities for a security capability. Parameters: int dev_id, sec_cap_id");
402}
403