chcr_core.c 9.7 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
/**
 * This file is part of the Chelsio T4/T5/T6 Ethernet driver for Linux.
 *
 * Copyright (C) 2011-2016 Chelsio Communications.  All rights reserved.
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation.
 *
 * Written and Maintained by:
 * Manoj Malviya (manojmalviya@chelsio.com)
 * Atul Gupta (atul.gupta@chelsio.com)
 * Jitendra Lulla (jlulla@chelsio.com)
 * Yeshaswi M R Gowda (yeshaswi@chelsio.com)
 * Harsh Jain (harsh@chelsio.com)
 */

#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/skbuff.h>

#include <crypto/aes.h>
#include <crypto/hash.h>

#include "t4_msg.h"
#include "chcr_core.h"
#include "cxgb4_uld.h"

29
static struct chcr_driver_data drv_data;
30

31 32
typedef int (*chcr_handler_func)(struct adapter *adap, unsigned char *input);
static int cpl_fw6_pld_handler(struct adapter *adap, unsigned char *input);
33 34 35
static void *chcr_uld_add(const struct cxgb4_lld_info *lld);
static int chcr_uld_state_change(void *handle, enum cxgb4_state state);

36 37 38 39
#ifdef CONFIG_CHELSIO_IPSEC_INLINE
static void update_netdev_features(void);
#endif /* CONFIG_CHELSIO_IPSEC_INLINE */

40 41
static chcr_handler_func work_handlers[NUM_CPL_CMDS] = {
	[CPL_FW6_PLD] = cpl_fw6_pld_handler,
42 43 44 45
#ifdef CONFIG_CHELSIO_TLS_DEVICE
	[CPL_ACT_OPEN_RPL] = chcr_ktls_cpl_act_open_rpl,
	[CPL_SET_TCB_RPL] = chcr_ktls_cpl_set_tcb_rpl,
#endif
46 47
};

48
static struct cxgb4_uld_info chcr_uld_info = {
49
	.name = DRV_MODULE_NAME,
50
	.nrxq = MAX_ULD_QSETS,
51
	/* Max ntxq will be derived from fw config file*/
52 53 54 55
	.rxq_size = 1024,
	.add = chcr_uld_add,
	.state_change = chcr_uld_state_change,
	.rx_handler = chcr_uld_rx_handler,
56
#if defined(CONFIG_CHELSIO_IPSEC_INLINE) || defined(CONFIG_CHELSIO_TLS_DEVICE)
A
Atul Gupta 已提交
57
	.tx_handler = chcr_uld_tx_handler,
58
#endif /* CONFIG_CHELSIO_IPSEC_INLINE || CONFIG_CHELSIO_TLS_DEVICE */
59 60
};

61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83
static void detach_work_fn(struct work_struct *work)
{
	struct chcr_dev *dev;

	dev = container_of(work, struct chcr_dev, detach_work.work);

	if (atomic_read(&dev->inflight)) {
		dev->wqretry--;
		if (dev->wqretry) {
			pr_debug("Request Inflight Count %d\n",
				atomic_read(&dev->inflight));

			schedule_delayed_work(&dev->detach_work, WQ_DETACH_TM);
		} else {
			WARN(1, "CHCR:%d request Still Pending\n",
				atomic_read(&dev->inflight));
			complete(&dev->detach_comp);
		}
	} else {
		complete(&dev->detach_comp);
	}
}

84
struct uld_ctx *assign_chcr_device(void)
85
{
86
	struct uld_ctx *u_ctx = NULL;
87 88

	/*
89 90 91 92
	 * When multiple devices are present in system select
	 * device in round-robin fashion for crypto operations
	 * Although One session must use the same device to
	 * maintain request-response ordering.
93
	 */
94 95 96 97 98 99
	mutex_lock(&drv_data.drv_mutex);
	if (!list_empty(&drv_data.act_dev)) {
		u_ctx = drv_data.last_dev;
		if (list_is_last(&drv_data.last_dev->entry, &drv_data.act_dev))
			drv_data.last_dev = list_first_entry(&drv_data.act_dev,
						  struct uld_ctx, entry);
100
		else
101 102
			drv_data.last_dev =
				list_next_entry(drv_data.last_dev, entry);
103
	}
104
	mutex_unlock(&drv_data.drv_mutex);
105
	return u_ctx;
106 107
}

108
static void chcr_dev_add(struct uld_ctx *u_ctx)
109 110 111
{
	struct chcr_dev *dev;

112 113 114 115 116 117 118 119 120
	dev = &u_ctx->dev;
	dev->state = CHCR_ATTACH;
	atomic_set(&dev->inflight, 0);
	mutex_lock(&drv_data.drv_mutex);
	list_move(&u_ctx->entry, &drv_data.act_dev);
	if (!drv_data.last_dev)
		drv_data.last_dev = u_ctx;
	mutex_unlock(&drv_data.drv_mutex);
}
121

122 123 124 125 126
static void chcr_dev_init(struct uld_ctx *u_ctx)
{
	struct chcr_dev *dev;

	dev = &u_ctx->dev;
127
	spin_lock_init(&dev->lock_chcr_dev);
128 129 130 131 132 133 134 135 136
	INIT_DELAYED_WORK(&dev->detach_work, detach_work_fn);
	init_completion(&dev->detach_comp);
	dev->state = CHCR_INIT;
	dev->wqretry = WQ_RETRY;
	atomic_inc(&drv_data.dev_count);
	atomic_set(&dev->inflight, 0);
	mutex_lock(&drv_data.drv_mutex);
	list_add_tail(&u_ctx->entry, &drv_data.inact_dev);
	mutex_unlock(&drv_data.drv_mutex);
137 138
}

139
static int chcr_dev_move(struct uld_ctx *u_ctx)
140
{
141 142 143 144 145
	 mutex_lock(&drv_data.drv_mutex);
	if (drv_data.last_dev == u_ctx) {
		if (list_is_last(&drv_data.last_dev->entry, &drv_data.act_dev))
			drv_data.last_dev = list_first_entry(&drv_data.act_dev,
						  struct uld_ctx, entry);
146
		else
147 148
			drv_data.last_dev =
				list_next_entry(drv_data.last_dev, entry);
149
	}
150 151 152 153 154 155
	list_move(&u_ctx->entry, &drv_data.inact_dev);
	if (list_empty(&drv_data.act_dev))
		drv_data.last_dev = NULL;
	atomic_dec(&drv_data.dev_count);
	mutex_unlock(&drv_data.drv_mutex);

156 157 158
	return 0;
}

159
static int cpl_fw6_pld_handler(struct adapter *adap,
160 161 162 163 164 165 166 167 168 169 170 171 172
			       unsigned char *input)
{
	struct crypto_async_request *req;
	struct cpl_fw6_pld *fw6_pld;
	u32 ack_err_status = 0;
	int error_status = 0;

	fw6_pld = (struct cpl_fw6_pld *)input;
	req = (struct crypto_async_request *)(uintptr_t)be64_to_cpu(
						    fw6_pld->data[1]);

	ack_err_status =
		ntohl(*(__be32 *)((unsigned char *)&fw6_pld->data[0] + 4));
173 174
	if (CHK_MAC_ERR_BIT(ack_err_status) || CHK_PAD_ERR_BIT(ack_err_status))
		error_status = -EBADMSG;
175 176
	/* call completion callback with failure status */
	if (req) {
H
Harsh Jain 已提交
177
		error_status = chcr_handle_resp(req, input, error_status);
178 179 180 181
	} else {
		pr_err("Incorrect request address from the firmware\n");
		return -EFAULT;
	}
182 183 184
	if (error_status)
		atomic_inc(&adap->chcr_stats.error);

185 186 187 188 189
	return 0;
}

int chcr_send_wr(struct sk_buff *skb)
{
190
	return cxgb4_crypto_send(skb->dev, skb);
191 192 193 194 195 196
}

static void *chcr_uld_add(const struct cxgb4_lld_info *lld)
{
	struct uld_ctx *u_ctx;

H
Harsh Jain 已提交
197 198 199 200
	/* Create the device and add it in the device list */
	if (!(lld->ulp_crypto & ULP_CRYPTO_LOOKASIDE))
		return ERR_PTR(-EOPNOTSUPP);

201 202 203 204 205 206 207
	/* Create the device and add it in the device list */
	u_ctx = kzalloc(sizeof(*u_ctx), GFP_KERNEL);
	if (!u_ctx) {
		u_ctx = ERR_PTR(-ENOMEM);
		goto out;
	}
	u_ctx->lldi = *lld;
208
	chcr_dev_init(u_ctx);
209 210 211 212 213

#ifdef CONFIG_CHELSIO_TLS_DEVICE
	if (lld->ulp_crypto & ULP_CRYPTO_KTLS_INLINE)
		chcr_enable_ktls(padap(&u_ctx->dev));
#endif
214 215 216 217 218 219 220 221
out:
	return u_ctx;
}

int chcr_uld_rx_handler(void *handle, const __be64 *rsp,
			const struct pkt_gl *pgl)
{
	struct uld_ctx *u_ctx = (struct uld_ctx *)handle;
222
	struct chcr_dev *dev = &u_ctx->dev;
223
	struct adapter *adap = padap(dev);
224
	const struct cpl_fw6_pld *rpl = (struct cpl_fw6_pld *)rsp;
225

226 227
	if (!work_handlers[rpl->opcode]) {
		pr_err("Unsupported opcode %d received\n", rpl->opcode);
228 229 230 231
		return 0;
	}

	if (!pgl)
232
		work_handlers[rpl->opcode](adap, (unsigned char *)&rsp[1]);
233
	else
234
		work_handlers[rpl->opcode](adap, pgl->va);
235 236 237
	return 0;
}

238
#if defined(CONFIG_CHELSIO_IPSEC_INLINE) || defined(CONFIG_CHELSIO_TLS_DEVICE)
A
Atul Gupta 已提交
239 240
int chcr_uld_tx_handler(struct sk_buff *skb, struct net_device *dev)
{
241 242 243 244 245 246 247 248
	/* In case if skb's decrypted bit is set, it's nic tls packet, else it's
	 * ipsec packet.
	 */
#ifdef CONFIG_CHELSIO_TLS_DEVICE
	if (skb->decrypted)
		return chcr_ktls_xmit(skb, dev);
#endif
#ifdef CONFIG_CHELSIO_IPSEC_INLINE
A
Atul Gupta 已提交
249
	return chcr_ipsec_xmit(skb, dev);
250 251
#endif
	return 0;
A
Atul Gupta 已提交
252
}
253
#endif /* CONFIG_CHELSIO_IPSEC_INLINE || CONFIG_CHELSIO_TLS_DEVICE */
A
Atul Gupta 已提交
254

255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272
static void chcr_detach_device(struct uld_ctx *u_ctx)
{
	struct chcr_dev *dev = &u_ctx->dev;

	if (dev->state == CHCR_DETACH) {
		pr_debug("Detached Event received for already detach device\n");
		return;
	}
	dev->state = CHCR_DETACH;
	if (atomic_read(&dev->inflight) != 0) {
		schedule_delayed_work(&dev->detach_work, WQ_DETACH_TM);
		wait_for_completion(&dev->detach_comp);
	}

	// Move u_ctx to inactive_dev list
	chcr_dev_move(u_ctx);
}

273 274 275 276 277 278 279
static int chcr_uld_state_change(void *handle, enum cxgb4_state state)
{
	struct uld_ctx *u_ctx = handle;
	int ret = 0;

	switch (state) {
	case CXGB4_STATE_UP:
280 281 282
		if (u_ctx->dev.state != CHCR_INIT) {
			// ALready Initialised.
			return 0;
283
		}
284 285
		chcr_dev_add(u_ctx);
		ret = start_crypto();
286 287 288
		break;

	case CXGB4_STATE_DETACH:
289
		chcr_detach_device(u_ctx);
290 291 292 293 294 295 296 297 298 299
		break;

	case CXGB4_STATE_START_RECOVERY:
	case CXGB4_STATE_DOWN:
	default:
		break;
	}
	return ret;
}

300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317
#ifdef CONFIG_CHELSIO_IPSEC_INLINE
static void update_netdev_features(void)
{
	struct uld_ctx *u_ctx, *tmp;

	mutex_lock(&drv_data.drv_mutex);
	list_for_each_entry_safe(u_ctx, tmp, &drv_data.inact_dev, entry) {
		if (u_ctx->lldi.crypto & ULP_CRYPTO_IPSEC_INLINE)
			chcr_add_xfrmops(&u_ctx->lldi);
	}
	list_for_each_entry_safe(u_ctx, tmp, &drv_data.act_dev, entry) {
		if (u_ctx->lldi.crypto & ULP_CRYPTO_IPSEC_INLINE)
			chcr_add_xfrmops(&u_ctx->lldi);
	}
	mutex_unlock(&drv_data.drv_mutex);
}
#endif /* CONFIG_CHELSIO_IPSEC_INLINE */

318 319
static int __init chcr_crypto_init(void)
{
320 321 322 323 324
	INIT_LIST_HEAD(&drv_data.act_dev);
	INIT_LIST_HEAD(&drv_data.inact_dev);
	atomic_set(&drv_data.dev_count, 0);
	mutex_init(&drv_data.drv_mutex);
	drv_data.last_dev = NULL;
325
	cxgb4_register_uld(CXGB4_ULD_CRYPTO, &chcr_uld_info);
326

327 328 329 330 331 332
	#ifdef CONFIG_CHELSIO_IPSEC_INLINE
	rtnl_lock();
	update_netdev_features();
	rtnl_unlock();
	#endif /* CONFIG_CHELSIO_IPSEC_INLINE */

333 334 335 336 337 338
	return 0;
}

static void __exit chcr_crypto_exit(void)
{
	struct uld_ctx *u_ctx, *tmp;
339
	struct adapter *adap;
340

341 342
	stop_crypto();
	cxgb4_unregister_uld(CXGB4_ULD_CRYPTO);
343
	/* Remove all devices from list */
344 345
	mutex_lock(&drv_data.drv_mutex);
	list_for_each_entry_safe(u_ctx, tmp, &drv_data.act_dev, entry) {
346 347
		adap = padap(&u_ctx->dev);
		memset(&adap->chcr_stats, 0, sizeof(adap->chcr_stats));
348 349 350 351
#ifdef CONFIG_CHELSIO_TLS_DEVICE
		if (u_ctx->lldi.ulp_crypto & ULP_CRYPTO_KTLS_INLINE)
			chcr_disable_ktls(adap);
#endif
352
		list_del(&u_ctx->entry);
353 354
		kfree(u_ctx);
	}
355
	list_for_each_entry_safe(u_ctx, tmp, &drv_data.inact_dev, entry) {
356 357
		adap = padap(&u_ctx->dev);
		memset(&adap->chcr_stats, 0, sizeof(adap->chcr_stats));
358 359 360 361
#ifdef CONFIG_CHELSIO_TLS_DEVICE
		if (u_ctx->lldi.ulp_crypto & ULP_CRYPTO_KTLS_INLINE)
			chcr_disable_ktls(adap);
#endif
362 363 364 365
		list_del(&u_ctx->entry);
		kfree(u_ctx);
	}
	mutex_unlock(&drv_data.drv_mutex);
366 367 368 369 370 371 372 373 374
}

module_init(chcr_crypto_init);
module_exit(chcr_crypto_exit);

MODULE_DESCRIPTION("Crypto Co-processor for Chelsio Terminator cards.");
MODULE_LICENSE("GPL");
MODULE_AUTHOR("Chelsio Communications");
MODULE_VERSION(DRV_VERSION);