From: Vidya Sagar Velumuri <vvelum...@marvell.com> Add probe for cn20k crypto device
Signed-off-by: Vidya Sagar Velumuri <vvelum...@marvell.com> --- drivers/crypto/cnxk/cn10k_cryptodev.c | 12 +- drivers/crypto/cnxk/cn20k_cryptodev.c | 152 ++++++++++++++++++++++++++ drivers/crypto/cnxk/cn20k_cryptodev.h | 13 +++ drivers/crypto/cnxk/meson.build | 1 + 4 files changed, 170 insertions(+), 8 deletions(-) create mode 100644 drivers/crypto/cnxk/cn20k_cryptodev.c create mode 100644 drivers/crypto/cnxk/cn20k_cryptodev.h diff --git a/drivers/crypto/cnxk/cn10k_cryptodev.c b/drivers/crypto/cnxk/cn10k_cryptodev.c index 70bef13cda..598def51a5 100644 --- a/drivers/crypto/cnxk/cn10k_cryptodev.c +++ b/drivers/crypto/cnxk/cn10k_cryptodev.c @@ -22,14 +22,10 @@ uint8_t cn10k_cryptodev_driver_id; static struct rte_pci_id pci_id_cpt_table[] = { - { - RTE_PCI_DEVICE(PCI_VENDOR_ID_CAVIUM, - PCI_DEVID_CN10K_RVU_CPT_VF) - }, - /* sentinel */ - { - .device_id = 0 - }, + CNXK_PCI_ID(PCI_SUBSYSTEM_DEVID_CN10KA, PCI_DEVID_CN10K_RVU_CPT_VF), + CNXK_PCI_ID(PCI_SUBSYSTEM_DEVID_CN10KAS, PCI_DEVID_CN10K_RVU_CPT_VF), + CNXK_PCI_ID(PCI_SUBSYSTEM_DEVID_CN10KB, PCI_DEVID_CN10K_RVU_CPT_VF), + {.vendor_id = 0}, }; static int diff --git a/drivers/crypto/cnxk/cn20k_cryptodev.c b/drivers/crypto/cnxk/cn20k_cryptodev.c new file mode 100644 index 0000000000..e52336c2b7 --- /dev/null +++ b/drivers/crypto/cnxk/cn20k_cryptodev.c @@ -0,0 +1,152 @@ +/* SPDX-License-Identifier: BSD-3-Clause + * Copyright(C) 2025 Marvell. + */ + +#include <bus_pci_driver.h> +#include <cryptodev_pmd.h> +#include <dev_driver.h> +#include <rte_common.h> +#include <rte_crypto.h> +#include <rte_cryptodev.h> +#include <rte_pci.h> + +#include "cn20k_cryptodev.h" +#include "cnxk_cryptodev.h" +#include "cnxk_cryptodev_capabilities.h" +#include "cnxk_cryptodev_ops.h" +#include "cnxk_cryptodev_sec.h" + +#include "roc_api.h" + +uint8_t cn20k_cryptodev_driver_id; + +static struct rte_pci_id pci_id_cpt_table[] = { + CNXK_PCI_ID(PCI_SUBSYSTEM_DEVID_CN20KA, PCI_DEVID_CN20K_RVU_CPT_VF), + {.vendor_id = 0}, +}; + +static int +cn20k_cpt_pci_probe(struct rte_pci_driver *pci_drv __rte_unused, struct rte_pci_device *pci_dev) +{ + struct rte_cryptodev_pmd_init_params init_params = {.name = "", + .socket_id = rte_socket_id(), + .private_data_size = + sizeof(struct cnxk_cpt_vf)}; + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; + struct rte_cryptodev *dev; + struct roc_cpt *roc_cpt; + struct cnxk_cpt_vf *vf; + int rc; + + rc = roc_plt_init(); + if (rc < 0) { + plt_err("Failed to initialize platform model"); + return rc; + } + + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + dev = rte_cryptodev_pmd_create(name, &pci_dev->device, &init_params); + if (dev == NULL) { + rc = -ENODEV; + goto exit; + } + + /* Get private data space allocated */ + vf = dev->data->dev_private; + + roc_cpt = &vf->cpt; + + if (rte_eal_process_type() == RTE_PROC_PRIMARY) { + roc_cpt->pci_dev = pci_dev; + + rc = cnxk_cpt_parse_devargs(dev->device->devargs, vf); + if (rc) { + plt_err("Failed to parse devargs rc=%d", rc); + goto pmd_destroy; + } + + rc = roc_cpt_dev_init(roc_cpt); + if (rc) { + plt_err("Failed to initialize roc cpt rc=%d", rc); + goto pmd_destroy; + } + + rc = cnxk_cpt_eng_grp_add(roc_cpt); + if (rc) { + plt_err("Failed to add engine group rc=%d", rc); + goto dev_fini; + } + + /* Create security context */ + rc = cnxk_crypto_sec_ctx_create(dev); + if (rc) + goto dev_fini; + } + + cnxk_cpt_caps_populate(vf); + + dev->feature_flags = cnxk_cpt_default_ff_get(); + + dev->qp_depth_used = cnxk_cpt_qp_depth_used; + + rte_cryptodev_pmd_probing_finish(dev); + + return 0; + +dev_fini: + if (rte_eal_process_type() == RTE_PROC_PRIMARY) + roc_cpt_dev_fini(roc_cpt); +pmd_destroy: + rte_cryptodev_pmd_destroy(dev); +exit: + plt_err("Could not create device (vendor_id: 0x%x device_id: 0x%x)", pci_dev->id.vendor_id, + pci_dev->id.device_id); + return rc; +} + +static int +cn20k_cpt_pci_remove(struct rte_pci_device *pci_dev) +{ + char name[RTE_CRYPTODEV_NAME_MAX_LEN]; + struct rte_cryptodev *dev; + struct cnxk_cpt_vf *vf; + int ret; + + if (pci_dev == NULL) + return -EINVAL; + + rte_pci_device_name(&pci_dev->addr, name, sizeof(name)); + + dev = rte_cryptodev_pmd_get_named_dev(name); + if (dev == NULL) + return -ENODEV; + + /* Destroy security context */ + cnxk_crypto_sec_ctx_destroy(dev); + + if (rte_eal_process_type() == RTE_PROC_PRIMARY) { + dev->dev_ops = NULL; + vf = dev->data->dev_private; + ret = roc_cpt_dev_fini(&vf->cpt); + if (ret) + return ret; + } + + return rte_cryptodev_pmd_destroy(dev); +} + +static struct rte_pci_driver cn20k_cryptodev_pmd = { + .id_table = pci_id_cpt_table, + .drv_flags = RTE_PCI_DRV_NEED_MAPPING | RTE_PCI_DRV_NEED_IOVA_AS_VA, + .probe = cn20k_cpt_pci_probe, + .remove = cn20k_cpt_pci_remove, +}; + +static struct cryptodev_driver cn20k_cryptodev_drv; + +RTE_PMD_REGISTER_PCI(CRYPTODEV_NAME_CN20K_PMD, cn20k_cryptodev_pmd); +RTE_PMD_REGISTER_PCI_TABLE(CRYPTODEV_NAME_CN20K_PMD, pci_id_cpt_table); +RTE_PMD_REGISTER_KMOD_DEP(CRYPTODEV_NAME_CN20K_PMD, "vfio-pci"); +RTE_PMD_REGISTER_CRYPTO_DRIVER(cn20k_cryptodev_drv, cn20k_cryptodev_pmd.driver, + cn20k_cryptodev_driver_id); diff --git a/drivers/crypto/cnxk/cn20k_cryptodev.h b/drivers/crypto/cnxk/cn20k_cryptodev.h new file mode 100644 index 0000000000..d8a84d5464 --- /dev/null +++ b/drivers/crypto/cnxk/cn20k_cryptodev.h @@ -0,0 +1,13 @@ +/* SPDX-License-Identifier: BSD-3-Clause + * Copyright(C) 2025 Marvell. + */ + +#ifndef _CN20K_CRYPTODEV_H_ +#define _CN20K_CRYPTODEV_H_ + +/* Marvell OCTEON CN20K Crypto PMD device name */ +#define CRYPTODEV_NAME_CN20K_PMD crypto_cn20k + +extern uint8_t cn20k_cryptodev_driver_id; + +#endif /* _CN20K_CRYPTODEV_H_ */ diff --git a/drivers/crypto/cnxk/meson.build b/drivers/crypto/cnxk/meson.build index e9b67b4a14..886bb5c428 100644 --- a/drivers/crypto/cnxk/meson.build +++ b/drivers/crypto/cnxk/meson.build @@ -17,6 +17,7 @@ sources = files( 'cn10k_cryptodev_sec.c', 'cn10k_ipsec.c', 'cn10k_tls.c', + 'cn20k_cryptodev.c', 'cnxk_cryptodev.c', 'cnxk_cryptodev_capabilities.c', 'cnxk_cryptodev_devargs.c', -- 2.25.1