From: Shihong Wang <shihong.w...@corigine.com>

IPsec packet processing is mostly carried out in hardware.
The hardware statistics on successful packets and discarded
packets. The driver can obtain these statistics by Mailbox.

Signed-off-by: Shihong Wang <shihong.w...@corigine.com>
Reviewed-by: Chaoyong He <chaoyong...@corigine.com>
---
 drivers/net/nfp/nfp_ipsec.c | 149 ++++++++++++++++++++++++++++++++++++
 1 file changed, 149 insertions(+)

diff --git a/drivers/net/nfp/nfp_ipsec.c b/drivers/net/nfp/nfp_ipsec.c
index 51770def9d..d4292c3b90 100644
--- a/drivers/net/nfp/nfp_ipsec.c
+++ b/drivers/net/nfp/nfp_ipsec.c
@@ -356,6 +356,154 @@ static const struct rte_security_capability 
nfp_security_caps[] = {
        }
 };
 
+/* IPsec config message cmd codes */
+enum nfp_ipsec_cfg_msg_cmd_codes {
+       NFP_IPSEC_CFG_MSG_ADD_SA,       /**< Add a new SA */
+       NFP_IPSEC_CFG_MSG_INV_SA,       /**< Invalidate an existing SA */
+       NFP_IPSEC_CFG_MSG_MODIFY_SA,    /**< Modify an existing SA */
+       NFP_IPSEC_CFG_MSG_GET_SA_STATS, /**< Report SA counters, flags, etc. */
+       NFP_IPSEC_CFG_MSG_GET_SEQ_NUMS, /**< Allocate sequence numbers */
+       NFP_IPSEC_CFG_MSG_LAST
+};
+
+enum nfp_ipsec_cfg_msg_rsp_codes {
+       NFP_IPSEC_CFG_MSG_OK,
+       NFP_IPSEC_CFG_MSG_FAILED,
+       NFP_IPSEC_CFG_MSG_SA_VALID,
+       NFP_IPSEC_CFG_MSG_SA_HASH_ADD_FAILED,
+       NFP_IPSEC_CFG_MSG_SA_HASH_DEL_FAILED,
+       NFP_IPSEC_CFG_MSG_SA_INVALID_CMD
+};
+
+static int
+nfp_ipsec_cfg_cmd_issue(struct nfp_net_hw *hw,
+               struct nfp_ipsec_msg *msg)
+{
+       int ret;
+       uint32_t i;
+       uint32_t msg_size;
+
+       msg_size = RTE_DIM(msg->raw);
+       msg->rsp = NFP_IPSEC_CFG_MSG_OK;
+
+       for (i = 0; i < msg_size; i++)
+               nn_cfg_writel(hw, NFP_NET_CFG_MBOX_VAL + 4 * i, msg->raw[i]);
+
+       ret = nfp_net_mbox_reconfig(hw, NFP_NET_CFG_MBOX_CMD_IPSEC);
+       if (ret < 0) {
+               PMD_DRV_LOG(ERR, "Failed to IPsec reconfig mbox");
+               return ret;
+       }
+
+       /*
+        * Not all commands and callers make use of response message data. But
+        * leave this up to the caller and always read and store the full
+        * response. One example where the data is needed is for statistics.
+        */
+       for (i = 0; i < msg_size; i++)
+               msg->raw[i] = nn_cfg_readl(hw, NFP_NET_CFG_MBOX_VAL + 4 * i);
+
+       switch (msg->rsp) {
+       case NFP_IPSEC_CFG_MSG_OK:
+               ret = 0;
+               break;
+       case NFP_IPSEC_CFG_MSG_SA_INVALID_CMD:
+               ret = -EINVAL;
+               break;
+       case NFP_IPSEC_CFG_MSG_SA_VALID:
+               ret = -EEXIST;
+               break;
+       case NFP_IPSEC_CFG_MSG_FAILED:
+               /* FALLTHROUGH */
+       case NFP_IPSEC_CFG_MSG_SA_HASH_ADD_FAILED:
+               /* FALLTHROUGH */
+       case NFP_IPSEC_CFG_MSG_SA_HASH_DEL_FAILED:
+               ret = -EIO;
+               break;
+       default:
+               ret = -EDOM;
+       }
+
+       return ret;
+}
+
+/**
+ * Get discards packet statistics for each SA
+ *
+ * The sa_discard_stats contains the statistics of discards packets
+ * of an SA. This function calculates the sum total of discarded packets.
+ *
+ * @param errors
+ *   The value is SA discards packet sum total
+ * @param sa_discard_stats
+ *   The struct is SA discards packet Statistics
+ */
+static void
+nfp_get_errorstats(uint64_t *errors,
+               struct ipsec_discard_stats *sa_discard_stats)
+{
+       uint32_t i;
+       uint32_t len;
+       uint32_t *perror;
+
+       perror = &sa_discard_stats->discards_auth;
+       len = sizeof(struct ipsec_discard_stats) / sizeof(uint32_t);
+
+       for (i = 0; i < len; i++)
+               *errors += *perror++;
+
+       *errors -= sa_discard_stats->ipv4_id_counter;
+}
+
+static int
+nfp_security_session_get_stats(void *device,
+               struct rte_security_session *session,
+               struct rte_security_stats *stats)
+{
+       int ret;
+       struct nfp_net_hw *hw;
+       struct nfp_ipsec_msg msg;
+       struct rte_eth_dev *eth_dev;
+       struct ipsec_get_sa_stats *cfg_s;
+       struct rte_security_ipsec_stats *ips_s;
+       struct nfp_ipsec_session *priv_session;
+       enum rte_security_ipsec_sa_direction direction;
+
+       eth_dev = device;
+       priv_session = SECURITY_GET_SESS_PRIV(session);
+       memset(&msg, 0, sizeof(msg));
+       msg.cmd = NFP_IPSEC_CFG_MSG_GET_SA_STATS;
+       msg.sa_idx = priv_session->sa_index;
+       hw = NFP_NET_DEV_PRIVATE_TO_HW(eth_dev->data->dev_private);
+
+       ret = nfp_ipsec_cfg_cmd_issue(hw, &msg);
+       if (ret < 0) {
+               PMD_DRV_LOG(ERR, "Failed to get SA stats");
+               return ret;
+       }
+
+       cfg_s = &msg.cfg_get_stats;
+       direction = priv_session->ipsec.direction;
+       memset(stats, 0, sizeof(struct rte_security_stats)); /* Start with 
zeros */
+       stats->protocol = RTE_SECURITY_PROTOCOL_IPSEC;
+       ips_s = &stats->ipsec;
+
+       /* Only display SA if any counters are non-zero */
+       if (cfg_s->lifetime_byte_count != 0 || cfg_s->pkt_count != 0) {
+               if (direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) {
+                       ips_s->ipackets = cfg_s->pkt_count;
+                       ips_s->ibytes = cfg_s->lifetime_byte_count;
+                       nfp_get_errorstats(&ips_s->ierrors, 
&cfg_s->sa_discard_stats);
+               } else {
+                       ips_s->opackets = cfg_s->pkt_count;
+                       ips_s->obytes = cfg_s->lifetime_byte_count;
+                       nfp_get_errorstats(&ips_s->oerrors, 
&cfg_s->sa_discard_stats);
+               }
+       }
+
+       return 0;
+}
+
 static const struct rte_security_capability *
 nfp_crypto_capabilities_get(void *device __rte_unused)
 {
@@ -370,6 +518,7 @@ nfp_security_session_get_size(void *device __rte_unused)
 
 static const struct rte_security_ops nfp_security_ops = {
        .session_get_size = nfp_security_session_get_size,
+       .session_stats_get = nfp_security_session_get_stats,
        .capabilities_get = nfp_crypto_capabilities_get,
 };
 
-- 
2.39.1

Reply via email to