xref: /dpdk/lib/security/rte_security.c (revision 3b78aa7b2317fb385ed7fa5f5535f60050ede618)
1 /* SPDX-License-Identifier: BSD-3-Clause
2  * Copyright 2017 NXP.
3  * Copyright(c) 2017 Intel Corporation.
4  * Copyright (c) 2020 Samsung Electronics Co., Ltd All Rights Reserved
5  */
6 
7 #include <rte_cryptodev.h>
8 #include <rte_dev.h>
9 #include <rte_telemetry.h>
10 #include "rte_security.h"
11 #include "rte_security_driver.h"
12 
13 /* Macro to check for invalid pointers */
14 #define RTE_PTR_OR_ERR_RET(ptr, retval) do {	\
15 	if ((ptr) == NULL)			\
16 		return retval;			\
17 } while (0)
18 
19 /* Macro to check for invalid pointers chains */
20 #define RTE_PTR_CHAIN3_OR_ERR_RET(p1, p2, p3, retval, last_retval) do {	\
21 	RTE_PTR_OR_ERR_RET(p1, retval);					\
22 	RTE_PTR_OR_ERR_RET(p1->p2, retval);				\
23 	RTE_PTR_OR_ERR_RET(p1->p2->p3, last_retval);			\
24 } while (0)
25 
26 #define RTE_SECURITY_DYNFIELD_NAME "rte_security_dynfield_metadata"
27 int rte_security_dynfield_offset = -1;
28 
29 int
30 rte_security_dynfield_register(void)
31 {
32 	static const struct rte_mbuf_dynfield dynfield_desc = {
33 		.name = RTE_SECURITY_DYNFIELD_NAME,
34 		.size = sizeof(rte_security_dynfield_t),
35 		.align = __alignof__(rte_security_dynfield_t),
36 	};
37 	rte_security_dynfield_offset =
38 		rte_mbuf_dynfield_register(&dynfield_desc);
39 	return rte_security_dynfield_offset;
40 }
41 
42 struct rte_security_session *
43 rte_security_session_create(struct rte_security_ctx *instance,
44 			    struct rte_security_session_conf *conf,
45 			    struct rte_mempool *mp,
46 			    struct rte_mempool *priv_mp)
47 {
48 	struct rte_security_session *sess = NULL;
49 
50 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_create, NULL, NULL);
51 	RTE_PTR_OR_ERR_RET(conf, NULL);
52 	RTE_PTR_OR_ERR_RET(mp, NULL);
53 	RTE_PTR_OR_ERR_RET(priv_mp, NULL);
54 
55 	if (rte_mempool_get(mp, (void **)&sess))
56 		return NULL;
57 
58 	if (instance->ops->session_create(instance->device, conf,
59 				sess, priv_mp)) {
60 		rte_mempool_put(mp, (void *)sess);
61 		return NULL;
62 	}
63 	instance->sess_cnt++;
64 
65 	return sess;
66 }
67 
68 int
69 rte_security_session_update(struct rte_security_ctx *instance,
70 			    struct rte_security_session *sess,
71 			    struct rte_security_session_conf *conf)
72 {
73 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_update, -EINVAL,
74 			-ENOTSUP);
75 	RTE_PTR_OR_ERR_RET(sess, -EINVAL);
76 	RTE_PTR_OR_ERR_RET(conf, -EINVAL);
77 
78 	return instance->ops->session_update(instance->device, sess, conf);
79 }
80 
81 unsigned int
82 rte_security_session_get_size(struct rte_security_ctx *instance)
83 {
84 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_get_size, 0, 0);
85 
86 	return instance->ops->session_get_size(instance->device);
87 }
88 
89 int
90 rte_security_session_stats_get(struct rte_security_ctx *instance,
91 			       struct rte_security_session *sess,
92 			       struct rte_security_stats *stats)
93 {
94 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_stats_get, -EINVAL,
95 			-ENOTSUP);
96 	/* Parameter sess can be NULL in case of getting global statistics. */
97 	RTE_PTR_OR_ERR_RET(stats, -EINVAL);
98 
99 	return instance->ops->session_stats_get(instance->device, sess, stats);
100 }
101 
102 int
103 rte_security_session_destroy(struct rte_security_ctx *instance,
104 			     struct rte_security_session *sess)
105 {
106 	int ret;
107 
108 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, session_destroy, -EINVAL,
109 			-ENOTSUP);
110 	RTE_PTR_OR_ERR_RET(sess, -EINVAL);
111 
112 	ret = instance->ops->session_destroy(instance->device, sess);
113 	if (ret != 0)
114 		return ret;
115 
116 	rte_mempool_put(rte_mempool_from_obj(sess), (void *)sess);
117 
118 	if (instance->sess_cnt)
119 		instance->sess_cnt--;
120 
121 	return 0;
122 }
123 
124 int
125 __rte_security_set_pkt_metadata(struct rte_security_ctx *instance,
126 				struct rte_security_session *sess,
127 				struct rte_mbuf *m, void *params)
128 {
129 #ifdef RTE_DEBUG
130 	RTE_PTR_OR_ERR_RET(sess, -EINVAL);
131 	RTE_PTR_OR_ERR_RET(instance, -EINVAL);
132 	RTE_PTR_OR_ERR_RET(instance->ops, -EINVAL);
133 #endif
134 	RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->set_pkt_metadata, -ENOTSUP);
135 	return instance->ops->set_pkt_metadata(instance->device,
136 					       sess, m, params);
137 }
138 
139 void *
140 __rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md)
141 {
142 	void *userdata = NULL;
143 
144 #ifdef RTE_DEBUG
145 	RTE_PTR_OR_ERR_RET(instance, NULL);
146 	RTE_PTR_OR_ERR_RET(instance->ops, NULL);
147 #endif
148 	RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->get_userdata, NULL);
149 	if (instance->ops->get_userdata(instance->device, md, &userdata))
150 		return NULL;
151 
152 	return userdata;
153 }
154 
155 const struct rte_security_capability *
156 rte_security_capabilities_get(struct rte_security_ctx *instance)
157 {
158 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
159 
160 	return instance->ops->capabilities_get(instance->device);
161 }
162 
163 const struct rte_security_capability *
164 rte_security_capability_get(struct rte_security_ctx *instance,
165 			    struct rte_security_capability_idx *idx)
166 {
167 	const struct rte_security_capability *capabilities;
168 	const struct rte_security_capability *capability;
169 	uint16_t i = 0;
170 
171 	RTE_PTR_CHAIN3_OR_ERR_RET(instance, ops, capabilities_get, NULL, NULL);
172 	RTE_PTR_OR_ERR_RET(idx, NULL);
173 
174 	capabilities = instance->ops->capabilities_get(instance->device);
175 
176 	if (capabilities == NULL)
177 		return NULL;
178 
179 	while ((capability = &capabilities[i++])->action
180 			!= RTE_SECURITY_ACTION_TYPE_NONE) {
181 		if (capability->action == idx->action &&
182 				capability->protocol == idx->protocol) {
183 			if (idx->protocol == RTE_SECURITY_PROTOCOL_IPSEC) {
184 				if (capability->ipsec.proto ==
185 						idx->ipsec.proto &&
186 					capability->ipsec.mode ==
187 							idx->ipsec.mode &&
188 					capability->ipsec.direction ==
189 							idx->ipsec.direction)
190 					return capability;
191 			} else if (idx->protocol == RTE_SECURITY_PROTOCOL_PDCP) {
192 				if (capability->pdcp.domain ==
193 							idx->pdcp.domain)
194 					return capability;
195 			} else if (idx->protocol ==
196 						RTE_SECURITY_PROTOCOL_DOCSIS) {
197 				if (capability->docsis.direction ==
198 							idx->docsis.direction)
199 					return capability;
200 			}
201 		}
202 	}
203 
204 	return NULL;
205 }
206 
207 static int
208 security_handle_cryptodev_list(const char *cmd __rte_unused,
209 			       const char *params __rte_unused,
210 			       struct rte_tel_data *d)
211 {
212 	int dev_id;
213 
214 	if (rte_cryptodev_count() < 1)
215 		return -1;
216 
217 	rte_tel_data_start_array(d, RTE_TEL_INT_VAL);
218 	for (dev_id = 0; dev_id < RTE_CRYPTO_MAX_DEVS; dev_id++)
219 		if (rte_cryptodev_is_valid_dev(dev_id) &&
220 		    rte_cryptodev_get_sec_ctx(dev_id))
221 			rte_tel_data_add_array_int(d, dev_id);
222 
223 	return 0;
224 }
225 
226 #define CRYPTO_CAPS_SZ                                             \
227 	(RTE_ALIGN_CEIL(sizeof(struct rte_cryptodev_capabilities), \
228 			sizeof(uint64_t)) /	sizeof(uint64_t))
229 
230 static int
231 crypto_caps_array(struct rte_tel_data *d,
232 		  const struct rte_cryptodev_capabilities *capabilities)
233 {
234 	const struct rte_cryptodev_capabilities *dev_caps;
235 	uint64_t caps_val[CRYPTO_CAPS_SZ];
236 	unsigned int i = 0, j;
237 
238 	rte_tel_data_start_array(d, RTE_TEL_U64_VAL);
239 
240 	while ((dev_caps = &capabilities[i++])->op !=
241 	   RTE_CRYPTO_OP_TYPE_UNDEFINED) {
242 		memset(&caps_val, 0, CRYPTO_CAPS_SZ * sizeof(caps_val[0]));
243 		rte_memcpy(caps_val, dev_caps, sizeof(capabilities[0]));
244 		for (j = 0; j < CRYPTO_CAPS_SZ; j++)
245 			rte_tel_data_add_array_u64(d, caps_val[j]);
246 	}
247 
248 	return (i - 1);
249 }
250 
251 #define SEC_CAPS_SZ						\
252 	(RTE_ALIGN_CEIL(sizeof(struct rte_security_capability), \
253 			sizeof(uint64_t)) /	sizeof(uint64_t))
254 
255 static int
256 sec_caps_array(struct rte_tel_data *d,
257 	       const struct rte_security_capability *capabilities)
258 {
259 	const struct rte_security_capability *dev_caps;
260 	uint64_t caps_val[SEC_CAPS_SZ];
261 	unsigned int i = 0, j;
262 
263 	rte_tel_data_start_array(d, RTE_TEL_U64_VAL);
264 
265 	while ((dev_caps = &capabilities[i++])->action !=
266 	   RTE_SECURITY_ACTION_TYPE_NONE) {
267 		memset(&caps_val, 0, SEC_CAPS_SZ * sizeof(caps_val[0]));
268 		rte_memcpy(caps_val, dev_caps, sizeof(capabilities[0]));
269 		for (j = 0; j < SEC_CAPS_SZ; j++)
270 			rte_tel_data_add_array_u64(d, caps_val[j]);
271 	}
272 
273 	return i - 1;
274 }
275 
276 static const struct rte_security_capability *
277 security_capability_by_index(const struct rte_security_capability *capabilities,
278 			     int index)
279 {
280 	const struct rte_security_capability *dev_caps = NULL;
281 	int i = 0;
282 
283 	while ((dev_caps = &capabilities[i])->action !=
284 	   RTE_SECURITY_ACTION_TYPE_NONE) {
285 		if (i == index)
286 			return dev_caps;
287 
288 		++i;
289 	}
290 
291 	return NULL;
292 }
293 
294 static int
295 security_capabilities_from_dev_id(int dev_id, const void **caps)
296 {
297 	const struct rte_security_capability *capabilities;
298 	struct rte_security_ctx *sec_ctx;
299 
300 	if (rte_cryptodev_is_valid_dev(dev_id) == 0)
301 		return -EINVAL;
302 
303 	sec_ctx = (struct rte_security_ctx *)rte_cryptodev_get_sec_ctx(dev_id);
304 	RTE_PTR_OR_ERR_RET(sec_ctx, -EINVAL);
305 
306 	capabilities = rte_security_capabilities_get(sec_ctx);
307 	RTE_PTR_OR_ERR_RET(capabilities, -EINVAL);
308 
309 	*caps = capabilities;
310 	return 0;
311 }
312 
313 static int
314 security_handle_cryptodev_sec_caps(const char *cmd __rte_unused, const char *params,
315 				   struct rte_tel_data *d)
316 {
317 	const struct rte_security_capability *capabilities;
318 	struct rte_tel_data *sec_caps;
319 	char *end_param;
320 	int sec_caps_n;
321 	int dev_id;
322 	int rc;
323 
324 	if (!params || strlen(params) == 0 || !isdigit(*params))
325 		return -EINVAL;
326 
327 	dev_id = strtoul(params, &end_param, 0);
328 	if (*end_param != '\0')
329 		CDEV_LOG_ERR("Extra parameters passed to command, ignoring");
330 
331 	rc = security_capabilities_from_dev_id(dev_id, (void *)&capabilities);
332 	if (rc < 0)
333 		return rc;
334 
335 	sec_caps = rte_tel_data_alloc();
336 	RTE_PTR_OR_ERR_RET(sec_caps, -ENOMEM);
337 
338 	rte_tel_data_start_dict(d);
339 	sec_caps_n = sec_caps_array(sec_caps, capabilities);
340 	rte_tel_data_add_dict_container(d, "sec_caps", sec_caps, 0);
341 	rte_tel_data_add_dict_int(d, "sec_caps_n", sec_caps_n);
342 
343 	return 0;
344 }
345 
346 static int
347 security_handle_cryptodev_crypto_caps(const char *cmd __rte_unused, const char *params,
348 				      struct rte_tel_data *d)
349 {
350 	const struct rte_security_capability *capabilities;
351 	struct rte_tel_data *crypto_caps;
352 	const char *capa_param;
353 	int dev_id, capa_id;
354 	int crypto_caps_n;
355 	char *end_param;
356 	int rc;
357 
358 	if (!params || strlen(params) == 0 || !isdigit(*params))
359 		return -EINVAL;
360 
361 	dev_id = strtoul(params, &end_param, 0);
362 	capa_param = strtok(end_param, ",");
363 	if (!capa_param || strlen(capa_param) == 0 || !isdigit(*capa_param))
364 		return -EINVAL;
365 
366 	capa_id = strtoul(capa_param, &end_param, 0);
367 	if (*end_param != '\0')
368 		CDEV_LOG_ERR("Extra parameters passed to command, ignoring");
369 
370 	rc = security_capabilities_from_dev_id(dev_id, (void *)&capabilities);
371 	if (rc < 0)
372 		return rc;
373 
374 	capabilities = security_capability_by_index(capabilities, capa_id);
375 	RTE_PTR_OR_ERR_RET(capabilities, -EINVAL);
376 
377 	crypto_caps = rte_tel_data_alloc();
378 	RTE_PTR_OR_ERR_RET(crypto_caps, -ENOMEM);
379 
380 	rte_tel_data_start_dict(d);
381 	crypto_caps_n = crypto_caps_array(crypto_caps, capabilities->crypto_capabilities);
382 
383 	rte_tel_data_add_dict_container(d, "crypto_caps", crypto_caps, 0);
384 	rte_tel_data_add_dict_int(d, "crypto_caps_n", crypto_caps_n);
385 
386 	return 0;
387 }
388 
389 RTE_INIT(security_init_telemetry)
390 {
391 	rte_telemetry_register_cmd("/security/cryptodev/list",
392 		security_handle_cryptodev_list,
393 		"Returns list of available crypto devices by IDs. No parameters.");
394 
395 	rte_telemetry_register_cmd("/security/cryptodev/sec_caps",
396 		security_handle_cryptodev_sec_caps,
397 		"Returns security capabilities for a cryptodev. Parameters: int dev_id");
398 
399 	rte_telemetry_register_cmd("/security/cryptodev/crypto_caps",
400 		security_handle_cryptodev_crypto_caps,
401 		"Returns crypto capabilities for a security capability. Parameters: int dev_id, sec_cap_id");
402 }
403