git: ca457729cc7b - main - cxgbe: Queue NIC TLS mbufs internally.
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 17 Feb 2023 17:08:18 UTC
The branch main has been updated by jhb:
URL: https://cgit.FreeBSD.org/src/commit/?id=ca457729cc7bee218ce4d001a39306687c433d39
commit ca457729cc7bee218ce4d001a39306687c433d39
Author: John Baldwin <jhb@FreeBSD.org>
AuthorDate: 2023-02-17 17:07:17 +0000
Commit: John Baldwin <jhb@FreeBSD.org>
CommitDate: 2023-02-17 17:07:17 +0000
cxgbe: Queue NIC TLS mbufs internally.
Set internal mbuf properties and queue NIC TLS mbuf chains to the
connection's TX queue directly.
Reviewed by: np
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D38579
---
sys/dev/cxgbe/adapter.h | 4 +--
sys/dev/cxgbe/crypto/t6_kern_tls.c | 66 ++++++++++++++++----------------------
sys/dev/cxgbe/t4_sge.c | 11 ++-----
3 files changed, 33 insertions(+), 48 deletions(-)
diff --git a/sys/dev/cxgbe/adapter.h b/sys/dev/cxgbe/adapter.h
index 7076b1cf781a..4206bca95cdf 100644
--- a/sys/dev/cxgbe/adapter.h
+++ b/sys/dev/cxgbe/adapter.h
@@ -1379,8 +1379,8 @@ int t6_tls_tag_alloc(struct ifnet *, union if_snd_tag_alloc_params *,
void t6_ktls_modload(void);
void t6_ktls_modunload(void);
int t6_ktls_try(struct ifnet *, struct socket *, struct ktls_session *);
-int t6_ktls_parse_pkt(struct mbuf *, int *, int *);
-int t6_ktls_write_wr(struct sge_txq *, void *, struct mbuf *, u_int, u_int);
+int t6_ktls_parse_pkt(struct mbuf *);
+int t6_ktls_write_wr(struct sge_txq *, void *, struct mbuf *, u_int);
#endif
/* t4_keyctx.c */
diff --git a/sys/dev/cxgbe/crypto/t6_kern_tls.c b/sys/dev/cxgbe/crypto/t6_kern_tls.c
index 0be0c092d7e0..f1302d063051 100644
--- a/sys/dev/cxgbe/crypto/t6_kern_tls.c
+++ b/sys/dev/cxgbe/crypto/t6_kern_tls.c
@@ -72,6 +72,7 @@ struct tlspcb {
struct vi_info *vi; /* virtual interface */
struct adapter *sc;
struct l2t_entry *l2te; /* L2 table entry used by this connection */
+ struct sge_txq *txq;
int tid; /* Connection identifier */
int tx_key_addr;
@@ -95,7 +96,6 @@ struct tlspcb {
/* Fields only used during setup and teardown. */
struct inpcb *inp; /* backpointer to host stack's PCB */
- struct sge_txq *txq;
struct sge_wrq *ctrlq;
struct clip_entry *ce; /* CLIP table entry used by this tid */
@@ -785,12 +785,7 @@ ktls_wr_len(struct tlspcb *tlsp, struct mbuf *m, struct mbuf *m_tls,
/* This should always be the last TLS record in a chain. */
MPASS(m_tls->m_next == NULL);
-
- /*
- * XXX: Set a bogus 'nsegs' value to avoid tripping an
- * assertion in mbuf_nsegs() in t4_sge.c.
- */
- *nsegsp = 1;
+ *nsegsp = 0;
return (wr_len);
}
@@ -893,7 +888,7 @@ ktls_find_tcp_timestamps(struct tcphdr *tcp)
}
int
-t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
+t6_ktls_parse_pkt(struct mbuf *m)
{
struct tlspcb *tlsp;
struct ether_header *eh;
@@ -901,6 +896,7 @@ t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
struct ip6_hdr *ip6;
struct tcphdr *tcp;
struct mbuf *m_tls;
+ void *items[1];
int nsegs;
u_int wr_len, tot_len;
@@ -976,7 +972,6 @@ t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
* Each of the remaining mbufs in the chain should reference a
* TLS record.
*/
- *nsegsp = 0;
for (m_tls = m->m_next; m_tls != NULL; m_tls = m_tls->m_next) {
MPASS(m_tls->m_flags & M_EXTPG);
@@ -993,8 +988,8 @@ t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
* Store 'nsegs' for the first TLS record in the
* header mbuf's metadata.
*/
- if (*nsegsp == 0)
- *nsegsp = nsegs;
+ if (m_tls == m->m_next)
+ set_mbuf_nsegs(m, nsegs);
}
MPASS(tot_len != 0);
@@ -1035,12 +1030,13 @@ t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
tot_len += roundup2(wr_len, EQ_ESIZE);
- *len16p = tot_len / 16;
+ set_mbuf_len16(m, tot_len / 16);
#ifdef VERBOSE_TRACES
CTR4(KTR_CXGBE, "%s: tid %d len16 %d nsegs %d", __func__,
- tlsp->tid, *len16p, *nsegsp);
+ tlsp->tid, mbuf_len16(m), mbuf_nsegs(m));
#endif
- return (0);
+ items[0] = m;
+ return (mp_ring_enqueue(tlsp->txq->r, items, 1, 256));
}
/*
@@ -1316,10 +1312,9 @@ _Static_assert(W_TCB_SND_UNA_RAW == W_TCB_SND_NXT_RAW,
"SND_NXT_RAW and SND_UNA_RAW are in different words");
static int
-ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
- void *dst, struct mbuf *m, struct tcphdr *tcp, struct mbuf *m_tls,
- u_int nsegs, u_int available, tcp_seq tcp_seqno, uint32_t *tsopt,
- u_int pidx, bool set_l2t_idx)
+ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq, void *dst,
+ struct mbuf *m, struct tcphdr *tcp, struct mbuf *m_tls, u_int available,
+ tcp_seq tcp_seqno, uint32_t *tsopt, u_int pidx, bool set_l2t_idx)
{
struct sge_eq *eq = &txq->eq;
struct tx_sdesc *txsd;
@@ -1335,7 +1330,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
u_int auth_start, auth_stop, auth_insert;
u_int cipher_start, cipher_stop, iv_offset;
u_int imm_len, mss, ndesc, offset, plen, tlen, twr_len, wr_len;
- u_int fields, tx_max_offset, tx_max;
+ u_int fields, nsegs, tx_max_offset, tx_max;
bool first_wr, last_wr, using_scratch;
ndesc = 0;
@@ -1457,7 +1452,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
out = (void *)(wr + 1);
fields = 0;
if (set_l2t_idx) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to set L2T_IX for subsequent TLS WR"));
#ifdef VERBOSE_TRACES
CTR3(KTR_CXGBE, "%s: tid %d set L2T_IX to %d", __func__,
@@ -1469,7 +1464,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
fields++;
}
if (tsopt != NULL && tlsp->prev_tsecr != ntohl(tsopt[1])) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to set T_RTSEQ_RECENT for subsequent TLS WR"));
#ifdef VERBOSE_TRACES
CTR2(KTR_CXGBE, "%s: tid %d wrote updated T_RTSEQ_RECENT",
@@ -1485,7 +1480,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
}
if (first_wr || tlsp->prev_seq != tx_max) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to set TX_MAX for subsequent TLS WR"));
#ifdef VERBOSE_TRACES
CTR4(KTR_CXGBE,
@@ -1504,7 +1499,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
* reset SND_UNA_RAW to 0 so that SND_UNA == TX_MAX.
*/
if (tlsp->prev_seq != tx_max || mtod(m_tls, vm_offset_t) != 0) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to clear SND_UNA_RAW for subsequent TLS WR"));
#ifdef VERBOSE_TRACES
CTR2(KTR_CXGBE, "%s: tid %d clearing SND_UNA_RAW", __func__,
@@ -1524,7 +1519,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
tlsp->prev_seq = tcp_seqno + tlen;
if (first_wr || tlsp->prev_ack != ntohl(tcp->th_ack)) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to set RCV_NXT for subsequent TLS WR"));
write_set_tcb_field_ulp(tlsp, out, txq, W_TCB_RCV_NXT,
V_TCB_RCV_NXT(M_TCB_RCV_NXT),
@@ -1536,7 +1531,7 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
}
if (first_wr || tlsp->prev_win != ntohs(tcp->th_win)) {
- KASSERT(nsegs != 0,
+ KASSERT(m->m_next == m_tls,
("trying to set RCV_WND for subsequent TLS WR"));
write_set_tcb_field_ulp(tlsp, out, txq, W_TCB_RCV_WND,
V_TCB_RCV_WND(M_TCB_RCV_WND),
@@ -1547,8 +1542,10 @@ ktls_write_tls_wr(struct tlspcb *tlsp, struct sge_txq *txq,
tlsp->prev_win = ntohs(tcp->th_win);
}
- /* Recalculate 'nsegs' if cached value is not available. */
- if (nsegs == 0)
+ /* Use cached value for first record in chain. */
+ if (m->m_next == m_tls)
+ nsegs = mbuf_nsegs(m);
+ else
nsegs = sglist_count_mbuf_epg(m_tls, m_tls->m_epg_hdrlen +
offset, plen - (m_tls->m_epg_hdrlen + offset));
@@ -1948,7 +1945,7 @@ ktls_write_tcp_fin(struct sge_txq *txq, void *dst, struct mbuf *m,
}
int
-t6_ktls_write_wr(struct sge_txq *txq, void *dst, struct mbuf *m, u_int nsegs,
+t6_ktls_write_wr(struct sge_txq *txq, void *dst, struct mbuf *m,
u_int available)
{
struct sge_eq *eq = &txq->eq;
@@ -2043,18 +2040,11 @@ t6_ktls_write_wr(struct sge_txq *txq, void *dst, struct mbuf *m, u_int nsegs,
}
ndesc = ktls_write_tls_wr(tlsp, txq, dst, m, tcp, m_tls,
- nsegs, available - totdesc, tcp_seqno, tsopt, pidx,
- set_l2t_idx);
+ available - totdesc, tcp_seqno, tsopt, pidx, set_l2t_idx);
totdesc += ndesc;
IDXINCR(pidx, ndesc, eq->sidx);
dst = &eq->desc[pidx];
- /*
- * The value of nsegs from the header mbuf's metadata
- * is only valid for the first TLS record.
- */
- nsegs = 0;
-
/* Only need to set the L2T index once. */
set_l2t_idx = false;
}
@@ -2126,13 +2116,13 @@ t6_tls_tag_alloc(struct ifnet *ifp, union if_snd_tag_alloc_params *params,
}
int
-t6_ktls_parse_pkt(struct mbuf *m, int *nsegsp, int *len16p)
+t6_ktls_parse_pkt(struct mbuf *m)
{
return (EINVAL);
}
int
-t6_ktls_write_wr(struct sge_txq *txq, void *dst, struct mbuf *m, u_int nsegs,
+t6_ktls_write_wr(struct sge_txq *txq, void *dst, struct mbuf *m,
u_int available)
{
panic("can't happen");
diff --git a/sys/dev/cxgbe/t4_sge.c b/sys/dev/cxgbe/t4_sge.c
index 94fc705bd1d4..8cd9be275126 100644
--- a/sys/dev/cxgbe/t4_sge.c
+++ b/sys/dev/cxgbe/t4_sge.c
@@ -2691,16 +2691,12 @@ restart:
#endif
#ifdef KERN_TLS
if (mst != NULL && mst->sw->type == IF_SND_TAG_TYPE_TLS) {
- int len16;
-
cflags |= MC_TLS;
set_mbuf_cflags(m0, cflags);
- rc = t6_ktls_parse_pkt(m0, &nsegs, &len16);
+ rc = t6_ktls_parse_pkt(m0);
if (rc != 0)
goto fail;
- set_mbuf_nsegs(m0, nsegs);
- set_mbuf_len16(m0, len16);
- return (0);
+ return (EINPROGRESS);
}
#endif
if (nsegs > max_nsegs_allowed(m0, vm_wr)) {
@@ -3260,8 +3256,7 @@ skip_coalescing:
#ifdef KERN_TLS
} else if (mbuf_cflags(m0) & MC_TLS) {
ETHER_BPF_MTAP(ifp, m0);
- n = t6_ktls_write_wr(txq, wr, m0, mbuf_nsegs(m0),
- avail);
+ n = t6_ktls_write_wr(txq, wr, m0, avail);
#endif
} else {
ETHER_BPF_MTAP(ifp, m0);