From patchwork Fri Sep 14 11:48:08 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 44718 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 093485B38; Fri, 14 Sep 2018 13:52:08 +0200 (CEST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70053.outbound.protection.outlook.com [40.107.7.53]) by dpdk.org (Postfix) with ESMTP id 2DD255B2E for ; Fri, 14 Sep 2018 13:52:06 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hDij1l/dmREeedEv8WAn/C4r/TepUz8+ko66n55i+Bs=; b=EL7MEjM+baLlXdqxCqnNZBjnny8r2UyxnOPGcanD4UgPuHOhC8wE0tWIVFmRAi9WS6otCqls+i9dnEJvsszDmBAMYp/LJvO/yay4XFjOzRrs17zRrzSTS1ZHSEc0rNFiRLByeSsd91XZAjEbgHwHhx7cSa2uEK7WxeMXKShD46s= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; Received: from GDB1.ap.freescale.net (14.143.30.134) by VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1122.18; Fri, 14 Sep 2018 11:52:02 +0000 From: akhil.goyal@nxp.com To: dev@dpdk.org Cc: hemant.agrawal@nxp.com, pablo.de.lara.guarch@intel.com, Akhil Goyal Date: Fri, 14 Sep 2018 17:18:08 +0530 Message-Id: <20180914114810.14960-2-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180914114810.14960-1-akhil.goyal@nxp.com> References: <20180914114810.14960-1-akhil.goyal@nxp.com> MIME-Version: 1.0 X-Originating-IP: [14.143.30.134] X-ClientProxiedBy: TY2PR06CA0045.apcprd06.prod.outlook.com (2603:1096:404:2e::33) To VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c36e81ee-d2f2-454b-042f-08d61a387dc9 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:VI1PR04MB4893; X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 3:fTpJjSqugvhf/AXCaaNPgcjyOo9UmjcPmf+TlZa2kk/2/h2aqsUanJbIjHD5MFiHG+SAOEqLlqR20b0sVZg/fjZ3tgo1iPN/xdUaRvcMQ6JDuaUsB3I+9KunzFn594M/vhuIq1rODQRysStZaYN4Fx1Bi/wJP8mcAleF/hfeYtu8/vazIdSd6qbliAb1Z27Q0OScK+9R2h7ISjSqxtc/QMkE/lwNb8HgGl4yuC5oNT6UsYaJxjraoEKrZoR2PIrt; 25:EQnYYvjiuIIB8YSewsE/jyjlX6ugH0ICfEw7Tt5nm61ROttKk82gVZ9zq/bDkdGDGQQuJslir5JZx+nCdh9QwDBvlO9j4kQUY+oCiPRRizbHFd7A+Jap5HSr2IAvnUoW2QzyR3crJiFBCuGKN8i7tHTZhSFus/oCwfpVTPWOx/57tqU9noJW9QWyY0lxaAcKqnRuymeAXplmXnYv/FltckSi5tRgInpiwwKAthxIhUj+KvgwoJKbuFBv4JMYdDr7UW7wJpcynOJowlFJ2+4xgyrNFpt0PLUz/iBS9XgiBSCVqyBrdy4r7d2joHJZ69n0g4E3lyoYRCp3qye9PjcTWA==; 31:mlyR6JaAktK1yHMFkLZobCW3ya4H1ocIzTRJ6mUxPEE0XWVf5psucx5YwFqwk9AcNh81wDD5DL/GfHQWeqdBahwJJM1cAb2m7RlFiN6GASRTG46HPss7ebtwfZAAanCtq4ucEa568f/h5fhaW18u/41NWsurDLClilrcw3ld1324gGJyMqMKA2harvZ/aoRY9tcK7uDuRItCCkK6ul21mFQGxHHVixzOIMT0PGCODDw= X-MS-TrafficTypeDiagnostic: VI1PR04MB4893: X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 20: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; 4:Ik4EiLIC3+gcrwumG07sbT3cj9uqOsoIpMG0qxBYbSMLw4LvO1gz9GzAYKISJFpDwbP4y7ZsfZ7xZRJHWrTu4OiMDFQYazeYmjIYVlScpU44yYE0DBA76LzNmbRbsCn6/yYLpJ0d5mRsNVFWVkzGAez4BFX6sIAWUHVnrHj4FPuA7Y8dooQ7kLs1HHywT5X3PglubdLWgk7jxWxZ0xo67u7tu7dLRR0LARc2lZ6Kwyxt/GJ/XVKKEyQk6GT4Xbwks5cFGrYKlggn/5o+KZmz2WeM9wNH+uPkbP0C0bARtvwxJt+25Q1rXD+9F1kaAYQp X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(823301075)(3002001)(10201501046)(93006095)(93001095)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123560045)(201708071742011)(7699050); SRVR:VI1PR04MB4893; BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB4893; X-Forefront-PRVS: 07954CC105 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(396003)(136003)(346002)(366004)(39860400002)(51234002)(199004)(189003)(86362001)(575784001)(7736002)(105586002)(25786009)(6486002)(1076002)(5660300001)(6116002)(3846002)(47776003)(5024004)(53936002)(66066001)(2351001)(2361001)(106356001)(305945005)(14444005)(50466002)(36756003)(6916009)(2906002)(6512007)(9686003)(4326008)(85782001)(48376002)(316002)(16586007)(186003)(16526019)(8936002)(486006)(81166006)(8676002)(50226002)(81156014)(5009440100003)(478600001)(68736007)(476003)(2616005)(51416003)(52116002)(11346002)(446003)(76176011)(26005)(956004)(386003)(33896004)(97736004)(6506007)(110426005)(85772001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB4893; H:GDB1.ap.freescale.net; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; VI1PR04MB4893; 23:aBibScPA54PNdmpcNhHMigCK1VL3UzzWVn/2zfa4L?= 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 X-Microsoft-Antispam-Message-Info: ITYl3ky8zTG75AoDNVPKNB5PFr3y2+/cfPB7uJ4GDho9Q/+uQ8EhFZApPI3estLYK7RyGkYdZTvm8K5H6H+xdPnzKBzbX9bFqKfqpE6ypEAKy9HD3nwOozHnjCGzdVH5MxIFyUm1AP9NZ8dztvytVScM0R9myYtev35ap60EKMjLNmE4pMPO9pCcql6CVG4d9oK/Yp4QMJJaVvTAZdQ6T9I26+JqGGwpvXSc7Swo6lstYbrJQlCWOLmaATi/EcKXVxRxiKf9mkJixwRiIGAwMmvyhw9J60PkPC0PyGsscWeJGOXk/z0+04Z9OAtyaBMzitARLBIgCTOP/DW/ymY6ZlajvVllpIRcXTlE4QClFhw= X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 6:msYQV7KYJonbwUd0jl3lbOODugNi3EEU+QUF5sjkmPc6pHrbLIumHIVrxR1hepF0L0yAtfqegvzgpmkCPzh8XSCtwnaBMpLevYk617diPFSVG5pGaym02aFqelHoz+ySmBRYhwK80/+TkceMFo3115z737aQYI7vU4TnxuGc12k4Mg135yrSd+mEUmiOHop9FCIEPqGJEm2FhVoaUxt1blhXd36dyEfR1vsVNbcPanxTycmAD6tVLAdEH2WHek70PQ8cN9KE5ISimchroR3Gb0/NkvRJr1E+ByFol8kEJFhtBn3mX3iVH2sxOTwNqQnEDMZc4NaxSlMTrL+XphfSV8PCe8WLmG0+ubw+LTWvMYrO+k75W9qGqq0e7oGW2ulZuiZnlKozfznXtKLE5qs9tbxu0AqMdGdciwQq45v6KqqHFlZxH+S+7UEqOIOX6L0ke1/rH+5giN56zCFCHsY62A==; 5:EB7sdHcT3NM++G+77zYwhHwpQhDi3tGkC0zbVzA2Y+vRyGsKUjDPyjco3is/ncz9ygpDgTksWnqrON4JlrnGqrnZq4FOAcxNC4keLdQt9XVVLn+AcSmRkg9z1GzHeF9xc7RNYCywr4tX4s/eBQC+JvtOrWz3tNUXH0o/45XY1KE=; 7:DrWYT/agy2B24K3kNFNXFqmzmaBIC+9ow1kWk4b2M6A3gPSkfw7+q+imKNxTz4ujJkGO/QpyDwMiNjE4cThZgV46KjCu4MM0lZHf1BYP7R1xHZ9PVlLU1U9ejhpPuBTzJlYsC872+RIcP2bnlUMwYm3xJBysAbMNvbJoTMMEO+vAHJQfaP23WTo9N/r7i3TLHtB5hXWKOspyCzpC+S30TzeoxeaLINfGvwryjxLCa7vWj3zlH3IMVsth/wvu9B1+ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Sep 2018 11:52:02.6882 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c36e81ee-d2f2-454b-042f-08d61a387dc9 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4893 Subject: [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: support for event crypto adapter X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Akhil Goyal Signed-off-by: Akhil Goyal Signed-off-by: Ashish Jain --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 90 ++++++++++++++++++- drivers/crypto/dpaa2_sec/dpaa2_sec_event.h | 18 ++++ drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 2 + .../dpaa2_sec/rte_pmd_dpaa2_sec_version.map | 8 ++ 4 files changed, 116 insertions(+), 2 deletions(-) create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_event.h diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 53e493457..ae38f507b 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2016 NXP + * Copyright 2016-2018 NXP * */ @@ -10,7 +10,6 @@ #include #include -#include #include #include #include @@ -28,6 +27,7 @@ #include #include "dpaa2_sec_priv.h" +#include "dpaa2_sec_event.h" #include "dpaa2_sec_logs.h" /* Required types */ @@ -2853,6 +2853,92 @@ void dpaa2_sec_stats_reset(struct rte_cryptodev *dev) } } +static void __attribute__((hot)) +dpaa2_sec_process_parallel_event(struct qbman_swp *swp, + const struct qbman_fd *fd, + const struct qbman_result *dq, + struct dpaa2_queue *rxq, + struct rte_event *ev) +{ + /* Prefetching mbuf */ + rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- + rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size)); + + /* Prefetching ipsec crypto_op stored in priv data of mbuf */ + rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)-64)); + + ev->flow_id = rxq->ev.flow_id; + ev->sub_event_type = rxq->ev.sub_event_type; + ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; + ev->op = RTE_EVENT_OP_NEW; + ev->sched_type = rxq->ev.sched_type; + ev->queue_id = rxq->ev.queue_id; + ev->priority = rxq->ev.priority; + ev->event_ptr = sec_fd_to_mbuf(fd, ((struct rte_cryptodev *) + (rxq->dev))->driver_id); + + qbman_swp_dqrr_consume(swp, dq); +} + +int +dpaa2_sec_eventq_attach(const struct rte_cryptodev *dev, + int qp_id, + uint16_t dpcon_id, + const struct rte_event *event) +{ + struct dpaa2_sec_dev_private *priv = dev->data->dev_private; + struct fsl_mc_io *dpseci = (struct fsl_mc_io *)priv->hw; + struct dpaa2_sec_qp *qp = dev->data->queue_pairs[qp_id]; + struct dpseci_rx_queue_cfg cfg; + int ret; + + if (event->sched_type == RTE_SCHED_TYPE_PARALLEL) + qp->rx_vq.cb = dpaa2_sec_process_parallel_event; + else + return -EINVAL; + + memset(&cfg, 0, sizeof(struct dpseci_rx_queue_cfg)); + cfg.options = DPSECI_QUEUE_OPT_DEST; + cfg.dest_cfg.dest_type = DPSECI_DEST_DPCON; + cfg.dest_cfg.dest_id = dpcon_id; + cfg.dest_cfg.priority = event->priority; + + cfg.options |= DPSECI_QUEUE_OPT_USER_CTX; + cfg.user_ctx = (size_t)(qp); + + ret = dpseci_set_rx_queue(dpseci, CMD_PRI_LOW, priv->token, + qp_id, &cfg); + if (ret) { + RTE_LOG(ERR, PMD, "Error in dpseci_set_queue: ret: %d\n", ret); + return ret; + } + + memcpy(&qp->rx_vq.ev, event, sizeof(struct rte_event)); + + return 0; +} + +int +dpaa2_sec_eventq_detach(const struct rte_cryptodev *dev, + int qp_id) +{ + struct dpaa2_sec_dev_private *priv = dev->data->dev_private; + struct fsl_mc_io *dpseci = (struct fsl_mc_io *)priv->hw; + struct dpseci_rx_queue_cfg cfg; + int ret; + + memset(&cfg, 0, sizeof(struct dpseci_rx_queue_cfg)); + cfg.options = DPSECI_QUEUE_OPT_DEST; + cfg.dest_cfg.dest_type = DPSECI_DEST_NONE; + + ret = dpseci_set_rx_queue(dpseci, CMD_PRI_LOW, priv->token, + qp_id, &cfg); + if (ret) + RTE_LOG(ERR, PMD, "Error in dpseci_set_queue: ret: %d\n", ret); + + return ret; +} + static struct rte_cryptodev_ops crypto_ops = { .dev_configure = dpaa2_sec_dev_configure, .dev_start = dpaa2_sec_dev_start, diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_event.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_event.h new file mode 100644 index 000000000..977099429 --- /dev/null +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_event.h @@ -0,0 +1,18 @@ +/* SPDX-License-Identifier: BSD-3-Clause + * Copyright 2018 NXP + * + */ + +#ifndef _DPAA2_SEC_EVENT_H_ +#define _DPAA2_SEC_EVENT_H_ + +int +dpaa2_sec_eventq_attach(const struct rte_cryptodev *dev, + int qp_id, + uint16_t dpcon_id, + const struct rte_event *event); + +int dpaa2_sec_eventq_detach(const struct rte_cryptodev *dev, + int qp_id); + +#endif /* _DPAA2_SEC_EVENT_H_ */ diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h index d015be1e9..bce9633c0 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h @@ -8,6 +8,8 @@ #ifndef _RTE_DPAA2_SEC_PMD_PRIVATE_H_ #define _RTE_DPAA2_SEC_PMD_PRIVATE_H_ +#include + #define CRYPTODEV_NAME_DPAA2_SEC_PMD crypto_dpaa2_sec /**< NXP DPAA2 - SEC PMD device name */ diff --git a/drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map b/drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map index 8591cc0b1..0bfb986d0 100644 --- a/drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map +++ b/drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map @@ -2,3 +2,11 @@ DPDK_17.05 { local: *; }; + +DPDK_18.11 { + global: + + dpaa2_sec_eventq_attach; + dpaa2_sec_eventq_detach; + +} DPDK_17.05; From patchwork Fri Sep 14 11:48:09 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 44719 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B55AB5F19; Fri, 14 Sep 2018 13:52:10 +0200 (CEST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70079.outbound.protection.outlook.com [40.107.7.79]) by dpdk.org (Postfix) with ESMTP id 94BB75F16 for ; Fri, 14 Sep 2018 13:52:09 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gaJQiPIIKpVMXs5hSjoJF7CEnPCMmAvNcL3Z/8tdigg=; b=h8FRcps3/ldu8sBuu5FwI03CTDwN0RjTRnq7rLsVQPlAV9b1VFYAIa134qIOkfCVHlTl8/KhmcDDmNiMM/PYfcusJU6mcID3b1bNzzWNG7ZCBdpUcOz6/y1y/H3XBfusFqYlRZ62d0hrpgFZhdqHjZv3qZsb+zUGxFZFviQLZGY= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; Received: from GDB1.ap.freescale.net (14.143.30.134) by VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1122.18; Fri, 14 Sep 2018 11:52:05 +0000 From: akhil.goyal@nxp.com To: dev@dpdk.org Cc: hemant.agrawal@nxp.com, pablo.de.lara.guarch@intel.com, Ashish Jain Date: Fri, 14 Sep 2018 17:18:09 +0530 Message-Id: <20180914114810.14960-3-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180914114810.14960-1-akhil.goyal@nxp.com> References: <20180914114810.14960-1-akhil.goyal@nxp.com> MIME-Version: 1.0 X-Originating-IP: [14.143.30.134] X-ClientProxiedBy: TY2PR06CA0045.apcprd06.prod.outlook.com (2603:1096:404:2e::33) To VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f4aac3d8-0d99-4996-dbd4-08d61a387fa5 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:VI1PR04MB4893; X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 3:vhnWpuPDw+dH+cQ29tTh+uUrAiZ2mnl5FPdINGMszbMFggLqffJaL3apQc2nr/V4A1k7Z7e1wbA1LLdJ9OFZfsvmCQUVbnWDThpdwiAbpAGeStPiTqmQ5qEO55luHVNdV2UM6FbPNER/jmdbjgrL51P+xcb67MCuIGPtTOSG+TA84X4RuDhM8HapFUw6Cy8Re15ydoAtm2e9vOzB6oSd4E+Sdk/H6Jb4N3OdkP523ohIESlMCuGq/96vWCCmS661; 25:+xWWWuPsRUgcZuqzmem6KEaMfYESN8s422n2Dtu2KFCtR8R8B4lMUN07fO4Ng6NtOXZ0CF3w28LCyuW23pk/BafdYqviWj+ctnqpOFLS/CSjEMWOV6j+NLtdxnICBf6v6SazIxNZR5RwmBnYAqH9ZXN0Fe2LW0gYiQbCFhJn4yOtz9WK8UQCA+vFYBNG63MvBTt7Jwh5JEOYVHykxhG4Y92MzCW74YWEL7U++5oGDZHJCYku7fFzBmVA61990W3ULyLLyr61samCROyhSaWSfNi7NRH4sW1D7nMQYjEnJo0qWP/jkc5zPJYfdZzR/xQsYTtrHaZL55XIcBZJFq0lQA==; 31:x4Fot+CqwgrGd+pYhkuKFxhR4V1p7XDDAvGUSbzCJBuwgwHJoF+aVjJXVnbb2aHpTrw9hiRTN8ASaHi4/AF012keuXI6kWkpB+yiIwZ+qKuGLOYjWn/2D0db1niVrYjP9qVgFbTmJ+yU44a3d+kbsqE4F4G7aHcFzzDwFbidxQxGNvIf24KzjjfQCwTU9tNvyHT+WE0slaj05KpNLtZ2OkwE5i9yJO8bBlfTWi0WjbY= X-MS-TrafficTypeDiagnostic: VI1PR04MB4893: X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 20: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; 4:ESylMMEiMfO+a9vHFcBAQ2RfovUpZcQNKs82AerprFgQUHFObPDGzr13i/LlioXxKfpz9szrSUtDAQM5AYM7Y4MCJHDJMauCYvYnmcPPSe/C/fjHSnAa+PIc23XeQmZj+f/k2eA5oZ2DR8F7ceFlsGU09bql9CycEwttoF8c7aqwZxi6av1Qcm2sJa9rsRn+32QjF3vkGiJ411+sf8D+znydyiL59U2w6XjHI9gMfKTFUNg9JlhjMmloD1wAJ3FNLgETbeWzzxF7KBFfs4OrDcTlc8LXAkrZNu7uIsGI1zVUqoMP6nHGTB3XW5Zw58Cm X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(823301075)(3002001)(10201501046)(93006095)(93001095)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123560045)(201708071742011)(7699050); SRVR:VI1PR04MB4893; BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB4893; X-Forefront-PRVS: 07954CC105 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(396003)(136003)(346002)(366004)(39860400002)(199004)(189003)(86362001)(7736002)(105586002)(25786009)(6486002)(1076002)(5660300001)(6116002)(3846002)(47776003)(5024004)(53936002)(66066001)(2351001)(2361001)(106356001)(305945005)(14444005)(50466002)(36756003)(6916009)(2906002)(6512007)(9686003)(4326008)(85782001)(48376002)(316002)(16586007)(186003)(16526019)(8936002)(486006)(81166006)(8676002)(50226002)(81156014)(5009440100003)(478600001)(68736007)(476003)(2616005)(51416003)(52116002)(11346002)(446003)(76176011)(26005)(956004)(386003)(33896004)(97736004)(6506007)(110426005)(85772001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB4893; H:GDB1.ap.freescale.net; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; VI1PR04MB4893; 23:CNevC9e1t7NhupT1rwzPdEZM+tbTIwc/pH9s/3uDw?= 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 X-Microsoft-Antispam-Message-Info: jw2vk7kEmJJ8MYFPNyYs9Y08csCsOxQoVhhuDKTzwzuv+doMwwpqeYre2V+2hIELOL6T116sWtefEtnpg7NLLwot+98r6aZ/Y6d4OZAXQMD5FhwjKJz0Ef13rc1ClTO9yORWFrb1LHa14At1bpWzSPItJd5o1M59nvBk7OAZu2N3cIChgZdkOWYALsWZLfRyO6Tu0Q1xtfnIjrEwoa7owFKaBpCoxDoif690ZgEJL4Og/9+5UdJAloQiGagk7dUGzGQZOgv+THzqxhRGta4CoZWPilD15KZSIbZSz8wjxSOlXHUczXYZqHvjdR03qVRag2oWkWEkqJ6mM+LvJO2Y61d0kIrlKnpBtxm9mAEnK0w= X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 6:nvCNnFiA/7MOaahymWVc63Bv3xjR2j5YCK8VAUzHLLj6z6lf3i9PPGNYi9iODmroBB7eQEl3FyzrjwX6n56UrB/6yrII6whzxUH42SPVJKdHgiWEa1S3YqKxUXM3Ozfr/HyUfUBy9IassC2peO9Duv+C9xK2iaBcG3lRCro0YGpanm0toptYNxvEV4BwMKgdqtlC/z13JXif03zNA1TiqEopK+WErnkwG2klKqAt2op2VnAYfM6aFZwt98Zs3e7or6qEVa+Gj7P7deedotL1wVXQ7HZAKTQuG+1vVYD8hFb0Z+fa7/rRfUM1/TnX14/7netDzfvK1GpbT1LW+gtknNSTXk6Q9ipcm27mpjF2FiKmC+/ObXDbN+fBkwRkEdJ2JiKGATt3K8DqNCEdb0NkUviL3oEOcbRk216VY/SF1HmtAzQ9yJDB/8Z5Vc6cGIyDh0Qu4ZmJIi38aIPx6A/GxA==; 5:gP+c0OQSHXKKiHw8l0tZ9h6E24sEbJTEAPdWLChoO1mjnPkmi3N7eR6kzaDiJ5Uhq0Xh+GKrNHyzwzCINJYEcPjo6pbDtrSARFEC4F+8yNoewe1qkZW4rlViJs3B0YThJFAs6saotCF3Ft2T6meCana0ezxwMnYFOQuomfhEujU=; 7:vPEUuW3bx0hRjuteXXHhbcJ9oCZMu+lZPQBV0ypBAftjj/yIQI80MlmQi0VeKYnYhIKbHKqNXRYNlT9jBtjg5juQMFMU3PJnMKOmIKPgfCy1aNYAyCUfGN7sqOobN1dg9hnQO0+GqEMJKNdD6urYv4UUfkIRRyqxXzkZjd5ivx8kYr+etVCjiTrciwN8XfV+yWUHkgxRhRbhQcJkkmgDdNhLOBnOEv1YVJ6bXi02VQImCTSjx0Z+J7+DKSW58L1Z SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Sep 2018 11:52:05.7976 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f4aac3d8-0d99-4996-dbd4-08d61a387fa5 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4893 Subject: [dpdk-dev] [PATCH 2/3] crypto/dpaa2_sec: support for atomic queues X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Ashish Jain Signed-off-by: Ashish Jain --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 57 +++++++++++++++++++-- 1 file changed, 52 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index ae38f507b..781595b38 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -1209,6 +1209,7 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, struct dpaa2_sec_qp *dpaa2_qp = (struct dpaa2_sec_qp *)qp; struct qbman_swp *swp; uint16_t num_tx = 0; + uint32_t flags[MAX_TX_RING_SLOTS] = {0}; /*todo - need to support multiple buffer pools */ uint16_t bpid; struct rte_mempool *mb_pool; @@ -1240,6 +1241,15 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, dpaa2_eqcr_size : nb_ops; for (loop = 0; loop < frames_to_send; loop++) { + if ((*ops)->sym->m_src->seqn) { + uint8_t dqrr_index = (*ops)->sym->m_src->seqn - 1; + + flags[loop] = QBMAN_ENQUEUE_FLAG_DCA | dqrr_index; + DPAA2_PER_LCORE_DQRR_SIZE--; + DPAA2_PER_LCORE_DQRR_HELD &= ~(1 << dqrr_index); + (*ops)->sym->m_src->seqn = DPAA2_INVALID_MBUF_SEQN; + } + /*Clear the unused FD fields before sending*/ memset(&fd_arr[loop], 0, sizeof(struct qbman_fd)); mb_pool = (*ops)->sym->m_src->pool; @@ -1256,7 +1266,7 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, while (loop < frames_to_send) { loop += qbman_swp_enqueue_multiple(swp, &eqdesc, &fd_arr[loop], - NULL, + &flags[loop], frames_to_send - loop); } @@ -1281,6 +1291,9 @@ sec_simple_fd_to_mbuf(const struct qbman_fd *fd, __rte_unused uint8_t id) DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)), rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size); + diff = len - mbuf->pkt_len; + mbuf->pkt_len += diff; + mbuf->data_len += diff; op = (struct rte_crypto_op *)(size_t)mbuf->buf_iova; mbuf->buf_iova = op->sym->aead.digest.phys_addr; op->sym->aead.digest.phys_addr = 0L; @@ -1291,9 +1304,6 @@ sec_simple_fd_to_mbuf(const struct qbman_fd *fd, __rte_unused uint8_t id) mbuf->data_off += SEC_FLC_DHR_OUTBOUND; else mbuf->data_off += SEC_FLC_DHR_INBOUND; - diff = len - mbuf->pkt_len; - mbuf->pkt_len += diff; - mbuf->data_len += diff; return op; } @@ -2879,6 +2889,38 @@ dpaa2_sec_process_parallel_event(struct qbman_swp *swp, qbman_swp_dqrr_consume(swp, dq); } +static void +dpaa2_sec_process_atomic_event(struct qbman_swp *swp __attribute__((unused)), + const struct qbman_fd *fd, + const struct qbman_result *dq, + struct dpaa2_queue *rxq, + struct rte_event *ev) +{ + uint8_t dqrr_index; + struct rte_crypto_op *crypto_op = (struct rte_crypto_op *)ev->event_ptr; + /* Prefetching mbuf */ + rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- + rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size)); + + /* Prefetching ipsec crypto_op stored in priv data of mbuf */ + rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)-64)); + + ev->flow_id = rxq->ev.flow_id; + ev->sub_event_type = rxq->ev.sub_event_type; + ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; + ev->op = RTE_EVENT_OP_NEW; + ev->sched_type = rxq->ev.sched_type; + ev->queue_id = rxq->ev.queue_id; + ev->priority = rxq->ev.priority; + + ev->event_ptr = sec_fd_to_mbuf(fd, ((struct rte_cryptodev *) + (rxq->dev))->driver_id); + dqrr_index = qbman_get_dqrr_idx(dq); + crypto_op->sym->m_src->seqn = dqrr_index + 1; + DPAA2_PER_LCORE_DQRR_SIZE++; + DPAA2_PER_LCORE_DQRR_HELD |= 1 << dqrr_index; + DPAA2_PER_LCORE_DQRR_MBUF(dqrr_index) = crypto_op->sym->m_src; +} int dpaa2_sec_eventq_attach(const struct rte_cryptodev *dev, @@ -2894,6 +2936,8 @@ dpaa2_sec_eventq_attach(const struct rte_cryptodev *dev, if (event->sched_type == RTE_SCHED_TYPE_PARALLEL) qp->rx_vq.cb = dpaa2_sec_process_parallel_event; + else if (event->sched_type == RTE_SCHED_TYPE_ATOMIC) + qp->rx_vq.cb = dpaa2_sec_process_atomic_event; else return -EINVAL; @@ -2905,7 +2949,10 @@ dpaa2_sec_eventq_attach(const struct rte_cryptodev *dev, cfg.options |= DPSECI_QUEUE_OPT_USER_CTX; cfg.user_ctx = (size_t)(qp); - + if (event->sched_type == RTE_SCHED_TYPE_ATOMIC) { + cfg.options |= DPSECI_QUEUE_OPT_ORDER_PRESERVATION; + cfg.order_preservation_en = 1; + } ret = dpseci_set_rx_queue(dpseci, CMD_PRI_LOW, priv->token, qp_id, &cfg); if (ret) { From patchwork Fri Sep 14 11:48:10 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 44720 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 0B4745F21; Fri, 14 Sep 2018 13:52:15 +0200 (CEST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70045.outbound.protection.outlook.com [40.107.7.45]) by dpdk.org (Postfix) with ESMTP id 4BAB25F20 for ; Fri, 14 Sep 2018 13:52:12 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LBGRfkXkLu4AJJ6QqcMlA/vnmtGHwL/cz/Hu7nJt2cQ=; b=lRK6XB+aC4PdHrA2phTM3nIREAbZSIU6a+QqjlFoKqNWeCViBqQnaRRcMNdo6pEMz3xoND9F44cSJ0gyYCORsuaGAfmTRPhzaxkNlr8CryKJUPaPAemg7wSoS5NKpQ5pFW5ZgbWKB8pJtU0OP4xmUwg4jJHJTPiauyxOxS1OQnM= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; Received: from GDB1.ap.freescale.net (14.143.30.134) by VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1122.18; Fri, 14 Sep 2018 11:52:08 +0000 From: akhil.goyal@nxp.com To: dev@dpdk.org Cc: hemant.agrawal@nxp.com, pablo.de.lara.guarch@intel.com, Akhil Goyal Date: Fri, 14 Sep 2018 17:18:10 +0530 Message-Id: <20180914114810.14960-4-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180914114810.14960-1-akhil.goyal@nxp.com> References: <20180914114810.14960-1-akhil.goyal@nxp.com> MIME-Version: 1.0 X-Originating-IP: [14.143.30.134] X-ClientProxiedBy: TY2PR06CA0045.apcprd06.prod.outlook.com (2603:1096:404:2e::33) To VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 45a0f395-4c0d-461a-8c0d-08d61a38817b X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:VI1PR04MB4893; X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 3:flYSC6lyj1v06/yi4pKRSNy9l8HryHKFdANv/yog/Oi0nxKcBCASI9Yua+u85hhyjci8gk91uHP7VzO9Z/Cz86JN/8riPpgiO+jzWiY8p5cO6ZIlndl07pqlYJ/llOw8VtXXSA6lxhKDQV7Nn6o39pDYapRuf1x15HI30CyjoD8z37JHWn0YFro8CxBQf+onePJgbQFEExbQrKZK7CUaV6+jvAquI5sMLz3hdHIscst6EzlpMkFiUkrBGBpB6g/5; 25:O/GKywAJcZq+QCBqFpqS2lLibxQT8rCjcsrqGmr3m+8uH6gmYlmrbeH9gvkbQuvyTQdGKYe7CubTpjJgZ8e9vAy095lDW6ceSoF3hzNKPgpBUQxJx9vBI0tJ+ohvMN6NfRSjfuT3uekS0aWLwkjj4z2ISe44XcSZYsV4/zabIw82ymR5cbURBbQfhn9ABtRgnDVKGppoySYywB4dBWKuWG/wxhQDanfgD2Ob75S4d8fNvXglt3yDMKf4yiZ1Jt1eWso8hyhJth8AhX1LaxXQ8vBqW5yhMQjK956XhMJtb1Js5xASjRdYDfQpeXKp6LjoeYMGJBW5CDmBzYQlyyaUXw==; 31:k3/VNLWWF/v41X1b4ckhbLDR8DsDW6lgwrYSgZQRjU742vWGXwVNiiLGYliI+9ohqDoGieMocRcm1HJfJDB2esx1xeTx0fZSDPccqKYMWSy1ELjcnl/9K74vSZtQSks0JD5Mf3zDXbOJiO4SZ0MZKrkQylZtCF7Mtj0cy9pt/sf3+6jY0HB2IucYk95Z485EvkQazEx9A+8XFPKcuiQU7zBFCMPD+9bZyc2lsw1znVE= X-MS-TrafficTypeDiagnostic: VI1PR04MB4893: X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 20: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; 4:kvooCBv4ysZK30lhG/EwbDSiVi5bJ7AXhN4Z89iQblgrHCL/jl/UqIb3ROJjWvxlgmqF1QncSKZXIBwHh2DKf+cNA5zuKkJxSwZmjIaNbcLIySHI/E+Wvmk6QUqmDu50aD6mvIUiR407CUOoJA/er+Qnw/6yiZ/LlmWh9SjJ6Ms6DpcMpJhyzOCJajKbl0lxSGzEs+Z6TZhgMhGruRWxbDZE0/bZs4FT18d3XPzX6M/NYHlda7V2ys8BE73utSp6m+Gm5JCvCEGBaENHhAri1l4kna3u5t5OqRuIm/XFcJAAVnUARo6RZmyx7dGKJ+8BsJaT/+eCdpjDh0bnNhGvlIn20+gGqlnpCwk+O1b1HAk= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197)(275809806118684); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(823301075)(3002001)(10201501046)(93006095)(93001095)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123560045)(201708071742011)(7699050); SRVR:VI1PR04MB4893; BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB4893; X-Forefront-PRVS: 07954CC105 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(396003)(136003)(346002)(366004)(39860400002)(199004)(189003)(86362001)(575784001)(6666003)(7736002)(105586002)(25786009)(6486002)(1076002)(5660300001)(6116002)(3846002)(47776003)(5024004)(53936002)(66066001)(2351001)(2361001)(106356001)(305945005)(50466002)(36756003)(6916009)(2906002)(6512007)(9686003)(4326008)(85782001)(48376002)(316002)(16586007)(186003)(16526019)(8936002)(486006)(81166006)(8676002)(50226002)(81156014)(5009440100003)(478600001)(68736007)(476003)(2616005)(51416003)(52116002)(11346002)(446003)(76176011)(26005)(956004)(386003)(33896004)(97736004)(6506007)(110426005)(85772001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB4893; H:GDB1.ap.freescale.net; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; VI1PR04MB4893; 23:SUl8ZyoemjtfGKBgl2gKaNXJRfwq1L9m6GalCAzTe?= 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 X-Microsoft-Antispam-Message-Info: pfSFyJNVD/4cNAezWg3HNKu2gZ8MIgcZzYabIqwAURSbCnCm5V9mwBKCtcAEZcaa40abg2SvCdvg99ZLWdQSe7Pru2vlBdog7wqcXSTp8ecBN6OJBtMVN8PmPYHlEy3fmaqSYacNnBOIDWPQwejmOrNC0C1Fr7rCh15YJF1RRsYHUlj9tv8MSKR8rKArNlGIlU0wGJXNN5+sfl65ggCoZrIrrZoz1fg0kmkjAmHutAgoJV3TOmk7VY3j3Klf7ddUhjJK7i/6ziCkrkBW41/PuVHfWUZRQdBOygCLJ2dA0qBWWvsdPlQHKAnuw71Xgoq/XzyGEHXule+96pZkeMd+Wgu3mSLn8hLpHO48gLip9vM= X-Microsoft-Exchange-Diagnostics: 1; VI1PR04MB4893; 6:/RzyXt5h0nz+L2NwDSgVXLQ4iGtCh6eRQ6PQEFrl4cIqW0oTh2T5zZ7aTtPzqi1v1LFSB2Pcmx9B+Us9zquVeD5qMZqQ/j+SV55PUrJxeW3bTbuHm9iD3TEDVJ20Bt7acQhYyK7GJCxLV8qn/PiRKcUydsYQp/IEsXRwnALU4DClVcVms5KccoTSrzAmR6ZA+t3lJVP97tteJSfuwzucKBrme9oYeib1vaHixxl/KPXzj8xSZLTfkx8/dbEiFIfR7Il0qZL0zlWtlWU8K6laC0/cQXNlCPNMDE3Y08vVt3XFCXzhtEZe5rjqpXL7BUY9TmsAnozdadvbDiyG7oiWXhVd+wpR/JzBwe4k8yxgkhPww+MFwDsS5VoUsnyOrYqbCTe/5cAYNdeRxWjCwYFbMT1XsIqKmm9WE0SHEFk78MCyiV/cbWHOncK6XEbo0Qky1qL3xK5S6wikqs59OP9n4g==; 5:dWBn/xsK+DwPDQU8VbRGzI0uv4lmi74deuFuw1T0h0333C464GwDHb3/7gFFYld5ZadyUK98R3qSbb2D4RJlH4fbUVhtM2j5MeKfvFPr+GBU0DymB32jK/tkbSBdUjxRjRmuSk4030EO1+qC/q8XZApeNY+Bh5wUNkx0TNsUbBM=; 7:SNrHdp7UVZrHsYCLMWr7sVxcg8JPXMsNdEjJ9Nb5Q5fbq6o0yZHw9RNBnMmh9PD/G0gNF7/PSqDPQrxG3F36ce3vC+ZTBuaSCi+8bLu/Z/IiDiIIjISu2sNM1Wz/xKt9newfy1+GDCw/DSmMlY8wTjj9xyGk2lCABQtCukHKf9RUoPpv6nooLcIkRoUwadyXNWM863qz8nKIyILRg21bYq4ysP4qzjzQNhnopo0Kh3N8LJvFEIxtJUoDJz+9fZNj SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Sep 2018 11:52:08.8914 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 45a0f395-4c0d-461a-8c0d-08d61a38817b X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4893 Subject: [dpdk-dev] [PATCH 3/3] event/dpaa2: support for crypto adapter X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Akhil Goyal Signed-off-by: Akhil Goyal Signed-off-by: Ashish Jain Signed-off-by: Hemant Agrawal Acked-By: Abhinandan Gujjar --- drivers/event/dpaa2/Makefile | 3 +- drivers/event/dpaa2/dpaa2_eventdev.c | 150 +++++++++++++++++++++++++++ drivers/event/dpaa2/dpaa2_eventdev.h | 9 ++ drivers/event/dpaa2/meson.build | 3 +- 4 files changed, 163 insertions(+), 2 deletions(-) diff --git a/drivers/event/dpaa2/Makefile b/drivers/event/dpaa2/Makefile index 5e1a63200..46f7d061e 100644 --- a/drivers/event/dpaa2/Makefile +++ b/drivers/event/dpaa2/Makefile @@ -20,9 +20,10 @@ CFLAGS += -I$(RTE_SDK)/drivers/event/dpaa2 CFLAGS += -I$(RTE_SDK)/lib/librte_eal/linuxapp/eal LDLIBS += -lrte_eal -lrte_eventdev LDLIBS += -lrte_bus_fslmc -lrte_mempool_dpaa2 -lrte_pmd_dpaa2 -LDLIBS += -lrte_bus_vdev +LDLIBS += -lrte_bus_vdev -lrte_pmd_dpaa2_sec CFLAGS += -I$(RTE_SDK)/drivers/net/dpaa2 CFLAGS += -I$(RTE_SDK)/drivers/net/dpaa2/mc +CFLAGS += -I$(RTE_SDK)/drivers/crypto/dpaa2_sec # versioning export map EXPORT_MAP := rte_pmd_dpaa2_event_version.map diff --git a/drivers/event/dpaa2/dpaa2_eventdev.c b/drivers/event/dpaa2/dpaa2_eventdev.c index cadbdb13b..890ab461c 100644 --- a/drivers/event/dpaa2/dpaa2_eventdev.c +++ b/drivers/event/dpaa2/dpaa2_eventdev.c @@ -27,6 +27,7 @@ #include #include #include +#include #include #include @@ -34,6 +35,7 @@ #include #include #include +#include #include "dpaa2_eventdev.h" #include "dpaa2_eventdev_logs.h" #include @@ -793,6 +795,149 @@ dpaa2_eventdev_eth_stop(const struct rte_eventdev *dev, return 0; } +static int +dpaa2_eventdev_crypto_caps_get(const struct rte_eventdev *dev, + const struct rte_cryptodev *cdev, + uint32_t *caps) +{ + const char *name = cdev->data->name; + + EVENTDEV_INIT_FUNC_TRACE(); + + RTE_SET_USED(dev); + + if (!strncmp(name, "dpsec-", 6)) + *caps = RTE_EVENT_CRYPTO_ADAPTER_DPAA2_CAP; + else + return -1; + + return 0; +} + +static int +dpaa2_eventdev_crypto_queue_add_all(const struct rte_eventdev *dev, + const struct rte_cryptodev *cryptodev, + const struct rte_event *ev) +{ + struct dpaa2_eventdev *priv = dev->data->dev_private; + uint8_t ev_qid = ev->queue_id; + uint16_t dpcon_id = priv->evq_info[ev_qid].dpcon->dpcon_id; + int i, ret; + + EVENTDEV_INIT_FUNC_TRACE(); + + for (i = 0; i < cryptodev->data->nb_queue_pairs; i++) { + ret = dpaa2_sec_eventq_attach(cryptodev, i, + dpcon_id, ev); + if (ret) { + DPAA2_EVENTDEV_ERR("dpaa2_sec_eventq_attach failed: ret %d\n", + ret); + goto fail; + } + } + return 0; +fail: + for (i = (i - 1); i >= 0 ; i--) + dpaa2_sec_eventq_detach(cryptodev, i); + + return ret; +} + +static int +dpaa2_eventdev_crypto_queue_add(const struct rte_eventdev *dev, + const struct rte_cryptodev *cryptodev, + int32_t rx_queue_id, + const struct rte_event *ev) +{ + struct dpaa2_eventdev *priv = dev->data->dev_private; + uint8_t ev_qid = ev->queue_id; + uint16_t dpcon_id = priv->evq_info[ev_qid].dpcon->dpcon_id; + int ret; + + EVENTDEV_INIT_FUNC_TRACE(); + + if (rx_queue_id == -1) + return dpaa2_eventdev_crypto_queue_add_all(dev, + cryptodev, ev); + + ret = dpaa2_sec_eventq_attach(cryptodev, rx_queue_id, + dpcon_id, ev); + if (ret) { + DPAA2_EVENTDEV_ERR( + "dpaa2_sec_eventq_attach failed: ret: %d\n", ret); + return ret; + } + return 0; +} + +static int +dpaa2_eventdev_crypto_queue_del_all(const struct rte_eventdev *dev, + const struct rte_cryptodev *cdev) +{ + int i, ret; + + EVENTDEV_INIT_FUNC_TRACE(); + + RTE_SET_USED(dev); + + for (i = 0; i < cdev->data->nb_queue_pairs; i++) { + ret = dpaa2_sec_eventq_detach(cdev, i); + if (ret) { + DPAA2_EVENTDEV_ERR( + "dpaa2_sec_eventq_detach failed:ret %d\n", ret); + return ret; + } + } + + return 0; +} + +static int +dpaa2_eventdev_crypto_queue_del(const struct rte_eventdev *dev, + const struct rte_cryptodev *cryptodev, + int32_t rx_queue_id) +{ + int ret; + + EVENTDEV_INIT_FUNC_TRACE(); + + if (rx_queue_id == -1) + return dpaa2_eventdev_crypto_queue_del_all(dev, cryptodev); + + ret = dpaa2_sec_eventq_detach(cryptodev, rx_queue_id); + if (ret) { + DPAA2_EVENTDEV_ERR( + "dpaa2_sec_eventq_detach failed: ret: %d\n", ret); + return ret; + } + + return 0; +} + +static int +dpaa2_eventdev_crypto_start(const struct rte_eventdev *dev, + const struct rte_cryptodev *cryptodev) +{ + EVENTDEV_INIT_FUNC_TRACE(); + + RTE_SET_USED(dev); + RTE_SET_USED(cryptodev); + + return 0; +} + +static int +dpaa2_eventdev_crypto_stop(const struct rte_eventdev *dev, + const struct rte_cryptodev *cryptodev) +{ + EVENTDEV_INIT_FUNC_TRACE(); + + RTE_SET_USED(dev); + RTE_SET_USED(cryptodev); + + return 0; +} + static struct rte_eventdev_ops dpaa2_eventdev_ops = { .dev_infos_get = dpaa2_eventdev_info_get, .dev_configure = dpaa2_eventdev_configure, @@ -814,6 +959,11 @@ static struct rte_eventdev_ops dpaa2_eventdev_ops = { .eth_rx_adapter_queue_del = dpaa2_eventdev_eth_queue_del, .eth_rx_adapter_start = dpaa2_eventdev_eth_start, .eth_rx_adapter_stop = dpaa2_eventdev_eth_stop, + .crypto_adapter_caps_get = dpaa2_eventdev_crypto_caps_get, + .crypto_adapter_queue_pair_add = dpaa2_eventdev_crypto_queue_add, + .crypto_adapter_queue_pair_del = dpaa2_eventdev_crypto_queue_del, + .crypto_adapter_start = dpaa2_eventdev_crypto_start, + .crypto_adapter_stop = dpaa2_eventdev_crypto_stop, }; static int diff --git a/drivers/event/dpaa2/dpaa2_eventdev.h b/drivers/event/dpaa2/dpaa2_eventdev.h index 720e0c63b..c847b3eab 100644 --- a/drivers/event/dpaa2/dpaa2_eventdev.h +++ b/drivers/event/dpaa2/dpaa2_eventdev.h @@ -42,6 +42,15 @@ enum { (RTE_EVENT_ETH_RX_ADAPTER_CAP_INTERNAL_PORT | \ RTE_EVENT_ETH_RX_ADAPTER_CAP_MULTI_EVENTQ | \ RTE_EVENT_ETH_RX_ADAPTER_CAP_OVERRIDE_FLOW_ID) + +/**< Crypto Rx adapter cap to return If the packet transfers from + * the cryptodev to eventdev with DPAA2 devices. + */ +#define RTE_EVENT_CRYPTO_ADAPTER_DPAA2_CAP \ + (RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW | \ + RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_QP_EV_BIND | \ + RTE_EVENT_CRYPTO_ADAPTER_CAP_SESSION_PRIVATE_DATA) + /**< Ethernet Rx adapter cap to return If the packet transfers from * the ethdev to eventdev with DPAA2 devices. */ diff --git a/drivers/event/dpaa2/meson.build b/drivers/event/dpaa2/meson.build index de7a46155..c1bd63384 100644 --- a/drivers/event/dpaa2/meson.build +++ b/drivers/event/dpaa2/meson.build @@ -4,8 +4,9 @@ if host_machine.system() != 'linux' build = false endif -deps += ['bus_vdev', 'pmd_dpaa2'] +deps += ['bus_vdev', 'pmd_dpaa2', 'pmd_dpaa2_sec'] sources = files('dpaa2_hw_dpcon.c', 'dpaa2_eventdev.c') allow_experimental_apis = true +includes += include_directories('../../crypto/dpaa2_sec/')