From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0088.outbound.protection.outlook.com [104.47.42.88]) by dpdk.org (Postfix) with ESMTP id 0255610D71 for ; Thu, 22 Dec 2016 15:51:16 +0100 (CET) Received: from CY1PR03CA0009.namprd03.prod.outlook.com (10.174.128.19) by DM5PR03MB2473.namprd03.prod.outlook.com (10.168.233.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.789.14; Thu, 22 Dec 2016 14:51:15 +0000 Received: from BY2FFO11FD012.protection.gbl (2a01:111:f400:7c0c::197) by CY1PR03CA0009.outlook.office365.com (2603:10b6:600::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.803.11 via Frontend Transport; Thu, 22 Dec 2016 14:51:15 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;nxp.com; dkim=none (message not signed) header.d=none; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BY2FFO11FD012.mail.protection.outlook.com (10.1.14.130) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.789.10 via Frontend Transport; Thu, 22 Dec 2016 14:51:11 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id uBMEp6TC013482; Thu, 22 Dec 2016 07:51:07 -0700 From: Akhil Goyal To: CC: , , , , , , Akhil Goyal Date: Fri, 23 Dec 2016 01:46:49 +0530 Message-ID: <20161222201700.20020-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20161205125540.6419-1-akhil.goyal@nxp.com> References: <20161205125540.6419-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131268918745605301; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(7916002)(39450400003)(39840400002)(39380400002)(39410400002)(39860400002)(39850400002)(39400400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(6916009)(6666003)(77096006)(2950100002)(69596002)(356003)(5660300001)(38730400001)(47776003)(85426001)(8936002)(68736007)(110136003)(8656002)(189998001)(36756003)(626004)(76176999)(5003940100001)(50226002)(81156014)(8676002)(305945005)(50986999)(81166006)(2906002)(4326007)(97736004)(1076002)(86362001)(48376002)(104016004)(92566002)(50466002)(33646002)(2351001)(15395725005)(105606002)(106466001)(7059030); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR03MB2473; H:az84smr01.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11FD012; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: a97cd977-9a66-4c16-4354-08d42a79fa56 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DM5PR03MB2473; X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2473; 3:k0a8Cwj79nZJpyCkW24rufKk7WG1On1g2Bod8chYuqP5bz3lBw10jDA6bsj6+hLIJ/ZNPlSJa8F9lZOP7cEuzG7FWKNb/4dQmRp9u/Ci25SjsSxecZeXYMMwSaMoV92wm8WwfJ+ijviNDQvm0vN8gibFrUmcoOHc1s5NpeJkrahdd41yFfynz5sairqJyVMR+sHgQKZUxAMbTxtPBtJK7TjXzrfozC/eikxRT17FVwCKjbsqcdjFuyRJFEYpNDMMSUJ5baJy0JyDwdWKTn5Q9SYFMdcgLkSa07GsJWUa0cGmCK7nBQ2gUWL8qvsDBZ41fbYlPgfvwGOSlY9XHHUEuKoN1kL8IhNTPnnXLqgjBzk=; 25:s3PQtjy6Mo4/qeI0V9MH8dDCCzDZK145fbTAsbElJWArDfaVZb5XIOY9/MyuNf+NwJYVk3Nh0V3CZ3a8QX28j08lW6MCaiE2UCUxbgMk/ZKnRM4DxFSgmIxTAT9K+FUHQC81CzuEJct/XgMMayI90PV8l59rHwAHnp+eE9VRREwCdUNL1JSZOeZTZWDHzbSIeU2JiIgzyF1xkyLoUDBmU4aGozNCDhW4S8VzNv4MQ4VDINVwDKUsm0V4BCtz+lv214LbBLx1S5Wh00+FDdNSa6w6OYm5naQF1lw+R0ZpHo0fkW8vZyHOOQAiXS1NkBhavY+jhlz7Bpxsese2ubRCocRgtFX6/6NscXOo2DPRZSqS1sAqoMLiLSyo9tePzXktR9aHwP2SQJlCdHKQJtyQ12IXmLBKHVcF5lugF8OB2Oo5Xn8fUMtSkk+yBhPsEseW1GlxOWUSe5gtwEQh+lsCDA== X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2473; 31:wQnTMp8a/VVAyAIoNdyKkVX9qWq5gA9ufPQ9D5mia4n1p1/Wt/bK3UJlSibtw8amodJky+uuDvhSTf5xfx0l6BzlVMHEVBYLcezGwgX1Dwhv/rg9HzBODerhZnLcCH2JBI6bkfV75WX2pU3cVd/9BafFD1lLmfGVUdagRxMtiHec6jk11fcm9rFyeve2z3BK0AJhKYSEzqNBGKkXgelBHHZzSA299L9oABfCgORu7C4HL84YwvA1sF0TM8IJRWqBSrsA/ngzYQffvK+kT/k7Pw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095060)(601004)(2401047)(13023025)(13024025)(13017025)(13018025)(5005006)(13015025)(8121501046)(10201501046)(3002001)(6055026)(6096035)(20161123561025)(20161123563025)(20161123565025)(20161123556025)(20161123559025); SRVR:DM5PR03MB2473; BCL:0; PCL:0; RULEID:(400006); SRVR:DM5PR03MB2473; X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2473; 4: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 X-Forefront-PRVS: 01644DCF4A X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM5PR03MB2473; 23:luVVh/CRYNTopjYvPuJkt/rrjfwlgM630G2QRND/Q?= =?us-ascii?Q?1do3W/+lN+Wpjn49E04KY+COX83/GNZ17VdGhSg0g6I7PDKqYFTsDzQHMYk/?= =?us-ascii?Q?HEKZo1zoM0PiFEm0v3IVopX/f27a18DGe6uzGr+qWEuHS24atKyUdK0Lgmvm?= =?us-ascii?Q?oqOmWYiZIRgrydCLTSJdSpD16eq+/xc5KEubHx90ND+Ctn5w+JkT0BmvPaE1?= =?us-ascii?Q?00FLOnWGbMvpTEnHI3drN3ACkzhqRfPqWSHu+/WoyTlhv3CaHb3EM3eGjRfy?= =?us-ascii?Q?BfEsFbkYyEUAgiZ90rxXMVqyqtmrc4nsU3MUwBaSVUDQFX2CjCKn9wAqBIxr?= =?us-ascii?Q?FUcArIxdRkN8bmOJEdrI6ydnL4FdaCP4okyy/6xK9TqWAyB9Jw4ZQY1lxCBU?= =?us-ascii?Q?vBT6h4jUo+VELSXgFvRMrk+nWJaJN/LIMi9dRMHVGHHdcWNX5ERQovpSnMfR?= =?us-ascii?Q?NjxII7w4UIC0yVzRo1qv1ap5dmt2uTh3wSsUaDcwgFLhkhyyrTmPHM+pBdCZ?= =?us-ascii?Q?GjXcuLvGKDF2uPFL40cOPUSZCvphR0Awwk1i5vm8xb9oLYytvzFS7a36+Xpv?= =?us-ascii?Q?taEbWjBW9Jx6aHnSe9wBgMGc0oFDiTI10i8szYDK8qTw9sbZNBngwhQOWgQI?= =?us-ascii?Q?P+0+lTKTTXeDcjZzY0h9Mw/ID4oAbToSHgb9q2tdgZ/ESqeMo31jrlMKQK4A?= =?us-ascii?Q?CVkDOI4BuwtYnwNI98mgR75Lf0fWou9j1/HfR4daMt/9hEwuZtzsplHSkAPS?= =?us-ascii?Q?La5my+5+dWe7DiZKlWA+lQ1gLHmHsxngN+Gn9aYgLnA2H4nxKRVY055iYk1h?= =?us-ascii?Q?zx7mwcP0WX7Tpm6un9a7ZCEoXdczk/NFHhGSyNLFHgbUM/I7c4W0q0NLFDNq?= =?us-ascii?Q?OWFB6lJmBXqI0DfnE6xsXPYh84XSPerszjHzvw/XCwjoz06a2lU9292Qlxg0?= =?us-ascii?Q?BSwTp15vrFYaQ0NMchkFZ0GGNwAdb2mTjaNUZCJOx1euZTPCTKA3wi0E0nRI?= =?us-ascii?Q?iOqsqSml6QL8sHsUDLlofMsJ1wlAxzsq7lD6lLevr9K8CJkTCbM8zFHcWcUQ?= =?us-ascii?Q?EBqt0lCmY54Hcipy/BXOXiXbmiwWQz6Nz3VoLJLJrUS+iHDBL3fqfht7XrOt?= =?us-ascii?Q?8CWrQnyz4mqts15HG44FNey9D9fIP2GYVQS0wDBvu8N34aSGaj5AaFaimOu/?= =?us-ascii?Q?PiWjX6H6xuQZ7zpKtopg0V1HHXmbnEU42VZRqbfOQ81po6THDKGIUOEgTMZb?= =?us-ascii?Q?VWlCkmuVoyjJFgcLsotU5OP0WNybsl/+UYwKMVZzW/IaVSSAmYWoYiMvHvRm?= =?us-ascii?Q?8qz+HQNA6pnC/EzVjwo9zh8ypAOArExl5tVVbr7A2ajNCHwyt4SCKtLg6kDd?= =?us-ascii?Q?wphnA=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2473; 6:qwVJzr9LaW4n7zxMVTlOCZCuXyJw+vf+iUBeKDsD5s8Z3L/I9GK7IaDsjzk5/KTPWc7/Fgl7ZkRW4LP/KhHW/dQ7/g9FpSCY0RhkkKCUDZZ/tY3Wzd1U8JDgZ0W8vxA/V3Y8OX0Myna4VcczVLoCdEQ72JvUed32/snZAnEDJhaMI2pMUGAxn+5aAAzilWw5LFGQ8pqmwbFN+Uds6erx82IpdYSNBEzYUW6lpBLYfcwIBXk+QsauRS/P56vtvymmtwUjfFwJBa6JVYh5tMeoSMdM4L0jNgoQ2roXlrBF+glszegLYmrWbzrG6eJjz3cP8e0mivveBPkpo4+WSEr0xTGqlabaZ2TIcMotYFvlKr89CDaIlIn69bY7YB3+5iHPow3eO1PutCbSRyUSa9hKkoVGg7pGzDxsyzGU9JYMVif9jNfLp3kTQ/Dia0P4Hdv1; 5:iYEnb5lTilcn6tbvjEQCnRxchDAeHmYULrbFiZ47YDz+TUmx1G8gcUXhLrwx1z40Q7LQeb3pZFqS5GSvHK3wWkYkJtSe68bhtwHdjpUNWgQlkFQE1VhJh4n6wlwf9c/0xarCy5HDIV8121mtUqabVoRuU40+s+GdNIuDNcFvk7OBBtzGnpUVTpfEY3u7XFR1; 24:N0NyyuyctRPlp0T9gbkqSta489OmVlgGoTbO0xLkdtcVlgKX78Mbp71VkTdMhn9jSvvSvnXiVqx/Lz6IBMzu1y3c3Sy//KAWUP8cOvSqXyo= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2473; 7:TxWh6GOoPXe4UggqYXizcQ47zAmHNeYEMg8iTWfebm5wijOlNcfkuidoXc+qPjufMQG/pZTS+p/wq9+dXHWwsSMe2eRtQCbuyIPMHEarPr0MJ65AxpgPglKgkS52/CkTaB/k/ivHX0mxlZa/8ORoTEbURNw390WKBIArG5ZkCK9/vN1hJWxd4tCp53Nj+ve5iPZrT8BBmFMkIT20DVpY+Rc64oM7yqpK0xoTqwWnCPjuCiyXF3YZzbJcWAn1370Y/sRxbFbWt4hzwtSFfJsCXyzRpghzeRrIqh753eOxCbSQSZLoAvQmCSpCxohtSzH0GGXQYcvq1uRXLxUaDSMgA/SfjEz6/3WTKiybDFwMvNNmKGN0YwW/hLkD/yIQgXL3VMBcozqUjz4dYbMG51XBBz15gfl5F4ZkYbFbJU9dylXFdFOmHuTlzrZcW80MYznkM1G6isBcGQZ19HkSM7PBdw== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Dec 2016 14:51:11.4873 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2473 Subject: [dpdk-dev] [PATCH v2 00/11] Introducing NXP DPAA2 SEC based cryptodev PMD X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Dec 2016 14:51:17 -0000 Based over the DPAA2 PMD driver [1], this series of patches introduces the DPAA2_SEC PMD which provides DPDK crypto driver for NXP's DPAA2 CAAM Hardware accelerator. SEC is NXP DPAA2 SoC's security engine for cryptographic acceleration and offloading. It implements block encryption, stream cipher, hashing and public key algorithms. It also supports run-time integrity checking, and a hardware random number generator. Besides the objects exposed in [1], another key object has been added through this patch: - DPSECI, refers to SEC block interface :: Patch Layout :: 0001 : lib: Add rte_device pointer in cryptodevice. This patch may not be needed as some parallel work is going on on the mailing list. 0002~0003: Run Time Assembler(RTA) common library for CAAM hardware 0004 : Documentation 0005~0009: Crytodev PMD 0010 : Performance Test 0011 : MAINTAINERS :: Pending/ToDo :: - More functionality and algorithms are still work in progress -- Hash followed by Cipher mode -- session-less API -- Chained mbufs - Functional tests would be enhanced in v3 changes in v2: - Removed chechpatch error/warnings (one extern warning is coming which is not removed) - Moved flib to dpaa2_sec/hw - Improved patch set in an organized way - Improved Documentation for dpaa2_sec PMD - Removed unsupported algos from compatibility structure - corrected hw/compat.h to use rte_* APIs and MACROS - Corrected DPAA2_SEC PMD to use rte_device instead of PCI device (some parallel work is still in progress.) - updated MAINTAINERS file for DPAA2_SEC PMD - updated config file for DPAA2_SEC :: References :: [1] http://dpdk.org/ml/archives/dev/2016-December/051364.html Akhil Goyal (11): librte_cryptodev: Add rte_device pointer in cryptodevice crypto/dpaa2_sec: Run time assembler for Descriptor formation crypto/dpaa2_sec/hw: Sample descriptors for NXP DPAA2 SEC operations. doc: Adding NXP DPAA2_SEC in cryptodev lib: Add cryptodev type for DPAA2_SEC crypto: Add DPAA2_SEC PMD for NXP DPAA2 platform crypto/dpaa2_sec: Add DPAA2_SEC PMD into build system crypto/dpaa2_sec: Enable DPAA2_SEC PMD in the configuration crypto/dpaa2_sec: statistics support app/test: add dpaa2_sec crypto test crypto/dpaa2_sec: Update MAINTAINERS entry for dpaa2_sec PMD MAINTAINERS | 6 + app/test/test_cryptodev_perf.c | 12 + config/defconfig_arm64-dpaa2-linuxapp-gcc | 12 + doc/guides/cryptodevs/dpaa2_sec.rst | 233 ++ doc/guides/cryptodevs/index.rst | 1 + drivers/bus/fslmc/fslmc_vfio.c | 3 +- drivers/bus/fslmc/rte_fslmc.h | 5 +- drivers/common/dpaa2/dpio/dpaa2_hw_pvt.h | 25 + drivers/crypto/Makefile | 1 + drivers/crypto/dpaa2_sec/Makefile | 74 + drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 1668 +++++++++++++ drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h | 70 + drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 368 +++ drivers/crypto/dpaa2_sec/hw/compat.h | 123 + drivers/crypto/dpaa2_sec/hw/desc.h | 2570 ++++++++++++++++++++ drivers/crypto/dpaa2_sec/hw/desc/algo.h | 424 ++++ drivers/crypto/dpaa2_sec/hw/desc/common.h | 96 + drivers/crypto/dpaa2_sec/hw/desc/ipsec.h | 1502 ++++++++++++ drivers/crypto/dpaa2_sec/hw/rta.h | 918 +++++++ .../crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h | 310 +++ drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h | 215 ++ drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h | 172 ++ drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h | 187 ++ drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h | 300 +++ drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h | 366 +++ drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h | 405 +++ drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h | 161 ++ drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h | 549 +++++ drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h | 680 ++++++ drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h | 771 ++++++ .../crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h | 172 ++ drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h | 40 + drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h | 150 ++ .../crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map | 4 + lib/librte_cryptodev/rte_cryptodev.h | 4 + mk/rte.app.mk | 7 + 36 files changed, 12602 insertions(+), 2 deletions(-) create mode 100644 doc/guides/cryptodevs/dpaa2_sec.rst create mode 100644 drivers/crypto/dpaa2_sec/Makefile create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h create mode 100644 drivers/crypto/dpaa2_sec/hw/compat.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/algo.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/common.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/ipsec.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map -- 2.9.3