From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B1BD24574A; Tue, 6 Aug 2024 12:28:20 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id DFA5A42DD4; Tue, 6 Aug 2024 12:28:00 +0200 (CEST) Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazon11011048.outbound.protection.outlook.com [52.101.65.48]) by mails.dpdk.org (Postfix) with ESMTP id 64BE542DB4 for ; Tue, 6 Aug 2024 12:27:58 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UQB6ifQnxXxbnWxgBjP5IOFZT+GPg7wp/qlXtUoHy4YeNL1jjORs9rYjaCr5OHYpycg+JamrFC4lyg0Ko6hV71EQJJghbKWMdF6JeGORr5lzVaLdbTkctkL7zIPTb94Lgi0nM1kvRgcy68cgL1bPBie9IFGNspSNdb82Tjiff6MemH3mxDpNkL/73PkeVonHVzszE+pcWkzEA8AGajq41xbNl/XGc9+JxH1DZGlM4w2Tx6FgjVlNwhv4IrT/BJv1a0aC1Ng0X5d6hKcYdcKjnA2F+a7OFevcjBFPqzHimTp3bjoiidlCEvHAbINAaleJVE/Rf+vUtzaaFGS58pQupQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=uv0XgJFRFDc39L/2W/cmDuqLCsEXOpxKbHq3SNZ9At4=; b=FdtxzY0PMtp4oU3K6UkNp1u0qMb25BJ5ejV+r5wpdahOjbWQViacdijLozTlbdIxuEYnzkfeZoxamNC43KR0e4symZNoMZNwidbT6iVdxu7a3vMAAvOw0JxbUo/NhyAjie8rZWBPolYkIGis++SsH4Q5CGoSLU3M2mOLOqGxfbCuXkAA7C4z6d76ygYP5cmGGBGawdr9uyCVorndHfrLaLAZsryNFVB2NUxIL9y+BteRkM33u9L4oiU3Cr4jiAq65bsutzRjn32UsacOiw1MhHp7tdB/m0kMl/JFN3FglUukIj2uNV9NqcdqUkoTGY73AwfrDjqnGa4CSAxqGy8iaw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uv0XgJFRFDc39L/2W/cmDuqLCsEXOpxKbHq3SNZ9At4=; b=IGPgvBUp8XH41yBrI4BFIl4XnpXJKl0XP3aSrgxCO5Ro6QrmbWaJgTxmzFhq4Kw2sbQwwUWdoR4iYd4wtH7iGVr5mvSPlbZvuPcjguQJx2KiEQmlWdq4GAIWFhTITi4/h7qx9bvW/F/mDESyu7oCORQRYjjGievXIgm8L2NiHp9ZtV88cDGFAQlpsrKaDOFLu3kJsuFXRPuvWwOqGkmxgPJnD7ka++xf5L1bWmGCaAXMO8NBef3RJwCf7GUbLDvwppWluOJEbBxwIJJWd0lBfm9FBHpr+ulb4SaJ6jzw9YnrJv8r0R/L6pMfUQGQKCWEe5DNO0Mofs1V9uOVbHq0RA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8SPR01MB0024.eurprd04.prod.outlook.com (2603:10a6:20b:3d0::24) by VI1PR04MB6974.eurprd04.prod.outlook.com (2603:10a6:803:133::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.26; Tue, 6 Aug 2024 10:27:57 +0000 Received: from AS8SPR01MB0024.eurprd04.prod.outlook.com ([fe80::c634:479e:8f8a:a325]) by AS8SPR01MB0024.eurprd04.prod.outlook.com ([fe80::c634:479e:8f8a:a325%7]) with mapi id 15.20.7828.023; Tue, 6 Aug 2024 10:27:57 +0000 From: Gagandeep Singh To: dev@dpdk.org, Hemant Agrawal Cc: Jun Yang Subject: [v2 4/7] crypto/dpaa2_sec: enhance IPsec RFLC handling Date: Tue, 6 Aug 2024 15:57:29 +0530 Message-Id: <20240806102732.3225536-5-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240806102732.3225536-1-g.singh@nxp.com> References: <20240806084136.3212615-1-g.singh@nxp.com> <20240806102732.3225536-1-g.singh@nxp.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SG2PR04CA0188.apcprd04.prod.outlook.com (2603:1096:4:14::26) To AS8SPR01MB0024.eurprd04.prod.outlook.com (2603:10a6:20b:3d0::24) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS8SPR01MB0024:EE_|VI1PR04MB6974:EE_ X-MS-Office365-Filtering-Correlation-Id: 5f684675-1c81-45cf-811b-08dcb6027035 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|52116014|376014|366016|1800799024|38350700014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?AeNYgAsX6dCh67Y4yHvGmAbbmjDL7A0Joed0c5YPKLeGC63xu7BjxaUZ7SJZ?= =?us-ascii?Q?SK6nxRarvW43YQrtsadDw6QG7bFJyUl9gM3lwIjv6HeD9t2AIy8+D6ap9/Ce?= =?us-ascii?Q?uvL/nmjRikoRdx9/K6j5tzULKJ6nRU525bg0sXo60+msVJc3b8YQrZ2/VWNp?= =?us-ascii?Q?9MIMqzUwrz0XQyVSURYg18DAmarP0Kppak1+Vmr9jCE+RPWRco5T/e3+Kp1B?= =?us-ascii?Q?8y2ajDnsaM9+1LZIOjaJ42ZNe/+rB8yYazbPxUKvpjr0D6hrcMSYlIX0JOPv?= =?us-ascii?Q?zrJaIiQ0rdTKYaqx/zSP59d+ptKFyXGRIaAnsotIam3RgGwaCCvuHFj2xp1P?= =?us-ascii?Q?3AIh/BIWyCpO/LtAq2YDN1bId1b9P7bBD4MudJtXUTVh9KcuDTKwv/gwSm1h?= =?us-ascii?Q?Gc8Cs0AFZPm+ROYZxGa6+d7jgxZ7KiQRAs501jGJO099YiO2rXlQW/CUgJ5T?= =?us-ascii?Q?3RkR4m3SNEAr8nNbr35FCIHzTJFQCL5UAqS2c/Xk/I4tbmVPzkB6CsCWs2Tj?= =?us-ascii?Q?aZ71XTkPcQHDbdx76vNrJIbHObWdgcVYXfE32eSRFm2dZC/BCtCOGBdRN+7Z?= =?us-ascii?Q?wW/mG+vZDSXWd8ToSJk2TvUaR3AO1s3B4qsQL3xI2eeCuezl7m+GdisaG4iE?= =?us-ascii?Q?U1imJ8AaM1Lx5/OdAIb10oQfwX3tQR2RScVNyOu2gqfwiaxDH0Xv9PhRhOoE?= =?us-ascii?Q?LR+quidDCVv5k+yWYRmVzg0sPhLWmw1YLuQCtopmUvro+580O+DMdSFTB0r6?= =?us-ascii?Q?yeOlX7RWEsCMRKQThvSJKU0AKpn/q2khCi8szhON+rBHQR0H2FaRnBdJ7iG4?= =?us-ascii?Q?3yfLMQZEItuPYgu6xCQ52WPEkrQ78YLjEp7fvaWxRttrIaXeTkAmL93X2mx/?= =?us-ascii?Q?7uRck1gn9MLSuiKdUaCaj4GNS2aWVlXlbUQgVdzK7uYnETIirwIllOFcecjS?= =?us-ascii?Q?WENgyamW/cMOiDLT/Mx2OFSD0QpNxQP0SrRlOhqTAz+KI5pCwVeGmleDhiIv?= =?us-ascii?Q?8zbDL4cEFQfuZ5p3kZgmI/H147GdFrnw5rw03YHxgHHUh/aur4qqnUEX1WkE?= =?us-ascii?Q?asU+hgVh9b6bjPQEAUNOR/VeaWu+lgQY3oMZj5QSwFAwemaPCmvIh45MjpsY?= =?us-ascii?Q?2kqW8A6m7vU+/qjNgXOE/lAAWtO6vGkCa6atTVZeN/Hb96ZrLsuAdpU2zJFo?= =?us-ascii?Q?ma93U3AfHxT12siGKICnCXkGmZHZCQwl9NNZ5gziED0Ejcp8rGWlfv+7BA79?= =?us-ascii?Q?3vWu2yGNLgeDafMkdoXOY3SoUKXvc+pykvmZqQ6deyHpPA9fnIZ8qRlwpkzs?= =?us-ascii?Q?DKefB+QfxN0GoZWbC6ckyCd9wDbuSokoFAvSK8jvzfqO/hTFZDIHUN1GGkAi?= =?us-ascii?Q?B9YFBkosapM74A5tJw8Ux/fLS7ba63XfHB/shEXzDbiJup6xJQ=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8SPR01MB0024.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(52116014)(376014)(366016)(1800799024)(38350700014); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?cdoDodCGbCcn0bfraeHWmGgQVqJTThkUYyM3ZEmWsw8fP52MEZAZhKuqWxiz?= =?us-ascii?Q?hcEXfXpwl9LIVubwIPxPV/EN/Qkd/88txWAOai40Ps0isTOVm1gCj09nz9Ce?= =?us-ascii?Q?1umr88kP+8/WLuSujyzJEVQTJMkZNPUgy0gJi+ZPrKHUb1f0/Gr9VidErngY?= =?us-ascii?Q?x/ic5HeYqfn7trnK1Blnxaijz2NOU5PVgdqM3FcTvc4ZPbr6DTGQrPR11HTV?= =?us-ascii?Q?hWriywPemWJywCNXBIPZyF8/HdOJlOI+1dZ6FA0I5ZmzX270GzFR/R9bDgtu?= =?us-ascii?Q?86NxUVUEDHw5jZP12ruFkH7GmF068ZzKTW5ZcIjthC3isk0UFkEV3qyt8JsU?= =?us-ascii?Q?eNM0PI82FsoYMngvzBh6uFSMvW2tjoPcs3MbM8vxUgO8rQINB1yB2vGIfP5c?= =?us-ascii?Q?HweEgEp33FrDSDf6GzFVM/tG0+lxpsHI56atHTQdSV96ojU1l9KojWzyozn+?= =?us-ascii?Q?t2Gciw8HhUlunXPyCmt9Bn3kZ3RefqnNzi6Ud3qGgNv+8dXVbXiduDITOvYB?= =?us-ascii?Q?cSUNr/CeE0NV3eKKA1+Y6R89Mb1zAP8vbepe2VYoKqTzmYmtwas3zb/R5dxa?= =?us-ascii?Q?FMAoaAoF+MIXjQLlFo7HvwGO7hocYPUHu86ic+UEAK3O8elndlaYk7gA5TLm?= =?us-ascii?Q?PU9mbHPn0SKlmjfQZSm5swOAlJO4jaxiKKyQubbAVw70guJ+fiALFQAPf+GC?= =?us-ascii?Q?TJdexcE2MAeFTovq9iOP8Yy0SeiQXOw7JyUXQVcsJU+NA3xM98pueewtdoir?= =?us-ascii?Q?tuHshMZyqr7n3d794j1JakpZTZmTOl4go8YJD0uMTnekrmk8nAfWbrLeo88R?= =?us-ascii?Q?wMESVIbcEeYMUuYAYshEePptVIdEGT/r3niqAN4Q+dUUVwFM4fVxIIoTaET8?= =?us-ascii?Q?Fr+BwH4m+X4aBAAPVb9ytkDsBmhqzp4LBMBI/kalmCia50rpscJOFkmw56ZJ?= =?us-ascii?Q?3adfOdq3cov8JXNXuO9McIn4MzKC+0+0r0uAZEf6HU531RGNlwll6TlivaRU?= =?us-ascii?Q?gAIj64I/3RI+FZkYvHs/zKkCsiTxGMnf58ZAuOH72i8S8mM9PTn18kEdI56i?= =?us-ascii?Q?Us94Pw0BeI9QReCBvh4olPhJ6Ni7i0HU53ZzCBQGF13UBNSqj7rIaSBfl5WW?= =?us-ascii?Q?i0Iu+FTb8j/rmXuotzHjEvePusCqzKlvG09aPP/x5tda4LII6Aw6Z07+WmDb?= =?us-ascii?Q?qqcbmar41aQ3uziua23Ft0Q7gmKcS8h4qmOBUd/Oic7Q5NAvoXApwGHsp5Nf?= =?us-ascii?Q?vmnYbLbhfE2FPZYfWlX8XZ6m4ivUVCcBhYiyRuyrBiE/N8aUdvzn9PhfMLXT?= =?us-ascii?Q?6TtXMOERBlYtwlHUswIwHZ8PubAA47h3BY1ktAZF9Pa+c0+J0XSVgpBcPscl?= =?us-ascii?Q?AxEycj+s+MAI/5XReqIG6QYQpeQYEl9EBNULyFFnKa+hAYP7T8/JN6Q8zt3q?= =?us-ascii?Q?NESpNp5cBDd/bfmRgqzJTwk0Lc+SDuzXz98aw2bcJ7valZeGn7CrFjeLbsto?= =?us-ascii?Q?VGai8jcu9S5fnSToUZBuT4Ozpa7w/vl7gIRoAZLNjd0UocUGjjSm1RdiC+/r?= =?us-ascii?Q?ef55uOsXeC6rXyHGRO1oBoyG9wklHJ6boUgIzE2x?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5f684675-1c81-45cf-811b-08dcb6027035 X-MS-Exchange-CrossTenant-AuthSource: AS8SPR01MB0024.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Aug 2024 10:27:57.0121 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: /bGHBuHU8qQNBCFJRbYC9BJcnMJgqFerMI0/gZ10+M7yMCkY7ooXznzmVp9R6bva X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6974 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org From: Jun Yang Point Response FLC to FLC(SEC descriptor context). Response FLC can be used for debug purpose in dequeue process. Enable data stashing only. Annotation stashing is disabled which is not suitable for SEC and impacts performance. Signed-off-by: Jun Yang Acked-by: Hemant Agrawal --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 44 ++++++++++++--------- 1 file changed, 26 insertions(+), 18 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index e0b8bacdb8..0e30192b30 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -2005,7 +2005,7 @@ dpaa2_sec_queue_pair_setup(struct rte_cryptodev *dev, uint16_t qp_id, struct fsl_mc_io *dpseci = (struct fsl_mc_io *)priv->hw; struct dpseci_rx_queue_cfg cfg; int32_t retcode; - char str[30]; + char str[RTE_MEMZONE_NAMESIZE]; PMD_INIT_FUNC_TRACE(); @@ -2065,8 +2065,7 @@ dpaa2_sec_queue_pair_setup(struct rte_cryptodev *dev, uint16_t qp_id, return -ENOMEM; } - cfg.options = cfg.options | DPSECI_QUEUE_OPT_USER_CTX; - cfg.user_ctx = (size_t)(&qp->rx_vq); + cfg.dest_cfg.dest_type = DPSECI_DEST_NONE; retcode = dpseci_set_rx_queue(dpseci, CMD_PRI_LOW, priv->token, qp_id, &cfg); return retcode; @@ -3060,14 +3059,19 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev, struct alginfo authdata, cipherdata; int bufsize; struct sec_flow_context *flc; + uint64_t flc_iova; int ret = -1; PMD_INIT_FUNC_TRACE(); - priv = (struct ctxt_priv *)rte_zmalloc(NULL, - sizeof(struct ctxt_priv) + - sizeof(struct sec_flc_desc), - RTE_CACHE_LINE_SIZE); + RTE_SET_USED(dev); + + /** Make FLC address to align with stashing, low 6 bits are used + * control stashing. + */ + priv = rte_zmalloc(NULL, sizeof(struct ctxt_priv) + + sizeof(struct sec_flc_desc), + DPAA2_STASHING_ALIGN_SIZE); if (priv == NULL) { DPAA2_SEC_ERR("No memory for priv CTXT"); @@ -3077,10 +3081,12 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev, flc = &priv->flc_desc[0].flc; if (ipsec_xform->life.bytes_hard_limit != 0 || - ipsec_xform->life.bytes_soft_limit != 0 || - ipsec_xform->life.packets_hard_limit != 0 || - ipsec_xform->life.packets_soft_limit != 0) + ipsec_xform->life.bytes_soft_limit != 0 || + ipsec_xform->life.packets_hard_limit != 0 || + ipsec_xform->life.packets_soft_limit != 0) { + rte_free(priv); return -ENOTSUP; + } memset(session, 0, sizeof(dpaa2_sec_session)); @@ -3330,24 +3336,26 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev, 1, 0, (rta_sec_era >= RTA_SEC_ERA_10) ? SHR_WAIT : SHR_SERIAL, &decap_pdb, &cipherdata, &authdata); - } else + } else { + ret = -EINVAL; goto out; + } if (bufsize < 0) { + ret = -EINVAL; DPAA2_SEC_ERR("Crypto: Invalid SEC-DESC buffer length"); goto out; } flc->word1_sdl = (uint8_t)bufsize; - /* Enable the stashing control bit */ + flc_iova = DPAA2_VADDR_TO_IOVA(flc); + /* Enable the stashing control bit and data stashing only.*/ DPAA2_SET_FLC_RSC(flc); - flc->word2_rflc_31_0 = lower_32_bits( - (size_t)&(((struct dpaa2_sec_qp *) - dev->data->queue_pairs[0])->rx_vq) | 0x14); - flc->word3_rflc_63_32 = upper_32_bits( - (size_t)&(((struct dpaa2_sec_qp *) - dev->data->queue_pairs[0])->rx_vq)); + dpaa2_flc_stashing_set(DPAA2_FLC_DATA_STASHING, 1, + &flc_iova); + flc->word2_rflc_31_0 = lower_32_bits(flc_iova); + flc->word3_rflc_63_32 = upper_32_bits(flc_iova); /* Set EWS bit i.e. enable write-safe */ DPAA2_SET_FLC_EWS(flc); -- 2.25.1