From patchwork Thu Apr 28 11:47:20 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110422 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id CFD61A034C; Thu, 28 Apr 2022 13:48:05 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 986694281F; Thu, 28 Apr 2022 13:48:04 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20068.outbound.protection.outlook.com [40.107.2.68]) by mails.dpdk.org (Postfix) with ESMTP id 0C92C4281C; Thu, 28 Apr 2022 13:48:01 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GJRe3jPM2X1mO5bfeCV/t5/M96WHFpGeY7FJwkmUNbCM4IGKvZIcb+Dg1a0aIq7zn7Il6p3KimU6BfJ70gpDyV4ncrpfrDadtk0xWe8BVfG+PHyFnQ3q6KHx/Kkq5x0jjYS7/Fy9ubCt7r2y8paafYKyRiS2OWPo8IoEdcOnBh74gxpJLJJ19aL1Z7ajDvfRSk0Dpx4X7dqfyrTfOtBCThOo4HgdOBzBt+Vxdh4V/PqREilXc3MdtSI/UzWp4Gic9AnprnrS4fKwNQnBxU0trzBoUru+Hba2FRfEoSjE31BH7/kKMW9oa3RyhfqlmSQzJHH6jOU8xH9Uh5Xq+fgqvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NGJVqoQlRBOBdwXVBdSqnANybdSEqEx2wn512knqfyk=; b=T4MOQ3d0ssYmoV2PZE087yj4Eky1q9QEWogyvGfkS2fjVUR5IxtPi6XeOG6gy6xICgzXwIfBuHz1CE2BqFoS42IgPTfPUvRkGvVJ8NIcAJnn2k1RLqkGPLFApdF5WIadohJ7jvq3mQCP/A6I/SunZvW14U9DDpuNhYIImEjGcOuglNRNN/4r6TDKN54awwmwdPz8JxH0bMScGgQ/6jP4ve+C/CutMuckywYR+EaMhX+B0kN/JFWzDm2QMpdccyP4IIt6axA8PFYCkBOWHM6Awod/ifWLZ2pGYMe+MlLPM0IJpJ1id/mJ8BuZShHjHxwH/NkYuHQbDs9uWpp+5Zg9aQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NGJVqoQlRBOBdwXVBdSqnANybdSEqEx2wn512knqfyk=; b=NFlyWyB8wV16q2h6kv6g1eDCpSBOVBNW995be88QEfAzNyR/CkbxBQiZmBEUrhLGG5bGEY/IP75XogTd8GYljFJnCgyuaRos3srr3SJOVLexokC5WnOmRgkvS+ZQZ82vH5ulQlfv2nFI5YjUzoCpqQrPqSgNH2lKV5aSKiIlXKg= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:47:59 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:47:59 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 01/14] crypto/dpaa2_sec: fix fle buffer leak Date: Thu, 28 Apr 2022 17:17:20 +0530 Message-Id: <20220428114733.1419957-2-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: b5b25896-788c-4e0a-ee20-08da290cf167 X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: IA/CaybVql++/rcuL9CdfKlhdt4OrtPq3MJxO92SQCT8WtYDCzxL3ZtnsBUrUD1oriBSzE5DxhYnzbPIJiWL4h04Pwo12iuh1j+5UObzrvnttKj1pUJpZbvc6PtYq8JNPV++B3/UE+TB4gJaDy50b8mfFbQxiidN+sHjSD3PxO4iWHxOjUjmjnfuIGQfxNbtyFhRn1jsp57o4xk4YyJ/1df4xwnnACgQIqbHCE2JZjlm/2HZCaaGYR3CI8XzSkeL52rlxmJJJf61fgkiVIuOXQpGDHtPsXC2k44SQ4x3br4pc1C1S5SYUGJcHJN6UzOeUwEnthYfA1tL/rdtZ+5QGd/5JaNywOQRW0sYTWqh9n4LZyzXqLmYFHCrNuyzkOnugdcha/Q7711GfiV0cKhFWl1jZHDM59s5LL7tIk6c4mAzRKUC991gTXwTVdvPC5rLn/PSYSmCOVv2djvZYhM8pGVSjQCjNH/OXqurKq0MMOdnplM+t4N0FECmZPVbVtig4FcG8uxPmU6/RzjnbRYwaTUP6wtmO6udLjyGkdT7SKcOvWG0eAgqsJRx1gpUSqv02m9+v4YPmHwhpaO/Vo55E/Ruq5ctvs8C90CYZliu6jFk3C/+qIgUTAstICHqc3xq4HrXFHuvMI/He9p8+UQVG4T2EUyCES7gemue5H77OxLlZTrCmsNUeQharhBR/BM0vHhJgV2o8KIM0eEgf8OZdw== X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: fegMZ4/INaC9rGxFbBqy1szlB/2yso6CfVaGcR3IZzx+1GWAe2YNREv6tQcSFsxc5c3LufmU7L2cbr7K0dTIaFKoOwvNnJo+kCMRdEg2s0T4uOm8BzJwTshw1xIxMXq73/DglN99nlxmfXvKLUkGn39s+D8c+95awbB28KRroM9jZkcDDDbatU7Y3a4/GY/BqVeP5d2pM8it5AkIQladqly1WJV5YdNZ8/NkphU7bdEZvcQumKqbaXYkCTe+GK2w2StvqgWbsF0LgWFOLHL0Jlq6E03sv1grRh1T5j6pFTzJFmLvIfzvHT9zpqU7y4X8z4lpoLSw1Q5BB5Z9uFLmp+wpbP2ULC4oY3QbZXFEsmi0kioA7BSDP1yafMf1R85wpHZ10luBpsDldKK6m5VpefKwgnK0+zWdVROo2mmIM1Y+Juq+RE3ajsO/lek0+XeCtPlEGudpJeSm1qiyySoly8Dwr6Ygjn9EBVphTBD10Gdz4fbBv+4gZo+9uVji1IyWLJ8WZoDvx/5eBBggc55n33OcMK+lpHLG8X6Y/QfDdt7rAz7CZbxF5MUv1Oe8h9OSyYLsomRR8m6vJvMwzu9xuWRDh6IzVoQx+3CB5aH/RSJSUikFpCuRgZbEmKQsulj0wH0lOez/Z8OVEZXyacoEotmsghw2RpVbKlYGUVYphJNrPpDrIOHxllAEfSuZpfyU/gJQRQ9GxoM0L702oMSYkfWvnuk0yvQSGPw57x2QGP2g5gH5SMYMyO6GW6uqD/s6nlt9jsjgLodoNZftHCnjssF3b9J5Wb21KSqdGuSuz1xy15vVsJ1iSgOumOnDVz9zBcNU5E/Ro35f+jYS14cJJelUog3P2h1tpcOw1CtuGUG5sGw3DniwQ2WZvW+Sc1o3qg68QhVuVuHvlqEggRv4rWV2r42uun/BmcvnGBd4JO8fHd+9MDBVJ5Tp8GAL7yMXh5xQylhVeCQwh++5ZKhQ7BbXH+iyoJ0XOoiN/7se9giwVGOvWDwwoq+DLIYuMTiXzx0DIxcrtZd4XCS3Kmc9SvIzzbdoLhonfkUKVjn8dqcnBa991XAjTvjqKtTSp2+0g9YVchBBn1eWHZxkF+v1Cq+ZIb3tDTxWuyld3THaFH2zSLSlTistK/CoSCEeLDA5UVfjp5qfSJyDttAEivFZ0uMyoWUZJctsQWmMcmd418YB1CM+YfKGPMvRkTwo2u5i8OzzMHQ+TnFrHxM0AUDzEjMOWEU56p0RQHjj9hpWG5dX6rlF23Be1IEe2AMujeLUm2DiRA8tPd048XTh0Km/rO1nS/0gR7HwSBZnmVsSj9Bs4Gsy9k6LgH4iRpEdTwO3tKkRB29oXO7c3jj85GSfaptIt62sSYHks3iHS20pR9tUMlnzu1bA17ZmfnvzYIYvkY32zazqm3z3g/l2wpTETV47tnJwVYlvcnCu9yGds0pU8pnYrcmLvrU0YLf4kUlOoJoaJm/FuF1vfe2yG2SFfE+zKMXjjH3NFl3boLerLH4h2ezFINuUV8NUPQJPOEnZem1q9N+bBZyaFl+ULmNzXE/ZidCcOAyF+r0ANQj1KbEy97rpBdCQ4BDNE1TS85uauJZqtsy85sZ6Y+sJSs5qFUzkgbNXu8YTz+wJD+lygQQh1Y3JobG7b7r9DVWoSc3N9uzyTcqDnw98Bs13EB8NsyutlBsMpYrmGKkdDADAPu6qJVPYuyXm7roM+0krgn2+yP/cBLZylGEheGuKpNt8Fg== X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: b5b25896-788c-4e0a-ee20-08da290cf167 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:47:59.8298 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: qeEjeuQLBPj9Is0cm5m06t4vuRNARZvWP73Y26w1CyvzIPAsea+ZtqFZFeQqJzpL X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Driver allocates a fle buffer for each packet before enqueue and free the buffer on dequeue. But in case if there are enqueue failures, then code should free the fle buffers. Fixes: 4562de326d30 ("crypto/dpaa2_sec: support ordered queue") Fixes: 3ffce51a1f04 ("crypto/dpaa2_sec: add enqueue retry timeout") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 35 ++++++++++++++++++++- 1 file changed, 34 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index e62d04852b..03fef5e500 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2016-2021 NXP + * Copyright 2016-2022 NXP * */ @@ -64,6 +64,27 @@ enum dpaa2_sec_dump_levels { uint8_t cryptodev_driver_id; uint8_t dpaa2_sec_dp_dump = DPAA2_SEC_DP_ERR_DUMP; +static inline void +free_fle(const struct qbman_fd *fd) +{ + struct qbman_fle *fle; + struct rte_crypto_op *op; + struct ctxt_priv *priv; + +#ifdef RTE_LIB_SECURITY + if (DPAA2_FD_GET_FORMAT(fd) == qbman_fd_single) + return; +#endif + fle = (struct qbman_fle *)DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)); + op = (struct rte_crypto_op *)DPAA2_GET_FLE_ADDR((fle - 1)); + /* free the fle memory */ + if (likely(rte_pktmbuf_is_contiguous(op->sym->m_src))) { + priv = (struct ctxt_priv *)(size_t)DPAA2_GET_FLE_CTXT(fle - 1); + rte_mempool_put(priv->fle_pool, (void *)(fle-1)); + } else + rte_free((void *)(fle-1)); +} + #ifdef RTE_LIB_SECURITY static inline int build_proto_compound_sg_fd(dpaa2_sec_session *sess, @@ -1513,6 +1534,12 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, if (retry_count > DPAA2_MAX_TX_RETRY_COUNT) { num_tx += loop; nb_ops -= loop; + DPAA2_SEC_DP_DEBUG("Enqueue fail\n"); + /* freeing the fle buffers */ + while (loop < frames_to_send) { + free_fle(&fd_arr[loop]); + loop++; + } goto skip_tx; } } else { @@ -1854,6 +1881,12 @@ dpaa2_sec_enqueue_burst_ordered(void *qp, struct rte_crypto_op **ops, if (retry_count > DPAA2_MAX_TX_RETRY_COUNT) { num_tx += loop; nb_ops -= loop; + DPAA2_SEC_DP_DEBUG("Enqueue fail\n"); + /* freeing the fle buffers */ + while (loop < frames_to_send) { + free_fle(&fd_arr[loop]); + loop++; + } goto skip_tx; } } else { From patchwork Thu Apr 28 11:47:21 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110423 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 77BFDA034C; Thu, 28 Apr 2022 13:48:15 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5DB3442831; Thu, 28 Apr 2022 13:48:06 +0200 (CEST) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80082.outbound.protection.outlook.com [40.107.8.82]) by mails.dpdk.org (Postfix) with ESMTP id 3099C40E50; Thu, 28 Apr 2022 13:48:04 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=knyA3uI+eSvTTuwk4NaNfFcTFmYlOZEBUZNp/vT1cNCRtbo6eKPDl84JxndnZTOmBDHwyAUGvKvKqMqyVDaQOOQF8D4GOH11q5djRqHPGCKob6r8Cey89D32ficoYs6je+yYMn98L61urGqZgCLZp+4C4S/d5IgmMphc1AxJl+Lf+vozWuctca35ydPhtdsURQIK4C2CuWSYIaYRwMPMACrxE0Z4S9sNA3puhSPg7psW+5mMKVC15nuRhfk7I3IAIfY+JDkcPkw/qvxby8K4QYz+UlQGQWGHaBqWmr4KXV69/YxgOm8SbiBEr9NroWwh3UMf1bcXwraBcNTzFyRihQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1k6bDCo9CEpwvd2/JKdAaSDgNoQyelM5RBPZaRN/iO8=; b=TroqAaOnW34a1HIVzwExcKF1T/m+gMXU9wpBvS2iX/0/z3TkQW4cX4yCa9b0h6X5dOB5rtBR3tS8hC1ZPnQqoWhiD4xIKFEYpphmm1V2nxd9CFHXy72aQukF3MTsRON1CpmlVnync4V6KtsbMA2Zy0TVVoIvHksXvargiQvhIuXs9BZS59y7f8uAM2qy0bux7jUX3bmumBTNLdiO6km7K88e+JCEJmACtC65zC5mKWaUIw3DoN8Y7k/7gkk2zCE6WMHKioLdj4E0F0df9wNtixeLGm4RBDJS/wHvjpZxqnfcg1a6jbhk05uK7ZEQWDom93N8GNOUdo3gwI9XjZIe1A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1k6bDCo9CEpwvd2/JKdAaSDgNoQyelM5RBPZaRN/iO8=; b=IumoParZv5/xBnBS3PGhO858eb1fE7jE5ZWDrHw3xBQxMyEl4DJArGpW0QQMiCVHj0AyuJ1oWQdmeolSawOCxLnI00AncMp3CS5JiHvUqpG1olfcOswCGzt+ZSLnzU2x947X2QT1n/53ZWiYw5Rlg7ZHdxaC/YA/0EBT1sA/2Jw= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:48:02 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:02 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 02/14] crypto/dpaa2_sec: fix buffer pool ID check Date: Thu, 28 Apr 2022 17:17:21 +0530 Message-Id: <20220428114733.1419957-3-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: eee494f2-45c1-4bfb-0d02-08da290cf2e4 X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: eee494f2-45c1-4bfb-0d02-08da290cf2e4 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:02.0723 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: udsKVI+S6W9pcKEIP94RIMP4NSRKXgpg6OJEbHqsmAOnY+F6QDTHJ/qK0CG6HrRF X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Simple fd rely on bpid of the buffers whereas other FD types can support buffers without bpid of pool. So moving the bpid check to simple fd to mbuf conversion function. Fixes: 8d1f3a5d751b ("crypto/dpaa2_sec: support crypto operation") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 03fef5e500..2374d67978 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -1566,6 +1566,10 @@ sec_simple_fd_to_mbuf(const struct qbman_fd *fd) int16_t diff = 0; dpaa2_sec_session *sess_priv __rte_unused; + if (unlikely(DPAA2_GET_FD_IVP(fd))) { + DPAA2_SEC_ERR("error: non inline buffer"); + return NULL; + } struct rte_mbuf *mbuf = DPAA2_INLINE_MBUF_FROM_BUF( DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)), rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size); @@ -1612,11 +1616,6 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) * We can have a better approach to use the inline Mbuf */ - if (unlikely(DPAA2_GET_FD_IVP(fd))) { - /* TODO complete it. */ - DPAA2_SEC_ERR("error: non inline buffer"); - return NULL; - } op = (struct rte_crypto_op *)DPAA2_GET_FLE_ADDR((fle - 1)); /* Prefeth op */ From patchwork Thu Apr 28 11:47:22 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110424 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 84464A034C; Thu, 28 Apr 2022 13:48:22 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9B0AB42828; Thu, 28 Apr 2022 13:48:08 +0200 (CEST) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80074.outbound.protection.outlook.com [40.107.8.74]) by mails.dpdk.org (Postfix) with ESMTP id 2B1204282D; Thu, 28 Apr 2022 13:48:05 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m+6b7F5akV9mRt5tIbDWN774XtwgwdQQU922/6Io5uL8FFdNIUXv3tiw8JmeUn3qABzeLJkyhx4g9p91jHSkr942zVmzig7ywcLiN0Zh5quq5zHG0QCE9n867Fxr0nH8yXDODTchHmEuvwblpgpepKIwa0Mkn9EfoDCW5oNsGroZCE4XoPvUx6XOhCvInd1Rui/vgzPqb51/jisyEstnsGeF5WC/vqV96jPNT1/7YTOjj590vtS3xJ1qfYXw6qw5CAaLsMy4Yh1nm/+/WVmgrez6yWjhGYGQNY82tZ/cL1eli1jWfq37dWq5P/2BDb7a5KZi4dqUAfgmCv85GfA1eQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/jWTJ+8y7eqN4JZqhHKI/bOc45P/Isbhn7aUgvrHXpk=; b=gcZG4KC0yFc+O0ifG+aH+6vCdYh0WSkwUKQUQ4IuNlqIFJmdMTN4Ran/Bk5na7aDGc0YXPwrzgSU0LklUhpWamo1J7enAYYTu1NT0NapjyoXE/aOzaspD0oz3yq3U1IFIpfwQ5OFmDpO3Dgs2o3e8u8kyEUvr97B7BvXv066Covcdpr4bhxngW0chXqnTPYGEU+lN950L6EYLaqWoblL2SrASPIcsH/WNvoNorAi4PRvVZY25ngVlTW6Tj9w+JxK1k1klhFzAy0IgDSQgC49vWJxphJukGb5mvnwwXT3xiOMt4Uxo6NJzQzLb/+iXcxl7H8Yg1zgaQXusIHw2yD2dw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/jWTJ+8y7eqN4JZqhHKI/bOc45P/Isbhn7aUgvrHXpk=; b=SotxeHCAQ8AP/YZLuAQT33o281jgf9xg03UgRlZhETlN2XfWnPI3dAVGqdii8nCxWw3m61yexuw/Gl0qrbAmzaHM5aX7pMdSDTrG5r9zbcvzpPyNJnS6+lZ6vterjBXOFwvJmD7qJKtoZ20ZU7Xr0AZKJQD0gawNML5v70/67Xk= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:48:04 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:04 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 03/14] crypto/dpaa_sec: fix length for chain FD in raw sec driver Date: Thu, 28 Apr 2022 17:17:22 +0530 Message-Id: <20220428114733.1419957-4-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 9da1bab6-7e03-4986-9792-08da290cf439 X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9da1bab6-7e03-4986-9792-08da290cf439 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:04.2451 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: oKVeXujgYcN3tl6VBuD7vLtVgP4xySCY7TUzhM8TtGuL8KPQ66k9hZUQN5EvQBRk X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org DPAA sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD. Fixes: 78156d38e112 ("crypto/dpaa_sec: support authonly and chain with raw API") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c index 522685f8cf..29f4e6d40b 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause - * Copyright 2021 NXP + * Copyright 2021-2022 NXP */ #include @@ -397,8 +397,8 @@ build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx, unsigned int i; uint16_t auth_hdr_len = ofs.ofs.cipher.head - ofs.ofs.auth.head; - uint16_t auth_tail_len = ofs.ofs.auth.tail; - uint32_t auth_only_len = (auth_tail_len << 16) | auth_hdr_len; + uint16_t auth_tail_len; + uint32_t auth_only_len; int data_len = 0, auth_len = 0, cipher_len = 0; for (i = 0; i < sgl->num; i++) @@ -406,6 +406,8 @@ build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx, cipher_len = data_len - ofs.ofs.cipher.head - ofs.ofs.cipher.tail; auth_len = data_len - ofs.ofs.auth.head - ofs.ofs.auth.tail; + auth_tail_len = auth_len - cipher_len - auth_hdr_len; + auth_only_len = (auth_tail_len << 16) | auth_hdr_len; if (sgl->num > MAX_SG_ENTRIES) { DPAA_SEC_DP_ERR("Cipher-Auth: Max sec segs supported is %d", @@ -448,6 +450,7 @@ build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx, qm_sg_entry_set64(sg, dest_sgl->vec[i].iova); sg->length = dest_sgl->vec[i].len; } + sg->length -= ofs.ofs.cipher.tail; } else { qm_sg_entry_set64(sg, sgl->vec[0].iova); sg->length = sgl->vec[0].len - ofs.ofs.cipher.head; @@ -460,6 +463,7 @@ build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx, qm_sg_entry_set64(sg, sgl->vec[i].iova); sg->length = sgl->vec[i].len; } + sg->length -= ofs.ofs.cipher.tail; } if (is_encode(ses)) { From patchwork Thu Apr 28 11:47:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110425 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 40A0FA034C; Thu, 28 Apr 2022 13:48:29 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C2B014283B; Thu, 28 Apr 2022 13:48:09 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20069.outbound.protection.outlook.com [40.107.2.69]) by mails.dpdk.org (Postfix) with ESMTP id 8B9C942835; Thu, 28 Apr 2022 13:48:07 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=N7XdhebCAn5UpzXs6u2euCtD6zPZbrmaRRNCVzYQp17ph+aO5bD6cti9SAlu2ZH05b0YyTUkGFbNAa8Ar3J6utp9xd1WI0CE0DJrQiv67rIvd/zBwRFAqEUlc67mKVdEmexymUpDHSCvlZcQOiKXqornykSQgtHfZS5MvMa/Z3CMEjbajIOKgwTiZCvEUJVBpN98c15BNbK10OfP31WUU078Di8WqUhVGp/4NHUcIz0XHROKjK7xrWa71QvMhBCoCtL/VqemIifLVDwmf8rzqEr7/1Ej0Ybw7qfuhdLPxqZKp34C/hI+oFUHm0wQKoSsAP87YcgV9twC6eK+reVQIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lPctF8D0bjVtiokAgVqLEcuQ+6aFiXPOP1VviQzQzQo=; b=IayR0E88eVM5inwCrhymWO5NjgZL4SUwtIZ9io2tHPpTC5LkQgK7fdozgQX2eVifvlHlKsCyJApr0nfFcWLF8NtX20K73YKyrwsLXcdOxAEj/wAjwYnrodrMV4RlYoEmeAX1f/iJVnC7fXCuJdozjdh9z2IYrVXLBpwuYKUZ6cSeBK0r1lc/2mJ1gwf288Aj+Yy+957V5m6SfLeZdxo8QimRFVl33eCarRjA6+KFVrsGrM9r8bTTCWfa3mUp8n6I82gT3pKvh3x/8UQfFtNTxKN8OT/gB4AixXTqqEM+Pk/hzyxI9ayYmDEZn3F8jR1rMKhbfW1UOAXpMZgViRVlKw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lPctF8D0bjVtiokAgVqLEcuQ+6aFiXPOP1VviQzQzQo=; b=AZ7pIwiOfNnlW4YrqAdDAorKU4nkI9A3FBmZav1IZdP6L92pxxi8o2iGH5NadImdHJd25VXTNe61uGKiPYSloTzaXEUeunBiJDcAdQIic1hr6kkVrPCxZaNxc5TOaUIzCWyzpF9CDKIa/PJRxCBSi0Cymyl0qphLKV+w/mw2+Q8= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:48:06 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:06 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 04/14] crypto/dpaa2_sec: fix length for chain FD in raw sec driver Date: Thu, 28 Apr 2022 17:17:23 +0530 Message-Id: <20220428114733.1419957-5-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2d0e7155-6a57-423a-6248-08da290cf568 X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d0e7155-6a57-423a-6248-08da290cf568 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:06.2607 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 92xnSz20/cfOlMq/73YcBn7mvbREUNKbG/M4tndO9eEpLt+y23HxoaYB8AKKvtUz X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org DPAA2 sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD. Fixes: aa6ec1fd8443 ("crypto/dpaa2_sec: support authenc with raw buffer API") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c index 74f2045637..e68a4875dd 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause - * Copyright 2021 NXP + * Copyright 2021-2022 NXP */ #include @@ -44,8 +44,8 @@ build_raw_dp_chain_fd(uint8_t *drv_ctx, uint16_t auth_hdr_len = ofs.ofs.cipher.head - ofs.ofs.auth.head; - uint16_t auth_tail_len = ofs.ofs.auth.tail; - uint32_t auth_only_len = (auth_tail_len << 16) | auth_hdr_len; + uint16_t auth_tail_len; + uint32_t auth_only_len; int icv_len = sess->digest_length; uint8_t *old_icv; uint8_t *iv_ptr = iv->va; @@ -55,6 +55,8 @@ build_raw_dp_chain_fd(uint8_t *drv_ctx, cipher_len = data_len - ofs.ofs.cipher.head - ofs.ofs.cipher.tail; auth_len = data_len - ofs.ofs.auth.head - ofs.ofs.auth.tail; + auth_tail_len = auth_len - cipher_len - auth_hdr_len; + auth_only_len = (auth_tail_len << 16) | auth_hdr_len; /* first FLE entry used to store session ctxt */ fle = (struct qbman_fle *)rte_malloc(NULL, FLE_SG_MEM_SIZE(2 * sgl->num), @@ -104,6 +106,7 @@ build_raw_dp_chain_fd(uint8_t *drv_ctx, DPAA2_SET_FLE_OFFSET(sge, 0); sge->length = dest_sgl->vec[i].len; } + sge->length -= ofs.ofs.cipher.tail; } else { /* Configure Output SGE for Encap/Decap */ DPAA2_SET_FLE_ADDR(sge, sgl->vec[0].iova); @@ -117,6 +120,7 @@ build_raw_dp_chain_fd(uint8_t *drv_ctx, DPAA2_SET_FLE_OFFSET(sge, 0); sge->length = sgl->vec[i].len; } + sge->length -= ofs.ofs.cipher.tail; } if (sess->dir == DIR_ENC) { From patchwork Thu Apr 28 11:47:24 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110426 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 26A64A034C; Thu, 28 Apr 2022 13:48:36 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id B5ADE4283F; Thu, 28 Apr 2022 13:48:10 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20067.outbound.protection.outlook.com [40.107.2.67]) by mails.dpdk.org (Postfix) with ESMTP id 3097C42829 for ; Thu, 28 Apr 2022 13:48:09 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=F1MNQop53MXdUKc5mJmQpj1+gm7r5LuMZ/Z1Zr/k5ddRS3IyI0YHra8v7OCPRcZJta9pv1FbbsLbOHzJq3lqGLAfLXYbJ0nmjyqcTIvvgp6lmozqRdRH3vYux73QS5PVfyTaWWxlJbNoK8paBbiQYDp6M3qiYNqb3hYILsNHUWE+r1obdnbXMEEU+YBWcT7usyFuRQvvn2E9q/+Qbr8bTBgHJ7i5ErAXNR/ForTeeR2ABv7CqOeOlQ2SxTWTVfSn+5Q7AI8OUjJJT/ltTgw8bMKZDjQZdY9XTrQGFrOSu9FvouQ2CTHhPkhVTKpZQec2FBn4XwrmPbNq4HpvS9gBaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=72FAFAZov6BXALbzDsSvvgzjDwKgM8BwVgmSD12zo/w=; b=WmmYhvt01pYOMF5c/1ZM2qmlR+vh7YQCZQTkhRUWxtnp9kmCVp5mWwpY/WNKzBuq0LItW8M4rMZHYZP19whsx5prdNpaWvDLeOseQ+gl0mFRzRARCOOk8Pll2e+E2RwKquC9EQcWBxMdZogc63JZUXkRedf9i/EZPXIpwkDF1aen+nZn5cxpJoDVj0OEhq7MO1uD4zN5iv6L1Pu5MD3YmflKb/34mI/UH6pZzwKlTKnWLkyKx/cR2ZcIDXz7kkHe4ulPdPv/xNLy48BMas/37behtCwz1IEKed+Da7H/OKgyQy5zy670fwCT7/xkc0brdpQhLU0tMn07bgvpJ14SXA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=72FAFAZov6BXALbzDsSvvgzjDwKgM8BwVgmSD12zo/w=; b=jhbqxCKG44ObMsYUzxtu5PU6FBbrRJ3jPlwxThPqO+UjF7xfW/KS+SxtMw1muWneDtQdR7Pe9zsIryAILg1Lq/KQDpgBv9VTEgxUtw+qD7fg/WUEFaED+XcJVXFpthhMKD8Oq6nrcSqSEzN4o+kxdLrH9mlMpWnXwYX3WhRCq3E= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:48:08 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:08 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 05/14] crypto/dpaa_sec: physically enable QI Date: Thu, 28 Apr 2022 17:17:24 +0530 Message-Id: <20220428114733.1419957-6-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c458da1e-fb97-4009-85fe-08da290cf67a X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 6rspe5NSsW5L8x30K2cs8dHnw31afDvZIAwRyYj/N+0UkElw8UBZAhLvzX/8vkstysk60PaSZCeiWF16C7uE0U9+PizYMP9MY99VvkKlalZ7pIuQurwMZgyNzj2QsDzLMqvM/OWNl2QHVXRqMrRIeW+KBWxLRASeMjkriTV8J6o53eOhqaQIHB0LBmNS1aY7UYtTeUrmRSQSU0MnaWVDQXArUKRrJ2NrNTi4+JtccwpOMvDD3UDi2MGfWlx7IbtFUMbKfUNUK6nMBkhpIgw9HqQva3D6jLw2j63hF+wjD4+HKG975/qhOvMH7o33NSq+onP3xNW15qEnOsrJsxzN2V+Hn+peOC2AqsWwyWpnNEMV/3tnOmtUH7SIqtWPxDf3SD82cNlpn/FlDOdJCKnwl7rYpEoJb2mEEqVbFFsSXOQSwKi6/WUoLSEW9JPbwRSZHRDSJLyCpTdaDub7cpIs+kMCYMz53DkxW9bqwrQcFBfgx5eipJTn/4hZacpUhiS6NtXVFXZ7opiS9d1W2i7l4aJdQpXT6VY7k+CpeIdNhJ0jeeeOsdhnZNTV23RJOczpRfSoHj7s6xcw1K+9Bd1/xOILPNUiTyc9CynSl7uOCfKFAm6P3au8cO//VSmntljK/Obb86cL1HojV+4UCck6vB6MVT1RWsEjRnNAebd2LlhzJf/DBkihaIUfZT5HNZut3RBxSK1ZktRmjSnh1QoCovUEc6CBWi2f4v+Nz35INK5fBeM8DkfjExupef4GT16amsCo9Hw9cGAwH5B7kjxgYNE2QHUqES51jek9I0SltM6koM/bd/x7/OMZR3j/UfI6fag2llmRZC/59XUm50hrc9ZiOGNf5FI86ZD/ud7yCB3b67eeqwnIFDcnKNYZP7vlwfZIFVJ4wbDiwt7rBy/6XoleRfc1jMVyKsMWN99qurivTOIlGZwBIZB0hYZq+cea4RN6Q8lALqTlp9hQlmhbsDJWLJp7sBnttECtF5kCpZi+eYaENh557ZhDCgSpOhI4kB0i6OTWCwhXgvgeUr8uiHum3QvurF8jEf0TBYrFvReQZ7JYsC/nG+MrhmYx6CVixo1TTO/fVigxCe21yGRvcH73odkHqN9xeUp4/IRFgT6RUfR11yUf2gH0xGEXbAwr28SwfStzX6AIeHJc96aFntgr9C3rg+jCQsAkLXGnrMffHakSoApplCgT0nlK4qcP8KYS0qgugbL2ILBeS88e5m/ik7JMuZ97Op+/X6HSiKr000bK0hNKtueFdp0Ba+rsclJaMGhbgEIGYDcnAgsXhjXhrBvQGWmO4b5Euw6nFNTZ+8inaRI4XYNQlQUgmXSmY2uIf+5e8bNqomPoQBEgX8IYlmj3vGb0AwsIMPE7qKGgsRYOakmd+zIa8ZeMnFjNau9qQP3z0fMy/k315qw6aH76BsEAxgu2r/dxEllkYCNUXcqIKD7hmujW9fb1eTWxwMD69KePiPD1gO9/v3Lw8SYlOTOQtHFzaAtsiqAfIPEsk3ic4RjUFtZNSQm7bOR3FO2fW/9HaZjjD3MT/RQKg2jw8TfwJ0CGclshJCklQrkD1QSuYtmhZ2V9i2q4p2iCEsG0wFLcNjw2a3tZV5TUypQS8jMhDVwPAWaJKqoo6/TDG1pvRadWIfveqU2Jy0ENJDkkhV2SdyBz0lfb2WOEaKjThF5IHurx6UpUorv5+A1hGwLgJNS1HdYg+g74dgfjtqlKxahRy5Dhfpr4VpGVsw== X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: c458da1e-fb97-4009-85fe-08da290cf67a X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:08.0899 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: bFtr7PtOxr0Q/Zf7FwELy0VDyy7PFT9sAW0bEGvlDD6NwKiCMynJTha25W3VYCCK X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org To perform crypto operations on DPAA platform, QI interface of HW must be enabled. Earlier DPAA crypto driver was dependent on kernel for QI enable. Now with this patch there is no such dependency on kernel. Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa_sec/dpaa_sec.c | 30 ++++++++++++++++++++++++++++-- drivers/crypto/dpaa_sec/dpaa_sec.h | 6 ++++++ 2 files changed, 34 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index ed12d6663b..23a94d7e41 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2017-2021 NXP + * Copyright 2017-2022 NXP * */ @@ -20,6 +20,7 @@ #endif #include #include +#include #include #include #include @@ -3654,9 +3655,35 @@ dpaa_sec_dev_init(struct rte_cryptodev *cryptodev) struct dpaa_sec_qp *qp; uint32_t i, flags; int ret; + void *cmd_map; + int map_fd = -1; PMD_INIT_FUNC_TRACE(); + internals = cryptodev->data->dev_private; + map_fd = open("/dev/mem", O_RDWR); + if (unlikely(map_fd < 0)) { + DPAA_SEC_ERR("Unable to open (/dev/mem)"); + return map_fd; + } + internals->sec_hw = mmap(NULL, MAP_SIZE, PROT_READ | PROT_WRITE, + MAP_SHARED, map_fd, SEC_BASE_ADDR); + if (internals->sec_hw == MAP_FAILED) { + DPAA_SEC_ERR("Memory map failed"); + close(map_fd); + return -EINVAL; + } + cmd_map = (uint8_t *)internals->sec_hw + + (BLOCK_OFFSET * QI_BLOCK_NUMBER) + CMD_REG; + if (!(be32_to_cpu(rte_read32(cmd_map)) & QICTL_DQEN)) + /* enable QI interface */ + rte_write32(cpu_to_be32(QICTL_DQEN), cmd_map); + + ret = munmap(internals->sec_hw, MAP_SIZE); + if (ret) + DPAA_SEC_WARN("munmap failed\n"); + + close(map_fd); cryptodev->driver_id = dpaa_cryptodev_driver_id; cryptodev->dev_ops = &crypto_ops; @@ -3673,7 +3700,6 @@ dpaa_sec_dev_init(struct rte_cryptodev *cryptodev) RTE_CRYPTODEV_FF_OOP_LB_IN_SGL_OUT | RTE_CRYPTODEV_FF_OOP_LB_IN_LB_OUT; - internals = cryptodev->data->dev_private; internals->max_nb_queue_pairs = RTE_DPAA_MAX_NB_SEC_QPS; internals->max_nb_sessions = RTE_DPAA_SEC_PMD_MAX_NB_SESSIONS; diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index b3f2258ead..8921e3ed89 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -10,6 +10,12 @@ #define CRYPTODEV_NAME_DPAA_SEC_PMD crypto_dpaa_sec /**< NXP DPAA - SEC PMD device name */ +#define SEC_BASE_ADDR 0x1700000 +#define MAP_SIZE 0x100000 +#define BLOCK_OFFSET 0x10000 +#define CMD_REG 0x4 +#define QICTL_DQEN 0x01 +#define QI_BLOCK_NUMBER 7 #define MAX_DPAA_CORES 4 #define NUM_POOL_CHANNELS 4 #define DPAA_SEC_BURST 7 From patchwork Thu Apr 28 11:47:25 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110427 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B727BA034C; Thu, 28 Apr 2022 13:48:42 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D85DF42843; Thu, 28 Apr 2022 13:48:11 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20079.outbound.protection.outlook.com [40.107.2.79]) by mails.dpdk.org (Postfix) with ESMTP id 2B25342841 for ; Thu, 28 Apr 2022 13:48:11 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BFDSLGQuAeb6k7SMssf+J5O+W1ztiSIiclt8f44Po7vqjoaSN9zHhpjWE6SE0YUpl159gl1Z2BsfrqCTagHKTb0eFtdkH5EBxB3sgiBmzLRT82/QkUNJnSf00tOSXdB3O4SVPqZCoBq3kWYMSpNWX+pI81GxzX17KS3ap/zOnvFc5d5lTWyUTxJifo04q0oC52//fddLUublNHlGiMm+r9azXmYKvo749bFk30sN4TYrTwXdNAQO6iBhi6ABylg51ApNqVYQup6Q2Cp4BjTtU3IZVRlRB+FdwgGfDA8z9/8rbhigKXswSYVQHgt3lK9P75fhAvh8uGmuGtf6uM8vpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1nfNduKkR54YzMSXgid8h49E67B4U6MYNYOGrbIFq00=; b=nxJ6ZGfDBtFnVjqJu8I8wN879XtebymEZaV5WR7glZQtQ6Hk8C7+ZK+gxJ2HGuolt+7xtSBiJmntSmK6LiAoWqHz9SXSOaQRLFE4GsvSAHM+lY2PCD81nUhYFGbXbH+sJD9iwyhhn/lpFfqnMEpOYcozR9v5wDwfD4xEzghHTruFtK6hKbceJmDCkxM1bqorfnWCKnSOobX7M165OgMPfG/8lhpYrdzwPxoHXWLkdm1tI0mdlnXtgviOvzYiYiwmvlBWeBDoQYk5I+H4JHrqeyUDNBpby/1dnu0qqKNOcecVsPr5CnHND5ER+8ckmRhED/uAGj1ZcPg6at939DZIGw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1nfNduKkR54YzMSXgid8h49E67B4U6MYNYOGrbIFq00=; b=sja+ZzNZZyQDEwgXDN/VvGwQoNpe8EsRGrZD93fHrgNAGlILLtZjl7eqZXA80X/tF0nHI709+Vmu1F8+XMWpvoVjKQ+++TjeqWc9toU7j6gEVlplM0DqzQDs/+CxEy3hv2eZ8jsEd0cDnC2bm+lfzbXqtpI8G5IdxLTowf9ZKME= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by VI1PR04MB4622.eurprd04.prod.outlook.com (2603:10a6:803:76::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Thu, 28 Apr 2022 11:48:10 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:10 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 06/14] crypto/dpaa_sec: replace use of old build macros Date: Thu, 28 Apr 2022 17:17:25 +0530 Message-Id: <20220428114733.1419957-7-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 119a2b49-d296-490e-0168-08da290cf794 X-MS-TrafficTypeDiagnostic: VI1PR04MB4622:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(4326008)(8936002)(83380400001)(508600001)(6666004)(6506007)(6512007)(26005)(86362001)(52116002)(55236004)(5660300002)(38100700002)(8676002)(6486002)(316002)(186003)(2616005)(1076003)(36756003)(66946007)(66556008)(66476007)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 119a2b49-d296-490e-0168-08da290cf794 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:10.0116 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 04D2HLjbbEZHwTvgLhyWbsF0llwiK5DiJzcFUf12431iVdjX1ocD/PmFdSAOXKve X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4622 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Use the newer security macros defined by meson. Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c index 29f4e6d40b..d081953e26 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c @@ -645,7 +645,7 @@ build_dpaa_raw_dp_cipher_fd(uint8_t *drv_ctx, return cf; } -#ifdef RTE_LIBRTE_SECURITY +#ifdef RTE_LIB_SECURITY static inline struct dpaa_sec_job * build_dpaa_raw_proto_sg(uint8_t *drv_ctx, struct rte_crypto_sgl *sgl, @@ -1036,7 +1036,7 @@ dpaa_sec_configure_raw_dp_ctx(struct rte_cryptodev *dev, uint16_t qp_id, sess->build_raw_dp_fd = build_dpaa_raw_dp_chain_fd; else if (sess->ctxt == DPAA_SEC_AEAD) sess->build_raw_dp_fd = build_raw_cipher_auth_gcm_sg; -#ifdef RTE_LIBRTE_SECURITY +#ifdef RTE_LIB_SECURITY else if (sess->ctxt == DPAA_SEC_IPSEC || sess->ctxt == DPAA_SEC_PDCP) sess->build_raw_dp_fd = build_dpaa_raw_proto_sg; From patchwork Thu Apr 28 11:47:26 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110428 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 17023A034C; Thu, 28 Apr 2022 13:48:52 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4CB1D42849; Thu, 28 Apr 2022 13:48:14 +0200 (CEST) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2068.outbound.protection.outlook.com [40.107.20.68]) by mails.dpdk.org (Postfix) with ESMTP id 7F59342849 for ; Thu, 28 Apr 2022 13:48:13 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EIuNpm+POCRRq+F6Db1VlaZ469EXJCFDuZNV+BsrYmsCfOb0MRmih07coPSyeaOKEgtxu0qIS6MU31nDo/PmnenuSgV64W9jlFguldX1wonzbLnAA2GyYBnsURMk3PZCx2qOoxS0wjxNpDerd4/Iz4UqyBKKYXYIWB8Lcil/+geuZ9aINaJvEtMsPkRNiAWNm1GNYcWk3oNtck92mslRNnXiQuk6khG+v5Z/2lX41jyPGUIDs+AYiH1wBjvVuKIdffxzRWPNnRBi9gLPJwgF/AfRtCeWkD8d0t9K8bwpkr3HpVDBSVLi5TI48ykjAA9LgoaKHP7qYw6XV0jWe33KHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gh1P/DLnH9sjJu/kSGFhEpawSoKWTo95HhMLXQicCGQ=; b=XYZwMpVSl7KAaUbRC7bQf+OJBDxtTiWmXQake2QxQIlBs2HIsyBFfuKii/s/RH+Agaqn9K9uDDy+88j8krjB6QSdb86KOyxR91rUoMdZnF8nauR7xQAXaHUYG+Z4TLOncyubLSVH5PegB2y2cNoYIxH9Jk75OvQ+jaE0SrDXEAWgeq7a/9cGsHPYSZaCt+heTsl923pvQRW30zuycIrG70hXZO735S1IQvqZLvLUaijVv1mkbrEEMCa8lovNanCWPDVh6/Rh7T8LUv/RefgxsJ2rsKTVzewuRTBu7Aez5+l0imnZFoFdt5ZQqrF5Dk8DIEBOMZiEFFcUhbC5aQSuuw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gh1P/DLnH9sjJu/kSGFhEpawSoKWTo95HhMLXQicCGQ=; b=aYR4EbK2w0IgZ/o48P8AufWvSHT1/2NjSAcYVFsoSImfe5m9zbMjdwbakRU3ggUaPskZbKV49TwM2dlcx/+0+UeLHBx2etSWEUQiz/k0yQ0osBmXR+02dK1EJ9XDdKu3Ju9v/socJTaFi37yIfJU7OhOV0WqEt1nmkEz1g6hHbs= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:12 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:12 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 07/14] common/dpaax: remove obsolete code Date: Thu, 28 Apr 2022 17:17:26 +0530 Message-Id: <20220428114733.1419957-8-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c47b089d-f7f7-4b10-da25-08da290cf8b6 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: xd05jJdandx6Zyk8MZrTHHi2xT7Su8UjJuoUzmzINHLyp6QE+TrNCoSg0+Na5ZJ/2kCrehZ4fVymLJaTTdgh+gUqTE8fkW1GEwLoh/jllF9FD/QWKc1GTIlsklKDL76EfGP3FthIoPA/GFUCZltUo440jREKXzHZZk+3OjW6mVHQlzJdaIAjLFX/8kFzC45QHfu3gbYHBHFNDtZ16d999aNDeQQz0sKQQ6GS++IetTAsUz+AyIFNvol9juy1OIHJuJjyL/GnywmDnhXFJubikROaEzRW2vODM1XgRyGzsvaLilLvFfE/+x3efIb9oTxMW7J2eJfvPZIlLZusWPUxk5lLexdoFkIfSrjDMKYWmNyu8WAWADxp8S0RFrKujNb2SkMLhxAFdPFt1VUf0NUjfD3A9MLCkgTCSLsmkHjcrkWdHTqpUVLjPgfudq+qqe5HJiBlBcUrTvgiHfF9ovJld/QhSI4PcLZkfM8QdbWrFhh1/YB58iJrHCRA4Cna/N3WPsecqCpDc2Y/afWgYYjjOoM3WV6nXUoeS8NS/GrmyUjlkY4EyKM0yu2gACEK5mrBVEN8kx8itONF19jFTWV8WhsG/IgiGaB4uxrEG2gJF5kXyI0bm+NOWGeOwMnFDWsiacSPfUDie7ozj9eftW55f1heTmGmy8eI9PXsPIOXmC5duZM7K9GthWsmSwKDEXLTUiNjoa+gVjLsfbmv0WlXyThT8Id12eyO8bhJkX8AfGgQbfJHrnnXUf1zGL4JV+Pz X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(30864003)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: c47b089d-f7f7-4b10-da25-08da290cf8b6 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:11.9423 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ltnrv6twiZpYILfHkWf7ROP79kf51FjObZzfLg/S1ngEs8DgBtJ18aABcu0IfLfo X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Remove sec era 1 to 7 IPsec and caam operations code as none of the NXP platform use it. Signed-off-by: Gagandeep Singh --- drivers/common/dpaax/caamflib/desc/ipsec.h | 34 +++------------- .../dpaax/caamflib/rta/fifo_load_store_cmd.h | 15 ------- .../common/dpaax/caamflib/rta/header_cmd.h | 15 +------ drivers/common/dpaax/caamflib/rta/jump_cmd.h | 16 -------- drivers/common/dpaax/caamflib/rta/key_cmd.h | 12 ------ drivers/common/dpaax/caamflib/rta/math_cmd.h | 29 -------------- drivers/common/dpaax/caamflib/rta/move_cmd.h | 39 ++++--------------- drivers/common/dpaax/caamflib/rta/nfifo_cmd.h | 6 --- .../common/dpaax/caamflib/rta/operation_cmd.h | 20 ---------- .../common/dpaax/caamflib/rta/protocol_cmd.h | 29 -------------- 10 files changed, 15 insertions(+), 200 deletions(-) diff --git a/drivers/common/dpaax/caamflib/desc/ipsec.h b/drivers/common/dpaax/caamflib/desc/ipsec.h index 668d21649d..8ec6aac915 100644 --- a/drivers/common/dpaax/caamflib/desc/ipsec.h +++ b/drivers/common/dpaax/caamflib/desc/ipsec.h @@ -774,14 +774,9 @@ cnstr_shdsc_ipsec_encap(uint32_t *descbuf, bool ps, bool swap, COPY_DATA(p, pdb->ip_hdr, pdb->ip_hdr_len); SET_LABEL(p, hdr); pkeyjmp = JUMP(p, keyjmp, LOCAL_JUMP, ALL_TRUE, BOTH|SHRD); - if (authdata->keylen) { - if (rta_sec_era < RTA_SEC_ERA_6) - KEY(p, MDHA_SPLIT_KEY, authdata->key_enc_flags, - authdata->key, authdata->keylen, - INLINE_KEY(authdata)); - else - __gen_auth_key(p, authdata); - } + if (authdata->keylen) + __gen_auth_key(p, authdata); + if (cipherdata->keylen) KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, cipherdata->keylen, INLINE_KEY(cipherdata)); @@ -841,14 +836,9 @@ cnstr_shdsc_ipsec_decap(uint32_t *descbuf, bool ps, bool swap, __rta_copy_ipsec_decap_pdb(p, pdb, cipherdata->algtype); SET_LABEL(p, hdr); pkeyjmp = JUMP(p, keyjmp, LOCAL_JUMP, ALL_TRUE, BOTH|SHRD); - if (authdata->keylen) { - if (rta_sec_era < RTA_SEC_ERA_6) - KEY(p, MDHA_SPLIT_KEY, authdata->key_enc_flags, - authdata->key, authdata->keylen, - INLINE_KEY(authdata)); - else - __gen_auth_key(p, authdata); - } + if (authdata->keylen) + __gen_auth_key(p, authdata); + if (cipherdata->keylen) KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, cipherdata->keylen, INLINE_KEY(cipherdata)); @@ -1248,12 +1238,6 @@ cnstr_shdsc_ipsec_new_encap(uint32_t *descbuf, bool ps, LABEL(l2copy); REFERENCE(pl2copy); - if (rta_sec_era < RTA_SEC_ERA_8) { - pr_err("IPsec new mode encap: available only for Era %d or above\n", - USER_SEC_ERA(RTA_SEC_ERA_8)); - return -ENOTSUP; - } - PROGRAM_CNTXT_INIT(p, descbuf, 0); if (swap) PROGRAM_SET_BSWAP(p); @@ -1363,12 +1347,6 @@ cnstr_shdsc_ipsec_new_decap(uint32_t *descbuf, bool ps, LABEL(hdr); REFERENCE(phdr); - if (rta_sec_era < RTA_SEC_ERA_8) { - pr_err("IPsec new mode decap: available only for Era %d or above\n", - USER_SEC_ERA(RTA_SEC_ERA_8)); - return -ENOTSUP; - } - PROGRAM_CNTXT_INIT(p, descbuf, 0); if (swap) PROGRAM_SET_BSWAP(p); diff --git a/drivers/common/dpaax/caamflib/rta/fifo_load_store_cmd.h b/drivers/common/dpaax/caamflib/rta/fifo_load_store_cmd.h index 287e09cd75..51d54deb16 100644 --- a/drivers/common/dpaax/caamflib/rta/fifo_load_store_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/fifo_load_store_cmd.h @@ -68,11 +68,6 @@ rta_fifo_load(struct program *program, uint32_t src, pr_err("SEQ FIFO LOAD: Invalid command\n"); goto err; } - if ((rta_sec_era <= RTA_SEC_ERA_5) && (flags & AIDF)) { - pr_err("SEQ FIFO LOAD: Flag(s) not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } if ((flags & VLF) && ((flags & EXT) || (length >> 16))) { pr_err("SEQ FIFO LOAD: Invalid usage of VLF\n"); goto err; @@ -244,11 +239,6 @@ rta_fifo_store(struct program *program, uint32_t src, goto err; } } - if ((rta_sec_era == RTA_SEC_ERA_7) && (src == AFHA_SBOX)) { - pr_err("FIFO STORE: AFHA S-box not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } /* write output data type field */ ret = __rta_map_opcode(src, fifo_store_table, @@ -263,11 +253,6 @@ rta_fifo_store(struct program *program, uint32_t src, if (encrypt_flags & TK) opcode |= (0x1 << FIFOST_TYPE_SHIFT); if (encrypt_flags & EKT) { - if (rta_sec_era == RTA_SEC_ERA_1) { - pr_err("FIFO STORE: AES-CCM source types not supported\n"); - ret = -EINVAL; - goto err; - } opcode |= (0x10 << FIFOST_TYPE_SHIFT); opcode &= (uint32_t)~(0x20 << FIFOST_TYPE_SHIFT); } diff --git a/drivers/common/dpaax/caamflib/rta/header_cmd.h b/drivers/common/dpaax/caamflib/rta/header_cmd.h index 45aefa04c1..779f84ebcb 100644 --- a/drivers/common/dpaax/caamflib/rta/header_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/header_cmd.h @@ -155,12 +155,6 @@ rta_job_header(struct program *program, goto err; } - if ((rta_sec_era < RTA_SEC_ERA_7) && (flags & MTD) && !(flags & TD)) { - pr_err("JOB_DESC: Trying to MTD a descriptor that is not a TD. SEC Program Line: %d\n", - program->current_pc); - goto err; - } - if ((flags & EXT) && !(flags & SHR) && (start_idx < 2)) { pr_err("JOB_DESC: Start index must be >= 2 in case of no SHR and EXT. SEC Program Line: %d\n", program->current_pc); @@ -183,15 +177,8 @@ rta_job_header(struct program *program, hdr_ext |= ext_flags & DSEL_MASK; } - if (ext_flags & FTD) { - if (rta_sec_era <= RTA_SEC_ERA_5) { - pr_err("JOB_DESC: Fake trusted descriptor not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } - + if (ext_flags & FTD) hdr_ext |= HDR_EXT_FTD; - } } if (flags & RSMS) opcode |= HDR_RSLS; diff --git a/drivers/common/dpaax/caamflib/rta/jump_cmd.h b/drivers/common/dpaax/caamflib/rta/jump_cmd.h index 18f781e373..0ce5a3e7c6 100644 --- a/drivers/common/dpaax/caamflib/rta/jump_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/jump_cmd.h @@ -7,8 +7,6 @@ #ifndef __RTA_JUMP_CMD_H__ #define __RTA_JUMP_CMD_H__ -extern enum rta_sec_era rta_sec_era; - static const uint32_t jump_test_cond[][2] = { { NIFP, JUMP_COND_NIFP }, { NIP, JUMP_COND_NIP }, @@ -59,20 +57,6 @@ rta_jump(struct program *program, uint64_t address, unsigned int start_pc = program->current_pc; int ret = -EINVAL; - if (((jump_type == GOSUB) || (jump_type == RETURN)) && - (rta_sec_era < RTA_SEC_ERA_4)) { - pr_err("JUMP: Jump type not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } - - if (((jump_type == LOCAL_JUMP_INC) || (jump_type == LOCAL_JUMP_DEC)) && - (rta_sec_era <= RTA_SEC_ERA_5)) { - pr_err("JUMP_INCDEC: Jump type not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } - switch (jump_type) { case (LOCAL_JUMP): /* diff --git a/drivers/common/dpaax/caamflib/rta/key_cmd.h b/drivers/common/dpaax/caamflib/rta/key_cmd.h index ec3fbcaf61..714918e18b 100644 --- a/drivers/common/dpaax/caamflib/rta/key_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/key_cmd.h @@ -54,12 +54,6 @@ rta_key(struct program *program, uint32_t key_dst, program->current_instruction); goto err; } - if ((rta_sec_era <= RTA_SEC_ERA_5) && - ((flags & VLF) || (flags & AIDF))) { - pr_err("SEQKEY: Flag(s) not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } } else { if ((flags & AIDF) || (flags & VLF)) { pr_err("KEY: Invalid flag. SEC PC: %d; Instr: %d\n", @@ -84,12 +78,6 @@ rta_key(struct program *program, uint32_t key_dst, } if (key_dst == AFHA_SBOX) { - if (rta_sec_era == RTA_SEC_ERA_7) { - pr_err("KEY: AFHA S-box not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } - if (flags & IMMED) { pr_err("KEY: Invalid flag. SEC PC: %d; Instr: %d\n", program->current_pc, diff --git a/drivers/common/dpaax/caamflib/rta/math_cmd.h b/drivers/common/dpaax/caamflib/rta/math_cmd.h index cca70f7e04..532c70c518 100644 --- a/drivers/common/dpaax/caamflib/rta/math_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/math_cmd.h @@ -85,22 +85,7 @@ rta_math(struct program *program, uint64_t operand1, int ret = -EINVAL; unsigned int start_pc = program->current_pc; - if (((op == MATH_FUN_BSWAP) && (rta_sec_era < RTA_SEC_ERA_4)) || - ((op == MATH_FUN_ZBYT) && (rta_sec_era < RTA_SEC_ERA_2))) { - pr_err("MATH: operation not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - if (options & SWP) { - if (rta_sec_era < RTA_SEC_ERA_7) { - pr_err("MATH: operation not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - if ((options & IFB) || (!(options & IMMED) && !(options & IMMED2)) || ((options & IMMED) && (options & IMMED2))) { @@ -258,26 +243,12 @@ rta_mathi(struct program *program, uint64_t operand, int ret = -EINVAL; unsigned int start_pc = program->current_pc; - if (rta_sec_era < RTA_SEC_ERA_6) { - pr_err("MATHI: Command not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - if (((op == MATH_FUN_FBYT) && (options & SSEL))) { pr_err("MATHI: Illegal combination - FBYT and SSEL. SEC PC: %d; Instr: %d\n", program->current_pc, program->current_instruction); goto err; } - if ((options & SWP) && (rta_sec_era < RTA_SEC_ERA_7)) { - pr_err("MATHI: SWP not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - /* Write first operand field */ if (!(options & SSEL)) ret = __rta_map_opcode((uint32_t)operand, math_op1, diff --git a/drivers/common/dpaax/caamflib/rta/move_cmd.h b/drivers/common/dpaax/caamflib/rta/move_cmd.h index d2151c6dd7..ac1280c23a 100644 --- a/drivers/common/dpaax/caamflib/rta/move_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/move_cmd.h @@ -95,26 +95,12 @@ rta_move(struct program *program, int cmd_type, uint64_t src, bool is_move_len_cmd = false; unsigned int start_pc = program->current_pc; - if ((rta_sec_era < RTA_SEC_ERA_7) && (cmd_type != __MOVE)) { - pr_err("MOVE: MOVEB / MOVEDW not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - /* write command type */ if (cmd_type == __MOVEB) { opcode = CMD_MOVEB; } else if (cmd_type == __MOVEDW) { opcode = CMD_MOVEDW; } else if (!(flags & IMMED)) { - if (rta_sec_era < RTA_SEC_ERA_3) { - pr_err("MOVE: MOVE_LEN not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), program->current_pc, - program->current_instruction); - goto err; - } - if ((length != MATH0) && (length != MATH1) && (length != MATH2) && (length != MATH3)) { pr_err("MOVE: MOVE_LEN length must be MATH[0-3]. SEC PC: %d; Instr: %d\n", @@ -153,24 +139,15 @@ rta_move(struct program *program, int cmd_type, uint64_t src, else offset = dst_offset; - if (rta_sec_era < RTA_SEC_ERA_6) { - if (offset) - pr_debug("MOVE: Offset not supported by SEC Era %d. SEC PC: %d; Instr: %d\n", - USER_SEC_ERA(rta_sec_era), - program->current_pc, - program->current_instruction); - /* nothing to do for offset = 0 */ - } else { - ret = math_offset(offset); - if (ret < 0) { - pr_err("MOVE: Invalid offset in MATH register. SEC PC: %d; Instr: %d\n", - program->current_pc, - program->current_instruction); - goto err; - } - - opcode |= (uint32_t)ret; + ret = math_offset(offset); + if (ret < 0) { + pr_err("MOVE: Invalid offset in MATH register. SEC PC: %d; Instr: %d\n", + program->current_pc, + program->current_instruction); + goto err; } + + opcode |= (uint32_t)ret; } /* write source field */ diff --git a/drivers/common/dpaax/caamflib/rta/nfifo_cmd.h b/drivers/common/dpaax/caamflib/rta/nfifo_cmd.h index 85092d9612..8131acd9e4 100644 --- a/drivers/common/dpaax/caamflib/rta/nfifo_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/nfifo_cmd.h @@ -102,12 +102,6 @@ rta_nfifo_load(struct program *program, uint32_t src, LDST_SRCDST_WORD_INFO_FIFO; unsigned int start_pc = program->current_pc; - if ((data == AFHA_SBOX) && (rta_sec_era == RTA_SEC_ERA_7)) { - pr_err("NFIFO: AFHA S-box not supported by SEC Era %d\n", - USER_SEC_ERA(rta_sec_era)); - goto err; - } - /* write source field */ ret = __rta_map_opcode(src, nfifo_src, nfifo_src_sz[rta_sec_era], &val); if (ret < 0) { diff --git a/drivers/common/dpaax/caamflib/rta/operation_cmd.h b/drivers/common/dpaax/caamflib/rta/operation_cmd.h index 3d339cb0a0..fe1ac37ee8 100644 --- a/drivers/common/dpaax/caamflib/rta/operation_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/operation_cmd.h @@ -19,8 +19,6 @@ __rta_alg_aai_aes(uint16_t aai) uint16_t aes_mode = aai & OP_ALG_AESA_MODE_MASK; if (aai & OP_ALG_AAI_C2K) { - if (rta_sec_era < RTA_SEC_ERA_5) - return -1; if ((aes_mode != OP_ALG_AAI_CCM) && (aes_mode != OP_ALG_AAI_GCM)) return -EINVAL; @@ -30,9 +28,6 @@ __rta_alg_aai_aes(uint16_t aai) case OP_ALG_AAI_CBC_CMAC: case OP_ALG_AAI_CTR_CMAC_LTE: case OP_ALG_AAI_CTR_CMAC: - if (rta_sec_era < RTA_SEC_ERA_2) - return -EINVAL; - /* no break */ case OP_ALG_AAI_CTR: case OP_ALG_AAI_CBC: case OP_ALG_AAI_ECB: @@ -72,9 +67,6 @@ __rta_alg_aai_md5(uint16_t aai) { switch (aai) { case OP_ALG_AAI_HMAC: - if (rta_sec_era < RTA_SEC_ERA_2) - return -EINVAL; - /* no break */ case OP_ALG_AAI_SMAC: case OP_ALG_AAI_HASH: case OP_ALG_AAI_HMAC_PRECOMP: @@ -89,9 +81,6 @@ __rta_alg_aai_sha(uint16_t aai) { switch (aai) { case OP_ALG_AAI_HMAC: - if (rta_sec_era < RTA_SEC_ERA_2) - return -EINVAL; - /* no break */ case OP_ALG_AAI_HASH: case OP_ALG_AAI_HMAC_PRECOMP: return 0; @@ -115,15 +104,6 @@ __rta_alg_aai_rng(uint16_t aai) return -EINVAL; } - /* State Handle bits are valid only for SEC Era >= 5 */ - if ((rta_sec_era < RTA_SEC_ERA_5) && rng_sh) - return -EINVAL; - - /* PS, AI, SK bits are also valid only for SEC Era >= 5 */ - if ((rta_sec_era < RTA_SEC_ERA_5) && (aai & - (OP_ALG_AAI_RNG4_PS | OP_ALG_AAI_RNG4_AI | OP_ALG_AAI_RNG4_SK))) - return -EINVAL; - switch (rng_sh) { case OP_ALG_AAI_RNG4_SH_0: case OP_ALG_AAI_RNG4_SH_1: diff --git a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h index e9f20703f2..ac5c8af716 100644 --- a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h +++ b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h @@ -32,9 +32,6 @@ __rta_ssl_proto(uint16_t protoinfo) case OP_PCL_TLS_ECDHE_RSA_WITH_RC4_128_SHA: case OP_PCL_TLS_ECDH_anon_WITH_RC4_128_SHA: case OP_PCL_TLS_ECDHE_PSK_WITH_RC4_128_SHA: - if (rta_sec_era == RTA_SEC_ERA_7) - return -EINVAL; - /* fall through if not Era 7 */ case OP_PCL_TLS_RSA_EXPORT_WITH_DES40_CBC_SHA: case OP_PCL_TLS_RSA_WITH_DES_CBC_SHA: case OP_PCL_TLS_RSA_WITH_3DES_EDE_CBC_SHA: @@ -215,9 +212,6 @@ __rta_ipsec_proto(uint16_t protoinfo) switch (proto_cls1) { case OP_PCL_IPSEC_AES_NULL_WITH_GMAC: - if (rta_sec_era < RTA_SEC_ERA_2) - return -EINVAL; - /* no break */ case OP_PCL_IPSEC_AES_CCM8: case OP_PCL_IPSEC_AES_CCM12: case OP_PCL_IPSEC_AES_CCM16: @@ -229,9 +223,6 @@ __rta_ipsec_proto(uint16_t protoinfo) return 0; return -EINVAL; case OP_PCL_IPSEC_NULL: - if (rta_sec_era < RTA_SEC_ERA_2) - return -EINVAL; - /* no break */ case OP_PCL_IPSEC_DES_IV64: case OP_PCL_IPSEC_DES: case OP_PCL_IPSEC_3DES: @@ -351,9 +342,6 @@ __rta_blob_proto(uint16_t protoinfo) switch (protoinfo & OP_PCL_BLOB_REG_MASK) { case OP_PCL_BLOB_AFHA_SBOX: - if (rta_sec_era < RTA_SEC_ERA_3) - return -EINVAL; - /* no break */ case OP_PCL_BLOB_REG_MEMORY: case OP_PCL_BLOB_REG_KEY1: case OP_PCL_BLOB_REG_KEY2: @@ -368,12 +356,6 @@ __rta_blob_proto(uint16_t protoinfo) static inline int __rta_dlc_proto(uint16_t protoinfo) { - if ((rta_sec_era < RTA_SEC_ERA_2) && - (protoinfo & (OP_PCL_PKPROT_DSA_MSG | OP_PCL_PKPROT_HASH_MASK | - OP_PCL_PKPROT_EKT_Z | OP_PCL_PKPROT_DECRYPT_Z | - OP_PCL_PKPROT_DECRYPT_PRI))) - return -EINVAL; - switch (protoinfo & OP_PCL_PKPROT_HASH_MASK) { case OP_PCL_PKPROT_HASH_MD5: case OP_PCL_PKPROT_HASH_SHA1: @@ -482,9 +464,6 @@ __rta_dkp_proto(uint16_t protoinfo) static inline int __rta_3g_dcrc_proto(uint16_t protoinfo) { - if (rta_sec_era == RTA_SEC_ERA_7) - return -EINVAL; - switch (protoinfo) { case OP_PCL_3G_DCRC_CRC7: case OP_PCL_3G_DCRC_CRC11: @@ -497,9 +476,6 @@ __rta_3g_dcrc_proto(uint16_t protoinfo) static inline int __rta_3g_rlc_proto(uint16_t protoinfo) { - if (rta_sec_era == RTA_SEC_ERA_7) - return -EINVAL; - switch (protoinfo) { case OP_PCL_3G_RLC_NULL: case OP_PCL_3G_RLC_KASUMI: @@ -513,13 +489,8 @@ __rta_3g_rlc_proto(uint16_t protoinfo) static inline int __rta_lte_pdcp_proto(uint16_t protoinfo) { - if (rta_sec_era == RTA_SEC_ERA_7) - return -EINVAL; - switch (protoinfo) { case OP_PCL_LTE_ZUC: - if (rta_sec_era < RTA_SEC_ERA_5) - break; case OP_PCL_LTE_NULL: case OP_PCL_LTE_SNOW: case OP_PCL_LTE_AES: From patchwork Thu Apr 28 11:47:27 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110429 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 542D2A04FF; Thu, 28 Apr 2022 13:49:01 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A533E42855; Thu, 28 Apr 2022 13:48:16 +0200 (CEST) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2086.outbound.protection.outlook.com [40.107.20.86]) by mails.dpdk.org (Postfix) with ESMTP id DBDEB4284F; Thu, 28 Apr 2022 13:48:14 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UVbv2HbEZTaQGfpM6LjU8fohTTi70UhaocRZ+Wakrkty0OcptWL6Gjke8jspRibHgrDQkJ+MglXPYyW877gBtjMwt3tttvL8SruavNIuR3WLtNto+6LixCT1mMEoXQ37XAeFw0vyRBICON7QEgyYuV/cd6nsiCj/0soEkLgz8In07uTasakvsTjkXSes8Ix8C9FNOhl+FXRDQTta+bYP8ZOpdH7/nSczEPRqgkTCsbUrzoVWWyDczKwuxkhx2RWPpNqKars9mERkxWy6rQt9PARtOdazNaC2/LD0TGPTlmDzmqByiGJv25y+GgcfiPxMV4luBpnHpa5EdNqq5pFU5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZTfHyvb/Ajb/23Jnt+qYdq584XQf2eeIcmxmhAHNuBI=; b=M4p0aZlsFvuxUaoYR0G1A6r9vlzblwC/FR5uvXhF7pc+FKPs8fnHwJ/OPZy7CQlNsfuwVQ0O723eWep8SsmtPdNNtDgL6Hrhuk9ogeji4U4nYBzl1k//xTBz1ImfWvma6bvdQzlfpMRKQMr4e2ycgVwa0+w1B/d2YzyJZ/WYyZifs164Ymv4BU5gwPr3TuTpJelCudMx1Al9pN2PvsEOsyG3Fu/asdhnAfXVgB9oZaMjzpaUW4dmScsJ6QUO0YMl3L9aS7vTp4E4LE5fFoC2zCwskq0M68TjApM2wClZPS8wSAya/X5R+5xPOGImYWLJ16H2Y2ntDNWikz1B229A+Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZTfHyvb/Ajb/23Jnt+qYdq584XQf2eeIcmxmhAHNuBI=; b=A/09yz96O93QEY65xevDG11SvfXyn5Ox4vGOnKg0QwVuCqm4L6nvwo8KUGYapXGKvy28VmIoeM8GQr2TO/u3Ogcm5AYmM78B8XW+oZ+jPRAAzWqZOkvGnloM6R1fx2kt1OeVN+hYm4SjryHfiDOFmQ7OlXsp+uu25QSvR2/bugg= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:14 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:14 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Vanshika Shukla , stable@dpdk.org Subject: [PATCH v2 08/14] crypto/dpaa_sec: fix secondary process probe Date: Thu, 28 Apr 2022 17:17:27 +0530 Message-Id: <20220428114733.1419957-9-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f7d8eb72-7121-46a2-0fd2-08da290cf9fa X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: f7d8eb72-7121-46a2-0fd2-08da290cf9fa X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:13.9746 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: he9Bx7n8HBZ2h/c45hNdJeG8DGyq0jlY2Px40ZeF2mR8VB68o1wF7UOYXvbszdX4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org From: Vanshika Shukla DPAA hardware supports non-i/o performing secondary applications only. So we do not have to probe crypto devices in secondary applications. Fixes: c3e85bdcc6e6 ("crypto/dpaa_sec: add crypto driver for NXP DPAA platform") Cc: stable@dpdk.org Signed-off-by: Vanshika Shukla --- drivers/crypto/dpaa_sec/dpaa_sec.c | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index 23a94d7e41..6f2b4baf57 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -3766,23 +3766,24 @@ cryptodev_dpaa_sec_probe(struct rte_dpaa_driver *dpaa_drv __rte_unused, int retval; + if (rte_eal_process_type() != RTE_PROC_PRIMARY) + return 0; + snprintf(cryptodev_name, sizeof(cryptodev_name), "%s", dpaa_dev->name); cryptodev = rte_cryptodev_pmd_allocate(cryptodev_name, rte_socket_id()); if (cryptodev == NULL) return -ENOMEM; - if (rte_eal_process_type() == RTE_PROC_PRIMARY) { - cryptodev->data->dev_private = rte_zmalloc_socket( - "cryptodev private structure", - sizeof(struct dpaa_sec_dev_private), - RTE_CACHE_LINE_SIZE, - rte_socket_id()); + cryptodev->data->dev_private = rte_zmalloc_socket( + "cryptodev private structure", + sizeof(struct dpaa_sec_dev_private), + RTE_CACHE_LINE_SIZE, + rte_socket_id()); - if (cryptodev->data->dev_private == NULL) - rte_panic("Cannot allocate memzone for private " - "device data"); - } + if (cryptodev->data->dev_private == NULL) + rte_panic("Cannot allocate memzone for private " + "device data"); dpaa_dev->crypto_dev = cryptodev; cryptodev->device = &dpaa_dev->device; @@ -3824,8 +3825,7 @@ cryptodev_dpaa_sec_probe(struct rte_dpaa_driver *dpaa_drv __rte_unused, retval = -ENXIO; out: /* In case of error, cleanup is done */ - if (rte_eal_process_type() == RTE_PROC_PRIMARY) - rte_free(cryptodev->data->dev_private); + rte_free(cryptodev->data->dev_private); rte_cryptodev_pmd_release_device(cryptodev); From patchwork Thu Apr 28 11:47:28 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110430 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 55ADCA034C; Thu, 28 Apr 2022 13:49:07 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 98C1342845; Thu, 28 Apr 2022 13:48:18 +0200 (CEST) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2046.outbound.protection.outlook.com [40.107.20.46]) by mails.dpdk.org (Postfix) with ESMTP id 513BB42845 for ; Thu, 28 Apr 2022 13:48:17 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J8dNprK1YLtoNzw6J553/zk9LpDUiU5dXUBUE5nHb/2HmZkMDtCizADy/1O+gcprSsnUR+8O/U+Cgi4DrWfxgV5z1++fvGVR8jB5NrC2qHE+rtmuBqhDhp5l2+dsQ9e/xoACFKxKdQ0PBwA7pYWHtzqRoygt4L+6piU2jip27iou3IbEFI8oIDhPdS+XPthVTDg1T36IaK7UnMCaJnsR8unY1MtUbzgIeAltkrHlIM5y+O19gm/6VpfcNJKZ7Ihn/lSziVvkYERJGy8T/iheOfMGx0oy22CdlAFscMMNCPE29j+J/kZsJPLs7jCqGNlCd+Y6PwIt5wiatoLLqoGPRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kjArFlHF7K1qcuYsuf5tgCtj/03SZ12/6iJK3FHB/dU=; b=QiZdsczl9eocsn+Kkbd6zY6/tZsWO7H0sA8mAhPbYd7OJ+kgt6fKg3n8QwlFUuB0n0qaFgWhrhpTEu4Hi61e3TPE7+wOZNwh9lHCdFIpEY/EqXwrgPJPS+FxQY6KyRf010zbAx0w43r6awI5zxc93Nr6TpvkMJJp54ZtWXxEt9g3hND3XKD5387DPK927ZQtMIB/lzcu3Y7n1c9t0PI9YAm7vD97rjqA8i4iwZP/jJ8c3Mph2OtU8tsLxuk8LGqyeAiEZ5ZWfcasUP7jr057xyy5cuMVwWscpKwDeOVIk904pw5ACiHv4BfcqWJ4M+B9xLL0zz57Ao+FE+jx8ZPqvQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kjArFlHF7K1qcuYsuf5tgCtj/03SZ12/6iJK3FHB/dU=; b=drbpnJk8GnBFCyOuFNJHblACXM7pBU00LgoJluK0JTDLVPNnKOGvw/klGOEbuTr+D7fRPu3HmngsasDHDUMvkbowQJFLhFgN5ufQH4K3dWPdj/wSGezlzLcSYVsJXOTkQ30DlJkxYTJic0mG1SmNCnQW/lqtaKIf61b+buQb3XU= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:16 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:16 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 09/14] crypto/dpaa2_sec: per queue pair fle pool Date: Thu, 28 Apr 2022 17:17:28 +0530 Message-Id: <20220428114733.1419957-10-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: aac1c067-fd36-4893-cab9-08da290cfb15 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(30864003)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: aac1c067-fd36-4893-cab9-08da290cfb15 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:15.9589 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: XHOAOhClDcV5RacN9915gyQ/ko+ScA0WEmTAkcLNxcbL++J2Jgvhwq0oHwGOKMNm X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Driver is creating a fle pool with a fixed number of buffers for all queue pairs of a DPSECI object. These fle buffers are equivalent to the number of descriptors. In this patch, creating the fle pool for each queue pair so that user can control the number of descriptors of a queue pair using API rte_cryptodev_queue_pair_setup(). Signed-off-by: Gagandeep Singh --- drivers/bus/fslmc/portal/dpaa2_hw_dpio.c | 4 +- drivers/bus/fslmc/portal/dpaa2_hw_pvt.h | 3 +- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 190 ++++++++++---------- drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 5 +- drivers/net/dpaa2/dpaa2_ethdev.h | 4 +- drivers/net/dpaa2/dpaa2_rxtx.c | 3 +- 6 files changed, 101 insertions(+), 108 deletions(-) diff --git a/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c b/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c index 943fadee48..22c51c1a82 100644 --- a/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c +++ b/drivers/bus/fslmc/portal/dpaa2_hw_dpio.c @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2016-2019 NXP + * Copyright 2016-2022 NXP * */ #include @@ -614,7 +614,7 @@ dpaa2_free_eq_descriptors(void) if (qbman_result_eqresp_rc(eqresp)) { txq = eqresp_meta->dpaa2_q; - txq->cb_eqresp_free(dpio_dev->eqresp_ci); + txq->cb_eqresp_free(dpio_dev->eqresp_ci, txq); } qbman_result_eqresp_set_rspid(eqresp, 0); diff --git a/drivers/bus/fslmc/portal/dpaa2_hw_pvt.h b/drivers/bus/fslmc/portal/dpaa2_hw_pvt.h index 36d68ea0aa..024fbf9935 100644 --- a/drivers/bus/fslmc/portal/dpaa2_hw_pvt.h +++ b/drivers/bus/fslmc/portal/dpaa2_hw_pvt.h @@ -147,7 +147,8 @@ typedef void (dpaa2_queue_cb_dqrr_t)(struct qbman_swp *swp, struct dpaa2_queue *rxq, struct rte_event *ev); -typedef void (dpaa2_queue_cb_eqresp_free_t)(uint16_t eqresp_ci); +typedef void (dpaa2_queue_cb_eqresp_free_t)(uint16_t eqresp_ci, + struct dpaa2_queue *dpaa2_q); struct dpaa2_queue { struct rte_mempool *mb_pool; /**< mbuf pool to populate RX ring. */ diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 2374d67978..86c8df241b 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -65,11 +65,10 @@ uint8_t cryptodev_driver_id; uint8_t dpaa2_sec_dp_dump = DPAA2_SEC_DP_ERR_DUMP; static inline void -free_fle(const struct qbman_fd *fd) +free_fle(const struct qbman_fd *fd, struct dpaa2_sec_qp *qp) { struct qbman_fle *fle; struct rte_crypto_op *op; - struct ctxt_priv *priv; #ifdef RTE_LIB_SECURITY if (DPAA2_FD_GET_FORMAT(fd) == qbman_fd_single) @@ -78,10 +77,9 @@ free_fle(const struct qbman_fd *fd) fle = (struct qbman_fle *)DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)); op = (struct rte_crypto_op *)DPAA2_GET_FLE_ADDR((fle - 1)); /* free the fle memory */ - if (likely(rte_pktmbuf_is_contiguous(op->sym->m_src))) { - priv = (struct ctxt_priv *)(size_t)DPAA2_GET_FLE_CTXT(fle - 1); - rte_mempool_put(priv->fle_pool, (void *)(fle-1)); - } else + if (likely(rte_pktmbuf_is_contiguous(op->sym->m_src))) + rte_mempool_put(qp->fle_pool, (void *)(fle-1)); + else rte_free((void *)(fle-1)); } @@ -206,7 +204,7 @@ build_proto_compound_sg_fd(dpaa2_sec_session *sess, static inline int build_proto_compound_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; struct ctxt_priv *priv = sess->ctxt; @@ -223,9 +221,9 @@ build_proto_compound_fd(dpaa2_sec_session *sess, flc = &priv->flc_desc[0].flc; /* we are using the first FLE entry to store Mbuf */ - retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); + retval = rte_mempool_get(qp->fle_pool, (void **)(&fle)); if (retval) { - DPAA2_SEC_DP_ERR("Memory alloc failed"); + DPAA2_SEC_DP_DEBUG("Proto: Memory alloc failed"); return -ENOMEM; } memset(fle, 0, FLE_POOL_BUF_SIZE); @@ -282,11 +280,11 @@ build_proto_compound_fd(dpaa2_sec_session *sess, static inline int build_proto_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; if (sym_op->m_dst) - return build_proto_compound_fd(sess, op, fd, bpid); + return build_proto_compound_fd(sess, op, fd, bpid, qp); struct ctxt_priv *priv = sess->ctxt; struct sec_flow_context *flc; @@ -461,7 +459,8 @@ build_authenc_gcm_sg_fd(dpaa2_sec_session *sess, static inline int build_authenc_gcm_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, + struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; struct ctxt_priv *priv = sess->ctxt; @@ -485,9 +484,9 @@ build_authenc_gcm_fd(dpaa2_sec_session *sess, * to get the MBUF Addr from the previous FLE. * We can have a better approach to use the inline Mbuf */ - retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); + retval = rte_mempool_get(qp->fle_pool, (void **)(&fle)); if (retval) { - DPAA2_SEC_ERR("GCM: Memory alloc failed for SGE"); + DPAA2_SEC_DP_DEBUG("GCM: no buffer available in fle pool"); return -ENOMEM; } memset(fle, 0, FLE_POOL_BUF_SIZE); @@ -748,7 +747,7 @@ build_authenc_sg_fd(dpaa2_sec_session *sess, static inline int build_authenc_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; struct ctxt_priv *priv = sess->ctxt; @@ -777,9 +776,9 @@ build_authenc_fd(dpaa2_sec_session *sess, * to get the MBUF Addr from the previous FLE. * We can have a better approach to use the inline Mbuf */ - retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); + retval = rte_mempool_get(qp->fle_pool, (void **)(&fle)); if (retval) { - DPAA2_SEC_ERR("Memory alloc failed for SGE"); + DPAA2_SEC_DP_DEBUG("AUTHENC: no buffer available in fle pool"); return -ENOMEM; } memset(fle, 0, FLE_POOL_BUF_SIZE); @@ -1010,7 +1009,7 @@ static inline int build_auth_sg_fd( static inline int build_auth_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; struct qbman_fle *fle, *sge; @@ -1034,9 +1033,9 @@ build_auth_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, data_offset = data_offset >> 3; } - retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); + retval = rte_mempool_get(qp->fle_pool, (void **)(&fle)); if (retval) { - DPAA2_SEC_ERR("AUTH Memory alloc failed for SGE"); + DPAA2_SEC_DP_DEBUG("AUTH: no buffer available in fle pool"); return -ENOMEM; } memset(fle, 0, FLE_POOL_BUF_SIZE); @@ -1257,7 +1256,7 @@ build_cipher_sg_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, static int build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { struct rte_crypto_sym_op *sym_op = op->sym; struct qbman_fle *fle, *sge; @@ -1287,9 +1286,9 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, else dst = sym_op->m_src; - retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); + retval = rte_mempool_get(qp->fle_pool, (void **)(&fle)); if (retval) { - DPAA2_SEC_ERR("CIPHER: Memory alloc failed for SGE"); + DPAA2_SEC_DP_DEBUG("CIPHER: no buffer available in fle pool"); return -ENOMEM; } memset(fle, 0, FLE_POOL_BUF_SIZE); @@ -1374,7 +1373,7 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, static inline int build_sec_fd(struct rte_crypto_op *op, - struct qbman_fd *fd, uint16_t bpid) + struct qbman_fd *fd, uint16_t bpid, struct dpaa2_sec_qp *qp) { int ret = -1; dpaa2_sec_session *sess; @@ -1387,11 +1386,15 @@ build_sec_fd(struct rte_crypto_op *op, sess = (dpaa2_sec_session *)get_sec_session_private_data( op->sym->sec_session); #endif - else + else { + DPAA2_SEC_DP_ERR("Session type invalid\n"); return -ENOTSUP; + } - if (!sess) + if (!sess) { + DPAA2_SEC_DP_ERR("Session not available\n"); return -EINVAL; + } /* Any of the buffer is segmented*/ if (!rte_pktmbuf_is_contiguous(op->sym->m_src) || @@ -1423,23 +1426,23 @@ build_sec_fd(struct rte_crypto_op *op, } else { switch (sess->ctxt_type) { case DPAA2_SEC_CIPHER: - ret = build_cipher_fd(sess, op, fd, bpid); + ret = build_cipher_fd(sess, op, fd, bpid, qp); break; case DPAA2_SEC_AUTH: - ret = build_auth_fd(sess, op, fd, bpid); + ret = build_auth_fd(sess, op, fd, bpid, qp); break; case DPAA2_SEC_AEAD: - ret = build_authenc_gcm_fd(sess, op, fd, bpid); + ret = build_authenc_gcm_fd(sess, op, fd, bpid, qp); break; case DPAA2_SEC_CIPHER_HASH: - ret = build_authenc_fd(sess, op, fd, bpid); + ret = build_authenc_fd(sess, op, fd, bpid, qp); break; #ifdef RTE_LIB_SECURITY case DPAA2_SEC_IPSEC: - ret = build_proto_fd(sess, op, fd, bpid); + ret = build_proto_fd(sess, op, fd, bpid, qp); break; case DPAA2_SEC_PDCP: - ret = build_proto_compound_fd(sess, op, fd, bpid); + ret = build_proto_compound_fd(sess, op, fd, bpid, qp); break; #endif case DPAA2_SEC_HASH_CIPHER: @@ -1513,10 +1516,9 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, memset(&fd_arr[loop], 0, sizeof(struct qbman_fd)); mb_pool = (*ops)->sym->m_src->pool; bpid = mempool_to_bpid(mb_pool); - ret = build_sec_fd(*ops, &fd_arr[loop], bpid); + ret = build_sec_fd(*ops, &fd_arr[loop], bpid, dpaa2_qp); if (ret) { - DPAA2_SEC_ERR("error: Improper packet contents" - " for crypto operation"); + DPAA2_SEC_DP_DEBUG("FD build failed\n"); goto skip_tx; } ops++; @@ -1537,7 +1539,8 @@ dpaa2_sec_enqueue_burst(void *qp, struct rte_crypto_op **ops, DPAA2_SEC_DP_DEBUG("Enqueue fail\n"); /* freeing the fle buffers */ while (loop < frames_to_send) { - free_fle(&fd_arr[loop]); + free_fle(&fd_arr[loop], + dpaa2_qp); loop++; } goto skip_tx; @@ -1593,11 +1596,10 @@ sec_simple_fd_to_mbuf(const struct qbman_fd *fd) #endif static inline struct rte_crypto_op * -sec_fd_to_mbuf(const struct qbman_fd *fd) +sec_fd_to_mbuf(const struct qbman_fd *fd, struct dpaa2_sec_qp *qp) { struct qbman_fle *fle; struct rte_crypto_op *op; - struct ctxt_priv *priv; struct rte_mbuf *dst, *src; #ifdef RTE_LIB_SECURITY @@ -1651,8 +1653,7 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) /* free the fle memory */ if (likely(rte_pktmbuf_is_contiguous(src))) { - priv = (struct ctxt_priv *)(size_t)DPAA2_GET_FLE_CTXT(fle - 1); - rte_mempool_put(priv->fle_pool, (void *)(fle-1)); + rte_mempool_put(qp->fle_pool, (void *)(fle-1)); } else rte_free((void *)(fle-1)); @@ -1737,14 +1738,17 @@ dpaa2_sec_dump(struct rte_crypto_op *op) } static void -dpaa2_sec_free_eqresp_buf(uint16_t eqresp_ci) +dpaa2_sec_free_eqresp_buf(uint16_t eqresp_ci, + struct dpaa2_queue *dpaa2_q) { struct dpaa2_dpio_dev *dpio_dev = DPAA2_PER_LCORE_DPIO; struct rte_crypto_op *op; struct qbman_fd *fd; + struct dpaa2_sec_qp *dpaa2_qp; + dpaa2_qp = container_of(dpaa2_q, struct dpaa2_sec_qp, tx_vq); fd = qbman_result_eqresp_fd(&dpio_dev->eqresp[eqresp_ci]); - op = sec_fd_to_mbuf(fd); + op = sec_fd_to_mbuf(fd, dpaa2_qp); /* Instead of freeing, enqueue it to the sec tx queue (sec->core) * after setting an error in FD. But this will have performance impact. */ @@ -1860,10 +1864,9 @@ dpaa2_sec_enqueue_burst_ordered(void *qp, struct rte_crypto_op **ops, memset(&fd_arr[loop], 0, sizeof(struct qbman_fd)); mb_pool = (*ops)->sym->m_src->pool; bpid = mempool_to_bpid(mb_pool); - ret = build_sec_fd(*ops, &fd_arr[loop], bpid); + ret = build_sec_fd(*ops, &fd_arr[loop], bpid, dpaa2_qp); if (ret) { - DPAA2_SEC_ERR("error: Improper packet contents" - " for crypto operation"); + DPAA2_SEC_DP_DEBUG("FD build failed\n"); goto skip_tx; } ops++; @@ -1883,7 +1886,8 @@ dpaa2_sec_enqueue_burst_ordered(void *qp, struct rte_crypto_op **ops, DPAA2_SEC_DP_DEBUG("Enqueue fail\n"); /* freeing the fle buffers */ while (loop < frames_to_send) { - free_fle(&fd_arr[loop]); + free_fle(&fd_arr[loop], + dpaa2_qp); loop++; } goto skip_tx; @@ -1981,7 +1985,7 @@ dpaa2_sec_dequeue_burst(void *qp, struct rte_crypto_op **ops, } fd = qbman_result_DQ_fd(dq_storage); - ops[num_rx] = sec_fd_to_mbuf(fd); + ops[num_rx] = sec_fd_to_mbuf(fd, dpaa2_qp); if (unlikely(fd->simple.frc)) { /* TODO Parse SEC errors */ @@ -2023,6 +2027,7 @@ dpaa2_sec_queue_pair_release(struct rte_cryptodev *dev, uint16_t queue_pair_id) dpaa2_free_dq_storage(qp->rx_vq.q_storage); rte_free(qp->rx_vq.q_storage); } + rte_mempool_free(qp->fle_pool); rte_free(qp); dev->data->queue_pairs[queue_pair_id] = NULL; @@ -2033,7 +2038,7 @@ dpaa2_sec_queue_pair_release(struct rte_cryptodev *dev, uint16_t queue_pair_id) /** Setup a queue pair */ static int dpaa2_sec_queue_pair_setup(struct rte_cryptodev *dev, uint16_t qp_id, - __rte_unused const struct rte_cryptodev_qp_conf *qp_conf, + const struct rte_cryptodev_qp_conf *qp_conf, __rte_unused int socket_id) { struct dpaa2_sec_dev_private *priv = dev->data->dev_private; @@ -2041,6 +2046,7 @@ dpaa2_sec_queue_pair_setup(struct rte_cryptodev *dev, uint16_t qp_id, struct fsl_mc_io *dpseci = (struct fsl_mc_io *)priv->hw; struct dpseci_rx_queue_cfg cfg; int32_t retcode; + char str[30]; PMD_INIT_FUNC_TRACE(); @@ -2080,6 +2086,19 @@ dpaa2_sec_queue_pair_setup(struct rte_cryptodev *dev, uint16_t qp_id, dev->data->queue_pairs[qp_id] = qp; + snprintf(str, sizeof(str), "sec_fle_pool_p%d_%d_%d", + getpid(), dev->data->dev_id, qp_id); + qp->fle_pool = rte_mempool_create((const char *)str, + qp_conf->nb_descriptors, + FLE_POOL_BUF_SIZE, + FLE_POOL_CACHE_SIZE, 0, + NULL, NULL, NULL, NULL, + SOCKET_ID_ANY, MEMPOOL_F_SP_PUT | MEMPOOL_F_SC_GET); + if (!qp->fle_pool) { + DPAA2_SEC_ERR("Mempool (%s) creation failed", str); + return -ENOMEM; + } + cfg.options = cfg.options | DPSECI_QUEUE_OPT_USER_CTX; cfg.user_ctx = (size_t)(&qp->rx_vq); retcode = dpseci_set_rx_queue(dpseci, CMD_PRI_LOW, priv->token, @@ -2097,11 +2116,9 @@ dpaa2_sec_sym_session_get_size(struct rte_cryptodev *dev __rte_unused) } static int -dpaa2_sec_cipher_init(struct rte_cryptodev *dev, - struct rte_crypto_sym_xform *xform, +dpaa2_sec_cipher_init(struct rte_crypto_sym_xform *xform, dpaa2_sec_session *session) { - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; struct alginfo cipherdata; int bufsize, ret = 0; struct ctxt_priv *priv; @@ -2118,8 +2135,6 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; - flc = &priv->flc_desc[0].flc; session->ctxt_type = DPAA2_SEC_CIPHER; @@ -2238,11 +2253,9 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev, } static int -dpaa2_sec_auth_init(struct rte_cryptodev *dev, - struct rte_crypto_sym_xform *xform, +dpaa2_sec_auth_init(struct rte_crypto_sym_xform *xform, dpaa2_sec_session *session) { - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; struct alginfo authdata; int bufsize, ret = 0; struct ctxt_priv *priv; @@ -2260,7 +2273,6 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; flc = &priv->flc_desc[DESC_INITFINAL].flc; session->ctxt_type = DPAA2_SEC_AUTH; @@ -2476,12 +2488,10 @@ dpaa2_sec_auth_init(struct rte_cryptodev *dev, } static int -dpaa2_sec_aead_init(struct rte_cryptodev *dev, - struct rte_crypto_sym_xform *xform, +dpaa2_sec_aead_init(struct rte_crypto_sym_xform *xform, dpaa2_sec_session *session) { struct dpaa2_sec_aead_ctxt *ctxt = &session->ext_params.aead_ctxt; - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; struct alginfo aeaddata; int bufsize; struct ctxt_priv *priv; @@ -2505,7 +2515,6 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; flc = &priv->flc_desc[0].flc; session->aead_key.data = rte_zmalloc(NULL, aead_xform->key.length, @@ -2601,11 +2610,9 @@ dpaa2_sec_aead_init(struct rte_cryptodev *dev, static int -dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, - struct rte_crypto_sym_xform *xform, +dpaa2_sec_aead_chain_init(struct rte_crypto_sym_xform *xform, dpaa2_sec_session *session) { - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; struct alginfo authdata, cipherdata; int bufsize; struct ctxt_priv *priv; @@ -2643,7 +2650,6 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; flc = &priv->flc_desc[0].flc; session->cipher_key.data = rte_zmalloc(NULL, cipher_xform->key.length, @@ -2849,8 +2855,7 @@ dpaa2_sec_aead_chain_init(struct rte_cryptodev *dev, } static int -dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev, - struct rte_crypto_sym_xform *xform, void *sess) +dpaa2_sec_set_session_parameters(struct rte_crypto_sym_xform *xform, void *sess) { dpaa2_sec_session *session = sess; int ret; @@ -2868,37 +2873,37 @@ dpaa2_sec_set_session_parameters(struct rte_cryptodev *dev, /* Cipher Only */ if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && xform->next == NULL) { - ret = dpaa2_sec_cipher_init(dev, xform, session); + ret = dpaa2_sec_cipher_init(xform, session); /* Authentication Only */ } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && xform->next == NULL) { - ret = dpaa2_sec_auth_init(dev, xform, session); + ret = dpaa2_sec_auth_init(xform, session); /* Cipher then Authenticate */ } else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH) { session->ext_params.aead_ctxt.auth_cipher_text = true; if (xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL) - ret = dpaa2_sec_auth_init(dev, xform, session); + ret = dpaa2_sec_auth_init(xform, session); else if (xform->next->auth.algo == RTE_CRYPTO_AUTH_NULL) - ret = dpaa2_sec_cipher_init(dev, xform, session); + ret = dpaa2_sec_cipher_init(xform, session); else - ret = dpaa2_sec_aead_chain_init(dev, xform, session); + ret = dpaa2_sec_aead_chain_init(xform, session); /* Authenticate then Cipher */ } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER) { session->ext_params.aead_ctxt.auth_cipher_text = false; if (xform->auth.algo == RTE_CRYPTO_AUTH_NULL) - ret = dpaa2_sec_cipher_init(dev, xform, session); + ret = dpaa2_sec_cipher_init(xform, session); else if (xform->next->cipher.algo == RTE_CRYPTO_CIPHER_NULL) - ret = dpaa2_sec_auth_init(dev, xform, session); + ret = dpaa2_sec_auth_init(xform, session); else - ret = dpaa2_sec_aead_chain_init(dev, xform, session); + ret = dpaa2_sec_aead_chain_init(xform, session); /* AEAD operation for AES-GCM kind of Algorithms */ } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AEAD && xform->next == NULL) { - ret = dpaa2_sec_aead_init(dev, xform, session); + ret = dpaa2_sec_aead_init(xform, session); } else { DPAA2_SEC_ERR("Invalid crypto type"); @@ -3147,7 +3152,6 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev, struct alginfo authdata, cipherdata; int bufsize; struct sec_flow_context *flc; - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; int ret = -1; PMD_INIT_FUNC_TRACE(); @@ -3162,7 +3166,6 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; flc = &priv->flc_desc[0].flc; if (ipsec_xform->life.bytes_hard_limit != 0 || @@ -3395,7 +3398,6 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, struct rte_crypto_cipher_xform *cipher_xform = NULL; dpaa2_sec_session *session = (dpaa2_sec_session *)sess; struct ctxt_priv *priv; - struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; struct alginfo authdata, cipherdata; struct alginfo *p_authdata = NULL; int bufsize = -1; @@ -3420,7 +3422,6 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, return -ENOMEM; } - priv->fle_pool = dev_priv->fle_pool; flc = &priv->flc_desc[0].flc; /* find xfrm types */ @@ -3758,7 +3759,7 @@ dpaa2_sec_sym_session_configure(struct rte_cryptodev *dev, return -ENOMEM; } - ret = dpaa2_sec_set_session_parameters(dev, xform, sess_private_data); + ret = dpaa2_sec_set_session_parameters(xform, sess_private_data); if (ret != 0) { DPAA2_SEC_ERR("Failed to configure session parameters"); /* Return session to mempool */ @@ -3989,6 +3990,7 @@ dpaa2_sec_process_parallel_event(struct qbman_swp *swp, struct dpaa2_queue *rxq, struct rte_event *ev) { + struct dpaa2_sec_qp *qp; /* Prefetching mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size)); @@ -3996,6 +3998,7 @@ dpaa2_sec_process_parallel_event(struct qbman_swp *swp, /* Prefetching ipsec crypto_op stored in priv data of mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)-64)); + qp = container_of(rxq, struct dpaa2_sec_qp, rx_vq); ev->flow_id = rxq->ev.flow_id; ev->sub_event_type = rxq->ev.sub_event_type; ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; @@ -4003,7 +4006,7 @@ dpaa2_sec_process_parallel_event(struct qbman_swp *swp, ev->sched_type = rxq->ev.sched_type; ev->queue_id = rxq->ev.queue_id; ev->priority = rxq->ev.priority; - ev->event_ptr = sec_fd_to_mbuf(fd); + ev->event_ptr = sec_fd_to_mbuf(fd, qp); qbman_swp_dqrr_consume(swp, dq); } @@ -4015,6 +4018,7 @@ dpaa2_sec_process_atomic_event(struct qbman_swp *swp __rte_unused, struct rte_event *ev) { uint8_t dqrr_index; + struct dpaa2_sec_qp *qp; struct rte_crypto_op *crypto_op = (struct rte_crypto_op *)ev->event_ptr; /* Prefetching mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- @@ -4023,6 +4027,7 @@ dpaa2_sec_process_atomic_event(struct qbman_swp *swp __rte_unused, /* Prefetching ipsec crypto_op stored in priv data of mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)-64)); + qp = container_of(rxq, struct dpaa2_sec_qp, rx_vq); ev->flow_id = rxq->ev.flow_id; ev->sub_event_type = rxq->ev.sub_event_type; ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; @@ -4031,7 +4036,7 @@ dpaa2_sec_process_atomic_event(struct qbman_swp *swp __rte_unused, ev->queue_id = rxq->ev.queue_id; ev->priority = rxq->ev.priority; - ev->event_ptr = sec_fd_to_mbuf(fd); + ev->event_ptr = sec_fd_to_mbuf(fd, qp); dqrr_index = qbman_get_dqrr_idx(dq); *dpaa2_seqn(crypto_op->sym->m_src) = QBMAN_ENQUEUE_FLAG_DCA | dqrr_index; DPAA2_PER_LCORE_DQRR_SIZE++; @@ -4047,6 +4052,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, struct rte_event *ev) { struct rte_crypto_op *crypto_op = (struct rte_crypto_op *)ev->event_ptr; + struct dpaa2_sec_qp *qp; /* Prefetching mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- @@ -4055,6 +4061,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, /* Prefetching ipsec crypto_op stored in priv data of mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)-64)); + qp = container_of(rxq, struct dpaa2_sec_qp, rx_vq); ev->flow_id = rxq->ev.flow_id; ev->sub_event_type = rxq->ev.sub_event_type; ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; @@ -4062,7 +4069,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, ev->sched_type = rxq->ev.sched_type; ev->queue_id = rxq->ev.queue_id; ev->priority = rxq->ev.priority; - ev->event_ptr = sec_fd_to_mbuf(fd); + ev->event_ptr = sec_fd_to_mbuf(fd, qp); *dpaa2_seqn(crypto_op->sym->m_src) = DPAA2_ENQUEUE_FLAG_ORP; *dpaa2_seqn(crypto_op->sym->m_src) |= qbman_result_DQ_odpid(dq) << @@ -4236,7 +4243,6 @@ dpaa2_sec_uninit(const struct rte_cryptodev *dev) priv->hw = NULL; rte_free(dpseci); rte_free(dev->security_ctx); - rte_mempool_free(priv->fle_pool); DPAA2_SEC_INFO("Closing DPAA2_SEC device %s on numa socket %u", dev->data->name, rte_socket_id()); @@ -4304,7 +4310,6 @@ dpaa2_sec_dev_init(struct rte_cryptodev *cryptodev) uint16_t token; struct dpseci_attr attr; int retcode, hw_id; - char str[30]; PMD_INIT_FUNC_TRACE(); dpaa2_dev = container_of(dev, struct rte_dpaa2_device, device); @@ -4380,19 +4385,6 @@ dpaa2_sec_dev_init(struct rte_cryptodev *cryptodev) internals->token = token; internals->en_loose_ordered = true; - snprintf(str, sizeof(str), "sec_fle_pool_p%d_%d", - getpid(), cryptodev->data->dev_id); - internals->fle_pool = rte_mempool_create((const char *)str, - FLE_POOL_NUM_BUFS, - FLE_POOL_BUF_SIZE, - FLE_POOL_CACHE_SIZE, 0, - NULL, NULL, NULL, NULL, - SOCKET_ID_ANY, 0); - if (!internals->fle_pool) { - DPAA2_SEC_ERR("Mempool (%s) creation failed", str); - goto init_error; - } - dpaa2_sec_get_devargs(cryptodev, DRIVER_DUMP_MODE); dpaa2_sec_get_devargs(cryptodev, DRIVER_STRICT_ORDER); DPAA2_SEC_INFO("driver %s: created", cryptodev->data->name); diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h index 3094778a7a..63f4c64aab 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2016,2020-2021 NXP + * Copyright 2016,2020-2022 NXP * */ @@ -31,7 +31,6 @@ extern uint8_t cryptodev_driver_id; struct dpaa2_sec_dev_private { void *mc_portal; /**< MC Portal for configuring this device */ void *hw; /**< Hardware handle for this device.Used by NADK framework */ - struct rte_mempool *fle_pool; /* per device memory pool for FLE */ int32_t hw_id; /**< An unique ID of this device instance */ int32_t vfio_fd; /**< File descriptor received via VFIO */ uint16_t token; /**< Token required by DPxxx objects */ @@ -44,6 +43,7 @@ struct dpaa2_sec_dev_private { struct dpaa2_sec_qp { struct dpaa2_queue rx_vq; struct dpaa2_queue tx_vq; + struct rte_mempool *fle_pool; /* per device memory pool for FLE */ }; enum shr_desc_type { @@ -127,7 +127,6 @@ struct sec_flc_desc { }; struct ctxt_priv { - struct rte_mempool *fle_pool; /* per device memory pool for FLE */ struct sec_flc_desc flc_desc[0]; }; diff --git a/drivers/net/dpaa2/dpaa2_ethdev.h b/drivers/net/dpaa2/dpaa2_ethdev.h index e79a7fc2e2..a459181139 100644 --- a/drivers/net/dpaa2/dpaa2_ethdev.h +++ b/drivers/net/dpaa2/dpaa2_ethdev.h @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (c) 2015-2016 Freescale Semiconductor, Inc. All rights reserved. - * Copyright 2016-2021 NXP + * Copyright 2016-2022 NXP * */ @@ -264,7 +264,7 @@ __rte_internal uint16_t dpaa2_dev_tx_multi_txq_ordered(void **queue, struct rte_mbuf **bufs, uint16_t nb_pkts); -void dpaa2_dev_free_eqresp_buf(uint16_t eqresp_ci); +void dpaa2_dev_free_eqresp_buf(uint16_t eqresp_ci, struct dpaa2_queue *dpaa2_q); void dpaa2_flow_clean(struct rte_eth_dev *dev); uint16_t dpaa2_dev_tx_conf(void *queue) __rte_unused; int dpaa2_dev_is_dpaa2(struct rte_eth_dev *dev); diff --git a/drivers/net/dpaa2/dpaa2_rxtx.c b/drivers/net/dpaa2/dpaa2_rxtx.c index b8844fbdf1..39bfddd804 100644 --- a/drivers/net/dpaa2/dpaa2_rxtx.c +++ b/drivers/net/dpaa2/dpaa2_rxtx.c @@ -1408,7 +1408,8 @@ dpaa2_dev_tx(void *queue, struct rte_mbuf **bufs, uint16_t nb_pkts) } void -dpaa2_dev_free_eqresp_buf(uint16_t eqresp_ci) +dpaa2_dev_free_eqresp_buf(uint16_t eqresp_ci, + __rte_unused struct dpaa2_queue *dpaa2_q) { struct dpaa2_dpio_dev *dpio_dev = DPAA2_PER_LCORE_DPIO; struct qbman_fd *fd; From patchwork Thu Apr 28 11:47:29 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110431 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 21C28A034C; Thu, 28 Apr 2022 13:49:16 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5179442865; Thu, 28 Apr 2022 13:48:20 +0200 (CEST) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062.outbound.protection.outlook.com [40.107.20.62]) by mails.dpdk.org (Postfix) with ESMTP id BC7CF4284F; Thu, 28 Apr 2022 13:48:18 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EdX8sg2iPFFEECRSQhmsW4Xfmsmz64byhsASXXNMLP3plG4vd7WdL/J0pc9o+kHf4yxuvQV/Z0NowkTsYsh7uTuZAQ3VxeU1e17nitX2IbiaNS8P4xOHGU59w2Ti3v9zBnBKGO1cEqbvqqbb1pwWhQat7gAxsfWyX/arEsvcaqw9YwcGFk2ovGWdjlutHKjRYMF2ZjI40wnoHgCY5nlkrUet3ZVDCP3WLErEyYjmitSqhnbBgXsAXTZmQkXIcSagCfmWcAp91YaNABO150jSHxy2H6VXFvU42/DMVh3DjAERQNn/T9zmQDdDNAD99ArMFtVDuK4plR55Ufkt5PK8hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qE5wOHwxpQ030v6UJ4HYVk+HOhLA8kytV1k9n9KpvtU=; b=K4pvq8TjGELPaKrr/NqwH0SxuNZfuT/92fMP2HOWwpPgkbf7M++TNiMZ7z5a0udfuf+kkiBb16kR8GMrF43+vvfql4u8VGtcbIzqyjiQjpvEjxgemNVk/6VOGJrbzlSow9wgGhQvGGaZYWclmetvstSND+UpDohxFAvMqIG02PG21XSbDsnY2CBUWWqWzRcOE7/39Z0nU3ejGU5qpZPUbqSktObAi7aiejTQS/8IH1Ez1a0SGgDxh6jndGszxxRZQGnxZXUgdYCDm+pPh4CqGjXGN+PtOqE7LpooZ46R/O+OfHUVpLECGbXp1QGQGSMoXF6XBIWz45Q0T0mHcY3Scw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qE5wOHwxpQ030v6UJ4HYVk+HOhLA8kytV1k9n9KpvtU=; b=GQ26+QNj3T2rXYcNojM7XkzBQnMOSL9yGOHi9oMULmxU0VSn2jw/5iPw6M8ehyU1vfc7iLiSDVwSh2fdeSdeS6a1plzjVp6W1G+0JigjHYPND1cd00MWbNqG5X6JlD0s3NEnfffId6R5MRVmkbBs+6As8qEQj4iwo7CJcn78EUc= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:18 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:17 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 10/14] crypto/dpaa2_sec: fix crypto op pointer value Date: Thu, 28 Apr 2022 17:17:29 +0530 Message-Id: <20220428114733.1419957-11-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c1a7995e-7a61-4d26-5885-08da290cfc61 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: c1a7995e-7a61-4d26-5885-08da290cfc61 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:17.9443 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: r+3dkEUiX8syamUaIFhcqUob3G/XDmcqISK0mbPqxsREyAhzNQBrnW5FdvRhdtHE X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Driver is filling the crypto_op variable with an invalid value for atomic and ordered events which can results into segmentation fault. This patch assigning the correct crypto_op and event buffer pointers by extracting from FD. Fixes: a77db24643b7 ("crypto/dpaa2_sec: support atomic queues") Fixes: 4562de326d30 ("crypto/dpaa2_sec: support ordered queue") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 86c8df241b..9f2b384af9 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -4019,7 +4019,7 @@ dpaa2_sec_process_atomic_event(struct qbman_swp *swp __rte_unused, { uint8_t dqrr_index; struct dpaa2_sec_qp *qp; - struct rte_crypto_op *crypto_op = (struct rte_crypto_op *)ev->event_ptr; + struct rte_crypto_op *crypto_op; /* Prefetching mbuf */ rte_prefetch0((void *)(size_t)(DPAA2_GET_FD_ADDR(fd)- rte_dpaa2_bpid_info[DPAA2_GET_FD_BPID(fd)].meta_data_size)); @@ -4036,12 +4036,13 @@ dpaa2_sec_process_atomic_event(struct qbman_swp *swp __rte_unused, ev->queue_id = rxq->ev.queue_id; ev->priority = rxq->ev.priority; - ev->event_ptr = sec_fd_to_mbuf(fd, qp); + crypto_op = sec_fd_to_mbuf(fd, qp); dqrr_index = qbman_get_dqrr_idx(dq); *dpaa2_seqn(crypto_op->sym->m_src) = QBMAN_ENQUEUE_FLAG_DCA | dqrr_index; DPAA2_PER_LCORE_DQRR_SIZE++; DPAA2_PER_LCORE_DQRR_HELD |= 1 << dqrr_index; DPAA2_PER_LCORE_DQRR_MBUF(dqrr_index) = crypto_op->sym->m_src; + ev->event_ptr = crypto_op; } static void __rte_hot @@ -4051,7 +4052,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, struct dpaa2_queue *rxq, struct rte_event *ev) { - struct rte_crypto_op *crypto_op = (struct rte_crypto_op *)ev->event_ptr; + struct rte_crypto_op *crypto_op; struct dpaa2_sec_qp *qp; /* Prefetching mbuf */ @@ -4069,7 +4070,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, ev->sched_type = rxq->ev.sched_type; ev->queue_id = rxq->ev.queue_id; ev->priority = rxq->ev.priority; - ev->event_ptr = sec_fd_to_mbuf(fd, qp); + crypto_op = sec_fd_to_mbuf(fd, qp); *dpaa2_seqn(crypto_op->sym->m_src) = DPAA2_ENQUEUE_FLAG_ORP; *dpaa2_seqn(crypto_op->sym->m_src) |= qbman_result_DQ_odpid(dq) << @@ -4078,6 +4079,7 @@ dpaa2_sec_process_ordered_event(struct qbman_swp *swp, DPAA2_EQCR_SEQNUM_SHIFT; qbman_swp_dqrr_consume(swp, dq); + ev->event_ptr = crypto_op; } int From patchwork Thu Apr 28 11:47:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110432 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C4480A034C; Thu, 28 Apr 2022 13:49:21 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 501D342868; Thu, 28 Apr 2022 13:48:23 +0200 (CEST) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60043.outbound.protection.outlook.com [40.107.6.43]) by mails.dpdk.org (Postfix) with ESMTP id 3DC8942850; Thu, 28 Apr 2022 13:48:21 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=oVquCDtQrv4L5iIu/4MpqJiflPGMlwWAV51EBdfFeabpRnzplvCybmrzliacUE2TV67w+lCUd4wv2vlSLwyW0TPS5Zm+wECUm+BCdaecQsmuCiVx9vOvn84o3tAAx9k9PUsPiE2ugFb3MT8iUGiTgLn8mUqrhEg5V9CZT4v2+CQ0JUaD9YIB8qYI65I1Jtb7opd4m1HmxdHTf0oI5APsFbYHjPvIoUq1rCZ+WZaGYRqxE4A/Pq/wOQtVlqindJg86nL5HcZ0SphrXPX+pqF4dbIuxFzj7xVlGVb8lvdTEr3OJJjL/1RCp8xlUySNrXOmAlWQyO08Yh2WvlTsJf5Q0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wm4MqYHQ13WXf9cic0s4/D2IdwnCJpvr+gEJrMSIMg4=; b=IJY9Q8Psl9qiRe+vXEoDomyBrBzNIUo3Ukb6f9fY074pCv9zC82C7drfcVyxYGgQPyVTTudPil3IrsU8ri/YuHeMNP91kwHC53fG5NILGIE5OUfVbeQ2GpByd0JN+WjDFc8+xrnoGH1+teHNkjVxEC7Op1oZhXAh8PnzdLLMApk/eMf1Bb1m/Rm83RiSKBrQqjLMVQGcJO4m6fRKJglS/xe6cu+XsfJR2TmyrEDQrn0txyzMow3PJfjH5GRnZ2fWEREPpp3rhWU/ymos86rDYwq2Msv1eMxOh0noBww+g16D3WXwiX6XaKYmn1NskJoF3tGwwri/dTYra51mUGGiYw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wm4MqYHQ13WXf9cic0s4/D2IdwnCJpvr+gEJrMSIMg4=; b=aC4knrZgQbH3wqe+V+jXgO1mG2fD5ex6H2gx3KeIhS5nJ4fbH7DvO2LFkyvivoQBmxlcUVpbFK9x7RKdbfhhHq2P3Tg0Ji91pFS58D/sPbMFu5SeA/IE015K2uIPtzv2sHSbOvzYBZU+E8Ce0wsSDSBwl3XowHpEm3Ssl0XhVKM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:20 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:20 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 11/14] crypto/dpaa2_sec: fix operation status for simple FD Date: Thu, 28 Apr 2022 17:17:30 +0530 Message-Id: <20220428114733.1419957-12-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 85f192e3-f346-419d-7633-08da290cfdb6 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(4744005)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 85f192e3-f346-419d-7633-08da290cfdb6 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:20.3348 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: guC1BcCYQstzNCU4vMOJxiR0O3sac/KC7s0hyJShOBEuVJ1nIT1bxVEP5qMPh5RA X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Driver is not filling the operation status on dequeue in case the FD is simple. So setting the status as per the results. Fixes: 0a23d4b6f4c2 ("crypto/dpaa2_sec: support protocol offload IPsec") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 9f2b384af9..8444f1a795 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -1591,6 +1591,14 @@ sec_simple_fd_to_mbuf(const struct qbman_fd *fd) else mbuf->data_off += SEC_FLC_DHR_INBOUND; + if (unlikely(fd->simple.frc)) { + DPAA2_SEC_ERR("SEC returned Error - %x", + fd->simple.frc); + op->status = RTE_CRYPTO_OP_STATUS_ERROR; + } else { + op->status = RTE_CRYPTO_OP_STATUS_SUCCESS; + } + return op; } #endif From patchwork Thu Apr 28 11:47:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110433 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 67ECCA034C; Thu, 28 Apr 2022 13:49:27 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 454F94286B; Thu, 28 Apr 2022 13:48:24 +0200 (CEST) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60057.outbound.protection.outlook.com [40.107.6.57]) by mails.dpdk.org (Postfix) with ESMTP id 01FF94283E for ; Thu, 28 Apr 2022 13:48:23 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hEhFuwem7FtBqkA1LIpcqOTznWjaNf2nVbgYsOEbvdXB3rMLPPpXzluE1fudw4NQXQPpual7CPwxzBTYkcyBvukZPkIunWClunVohEvjaFoO51zbDPAgNhplaPQJLfXKK3eQzcDVdTO2YZroU/V0AfodvWy8lL9OvREECU3K8FoPUi5hlXU+Lw8cuA8VKwulAZMS9VFntsACrtL9maU0csGot3XOB1g78gt9jwMJS4Q+j+LRfeRoeZZKPYVvVYHC+bj+mcxjvOmL28MJBvXMl6O1bj3t8f8ZH/2aakzroxPg5Ni8Gtk0gs/+AWZ6FvrSlSxA34aXYNblu78pS4OltA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4Y2rnEiBQR4Bjz/JLXg35s0hPuucTy5V5rGSAfmdSps=; b=mlEDSbJ9M/p5omnCoEaU0ZTd6iDVTxv8loIRuN/t+dKdQv/mgPB+w9HxMGTUrLqjhbDYUpZ5tcid1NhDmobO6GP1pbT3prE5K0p7X38tmiL11Y4oO3I0ZDerMOm7iXkjrE16a5UbalMOgFogTil8gy/bI4YaiQWI00R3t6MLhrjDaxpFy60JCfMGIPrGT/Zfo3NiqIqIPIhxuo+M101+Ap2T/cywJdJAD7mGwlS3P8kmqkoCqD3yS1oYnkuM2Q/QimzRV24uhAtZRZDg/bLIb6dmGfMwDl6o1HFFtjc37HVsttx7PityiYXOgEzjWA99IYBbfYAlywTYnU6K+RBOPQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4Y2rnEiBQR4Bjz/JLXg35s0hPuucTy5V5rGSAfmdSps=; b=ntgRnkAfZqiA7Pj478UP5DQwmuyK8BigarSfDWvaUlzYSs2aCFQ45KcAPzyfTZtLrsH9M2TGGBuhIY9/RYQs/lxl/YyBb5WmXX4mSPE682pB7DpLeex1KwtDAsaO52BYEW25i5U5HlNO322yQ5mr9wLKiLUeju7rOffpEIXrcSo= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:22 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:22 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 12/14] bus/dpaa: remove unused thread specific variables Date: Thu, 28 Apr 2022 17:17:31 +0530 Message-Id: <20220428114733.1419957-13-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 17874636-d59f-4f47-d066-08da290cfee2 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 17874636-d59f-4f47-d066-08da290cfee2 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:22.2705 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 6Lmk5r8Hy4Vj2sf7au5byFJM2ARRDyZOQeUgNHOb75GJ3XiCeo3RiS/jGPI7yUhE X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org There are some crypto driver related thread specific variables which are no longer used, so removing them. Signed-off-by: Gagandeep Singh --- drivers/bus/dpaa/rte_dpaa_bus.h | 8 +------- drivers/crypto/dpaa_sec/dpaa_sec.c | 4 ---- 2 files changed, 1 insertion(+), 11 deletions(-) diff --git a/drivers/bus/dpaa/rte_dpaa_bus.h b/drivers/bus/dpaa/rte_dpaa_bus.h index 54bb1436fd..1f04d9ebd3 100644 --- a/drivers/bus/dpaa/rte_dpaa_bus.h +++ b/drivers/bus/dpaa/rte_dpaa_bus.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: BSD-3-Clause * - * Copyright 2017-2020 NXP + * Copyright 2017-2022 NXP * */ #ifndef __RTE_DPAA_BUS_H__ @@ -138,8 +138,6 @@ struct dpaa_portal { uint32_t bman_idx; /**< BMAN Portal ID*/ uint32_t qman_idx; /**< QMAN Portal ID*/ struct dpaa_portal_dqrr dpaa_held_bufs; - struct rte_crypto_op **dpaa_sec_ops; - int dpaa_sec_op_nb; uint64_t tid;/**< Parent Thread id for this portal */ }; @@ -153,10 +151,6 @@ RTE_DECLARE_PER_LCORE(struct dpaa_portal *, dpaa_io); RTE_PER_LCORE(dpaa_io)->dpaa_held_bufs.dqrr_held #define DPAA_PER_LCORE_DQRR_MBUF(i) \ RTE_PER_LCORE(dpaa_io)->dpaa_held_bufs.mbuf[i] -#define DPAA_PER_LCORE_RTE_CRYPTO_OP \ - RTE_PER_LCORE(dpaa_io)->dpaa_sec_ops -#define DPAA_PER_LCORE_DPAA_SEC_OP_NB \ - RTE_PER_LCORE(dpaa_io)->dpaa_sec_op_nb /* Various structures representing contiguous memory maps */ struct dpaa_memseg { diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index 6f2b4baf57..875df0bfc6 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -152,9 +152,6 @@ dqrr_out_fq_cb_rx(struct qman_portal *qm __always_unused, struct dpaa_sec_job *job; struct dpaa_sec_op_ctx *ctx; - if (DPAA_PER_LCORE_DPAA_SEC_OP_NB >= DPAA_SEC_BURST) - return qman_cb_dqrr_defer; - if (!(dqrr->stat & QM_DQRR_STAT_FD_VALID)) return qman_cb_dqrr_consume; @@ -183,7 +180,6 @@ dqrr_out_fq_cb_rx(struct qman_portal *qm __always_unused, } mbuf->data_len = len; } - DPAA_PER_LCORE_RTE_CRYPTO_OP[DPAA_PER_LCORE_DPAA_SEC_OP_NB++] = ctx->op; dpaa_sec_op_ending(ctx); return qman_cb_dqrr_consume; From patchwork Thu Apr 28 11:47:32 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110434 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9B0C2A034C; Thu, 28 Apr 2022 13:49:34 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 65B9042876; Thu, 28 Apr 2022 13:48:26 +0200 (CEST) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60073.outbound.protection.outlook.com [40.107.6.73]) by mails.dpdk.org (Postfix) with ESMTP id E632042841 for ; Thu, 28 Apr 2022 13:48:24 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=K7zj8a/CaZjRwlVQvMD7vJs32fZB0QQXkkSgHX7IXzduBHS5jhER30n78UEaxch6keIIuL5eDM6NkrL4g/9pGLr8/LkBpzdDj2jcFi+M9lQkNwiTV49XcNQHnzp+tVJW8hupH0orDWDbD1HCOZzKw5aZ75C26VhigOhbx5lI4VXOlsGj2MTX49y4C4iSDkhdUFGrhXS1wOumQwk0PJw/oJLyaCZdWp5C/qwdwTOKazOFlMR13EnWcpdRPzulkQqYWDawH2oLuBX6i07+44e8M8AsWcF+5Kg61x/Hu38vIF4+iUlQfwyz4GbQy9341Q19i/JvIDSzByvIBcGOL3iecQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=v7A5lZGMQDeo6t/1R76ZVLIQdOLukmNqUlw02dfpBhk=; b=CMgTtPYxNqegJycffsOqnIpZI1fdSJ025UHUgc7dfgbq3Qazv/4LrguMWV4YwGjocCR0m3Q23RWrZD1tJV3kdeGWgLrwK6WTZESzFTuhbDaBlqprR3KedCH/SdL0zHKOxvX9fHHgWKeY9S+AI2JG6HO1+QZQUd65Tm2aAFxsQWEjCAlZihD0MqflRTMWGTBadZDm+bwlbxZkBuMqsMCUf0V1E5cGt+nd2+tFQwknDvmvOv+sHTL7DrmTb2hr6pPq+yVlKEIRhwO/dGNar9rRBnifssd4vjO6VZf3gDRYr2ZPTiLfBKl6dWXOWqmvY6JoMynAGfXUFSa/j9tpw7AfYQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v7A5lZGMQDeo6t/1R76ZVLIQdOLukmNqUlw02dfpBhk=; b=Z44EV3JtGfbVt1WQjF4LaVyauZS7xgQehaY60BdhtASrpMhREuIenQFlzgB5PBMzb8caIyUwCRzNL4VpYcSa+CG494IEgiDkT7WsmHBiiOL38IxZlA0o6uciFV70Tzzou+2cif+TS6Nt0Zs1lK+QrVMDlhrtj30W21bkpuXOL5Q= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:24 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:24 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh Subject: [PATCH v2 13/14] crypto/dpaa_sec: move cdb prepration to session create Date: Thu, 28 Apr 2022 17:17:32 +0530 Message-Id: <20220428114733.1419957-14-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 00e3cfd4-4a90-48a5-a74e-08da290d0000 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 00e3cfd4-4a90-48a5-a74e-08da290d0000 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:24.0684 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: liYxD248Qi6/g8psuKdEm/KVPehC93+InY+Wis7p1wKqrIY7y5aUannEw3kfRnoF X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Driver is preparing the shared descriptor of session while attaching the session to a queue pair. It should be prepared on session create. Signed-off-by: Gagandeep Singh --- drivers/crypto/dpaa_sec/dpaa_sec.c | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index 875df0bfc6..05415dbf3b 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -2548,11 +2548,6 @@ dpaa_sec_attach_sess_q(struct dpaa_sec_qp *qp, dpaa_sec_session *sess) int ret; sess->qp[rte_lcore_id() % MAX_DPAA_CORES] = qp; - ret = dpaa_sec_prep_cdb(sess); - if (ret) { - DPAA_SEC_ERR("Unable to prepare sec cdb"); - return ret; - } if (unlikely(!DPAA_PER_LCORE_PORTAL)) { ret = rte_dpaa_portal_init((void *)0); if (ret) { @@ -2706,6 +2701,11 @@ dpaa_sec_sym_session_configure(struct rte_cryptodev *dev, set_sym_session_private_data(sess, dev->driver_id, sess_private_data); + ret = dpaa_sec_prep_cdb(sess_private_data); + if (ret) { + DPAA_SEC_ERR("Unable to prepare sec cdb"); + return ret; + } return 0; } @@ -3304,6 +3304,12 @@ dpaa_sec_security_session_create(void *dev, set_sec_session_private_data(sess, sess_private_data); + ret = dpaa_sec_prep_cdb(sess_private_data); + if (ret) { + DPAA_SEC_ERR("Unable to prepare sec cdb"); + return ret; + } + return ret; } From patchwork Thu Apr 28 11:47:33 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 110435 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 74A09A034C; Thu, 28 Apr 2022 13:49:40 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7CD234282C; Thu, 28 Apr 2022 13:48:28 +0200 (CEST) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60087.outbound.protection.outlook.com [40.107.6.87]) by mails.dpdk.org (Postfix) with ESMTP id 179A742874; Thu, 28 Apr 2022 13:48:27 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L0oLyCOWrnyWz5yzlXeCiGVGq/z8DQ/YdhccQlMx8HlG2xYGkalpEigP5Z/JIl2or8rnQJzqH9Gk0r4CEXs8YT5hN1ZFM4MfouUxsf32OBjWRIzVLPsBaXz5WCp05si94rpj/pzk/6xxZeNutXgJH1BUP6/6rRmWIupTfhyzxauZ2XipSqVi8k1bh9DId14M5uSlYrP1a/X5WICTh/O3eSd4TdmlUpm3VKZwCfx86bBAkjIQGRwapNeTwMGc3TuCTOsktRh32qwn3sG9NmX0OcI6MWvKas8Iypf58mJ5K+KQ0TJp30Zmo/o7Tqag+22kkLZGynznlFtsY3jcXLmFqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=uF8A9ZLhEY1EhhItm+zF5PWziN113iqtqOnFg7lgMV8=; b=RDmkJw5gX41/hF9jnW8bz5egQcrhXqAl0GdUHSpgGAZ5oTSvd6JgFD2wwtj+leFUPFb+PiDzpoVhdijtTrr9ViHrmi85k7bofKuoJl9TvYSFm0VCRJXAExXJN9TWjCHmEXPamPmoitNhpXCXO+QDfA7RGUNCM5+bbN0Ux1AztSmqtmW2TvNOcW3yNxzqtOLg41PSVwfnh9KwzxYRmu6K7kZnuLaIeZQkTFfMMXsdtCfhuBS5usY3JOWs9+G1kdoDNxcQaVwnfkmGjRPVioZMkY9Gz13ZHkEtT+4HhYyHQBaaH2XTy5Zr9f0zhWU6cv9hpYYySPGzQNsxSS20BkfMPQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uF8A9ZLhEY1EhhItm+zF5PWziN113iqtqOnFg7lgMV8=; b=Kjcwk7SRMdJlktCMzG6tGbFyO9gs1LVRT39MG9mkPlmx58P+xs28zoATWVhJxMBhrKe9Ty2cymqX7txVfpnEBC1SlpM3C2MSTSuPMHzc00tI5tr+G53Buyk/QAyGEJmDCHOqr0+KWqGAcpB4WqortProkjeBuM3t00rT2/isiGI= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AM9PR04MB8162.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.13; Thu, 28 Apr 2022 11:48:26 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::8cf1:93b:c340:3be2%9]) with mapi id 15.20.5206.014; Thu, 28 Apr 2022 11:48:26 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: Gagandeep Singh , stable@dpdk.org Subject: [PATCH v2 14/14] common/dpaax: fix short MAC-I IV calculation for zuc Date: Thu, 28 Apr 2022 17:17:33 +0530 Message-Id: <20220428114733.1419957-15-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220428114733.1419957-1-g.singh@nxp.com> References: <20220422035100.3180870-1-g.singh@nxp.com> <20220428114733.1419957-1-g.singh@nxp.com> X-ClientProxiedBy: SI2PR02CA0002.apcprd02.prod.outlook.com (2603:1096:4:194::22) To AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 6c5febd8-df4f-47be-9a18-08da290d0136 X-MS-TrafficTypeDiagnostic: AM9PR04MB8162:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6486002)(508600001)(8676002)(4326008)(66476007)(66556008)(86362001)(66946007)(316002)(55236004)(2906002)(38100700002)(6512007)(4744005)(38350700002)(26005)(6666004)(6506007)(52116002)(5660300002)(2616005)(1076003)(186003)(83380400001)(8936002)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: C2R4nCnZyxF7Wy5nRpgzfCNFJx+1qH6ewLqKL+3MvzMVvnfK8xejE4/urcrRJKo91WbRXK4R0DdNPDJamd6Q7yX7sMFR7dyNujM9MUUvi81zx1K0RLv5iR96d8fJJutXFTA7Cy5sCFTKpISRVZJmKbojYPELqtgDK2ejXDBgFl0QP4QWyJwvTDbezG3GPx2tjRnZcZ44u+IBYBh0eNSG2IaAJuHkPu0TwlKfVRKpGLrXaIkn3oQFWHoWjEuszwOzXaHSfK79VQBlcsBHL7xsx4x00wnrKC2dvbTvOE+gEdmY9slPSBGP72qbxNMeP/jMWtfE3ULLC1fUZcQAyc8oZ5CaqyK+tugxacaQXHgvOwwqaTklCBJLle2PF3O8dS8jGDlG2F5QItoXwEorxTU2F6lIDi8PgNNT9J81fyWLEmSeqsmD1VqRxOpE2+0QwELorFhSRMwn59gweDy7kaSQ2RSrkz+AJpHvHA81qSOII5wwgIyS4yDwVblUYXJQikmSVOKs7w6puXE7ebZ0B6Y+v2K6rqkSEXTIrKsUc4UN/O3IsKc8eHzaoZqbsHFjNsWTYF0w70XDLeZ/ujBEoIifiU16c/BsA50Loi/zGxCNqQ0Lpn/BiHaRMOvNSquqVm+Q+U6AB9kJ3z2d5+INMUlylI8HMq+CMKmV4kEdSmgE/e4eTvbWC43JtFKeDRa/HHNTEdRG7RRZMtu+pFtSUSve5TRg/K4DZ/7FSwHr8g09vDjjV+L9GWh+W+hBFzXT17r/8voKah1hxU83mO0DVH79RG9gT0mX4vNDUrhJ1A79Wm+MdwX4rUmdgihDa4jZY6DaIC8dZXYG/hAYg718dCm/t7aFuMS6Ztd6uSXqlv4YBhkkNPIW7NvyOt0f5p7ieP/RSsFIW17Y0b/cHnY/4nK4o1LLmcJIpXXIx62JEpeoQf45b1VcQLbZEdg21FfSOEfWl6xFXCqAcHBnyTrSHn8+vM3Asfa/npaJxbCB6BihtOZxAXJEgf1iaMeZVb2p8ATEN4nX1HUzQuXhQoEMQto+7f4ZWUERMynQRQJQnIVk1SpRUVWmqv4WhhOyMIpX1koeZw6UiUWro34pROCMj6lEO7n/nt64aJ8qFGLNQEi+2LfG6IMl1/VsgH+BJ/7olpYgvP4AAyM1ymyUrplV9EwV8eBxwDF34KogggxM26qvNawnnV0WLYDw9dyBz3fZy06jyGOkrCZeu2jWDF/S75lxgK/68eBF9Vz7keNmzNNQkub92zu6pWlNMQQ/l+k92kkWlldnSkvUD/sLKWtTEEfPMZPBxwEjM3G7xNSf+xC54yp/b5b4+moVT5GlIDaKNAYFY72lT8FoqemxgPBrvVCv0MKqgkLh4HQ0yguw6hd2yY9V+i0y7Uf2MfoUiKbPvPRV7oS16XF7gv8WCbU6tpVGm8BH5c8KnMaaOIp/+rL4UVbu+d3zDD4XNcOPxmBXskegmtNhsbL+mYGPrtF0pyXk4uwIcRnPWXwbiu8ReZdI908NwdDVtrcbVTiXaAtG4By3b6QsRQ7UaIOXvwmINm/V815MAzVzGC+hakxbgrVCcj3JGIAXpPw45nhUD2BvEAss39I0rIws2vbuQ4m6+LK2IlWF+OLgdxEXd6vjAa6nPcvdPbHCBZMIkdTOTHIZ7OaU5FCV66zzeCMlnX+svj3Bsj9ZgUSFPy11Pas3BrtVcjjEtda38QfH2W84oroj0/tLaeBD5/E9HBk2QjzuM61nXQ== X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 6c5febd8-df4f-47be-9a18-08da290d0136 X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Apr 2022 11:48:26.2249 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: gjIf86ZxcEdi8sJfl5LHxrC5rV7BzYdLF1XIz7ApKmDdKyjoVBbjvOD1NunZrlO4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8162 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Fixing the IV caluclation for zuc based short MAC-I as per the HW security engine guidelines. Fixes: 73a24060cd70 ("crypto/dpaa2_sec: add sample PDCP descriptor APIs") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh --- drivers/common/dpaax/caamflib/desc/pdcp.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/common/dpaax/caamflib/desc/pdcp.h b/drivers/common/dpaax/caamflib/desc/pdcp.h index 46153b9c29..289ee2a7d5 100644 --- a/drivers/common/dpaax/caamflib/desc/pdcp.h +++ b/drivers/common/dpaax/caamflib/desc/pdcp.h @@ -3066,7 +3066,7 @@ cnstr_shdsc_pdcp_short_mac(uint32_t *descbuf, case PDCP_AUTH_TYPE_ZUC: iv[0] = 0xFFFFFFFF; - iv[1] = swap ? swab32(0xFC000000) : 0xFC000000; + iv[1] = swab32(0xFC000000); iv[2] = 0x00000000; /* unused */ KEY(p, KEY2, authdata->key_enc_flags, authdata->key,