From patchwork Mon Jan 15 06:35:51 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 124475 Delivered-To: patch@linaro.org Received: by 10.46.64.148 with SMTP id r20csp573694lje; Sun, 14 Jan 2018 22:40:09 -0800 (PST) X-Google-Smtp-Source: ACJfBoumTIsJMBi4+pVl1/Tdn9ACgzc3sApv2s4GtPqWhaM1Y5qIevtbMHeP/fJJ67gqoql2SRow X-Received: by 10.28.19.210 with SMTP id 201mr8725626wmt.4.1515998409353; Sun, 14 Jan 2018 22:40:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1515998409; cv=none; d=google.com; s=arc-20160816; b=uT91dLZzNueID9F+7MD64aP2AdM8mIRp8Bwc8K9pChL8KZa7MsBnjGw2klkJDys4M5 RXWunNHsF6D7eI0ptWzKkqGh+n8fQgvmLvmnGrnmfm8QvTI4Fnauzq0Ks6LY+sef1OtB tBHMgQHwi2fRxdw4Nabldu6sGaqfoe7sWMoqtJlq9hgaUX5ZjvfV9fKt2Q/JHVFuws9B PW2i9S4Rp+xZVt645vb2irsC2qSLP+7opuXn1AvMdbVfWL7GuQ5Ng+x+1eava1imdilj bHw6P6Zdfqxh9VKs5qQsfls+KChvHCJJ3q/sr1VWmsst41wvGWt4TmkQCJPr7yFy3eoy LOkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:subject:spamdiagnosticmetadata :spamdiagnosticoutput:mime-version:references:in-reply-to:message-id :date:cc:to:from:arc-authentication-results; bh=Zpizh7N1xpPY9YneJeYUA9OwrNADARdF7mpwgyRJh6o=; b=c7zlSBc8BjbdG/o7WqpdXXWWYD4jw/AXlsT/oc9heYhHmrJ0utt+q+MeMRnJjVLSpB GGqdAKYV84P1rHYt1iJXVCoyDIx+WAPknN+yWgiVBHWEamXgLLMQfttfIM0RUlqp3HFA oqnS3bL5Ew0j6mms903u4r7X0eEhPD2JEvs+pxUir+jaX75W8w03PTByn6sWApu9s0Bu Y16U/Bw37Icz5CObCAaefjHdHP1Qsa84aTmlj+MMRdQ/vLedwL6uK5tT7V5K/bTtygM8 e8F9uzkvZGkRhjHRdE7sL8b63kwQ3/iVoJB2PtR0UN5wMe9ayx2bXDJBIznHnsVaG6Y1 Ny5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from dpdk.org (dpdk.org. [92.243.14.124]) by mx.google.com with ESMTP id x90si2859069wrb.344.2018.01.14.22.40.09; Sun, 14 Jan 2018 22:40:09 -0800 (PST) Received-SPF: pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) client-ip=92.243.14.124; Authentication-Results: mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 19C61A48B; Mon, 15 Jan 2018 07:40:06 +0100 (CET) Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0063.outbound.protection.outlook.com [104.47.32.63]) by dpdk.org (Postfix) with ESMTP id 4CE4925B3 for ; Mon, 15 Jan 2018 07:40:04 +0100 (CET) Received: from BN3PR03CA0103.namprd03.prod.outlook.com (10.174.66.21) by CO2PR03MB2358.namprd03.prod.outlook.com (10.166.93.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.407.7; Mon, 15 Jan 2018 06:40:03 +0000 Received: from BN1AFFO11FD024.protection.gbl (2a01:111:f400:7c10::109) by BN3PR03CA0103.outlook.office365.com (2603:10b6:400:4::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.407.7 via Frontend Transport; Mon, 15 Jan 2018 06:40:02 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; NXP1.onmicrosoft.com; dkim=none (message not signed) header.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD024.mail.protection.outlook.com (10.58.52.84) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.345.12 via Frontend Transport; Mon, 15 Jan 2018 06:40:00 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id w0F6drN7007259; Sun, 14 Jan 2018 23:39:58 -0700 From: Akhil Goyal To: CC: , Date: Mon, 15 Jan 2018 12:05:51 +0530 Message-ID: <20180115063553.12703-2-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20180115063553.12703-1-akhil.goyal@nxp.com> References: <20180111113304.19709-1-akhil.goyal@nxp.com> <20180115063553.12703-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131604720022597385; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(346002)(39860400002)(396003)(376002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(189003)(199004)(2351001)(47776003)(4326008)(77096006)(81156014)(104016004)(68736007)(53936002)(81166006)(105606002)(8676002)(50226002)(86362001)(5660300001)(6666003)(2950100002)(106466001)(8936002)(6916009)(85426001)(305945005)(356003)(51416003)(1076002)(2906002)(76176011)(50466002)(48376002)(54906003)(16586007)(97736004)(316002)(498600001)(8656006)(296002)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2358; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD024; 1:rGQd+QzcoHNCBBWjJnoH4SVLt43Ju9+ojwF459HynRyBZTpaTjp+JQImVKO9XT2kmaRGraq/sB8oSNni4ztE7xwWWflyRCHSz4CQ5pNOV1ieIxHLcz2p57YOZwItRJ2A MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1bcf6f08-aa2a-4dc0-2f09-08d55be2ce2d X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(5600026)(4604075)(2017052603307); SRVR:CO2PR03MB2358; X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2358; 3:kCQ/r6S5f3xpe468wjxTJLU1CSngwWAVCp+/WNh6y3YmHu6ZKmxETFtVNStUCnBKwoIB5O0/ZovGW6bfdbGj/f1WiwwIzILWNWBWpP0DWlc2RADNl2GFXNpk2bX3c35Kffh3SkaqRCsRpKnfViLveP+QxEnL/hDw48Gr4r+p9k6EL/klbzmaBEm07NnJD3fd7T0G7g28kikgNscBdiw9zt6boSIkifRW020M7uY+6FRx3jqXmw86oOXlGqG3BthBEfoH5CWn+/VlxkzAGZaaeENkG8oIMAz3ZXLzB+bN33ZgEZjkGJqpfjMyEmx17iiPY5VJWYrAp49WEUk4qD/oKyNT/AhYaxXwHUBN/MAqnT8=; 25:Qxnd132knXVe/fqM8rtxThcPVTzdjCTI0p9YBFPwJ/YaSL0uoj+pa0H1ysuA23lSGxArx6nKIqQMt8XFDoGV+36W/dK/KTV7YZCA4uWk9vRndxDHdsNwAidRahYNNfzVASFZUL8pqgrlbnuDYnULl0jqRBygFjAl4Mfr/PERbk/YEGbMJ/cilvvkILOrmD5sQejm7QFqlVgk28OKyJ103USPyBajQPWY/64S0XR4Huxe1mp0iBMZShN2Sp2blblw6diMINgOY5arbQXTXcf7b5DecpdXD3dwWxCeMmw9Tdkf28LvvD4KoieIj6PJBS57wVxmJy7o2BZCrpJgv71DsQ== X-MS-TrafficTypeDiagnostic: CO2PR03MB2358: X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2358; 31:a1Ckvy8gCRdPEnitnNFo1ro0LMb5eFmfr0waVWf+/RIqtCBHvp32V/8wR7bZM0Ft8ko5o5xJufDGd3DOux2FyyQ0cFWj1Voofr4Y8dE9TGmmFu0ZgJwwedf4FBe8LnBSEV/LW1CLa/SO8AIQ85+5inLFtib3hcp5pOi2od9ynV/if5cjexVaQo38SB5c3PioqFUkSTHNMe7zNIw0+BiMaZPG1GLNxqW5SGMkMMVtzeA=; 4:SF4ZMEkfwl3EM5SwbQ0N5DDdBDWx/dUmReEweVQiDV85njXwNsIG/LA7xubttfWw4NZFe1bmEDKjK2VFUWoVECg2EwR1MIkBDIsOdoBmm38TqCboy9Jl/JM/GbQdniLnR478MFOHr1+siebnueoP3FjI7WXrQp5WFAfImlAIKsL/gTyoGHd/3QyGyMnLLaE4K6VvBhcKti6fgO147Mq5OUuB8H/4/U7k9/gpDG/3OrZOr+nKAVj0ppSOGIV0Omg6eqg9TmZLl+t51M94CtnLFUi6jESEfphcXlGIuslQvvkbC1KoYrIJ5DEPZ8P5D9I3 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3231023)(944501161)(3002001)(6055026)(6096035)(20161123559100)(20161123565025)(201703131430075)(201703131520075)(201703131448075)(201703131433075)(201703151042153)(20161123556025)(20161123561025)(20161123563025)(201708071742011); SRVR:CO2PR03MB2358; BCL:0; PCL:0; RULEID:(100000803101)(100110400095)(400006); SRVR:CO2PR03MB2358; X-Forefront-PRVS: 0553CBB77A X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR03MB2358; 23:9zAw2EpVVO4bxo0b5VmxcnJNBHM+l6BWEs6lEOhzy?= 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 X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2358; 6:m7XBCMjchjM5+3FSF5hyRgc2ULKbS1llHU4042kLbrfpjRLjpOf2hzztVGYqfFq/f7RBGqkpvm7/QQAfLUCSMVFPUDynMW6MjSMfjC2dhcnDXMykYSdBVckiaGEHEAYeN+Iellenn9cqwGzPgLVeSmrssU44FkfKE1j2qlivwR6MywzIJ92/CzrbdCwC2rkP7UGA4izAOI3M2IkFWToWYEpoEG8/dfBY28WtzJ291MLIpY2OCnmch+xhB7LWXGfjuBb6Gcb5q88ltDFDKmS5k5gT4Iz6uEQuaUhcuxyNy2RFr1NsA/No82ceFzeLUYcGZB4io+xPBZNp9ba8r/xmLfanCq0K5R4RD49dAdIjUPw=; 5:q2+jFUhf1J/YjCJACNyLdUEFxZgZWFHGF7t2Jm4wRAKchT+Khy3P000lz0pTg9x+uRhcNrS0I5h0ELpzzAq46gmETqUcBT29FRJtJDmfr2nDB78UtrWMB4HOb/j6ljcDFkbWoLjDmSHlXE84QtYaLaveKi1LghjzGO/Y4yzA1OM=; 24:cq4SHYoXAnfOxGM/OT+qfmgcyJkjE1y+MYgpZnmZACCDNIDSQ6WFVm3uTP2YjpZedvzv1tUBXOCopA7qnYfWjXovuuQ/pFy7zjillfe8ny4=; 7:oLc2i/slhkwOgzh0GgY8/fJVktfxV6yFKrOd3nm8fd7VXVKbqKah23rJHg9gBo0Py+gZvjyzX6vfSY9Mi68Nkt2DKJaRq48Cw6ouEbTZRHLJMkYWJYdd/O5FaVc5U+T++LRpMMkxJDyySJCkjIpikv1qpZhnTqbCf9w4xxBZ2gLCHm4Nv3sZCsxXGkhHZBMuKpTTH0y6IC6GlC6ovn+HP0syhiqxc933EuZ3XVZV1Xu97eDYd1pu52QyzsxhbEcO SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Jan 2018 06:40:00.6997 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1bcf6f08-aa2a-4dc0-2f09-08d55be2ce2d X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2358 Subject: [dpdk-dev] [PATCH v3 1/3] crypto/dpaa_sec: optimize virt to phy conversion X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Hemant Agrawal Context memory is allocated from mempool. Ideally it will get all memory from single segment, so simple offset calculation is used for address conversion for such addresses from context memory. Signed-off-by: Hemant Agrawal Acked-by: Akhil Goyal --- drivers/crypto/dpaa_sec/dpaa_sec.c | 27 ++++++++++++++++++--------- drivers/crypto/dpaa_sec/dpaa_sec.h | 1 + 2 files changed, 19 insertions(+), 9 deletions(-) -- 2.9.3 diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index ad1b309..157eace 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -80,6 +80,8 @@ dpaa_sec_alloc_ctx(dpaa_sec_session *ses) dcbz_64(&ctx->job.sg[SG_CACHELINE_3]); ctx->ctx_pool = ses->ctx_pool; + ctx->vtop_offset = (uint64_t) ctx + - rte_mempool_virt2iova(ctx); return ctx; } @@ -104,6 +106,13 @@ dpaa_mem_vtop(void *vaddr) return (rte_iova_t)(NULL); } +/* virtual address conversin when mempool support is available for ctx */ +static inline phys_addr_t +dpaa_mem_vtop_ctx(struct dpaa_sec_op_ctx *ctx, void *vaddr) +{ + return (uint64_t)vaddr - ctx->vtop_offset; +} + static inline void * dpaa_mem_ptov(rte_iova_t paddr) { @@ -563,7 +572,7 @@ build_auth_only(struct rte_crypto_op *op, dpaa_sec_session *ses) if (is_decode(ses)) { /* need to extend the input to a compound frame */ sg->extension = 1; - qm_sg_entry_set64(sg, dpaa_mem_vtop(&cf->sg[2])); + qm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2])); sg->length = sym->auth.data.length + ses->digest_length; sg->final = 1; cpu_to_hw_sg(sg); @@ -577,7 +586,7 @@ build_auth_only(struct rte_crypto_op *op, dpaa_sec_session *ses) cpu_to_hw_sg(sg); /* let's check digest by hw */ - start_addr = dpaa_mem_vtop(old_digest); + start_addr = dpaa_mem_vtop_ctx(ctx, old_digest); sg++; qm_sg_entry_set64(sg, start_addr); sg->length = ses->digest_length; @@ -631,7 +640,7 @@ build_cipher_only(struct rte_crypto_op *op, dpaa_sec_session *ses) sg->extension = 1; sg->final = 1; sg->length = sym->cipher.data.length + ses->iv.length; - qm_sg_entry_set64(sg, dpaa_mem_vtop(&cf->sg[2])); + qm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, &cf->sg[2])); cpu_to_hw_sg(sg); sg = &cf->sg[2]; @@ -677,7 +686,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses) /* input */ rte_prefetch0(cf->sg); sg = &cf->sg[2]; - qm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop(sg)); + qm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop_ctx(ctx, sg)); if (is_encode(ses)) { qm_sg_entry_set64(sg, dpaa_mem_vtop(IV_ptr)); sg->length = ses->iv.length; @@ -722,7 +731,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses) ses->digest_length); sg++; - qm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest)); + qm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest)); sg->length = ses->digest_length; length += sg->length; sg->final = 1; @@ -736,7 +745,7 @@ build_cipher_auth_gcm(struct rte_crypto_op *op, dpaa_sec_session *ses) /* output */ sg++; - qm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop(sg)); + qm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop_ctx(ctx, sg)); qm_sg_entry_set64(sg, dst_start_addr + sym->aead.data.offset - ses->auth_only_len); sg->length = sym->aead.data.length + ses->auth_only_len; @@ -788,7 +797,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses) /* input */ rte_prefetch0(cf->sg); sg = &cf->sg[2]; - qm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop(sg)); + qm_sg_entry_set64(&cf->sg[1], dpaa_mem_vtop_ctx(ctx, sg)); if (is_encode(ses)) { qm_sg_entry_set64(sg, dpaa_mem_vtop(IV_ptr)); sg->length = ses->iv.length; @@ -818,7 +827,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses) ses->digest_length); sg++; - qm_sg_entry_set64(sg, dpaa_mem_vtop(ctx->digest)); + qm_sg_entry_set64(sg, dpaa_mem_vtop_ctx(ctx, ctx->digest)); sg->length = ses->digest_length; length += sg->length; sg->final = 1; @@ -832,7 +841,7 @@ build_cipher_auth(struct rte_crypto_op *op, dpaa_sec_session *ses) /* output */ sg++; - qm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop(sg)); + qm_sg_entry_set64(&cf->sg[0], dpaa_mem_vtop_ctx(ctx, sg)); qm_sg_entry_set64(sg, dst_start_addr + sym->cipher.data.offset); sg->length = sym->cipher.data.length; length = sg->length; diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index 9342949..e82f4fb 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -155,6 +155,7 @@ struct dpaa_sec_op_ctx { struct rte_crypto_op *op; struct rte_mempool *ctx_pool; /* mempool pointer for dpaa_sec_op_ctx */ uint32_t fd_status; + int64_t vtop_offset; uint8_t digest[DPAA_MAX_NB_MAX_DIGEST]; };