Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1946874ybf; Sun, 1 Mar 2020 22:19:29 -0800 (PST) X-Google-Smtp-Source: APXvYqxjQgevFaNZzlFjut28Vz6HbHEi2bmVeMiSiN+3Iu2v2m0j8Nmu5yzwAnd00psu71951XhU X-Received: by 2002:a05:6830:1284:: with SMTP id z4mr6990892otp.291.1583129969563; Sun, 01 Mar 2020 22:19:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583129969; cv=none; d=google.com; s=arc-20160816; b=DGZIMdJ9mjO0HKrBdvOfOXoBXBM8OP4mZEXFLt4YF8cdyLZdpURv1H4cLyeRWKcNFn o7rP1uUxS//7ZiVVi5fhgqs9wQjD07Im7Sci50f8EfjgRHcwClDAPvDENurbW0IXEsoy 98kChoqbgkhI5wgbAGy3ioc/P9Bq38yzjQV/9r9ckX+yGSjBxtIfCa5YKTgBz7TUNkRi pay5TG2MYJGNncBNYLBWWsmX/94W/7InPcGLnPcUXG+HRUgOh4w3WqBAj48gwH349yKG olGit4LonwOogvdTHgfKANQQfnJkgijZQBKZwhZ7yO37+UTCwX0TEoOtO6PBCnl900IL 0+xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=plOUlNdzdsKNHYkoVWbpznFbavhDQk0SG8TEXz363Xg=; b=ioepKaM54m60+44NbR3OFCgD5hAI7frNkGLxuJwHb/nGJtvVusBqC3ksKwHdhfuQ3n Z/7IC/9kXCkiEtGB8gmQwwZxZXs+AWytLtV5PRSfRiDB7CWj1Un+ANLHXdjRiO0yDyVe j6MKoYf2RmMeVigbok4mRyvIs5yEAJjAjW9JxHfHn9AG113h8n/9rr6nbMeh+xzkOt7V fBlp38RgpJEbzOp3N8+0DPNdbnqGnrgglzIgJE4RGzt47PP+MEj16eR5os1IsBzDVgFv 8J5/Yt2Dwlj62pq2ClYyJrWmPh2JCGoXzDExirguhKh4v0euxWv+2u+MjfwSlZC/uKCs NPiA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i25si3455337otc.184.2020.03.01.22.19.18; Sun, 01 Mar 2020 22:19:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726282AbgCBGTO (ORCPT + 99 others); Mon, 2 Mar 2020 01:19:14 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:11126 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726052AbgCBGTO (ORCPT ); Mon, 2 Mar 2020 01:19:14 -0500 Received: from DGGEMS401-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 81E684C487EA6BF1ACB0; Mon, 2 Mar 2020 14:19:02 +0800 (CST) Received: from localhost.localdomain (10.67.165.24) by DGGEMS401-HUB.china.huawei.com (10.3.19.201) with Microsoft SMTP Server id 14.3.439.0; Mon, 2 Mar 2020 14:18:51 +0800 From: Zaibo Xu To: , CC: , , , , , , , , , Subject: [PATCH v2 3/5] crypto: hisilicon/sec2 - Add iommu status check Date: Mon, 2 Mar 2020 14:15:14 +0800 Message-ID: <1583129716-28382-4-git-send-email-xuzaibo@huawei.com> X-Mailer: git-send-email 2.8.1 In-Reply-To: <1583129716-28382-1-git-send-email-xuzaibo@huawei.com> References: <1583129716-28382-1-git-send-email-xuzaibo@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-CFilter-Loop: Reflected Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: liulongfang In order to improve performance of small packets (<512Bytes) in SMMU translation scenario,We need to identify the type of IOMMU in the SEC probe to process small packets by a different method. Signed-off-by: liulongfang Reviewed-by: Zaibo Xu --- drivers/crypto/hisilicon/sec2/sec.h | 1 + drivers/crypto/hisilicon/sec2/sec_main.c | 19 +++++++++++++++++++ 2 files changed, 20 insertions(+) diff --git a/drivers/crypto/hisilicon/sec2/sec.h b/drivers/crypto/hisilicon/sec2/sec.h index 13e2d8d..eab0d22 100644 --- a/drivers/crypto/hisilicon/sec2/sec.h +++ b/drivers/crypto/hisilicon/sec2/sec.h @@ -165,6 +165,7 @@ struct sec_dev { struct list_head list; struct sec_debug debug; u32 ctx_q_num; + bool iommu_used; u32 num_vfs; unsigned long status; }; diff --git a/drivers/crypto/hisilicon/sec2/sec_main.c b/drivers/crypto/hisilicon/sec2/sec_main.c index ebafc1c..6466d90 100644 --- a/drivers/crypto/hisilicon/sec2/sec_main.c +++ b/drivers/crypto/hisilicon/sec2/sec_main.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include #include @@ -826,6 +827,23 @@ static void sec_probe_uninit(struct hisi_qm *qm) destroy_workqueue(qm->wq); } +static void sec_iommu_used_check(struct sec_dev *sec) +{ + struct iommu_domain *domain; + struct device *dev = &sec->qm.pdev->dev; + + domain = iommu_get_domain_for_dev(dev); + + /* Check if iommu is used */ + sec->iommu_used = false; + if (domain) { + if (domain->type & __IOMMU_DOMAIN_PAGING) + sec->iommu_used = true; + dev_info(dev, "SMMU Opened, the iommu type = %u\n", + domain->type); + } +} + static int sec_probe(struct pci_dev *pdev, const struct pci_device_id *id) { struct sec_dev *sec; @@ -839,6 +857,7 @@ static int sec_probe(struct pci_dev *pdev, const struct pci_device_id *id) pci_set_drvdata(pdev, sec); sec->ctx_q_num = ctx_q_num; + sec_iommu_used_check(sec); qm = &sec->qm; -- 2.8.1