From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM04-SN1-obe.outbound.protection.outlook.com (mail-eopbgr700072.outbound.protection.outlook.com [40.107.70.72]) by dpdk.org (Postfix) with ESMTP id 8CF211B108 for ; Tue, 25 Sep 2018 05:27:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0iPXCCgaCdqUgYOKEcRSX/9aYvB8adCtyqaNKCCCXCY=; b=EEh+4tPzwz/WZpc0DZD1Seq7yaXIRjGHhZCnPZO1e/6nziOKy5U4c+ze8Dk5RBdpH2uqKT6NJkRtU+qN9J8HCUGPtJ3ZEIMHsZbHb9dTksZZDr7EbjxqbMlAJvSag/gZccpp8bbVUIxWqwG44ychUtY09ph7ReyVhhGYslYZ2a8= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Jerin.JacobKollanukkaran@cavium.com; Received: from jerin (115.113.156.3) by BYAPR07MB4997.namprd07.prod.outlook.com (2603:10b6:a03:5b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1143.17; Tue, 25 Sep 2018 03:11:46 +0000 Date: Tue, 25 Sep 2018 08:41:31 +0530 From: Jerin Jacob To: akhil.goyal@nxp.com Cc: dev@dpdk.org, hemant.agrawal@nxp.com, pablo.de.lara.guarch@intel.com, abhinandan.gujjar@intel.com Message-ID: <20180925031130.GA10106@jerin> References: <20180914114810.14960-1-akhil.goyal@nxp.com> <20180914114810.14960-4-akhil.goyal@nxp.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180914114810.14960-4-akhil.goyal@nxp.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Originating-IP: [115.113.156.3] X-ClientProxiedBy: PN1PR0101CA0002.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c00:e::12) To BYAPR07MB4997.namprd07.prod.outlook.com (2603:10b6:a03:5b::22) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 7e4b03cb-c507-47be-8e67-08d62294a279 X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534165)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:BYAPR07MB4997; X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4997; 3:1TCHffihhlFhXufzzOhP5uJXXiQsvNfV4enJgvCrmSKOPENsT1ex7bmBkrZ+hpuAbR+4V4tMaEbBS8NxPmLvm1QhjQxFNyFrLf/HAQkQJuZDefJFVM3RB4bPlerW7vSesJEkp8qZ5H0sBmlxNawDrFmx0WqOqpyPICffqqO31dmOoBZE0QrQ102mGsRSeXrifHt2uXtSeQ/tCE68Pms36HCG38iB+ekiHPPGYD4DisMxp29YoL1BFyCWSPIV0rjG; 25:MAPnTEgphHcOk2DYAaWEkmCikWNQZUtDJJZXFdBFp1kslnp0oxXLsp/jySTrXin69IVsJJ67KELs8qBG7xoJCs6H0SrDhfJ16qnbPwexj+I/fhb4A3sotNPEPNc/G0Wnl/ei7OxBE3JUcLTbW79B66/gWZhT7BU1zDjm9TGspSLungPDGYTa3aiqoE8ndIXkrAxetbcxUvzHS++4SMtJLpFYnWg6EMg3hpoGDHC149vjStfW8/AIxEVANVZH6ZR7AjdWMW1RBh7ta7ri1JvBy7cXI87TDJXVVFspZTvSPTUn8G3pcvADMfxx14yAOciU0FX10POoUetJlZQvsTzG/A==; 31:aNMpdjrPgT4RlQ5ziVSKHQDWEPTLqItRNM7aeSlijOkMSRqNWWTQgTX1PIeq2FFAv6g152BhTGyHv2h9tmEMwjoSx8EDSD0TD5V84IhvRzPZewzQ64btwp349+QBxtgGC73rlkmsqy/P8tloTLBhiEOYiecjhip7Nuot5eFLfK8b7wCugWQFXEaQm2ndZ2d6mNK+pVZ2hpOGxqbrNm4Xdh30E/f967ctxtjYje4jB58= X-MS-TrafficTypeDiagnostic: BYAPR07MB4997: X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4997; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197)(228905959029699)(275809806118684); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3231355)(944501410)(52105095)(3002001)(149066)(150027)(6041310)(20161123560045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(201708071742011)(7699051); SRVR:BYAPR07MB4997; BCL:0; PCL:0; RULEID:; SRVR:BYAPR07MB4997; X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4997; 4:Z7b8OtXbGk0mnpc4mnXDBlAOY0MAHgTNexl8IglRXS9r0hDDH/la6Yv4C1LRhJpwTK7OPdd4ySWhyho+tmaYHifcp6JhrYbskpgSCe3e7/XlSSjJYCQdbHhDFsejjZXVLgb5mJCVjOoR6YPuo3q0XDIy+UaznqkkgtrapAN9HXJKV2K16RmnkKk+GtMJBK6VMQTUoTPut0SyGSNljjwYPkYhS/Yrwwsz7B5/dDPzAk8Ekd62c4x+1cgN2VRiki61qrLtlKV0Kcb862uyeYi1YOv6cnRb0hz0m64bCyVl5mA33tcyTYmToto2Ssb3OoyGRtWVN8wYKM9iU+tfq03cwd0mLXYtvAR+i7s6lijZ3QViMNRacuFE6tXCJpD8BJcm X-Forefront-PRVS: 08062C429B X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(979002)(39860400002)(376002)(396003)(136003)(366004)(346002)(189003)(199004)(13464003)(26005)(5024004)(6246003)(53936002)(97736004)(25786009)(76176011)(229853002)(6916009)(186003)(16526019)(6666003)(1076002)(5660300001)(6116002)(72206003)(575784001)(16586007)(3846002)(8676002)(478600001)(55016002)(23726003)(58126008)(316002)(4326008)(33896004)(50466002)(47776003)(42882007)(106356001)(386003)(486006)(476003)(956004)(105586002)(11346002)(446003)(44832011)(2361001)(33716001)(9686003)(305945005)(81156014)(68736007)(66066001)(2351001)(33656002)(52116002)(81166006)(7736002)(8936002)(2906002)(6496006)(18370500001)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR07MB4997; H:jerin; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BYAPR07MB4997; 23:oB9zoTb4o83VYGENj+2DtIqehn1q3dSRprmvijuZX?= =?us-ascii?Q?Xz5O2GiXv5Epe4bsPiXDrs3GJpAgNw2r5ndR+l0lGVCQNajjGmsKRHzvLzjI?= =?us-ascii?Q?qL0ryrvpu5KCxy/hjBThfYI3obO1NxmCYuQFp2O8B+FREy8YbuxTxo5F0LTQ?= =?us-ascii?Q?uXynAfJJoW8CxKdbQvYvtEiUkoOkyIcflc6mTefGPWO7U2zxtRv5ZPpOsGhw?= =?us-ascii?Q?uCZDS9iYHf0+gxNDKwDrB5IhcN4mc4XeTyswdLqsbIz/vPprnSjk0RT/YyQb?= =?us-ascii?Q?plpbhp9tkMh+WrcjXZ1llGBMpnE+idlEH1INDb5qSmShqpuwuqyW0WqAtPw4?= =?us-ascii?Q?l6GzN2xXwFND48q8AFgFKVqc5r8MbZHbBu+cfUcJXnyhmMrI41bRJYfCcclM?= =?us-ascii?Q?LDd0y45/B8hpKAyCgFqglFyYuJ6+0ARgEZc/M9FtpN+TKutM21iBfOyrtXSu?= =?us-ascii?Q?63hvnwTWLwBHcYubNq/xL5T5IVRzhEhNfea7Pf/oSrDz0PgTu62aYoW3axbp?= =?us-ascii?Q?7XlHZKuptB94CpQJWG+o2jaluNe/uJPEO8UMtCeAU40pCZTJcyxKZOL9l29W?= =?us-ascii?Q?Ir3Sb04rzSuo2zz6AT32LTjeQhUeBki8LjHnA7LUngcM92oojfh8m7w4gpAx?= =?us-ascii?Q?Wmmfkkp7XS/N6ZQxqlyCKwbkbTkmj6BK/pWYYFxHZNCrWYH8vGatB5GcqArQ?= =?us-ascii?Q?OovrDYR29kSR7exnARYutaLMWJizc6DESsF1osGThYfpC2BBGs4hCEhYxxxU?= =?us-ascii?Q?Gg3x4tyzTDHGNasu7Q2iK/l55abxI4QfXap+e3DwPN4loJd1PuYDvW5+BXOj?= =?us-ascii?Q?dVt9MAgYc8gRCx+hwqBM8JMwa0tTsyl6RMqQb0zOQMTtaxVRPJ8z6tVH+of/?= =?us-ascii?Q?xglXaC1OY3LkU7Gx8GPamzS7wDbfOFpZaWtj9eZ36cnF7Kno1OJugwG5b19O?= =?us-ascii?Q?GAvHEfJ9+YyLSr5XtfX/oGXwedbFmxUPIw4Lr9Idh6jlcifxOoyR1a5N219z?= =?us-ascii?Q?RIObWySPocjw9DifIbE2OkhPtHI8+Dp0bLgtKwqdm+eWEA5Zgw6mywSE+M5f?= =?us-ascii?Q?vaXNV666xTpfxTZBmMkzr2c3gYa56qIpIycqQC3e2xUCUS7GFDXwDSGbpdaB?= =?us-ascii?Q?WWP2PQjEVbHQZj+sTcxZKSPzO5EooLoJWRsSHzIuvmuU/BkDHGUZkfx0XDUK?= =?us-ascii?Q?1bAGxeLNObxZ/zLguTG+fJBm7Bis2uyTsVlTAkCCKWDIlmCBv5idQnHan4g2?= =?us-ascii?Q?N2ZnbdAUI/oa/zg5EmpXE5t4FQvnHRQngGltQTIjR8diYkQSmj31fX66nwZv?= =?us-ascii?Q?A+/VIglqsQIi2w2EMAR562QelMGoMTRgNE9WI6wA1gLJ84/CzvqMAxkXyhtC?= =?us-ascii?Q?ukY0hMAnJIFePIUJMjkpl0f193okIsRzHbGjGzSo/GiP2N8xgJj9XHLbZRqI?= =?us-ascii?Q?tS3pG2oNf83xp28PBMBZPuPTiYfM8fgmfA8Sjn3ZOvWhFkPUw/NdRN6htroO?= =?us-ascii?Q?wihiV6QACLBSpMZsJjOPP+llJM8LMeP8oM=3D?= X-Microsoft-Antispam-Message-Info: JsSScMMnS95q8WOwlyAYh2kvdcNGNPp9xTcaBzn35yoaNUNu3+rrggyqT59sVtF6NNNkvRtF+SXEJtB9grO4vKicotXsacuL1asjXuIIOHo2wZesAaMh1KqK9dP+qkLVhgk4aVM9xa7/fnvhVENZ7on6zQ0oUbf1lshzUzxTp0rFJzFSHZZXVq5WT532t7TGHiga5CCiz86wT+6df9ywbha7igd0jFh+vyT0MGA8Y2isT4TaNhINOhpLyxEQEpS00qUuElPdD0fAfNkHqJLejWNYHFcJXRLMSUp24Jz0KBwYYS+ZHlDo8tyVUqzFxGM/0sZbVmzmuRnKcCpD9q9PtKJm+pWJsY8FmNEbhgUDbOs= X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4997; 6:5brm1mPhwCHnXIk2nV2MwHedunIR0a6CSjYRfF1xDyMoCBF5UWdsMqum66Q7XZj6vjeDeBBjfsP4a9vG2A7EUL1lTTgR8xrSozNQJQ/Tx6hjmN21rcdqAuHcD+xceEEn/hT3460SUWWA/1e9QFyUHajPapVVZYQaZIPlryWpXJXizlKIezVbHNlo+1uB6tJFVDFN4CcBnuqKLLoIiNPZuNkKQa0gufkQ2LW7Djyisg8KP4RiCBa0tb3/o6u1ud43lUb9lTro4Fg26tI2+/+CuHDDFMao6PCLBnaNWMlaeC/1s3asuTKJFup/F4vwOapYpahPjrQt1fvN76WZ6qzB93NVsjh2inX35566oS8/gK1nxYfKZXaqa73NSUMp6R5sfdGfzhGc1ej6FkOwZLeEQpKyAT4x4aDS/RTR1JE2HZMYkzgjJm5hSsPSs95Eb0ZF4w2K4+b6jjmgrF5NGoYhSw==; 5:QdYJn59+mJm47vfgFw0kACu1K40fIUgFgGLNIIsEUD+sExlUZt607fb95AqvEo8HbCO/9cXH0JqpFBYWvZ9ljbObPzhT8GTAzREKY/MQd1Z5YzUlcoblynMxyb+gwZzu0ntH6ihIxTkvqW2mFCSGJB6Tn3mFyHhYhutaMmu5q4I=; 7:sSwoa1Rlrne2ujeSLU+Bx5Tjimcbl2KmT4dsqKos8bSGTuItRfYc7dMw6jf0qUKbSbx6tem7GRrSWiRhew9K30ZyRxPtvcMkwkVEyNODHUPmxG+vDAl1ZpS2JoUvpuadhD+VfIUsqvTW4Eicyxf5QVnaXH2vmh0CesiCWdiu8TdSZMRjDJmsAkXQ0WQc2SnqIq/4b4WGPX5qJdZSRPjT4VnrH8k5IcvFmAbvW4RtAr9ZB+DPs29AflYvc5LTMoH2 SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Sep 2018 03:11:46.8203 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7e4b03cb-c507-47be-8e67-08d62294a279 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR07MB4997 Subject: Re: [dpdk-dev] [PATCH 3/3] event/dpaa2: support for crypto adapter X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 25 Sep 2018 03:27:42 -0000 -----Original Message----- > Date: Fri, 14 Sep 2018 17:18:10 +0530 > From: akhil.goyal@nxp.com > To: dev@dpdk.org > CC: hemant.agrawal@nxp.com, pablo.de.lara.guarch@intel.com, Akhil Goyal > > Subject: [dpdk-dev] [PATCH 3/3] event/dpaa2: support for crypto adapter > X-Mailer: git-send-email 2.17.1 > > > From: Akhil Goyal > > Signed-off-by: Akhil Goyal > Signed-off-by: Ashish Jain > Signed-off-by: Hemant Agrawal Adding Eventdev Crypto Adapter maintainer + Abhinandan Gujjar > --- > drivers/event/dpaa2/Makefile | 3 +- > drivers/event/dpaa2/dpaa2_eventdev.c | 150 +++++++++++++++++++++++++++ > drivers/event/dpaa2/dpaa2_eventdev.h | 9 ++ > drivers/event/dpaa2/meson.build | 3 +- > 4 files changed, 163 insertions(+), 2 deletions(-) > > diff --git a/drivers/event/dpaa2/Makefile b/drivers/event/dpaa2/Makefile > index 5e1a63200..46f7d061e 100644 > --- a/drivers/event/dpaa2/Makefile > +++ b/drivers/event/dpaa2/Makefile > @@ -20,9 +20,10 @@ CFLAGS += -I$(RTE_SDK)/drivers/event/dpaa2 > CFLAGS += -I$(RTE_SDK)/lib/librte_eal/linuxapp/eal > LDLIBS += -lrte_eal -lrte_eventdev > LDLIBS += -lrte_bus_fslmc -lrte_mempool_dpaa2 -lrte_pmd_dpaa2 > -LDLIBS += -lrte_bus_vdev > +LDLIBS += -lrte_bus_vdev -lrte_pmd_dpaa2_sec > CFLAGS += -I$(RTE_SDK)/drivers/net/dpaa2 > CFLAGS += -I$(RTE_SDK)/drivers/net/dpaa2/mc > +CFLAGS += -I$(RTE_SDK)/drivers/crypto/dpaa2_sec > > # versioning export map > EXPORT_MAP := rte_pmd_dpaa2_event_version.map > diff --git a/drivers/event/dpaa2/dpaa2_eventdev.c b/drivers/event/dpaa2/dpaa2_eventdev.c > index cadbdb13b..890ab461c 100644 > --- a/drivers/event/dpaa2/dpaa2_eventdev.c > +++ b/drivers/event/dpaa2/dpaa2_eventdev.c > @@ -27,6 +27,7 @@ > #include > #include > #include > +#include > #include > > #include > @@ -34,6 +35,7 @@ > #include > #include > #include > +#include > #include "dpaa2_eventdev.h" > #include "dpaa2_eventdev_logs.h" > #include > @@ -793,6 +795,149 @@ dpaa2_eventdev_eth_stop(const struct rte_eventdev *dev, > return 0; > } > > +static int > +dpaa2_eventdev_crypto_caps_get(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cdev, > + uint32_t *caps) > +{ > + const char *name = cdev->data->name; > + > + EVENTDEV_INIT_FUNC_TRACE(); > + > + RTE_SET_USED(dev); > + > + if (!strncmp(name, "dpsec-", 6)) > + *caps = RTE_EVENT_CRYPTO_ADAPTER_DPAA2_CAP; > + else > + return -1; > + > + return 0; > +} > + > +static int > +dpaa2_eventdev_crypto_queue_add_all(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cryptodev, > + const struct rte_event *ev) > +{ > + struct dpaa2_eventdev *priv = dev->data->dev_private; > + uint8_t ev_qid = ev->queue_id; > + uint16_t dpcon_id = priv->evq_info[ev_qid].dpcon->dpcon_id; > + int i, ret; > + > + EVENTDEV_INIT_FUNC_TRACE(); > + > + for (i = 0; i < cryptodev->data->nb_queue_pairs; i++) { > + ret = dpaa2_sec_eventq_attach(cryptodev, i, > + dpcon_id, ev); > + if (ret) { > + DPAA2_EVENTDEV_ERR("dpaa2_sec_eventq_attach failed: ret %d\n", > + ret); > + goto fail; > + } > + } > + return 0; > +fail: > + for (i = (i - 1); i >= 0 ; i--) > + dpaa2_sec_eventq_detach(cryptodev, i); > + > + return ret; > +} > + > +static int > +dpaa2_eventdev_crypto_queue_add(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cryptodev, > + int32_t rx_queue_id, > + const struct rte_event *ev) > +{ > + struct dpaa2_eventdev *priv = dev->data->dev_private; > + uint8_t ev_qid = ev->queue_id; > + uint16_t dpcon_id = priv->evq_info[ev_qid].dpcon->dpcon_id; > + int ret; > + > + EVENTDEV_INIT_FUNC_TRACE(); > + > + if (rx_queue_id == -1) > + return dpaa2_eventdev_crypto_queue_add_all(dev, > + cryptodev, ev); > + > + ret = dpaa2_sec_eventq_attach(cryptodev, rx_queue_id, > + dpcon_id, ev); > + if (ret) { > + DPAA2_EVENTDEV_ERR( > + "dpaa2_sec_eventq_attach failed: ret: %d\n", ret); > + return ret; > + } > + return 0; > +} > + > +static int > +dpaa2_eventdev_crypto_queue_del_all(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cdev) > +{ > + int i, ret; > + > + EVENTDEV_INIT_FUNC_TRACE(); > + > + RTE_SET_USED(dev); > + > + for (i = 0; i < cdev->data->nb_queue_pairs; i++) { > + ret = dpaa2_sec_eventq_detach(cdev, i); > + if (ret) { > + DPAA2_EVENTDEV_ERR( > + "dpaa2_sec_eventq_detach failed:ret %d\n", ret); > + return ret; > + } > + } > + > + return 0; > +} > + > +static int > +dpaa2_eventdev_crypto_queue_del(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cryptodev, > + int32_t rx_queue_id) > +{ > + int ret; > + > + EVENTDEV_INIT_FUNC_TRACE(); > + > + if (rx_queue_id == -1) > + return dpaa2_eventdev_crypto_queue_del_all(dev, cryptodev); > + > + ret = dpaa2_sec_eventq_detach(cryptodev, rx_queue_id); > + if (ret) { > + DPAA2_EVENTDEV_ERR( > + "dpaa2_sec_eventq_detach failed: ret: %d\n", ret); > + return ret; > + } > + > + return 0; > +} > + > +static int > +dpaa2_eventdev_crypto_start(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cryptodev) > +{ > + EVENTDEV_INIT_FUNC_TRACE(); > + > + RTE_SET_USED(dev); > + RTE_SET_USED(cryptodev); > + > + return 0; > +} > + > +static int > +dpaa2_eventdev_crypto_stop(const struct rte_eventdev *dev, > + const struct rte_cryptodev *cryptodev) > +{ > + EVENTDEV_INIT_FUNC_TRACE(); > + > + RTE_SET_USED(dev); > + RTE_SET_USED(cryptodev); > + > + return 0; > +} > + > static struct rte_eventdev_ops dpaa2_eventdev_ops = { > .dev_infos_get = dpaa2_eventdev_info_get, > .dev_configure = dpaa2_eventdev_configure, > @@ -814,6 +959,11 @@ static struct rte_eventdev_ops dpaa2_eventdev_ops = { > .eth_rx_adapter_queue_del = dpaa2_eventdev_eth_queue_del, > .eth_rx_adapter_start = dpaa2_eventdev_eth_start, > .eth_rx_adapter_stop = dpaa2_eventdev_eth_stop, > + .crypto_adapter_caps_get = dpaa2_eventdev_crypto_caps_get, > + .crypto_adapter_queue_pair_add = dpaa2_eventdev_crypto_queue_add, > + .crypto_adapter_queue_pair_del = dpaa2_eventdev_crypto_queue_del, > + .crypto_adapter_start = dpaa2_eventdev_crypto_start, > + .crypto_adapter_stop = dpaa2_eventdev_crypto_stop, > }; > > static int > diff --git a/drivers/event/dpaa2/dpaa2_eventdev.h b/drivers/event/dpaa2/dpaa2_eventdev.h > index 720e0c63b..c847b3eab 100644 > --- a/drivers/event/dpaa2/dpaa2_eventdev.h > +++ b/drivers/event/dpaa2/dpaa2_eventdev.h > @@ -42,6 +42,15 @@ enum { > (RTE_EVENT_ETH_RX_ADAPTER_CAP_INTERNAL_PORT | \ > RTE_EVENT_ETH_RX_ADAPTER_CAP_MULTI_EVENTQ | \ > RTE_EVENT_ETH_RX_ADAPTER_CAP_OVERRIDE_FLOW_ID) > + > +/**< Crypto Rx adapter cap to return If the packet transfers from > + * the cryptodev to eventdev with DPAA2 devices. > + */ > +#define RTE_EVENT_CRYPTO_ADAPTER_DPAA2_CAP \ > + (RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW | \ > + RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_QP_EV_BIND | \ > + RTE_EVENT_CRYPTO_ADAPTER_CAP_SESSION_PRIVATE_DATA) > + > /**< Ethernet Rx adapter cap to return If the packet transfers from > * the ethdev to eventdev with DPAA2 devices. > */ > diff --git a/drivers/event/dpaa2/meson.build b/drivers/event/dpaa2/meson.build > index de7a46155..c1bd63384 100644 > --- a/drivers/event/dpaa2/meson.build > +++ b/drivers/event/dpaa2/meson.build > @@ -4,8 +4,9 @@ > if host_machine.system() != 'linux' > build = false > endif > -deps += ['bus_vdev', 'pmd_dpaa2'] > +deps += ['bus_vdev', 'pmd_dpaa2', 'pmd_dpaa2_sec'] > sources = files('dpaa2_hw_dpcon.c', > 'dpaa2_eventdev.c') > > allow_experimental_apis = true > +includes += include_directories('../../crypto/dpaa2_sec/') > -- > 2.17.1 >