From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 3E78EA04B0; Thu, 13 Aug 2020 19:24:01 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 38F7F1C0BC; Thu, 13 Aug 2020 19:24:00 +0200 (CEST) Received: from mail-qv1-f68.google.com (mail-qv1-f68.google.com [209.85.219.68]) by dpdk.org (Postfix) with ESMTP id DBD121C026 for ; Thu, 13 Aug 2020 19:23:58 +0200 (CEST) Received: by mail-qv1-f68.google.com with SMTP id x7so2986576qvi.5 for ; Thu, 13 Aug 2020 10:23:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=7Vfks67dPtNXFpaUzfT73xlYwtBfaYITl5lzDkPXviw=; b=KAFcmAMPXCVIUpMTfI5G+a7ihiEb4FOcAkWMT8H2oCwRiFwhN8e7kT707b5SDg8UJm Jf6dzaOURAdQ6A21Nx6wXgg/LpQ6EGgnswFJXORFmfipf1090tzDEbuPMZdp+UHiLbBX 7j1eFObFvhOIgSxhnuDzCCiSYz8P1hs+P86+0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=7Vfks67dPtNXFpaUzfT73xlYwtBfaYITl5lzDkPXviw=; b=dNp3ThqVuYEZIgLA89iGj4mzTi0AUXqrCzNYB73XN6NdaeLobTjdDaDC+bqnGknr2W 7nwvO1X+ECK4gznz3TgRr8CZ8LLDo+gcMWKbY5WoyVCnxmBXMlqq3wAJVKOf4AWHQU4M DhyUA8PRKtV7bQo/3VR27Wp/6wkRPGyyAb/AEydLd/pUuPguGKEydA2I0ZgEiBRqc20u /Bzs41CtNY4VScBsrEc++y4xyUEcoYo6egN7N3VydcCyA81nC6LK9V147mj6ui/36D1J L07fEqa5j9pfrK8MyM16P1uVjYPeullJMZbv3tfarm5F9oJFNX0/sPhKoSvJMalzsaF5 IFCg== X-Gm-Message-State: AOAM532D0F7jwet/mZdXZc/mc4DHpI4DrGLkbKtNQqF6+PTVroRv12WS JB/nLFNux9+GBToBlCStNH2O0mMDvtRCZPcDCMStNvNtOsh2gmY89/2LpexlXY0CVXjQ3sdBYyH BFE1dBK2JVBuXV9ejMwzVAzvrUdHlHBobYvITQWyGGG12DCbVgs6dq43X+Gs+ X-Google-Smtp-Source: ABdhPJxvc5iboD0tC35LwnZN8pmTdr/skwPYm98mwfyK3grkllpZe2UAtXplnmJJwcxISKbuaM+1cw== X-Received: by 2002:a05:6214:b34:: with SMTP id w20mr5570206qvj.215.1597339437558; Thu, 13 Aug 2020 10:23:57 -0700 (PDT) Received: from rahul_yocto_ubuntu18.ibn.broadcom.net ([192.19.234.250]) by smtp.gmail.com with ESMTPSA id g129sm6246635qkb.39.2020.08.13.10.23.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 13 Aug 2020 10:23:56 -0700 (PDT) From: Vikas Gupta To: dev@dpdk.org, akhil.goyal@nxp.com Cc: vikram.prakash@broadcom.com, Vikas Gupta Date: Thu, 13 Aug 2020 22:53:36 +0530 Message-Id: <20200813172344.3228-1-vikas.gupta@broadcom.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200812063127.8687-1-vikas.gupta@broadcom.com> References: <20200812063127.8687-1-vikas.gupta@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v2 0/8] Add Crypto PMD for Broadcom`s FlexSparc devices X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Hi, This patchset contains support for Crypto offload on Broadcom’s Stingray/Stingray2 SoCs having FlexSparc unit. BCMFS is an acronym for Broadcom FlexSparc device used in the patchest. The patchset progressively adds major modules as below. a) Detection of platform-device based on the known registered platforms and attaching with VFIO. b) Creation of Cryptodevice. c) Addition of session handling. d) Add Cryptodevice into test Cryptodev framework. The patchset has been tested on the above mentioned SoCs. Regards, Vikas Changes from v0->v1: Updated the ABI version in file .../crypto/bcmfs/rte_pmd_bcmfs_version.map Changes from v1->v2: - Fix compilation errors and coding style warnings. - Use global test crypto suite suggested by Adam Dybkowski Vikas Gupta (8): crypto/bcmfs: add BCMFS driver crypto/bcmfs: add vfio support crypto/bcmfs: add apis for queue pair management crypto/bcmfs: add hw queue pair operations crypto/bcmfs: create a symmetric cryptodev crypto/bcmfs: add session handling and capabilities crypto/bcmfs: add crypto h/w module crypto/bcmfs: add crypto pmd into cryptodev test MAINTAINERS | 7 + app/test/test_cryptodev.c | 17 + app/test/test_cryptodev.h | 1 + config/common_base | 5 + doc/guides/cryptodevs/bcmfs.rst | 72 ++ doc/guides/cryptodevs/features/bcmfs.ini | 56 + doc/guides/cryptodevs/index.rst | 1 + drivers/crypto/bcmfs/bcmfs_dev_msg.h | 29 + drivers/crypto/bcmfs/bcmfs_device.c | 331 ++++++ drivers/crypto/bcmfs/bcmfs_device.h | 76 ++ drivers/crypto/bcmfs/bcmfs_hw_defs.h | 38 + drivers/crypto/bcmfs/bcmfs_logs.c | 38 + drivers/crypto/bcmfs/bcmfs_logs.h | 34 + drivers/crypto/bcmfs/bcmfs_qp.c | 383 +++++++ drivers/crypto/bcmfs/bcmfs_qp.h | 142 +++ drivers/crypto/bcmfs/bcmfs_sym.c | 316 ++++++ drivers/crypto/bcmfs/bcmfs_sym_capabilities.c | 764 ++++++++++++++ drivers/crypto/bcmfs/bcmfs_sym_capabilities.h | 16 + drivers/crypto/bcmfs/bcmfs_sym_defs.h | 186 ++++ drivers/crypto/bcmfs/bcmfs_sym_engine.c | 994 ++++++++++++++++++ drivers/crypto/bcmfs/bcmfs_sym_engine.h | 103 ++ drivers/crypto/bcmfs/bcmfs_sym_pmd.c | 426 ++++++++ drivers/crypto/bcmfs/bcmfs_sym_pmd.h | 38 + drivers/crypto/bcmfs/bcmfs_sym_req.h | 62 ++ drivers/crypto/bcmfs/bcmfs_sym_session.c | 424 ++++++++ drivers/crypto/bcmfs/bcmfs_sym_session.h | 99 ++ drivers/crypto/bcmfs/bcmfs_vfio.c | 107 ++ drivers/crypto/bcmfs/bcmfs_vfio.h | 17 + drivers/crypto/bcmfs/hw/bcmfs4_rm.c | 742 +++++++++++++ drivers/crypto/bcmfs/hw/bcmfs5_rm.c | 677 ++++++++++++ drivers/crypto/bcmfs/hw/bcmfs_rm_common.c | 82 ++ drivers/crypto/bcmfs/hw/bcmfs_rm_common.h | 46 + drivers/crypto/bcmfs/meson.build | 20 + .../crypto/bcmfs/rte_pmd_bcmfs_version.map | 3 + drivers/crypto/meson.build | 3 +- mk/rte.app.mk | 1 + 36 files changed, 6355 insertions(+), 1 deletion(-) create mode 100644 doc/guides/cryptodevs/bcmfs.rst create mode 100644 doc/guides/cryptodevs/features/bcmfs.ini create mode 100644 drivers/crypto/bcmfs/bcmfs_dev_msg.h create mode 100644 drivers/crypto/bcmfs/bcmfs_device.c create mode 100644 drivers/crypto/bcmfs/bcmfs_device.h create mode 100644 drivers/crypto/bcmfs/bcmfs_hw_defs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_logs.c create mode 100644 drivers/crypto/bcmfs/bcmfs_logs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_qp.c create mode 100644 drivers/crypto/bcmfs/bcmfs_qp.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_capabilities.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_capabilities.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_defs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_engine.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_engine.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_pmd.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_pmd.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_req.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_session.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_session.h create mode 100644 drivers/crypto/bcmfs/bcmfs_vfio.c create mode 100644 drivers/crypto/bcmfs/bcmfs_vfio.h create mode 100644 drivers/crypto/bcmfs/hw/bcmfs4_rm.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs5_rm.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs_rm_common.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs_rm_common.h create mode 100644 drivers/crypto/bcmfs/meson.build create mode 100644 drivers/crypto/bcmfs/rte_pmd_bcmfs_version.map -- 2.17.1