From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id B7718A04B1; Mon, 5 Oct 2020 18:27:19 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id F2D801B3C8; Mon, 5 Oct 2020 18:27:15 +0200 (CEST) Received: from mail-pj1-f68.google.com (mail-pj1-f68.google.com [209.85.216.68]) by dpdk.org (Postfix) with ESMTP id 8721B2B9C for ; Mon, 5 Oct 2020 18:27:13 +0200 (CEST) Received: by mail-pj1-f68.google.com with SMTP id i3so67452pjz.4 for ; Mon, 05 Oct 2020 09:27:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version; bh=zXdA2j1cw9H3wJiOpr0WTJ4Pdy05eR5B927erukVFcw=; b=fct48kl0yD854D2H84FHayvBBIjfRKxFKibd3KhCbp2Me/4KKcxmOuMEkW2SEdNT2g tkBVcSh5BXH02t5VVAz1NRmp1OLtuiOAsKT9GkNDpLq9DuTauP3XD5rq37yzPnN8UmBX x3K/6aA7E98+8crbwL64/5S5PwImSPlEe2ha4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version; bh=zXdA2j1cw9H3wJiOpr0WTJ4Pdy05eR5B927erukVFcw=; b=GcUkpBaCxkkqIsBwBDOhsBEqrqa4cKqqd6yS2EKG6B/x0cATq5aaGJzKJQfJo6/6Y5 kyuDxriIA2ljkXF3DkC+ZDYqRsLgkm+WYf4zzCSESksdPpeErD9c3Na5FxoyP5EmgW4p wFU+cJ12sXZhHPFwA1H+dOYx8+euz20lx6Twjp6sZGZ/1TNHNFIFcB22bRbTSyOWWHCo tVef2LjqXSF0ddFXVl2V7YYalkY/Ix8INuLHJ23/YN6lqiOKX8Y3kWoslwW6eOs0+/99 rlGtB5xwyEVoNcBR1tj74yl6TOrMonm8b9QUFBjVGrfwQRYbWJZooLmjEWBTb+04+F69 VtBQ== X-Gm-Message-State: AOAM530wqij2bAtqme+iV5+JW8S34r2+nOYp+GrrmopRA4FHb+okGsCn 189+XgPGMho0Z6m9AlLJYrgxuWPfHTnPtuY3jgdf/QvSEe1fco0il38oPoQOOlsoMWLLq91Gn/P SpUl1XoYjfAdz7rt0W7tIeyFNZhowYdwRM9wXt1tTQvLjbLHtJVswcc0AxtKo X-Google-Smtp-Source: ABdhPJzLHzUrksDIWKtM9IS9/mCx2fBRxZ2o5362aBovZ/k0kAcJ/FPEFqgtCSTuWZYmuP0JvTVzLg== X-Received: by 2002:a17:90a:f310:: with SMTP id ca16mr137099pjb.223.1601915231109; Mon, 05 Oct 2020 09:27:11 -0700 (PDT) Received: from rahul_yocto_ubuntu18.ibn.broadcom.net ([192.19.234.250]) by smtp.gmail.com with ESMTPSA id d129sm378061pfc.161.2020.10.05.09.27.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Oct 2020 09:27:10 -0700 (PDT) From: Vikas Gupta To: dev@dpdk.org, akhil.goyal@nxp.com Cc: vikram.prakash@broadcom.com, Vikas Gupta Date: Mon, 5 Oct 2020 21:56:50 +0530 Message-Id: <20201005162658.12416-1-vikas.gupta@broadcom.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200813172344.3228-1-vikas.gupta@broadcom.com> References: <20200813172344.3228-1-vikas.gupta@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-dev] [PATCH v3 0/8] Add Crypto PMD for Broadcom`s FlexSparc devices X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Hi, This patchset contains support for Crypto offload on Broadcom’s Stingray/Stingray2 SoCs having FlexSparc unit. BCMFS is an acronym for Broadcom FlexSparc device used in the patchest. The patchset progressively adds major modules as below. a) Detection of platform-device based on the known registered platforms and attaching with VFIO. b) Creation of Cryptodevice. c) Addition of session handling. d) Add Cryptodevice into test Cryptodev framework. The patchset has been tested on the above mentioned SoCs. Regards, Vikas Changes from v0->v1: Updated the ABI version in file .../crypto/bcmfs/rte_pmd_bcmfs_version.map Changes from v1->v2: - Fix compilation errors and coding style warnings. - Use global test crypto suite suggested by Adam Dybkowski Changes from v2->v3: - Release notes updated. - bcmfs.rst updated with missing information about installation. - Review comments from patch1 from v2 addressed. - Updated description about dependency of PMD driver on VFIO_PRESENT. - Fixed typo in bcmfs_hw_defs.h (comments on patch3 from v2 addressed) - Comments on patch6 from v2 addressed and capability list is fixed. Removed redundant enums and macros from the file bcmfs_sym_defs.h and updated other impacted APIs accordingly. patch7 too is updated due to removal of redundancy. Thanks! to Akhil for pointing out the redundancy. - Fix minor code style issues in few files as part of review. Vikas Gupta (8): crypto/bcmfs: add BCMFS driver crypto/bcmfs: add vfio support crypto/bcmfs: add apis for queue pair management crypto/bcmfs: add hw queue pair operations crypto/bcmfs: create a symmetric cryptodev crypto/bcmfs: add session handling and capabilities crypto/bcmfs: add crypto h/w module crypto/bcmfs: add crypto pmd into cryptodev test MAINTAINERS | 7 + app/test/test_cryptodev.c | 17 + app/test/test_cryptodev.h | 1 + doc/guides/cryptodevs/bcmfs.rst | 109 ++ doc/guides/cryptodevs/features/bcmfs.ini | 56 + doc/guides/cryptodevs/index.rst | 1 + doc/guides/rel_notes/release_20_11.rst | 5 + drivers/crypto/bcmfs/bcmfs_dev_msg.h | 29 + drivers/crypto/bcmfs/bcmfs_device.c | 332 +++++ drivers/crypto/bcmfs/bcmfs_device.h | 76 ++ drivers/crypto/bcmfs/bcmfs_hw_defs.h | 32 + drivers/crypto/bcmfs/bcmfs_logs.c | 38 + drivers/crypto/bcmfs/bcmfs_logs.h | 34 + drivers/crypto/bcmfs/bcmfs_qp.c | 383 ++++++ drivers/crypto/bcmfs/bcmfs_qp.h | 142 ++ drivers/crypto/bcmfs/bcmfs_sym.c | 289 +++++ drivers/crypto/bcmfs/bcmfs_sym_capabilities.c | 764 +++++++++++ drivers/crypto/bcmfs/bcmfs_sym_capabilities.h | 16 + drivers/crypto/bcmfs/bcmfs_sym_defs.h | 34 + drivers/crypto/bcmfs/bcmfs_sym_engine.c | 1155 +++++++++++++++++ drivers/crypto/bcmfs/bcmfs_sym_engine.h | 115 ++ drivers/crypto/bcmfs/bcmfs_sym_pmd.c | 426 ++++++ drivers/crypto/bcmfs/bcmfs_sym_pmd.h | 38 + drivers/crypto/bcmfs/bcmfs_sym_req.h | 62 + drivers/crypto/bcmfs/bcmfs_sym_session.c | 282 ++++ drivers/crypto/bcmfs/bcmfs_sym_session.h | 109 ++ drivers/crypto/bcmfs/bcmfs_vfio.c | 107 ++ drivers/crypto/bcmfs/bcmfs_vfio.h | 17 + drivers/crypto/bcmfs/hw/bcmfs4_rm.c | 743 +++++++++++ drivers/crypto/bcmfs/hw/bcmfs5_rm.c | 677 ++++++++++ drivers/crypto/bcmfs/hw/bcmfs_rm_common.c | 82 ++ drivers/crypto/bcmfs/hw/bcmfs_rm_common.h | 51 + drivers/crypto/bcmfs/meson.build | 20 + .../crypto/bcmfs/rte_pmd_bcmfs_version.map | 3 + drivers/crypto/meson.build | 1 + 35 files changed, 6253 insertions(+) create mode 100644 doc/guides/cryptodevs/bcmfs.rst create mode 100644 doc/guides/cryptodevs/features/bcmfs.ini create mode 100644 drivers/crypto/bcmfs/bcmfs_dev_msg.h create mode 100644 drivers/crypto/bcmfs/bcmfs_device.c create mode 100644 drivers/crypto/bcmfs/bcmfs_device.h create mode 100644 drivers/crypto/bcmfs/bcmfs_hw_defs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_logs.c create mode 100644 drivers/crypto/bcmfs/bcmfs_logs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_qp.c create mode 100644 drivers/crypto/bcmfs/bcmfs_qp.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_capabilities.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_capabilities.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_defs.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_engine.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_engine.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_pmd.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_pmd.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_req.h create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_session.c create mode 100644 drivers/crypto/bcmfs/bcmfs_sym_session.h create mode 100644 drivers/crypto/bcmfs/bcmfs_vfio.c create mode 100644 drivers/crypto/bcmfs/bcmfs_vfio.h create mode 100644 drivers/crypto/bcmfs/hw/bcmfs4_rm.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs5_rm.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs_rm_common.c create mode 100644 drivers/crypto/bcmfs/hw/bcmfs_rm_common.h create mode 100644 drivers/crypto/bcmfs/meson.build create mode 100644 drivers/crypto/bcmfs/rte_pmd_bcmfs_version.map -- 2.17.1