From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM05-CO1-obe.outbound.protection.outlook.com (mail-eopbgr720088.outbound.protection.outlook.com [40.107.72.88]) by dpdk.org (Postfix) with ESMTP id AF7451B170 for ; Tue, 9 Oct 2018 11:09:04 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AjOovx7TKI/qkUVWA4SxcSlynLZ9JDATee/6HPpbemE=; b=j2Z7u3HHyGX7Ywv0RmWa7s+Kdfg/cUQ/WepwKxj1klgg0QPBqfLw6qP16gtXcKOLNg6IGp+1R+CU10f/DriN/D0rHEzK5AbvQGYgBZdV/nTW1A0kTH9iv1S1PWUYu8cZFf1rtbmgp7Xnc88HObnVGDLQ3aAOFgiCNLr1PnvHyUI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Anoob.Joseph@cavium.com; Received: from ajoseph83.caveonetworks.com.com (115.113.156.2) by BN7PR07MB4897.namprd07.prod.outlook.com (2603:10b6:406:ef::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1207.28; Tue, 9 Oct 2018 09:08:59 +0000 From: Anoob Joseph To: Akhil Goyal , Pablo de Lara , Thomas Monjalon Cc: Anoob Joseph , Jerin Jacob , Narayana Prasad , Ankur Dwivedi , Murthy NSSR , Nithin Dabilpuram , Ragothaman Jayaraman , Srisivasubramanian S , Tejasree Kondoj , dev@dpdk.org Date: Tue, 9 Oct 2018 14:37:39 +0530 Message-Id: <1539076076-19786-7-git-send-email-anoob.joseph@caviumnetworks.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1539076076-19786-1-git-send-email-anoob.joseph@caviumnetworks.com> References: <1538744363-30340-1-git-send-email-anoob.joseph@caviumnetworks.com> <1539076076-19786-1-git-send-email-anoob.joseph@caviumnetworks.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [115.113.156.2] X-ClientProxiedBy: PN1PR0101CA0004.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c00:e::14) To BN7PR07MB4897.namprd07.prod.outlook.com (2603:10b6:406:ef::26) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 11a56ae2-fae9-4751-acd8-08d62dc6db87 X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:BN7PR07MB4897; X-Microsoft-Exchange-Diagnostics: 1; BN7PR07MB4897; 3:g6YYC+kqtNNQTUzD6/15G+j23TGgURk/DIFIg3OWyeyvZMPZbhCpOqle+LH2Yv3Vgct6Cwq1vUBsl3KgH/ehB/gYZjaAvhmXC0TZKnmhcT3Q+H8irJ3+BufbZIbvY6CGgY9H2mOmKDXzlblpRyAGVBgSZKRophSNloa1lGpvMcCnJlBAPnjrE/lnYNfF2oaqYCtXvniUdwoBE+8xpcBmKRdUz9tcIvM3VYgC9H/eOteLqdmbWyC90MV7qv4384Qf; 25:6FbtaDZe8RLl9TGOustFZW6WQ8/03HvpIVZu4NZQB6CPDwWyT3Gr67vsQz+LsMHO5yjKNLb69gz98z4FsPijeD/h6I+6Gzlxjdw/AAUYc2k7nUCfvdp2s2M8TcUF8AhVg3F7EFIfSeLUpI95U15jYh87nIzQIAti32Eo6MZwg0nCltVn4lcCcds6LyYta2+dORuTdbqgHPao0piyip3giHi7iSpiGX0RSvfRxpai/dzyG76dwkHdm9xtdbhiPvW2j232XPCLG0f7d94kXppMB5yGmNaGDa0GGCrndZ8vjQSagfI7KAp3KrUlvz08Zck4p+YNzPMFtVU+6drpA+K4zw==; 31:yptNZJQb6UJbf4mEL3/6107oEiVSHkrhtwnVmDeZf1+eIr3mHvmIv1jhERzHoMPiHbMZb2Ub2nGJLweDncI3zfzxeK9Uw/7NjBb0muyAv5OpaIvsD2/yccLxcH/1tTFwlIws6XD4ho4RNuO5NSnC9uV/+RQDD/Ou9P+URTSBHdGZ8yyxRXgl4cEP2G2ppoMm89GstUK6aNYqsZ1o7UG4W3a+d/L3+mk9lx/f6SUTk8E= X-MS-TrafficTypeDiagnostic: BN7PR07MB4897: X-Microsoft-Exchange-Diagnostics: 1; BN7PR07MB4897; 20:DsEA0vxF5f8fVmm8DtxpMSfeoQsUp3VgFdPFYBEdpxiWo5+nEm9mn4ETqCtWxIZIQvLXe5RDlLPelWqfP3QVCDRv1K+91FRVuN35RE2d8y/YyU+1OUTBkbhdvR3Xh4SgeKyPgwlr+dafWqWGU1Q6e53fv0Tq9ThEr8K813FtBwrnbbK3UzGT9zDPWxx+sDsJYi7qRSS8DT+varMqbZIpFVsv9f8alBBd5RGfkDz108ebrgfLOXB8VpYi3l1Pt4OfyooCMn47RZeKrWwtsRAtHqSwHPIXVUgns06XzV4WzklfriUjt0cY0M1v2ao8LLXgU+yg3jplaqYB2jhkaoF+BBfH1+tKJ5QpBke8hywlScoAzNjlXE/vpy4LF0TqmEwErOw4UfsyQlZpJzrlayVquFgmhW2uYm5FHTTaqc0UH6Vd/6yRHzfkXgk1Cu3IwNNtWvLjIMvtImjWisY8ODPEmCNAiMypHWld5ScWMZpibReBYZ+qZ+MLfEkx06As2+o6XnrcyQ8N46Yn5muk+/arEDFKV3LXg3LTSzZeY0PnlRjAQXuB05C44ijvkfhtcEqp9ysGXGakhJABMdeN0mDBRYTv3MO+mIYvFjfmAFujkTs=; 4:Zy+tSgEh/mQHCwUEfqGChc9WJkoncjmwDKj9Ie+3F5oSMZo3ROP2G0v1kaNKxQ0P7cCHj3PbU3ZJVlaivMEdDqYJan1wkgbwLqrRgL3EO+qR5Ny+bgx8pLkmPX+RNMmOrg4T/9e22LgdNmLuxXyAJtUVU69GjObY1oZ++k0/HWwNKT5DQpmos8Cjgcs37YbUdvqNESr+BQxN3aExtowM+2zXpSoGXYwMq5W5ULRSDKaQaVM0QAVq/e/BDlGKPIoUPbex75BeWeHG+SpuNko8ZQ== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(93006095)(10201501046)(3231355)(944501410)(52105095)(149066)(150057)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123558120)(201708071742011)(7699051); SRVR:BN7PR07MB4897; BCL:0; PCL:0; RULEID:; SRVR:BN7PR07MB4897; X-Forefront-PRVS: 08200063E9 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(396003)(366004)(376002)(136003)(346002)(39860400002)(199004)(189003)(42882007)(47776003)(106356001)(6666003)(186003)(5660300001)(26005)(68736007)(16526019)(8936002)(25786009)(6116002)(2906002)(81156014)(50226002)(305945005)(81166006)(7736002)(3846002)(105586002)(478600001)(8676002)(54906003)(110136005)(48376002)(16586007)(14444005)(575784001)(6486002)(6506007)(50466002)(316002)(53936002)(386003)(51416003)(52116002)(76176011)(11346002)(6512007)(44832011)(446003)(36756003)(55236004)(956004)(2616005)(486006)(4326008)(66066001)(97736004)(72206003)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:BN7PR07MB4897; H:ajoseph83.caveonetworks.com.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN7PR07MB4897; 23:zMTbAOBPSMjHnabjIx4wxKeT+RyOhakyIdplB1tq5?= =?us-ascii?Q?srk/mV4fHgLepX0huCZjnt68tY3iEfHQqWGPIItEeYh+HEOj8+E4Qs9kGlE/?= =?us-ascii?Q?xpb8la2CX2U2j5Uqo0TzLSlsTF3PexwxSmZmFL2NDZahmowQEqawLLswvUqn?= =?us-ascii?Q?NYOpXbtyLIFVhfmU2H8+gwGyUETz62KOo2KmVWtbd+QyCmYx2X22MQOGOKex?= =?us-ascii?Q?UO7xGo6oxZvAsdy7TdTIUmnIKHM+1MfQAQ/+uIjHd95lJbjVbwx865skLZlY?= =?us-ascii?Q?MupS12IUwfFTit6pGdgMmFvIKpfsbkmwQpeQ0gyzFMXSrPhYSWVGHgjpHhMJ?= =?us-ascii?Q?WFVOE0sWhX2GFR0xI8nOhcaZpJCQaOLElZlX6aDiXKQ+s2cqbA5MiE2jQSgM?= =?us-ascii?Q?5jnY7YLCB6T/opVMdhSwd3SfN+HhfbMASbOOmtqlsC3aC/z94Y+SNwFf7J77?= =?us-ascii?Q?tZ75sEtXSumLFMRJWOZO1wt0gGYokbYvzAoQi1JWKpxNs29MJxPA7oSYOCS+?= =?us-ascii?Q?dFEaaLcpq4KUPEtvGJKj0UlKnLiZn09mmbe6eKmD7gCmOL0i9qMpT70SvHMJ?= =?us-ascii?Q?Z6Ulfe9fMcpAhREKxJfSpTZR77TLwI5DNsar1kID9NikaFYkHE+N4aNzR4IB?= =?us-ascii?Q?KQhKT8ptk6sPnOBmIv/grFkjDYND7GKRkERbGLq9OzDwQZONvg7MM4ZNa4V5?= =?us-ascii?Q?pzqI0VW0v2jn8dTnjU97X0hQWQAliKyShmRmC5+Rsv+L7TuJQ7Ojmg2o7YKZ?= =?us-ascii?Q?f4LCVciMIMvcAaKmxCWKvfwAmLzslFGu4y6nysUM9c4CBLS04vW8qU9tOFRD?= =?us-ascii?Q?eg9cc5EDa+PiqKkPVCLiJCGy8K7cGRudnASVXz2WMhgZ1kxEhiX3WUWcDPz0?= =?us-ascii?Q?KA0FP4jiqVzd0n5fk7IBKRFG3ZMLVxo7CWYesdEfhmqP96AH1eTtA+Z14RG8?= =?us-ascii?Q?XsCyBzlOujTTB+VfmPzzStSmoPv6yxHdfB0zhUql6BjsERtvRYeryBBApSa2?= =?us-ascii?Q?TVD4BOak/vakvebGfLIgxtBzCQsLJ89RPCSlbHa/CzDYgdOHX6rJLDJ4F5An?= =?us-ascii?Q?YkGJg7p8N+xJF0hHYKHV4IWSisbsS+9o1tsSclD8UrI8z9hEOKkC8meKcMmt?= =?us-ascii?Q?GCxN8TwmhjA0eWJu3ZJZFOYeYijjDviv9iH8jXD49RVtXoKzv9ZF3DgIodql?= =?us-ascii?Q?o3OeEyEp+Oqqormbs61q1dJMVy/RlR/5hNzzf578qf6kS9YTO1NfX4ZXCesb?= =?us-ascii?Q?w+bXayC5Y8iq3xglDbaHScyQbTpJqlMt1LA7uZWBkPS5XQkaepOfQNBhrjcL?= =?us-ascii?B?QT09?= X-Microsoft-Antispam-Message-Info: cUU3Idy0DL8kWejwJ3utNESYXVF9yWxykgAcv6wp0c7qzbkSo760RFR9Bn/mik2o1Of6R8c7R4Pyu6GMTJXdgphFcR2WRNoot4gGuTshle6eoVvcX3fygKAfATLBR099XxBSV7kzgBZUN9vDv/rvu8Z5my+Pdor+Y1g2Nrfw55jzjTsbxTiXr2/GvJ8lA/YMJ1A27KnmqLEIanQithn35Y3ShhHQv1ObOzstF7GCmHd7waCgUnfbTjIlsdVqPFDYMFAUgX2/mg7xSeMJRIzixH2IgSmyHAZc2N48anFWOq8V8+AREPSjvuGrsdiZIr0NSh36PppUGxMqYO8DGDb1JP7upppbfplc5CpQjsxyTzc= X-Microsoft-Exchange-Diagnostics: 1; BN7PR07MB4897; 6:ofBEwDxdHHpEbDkV/4Oa7Q68RFDj5F5HzsSqU64nb4J/qXXgW3ejUTHevxMgmMBDGsJBvwiCeqxPwaOu4OOTJ3wgfkILsxOpvdlNrlplQCLakTYx92zJdHgdU0edQslMAcfIbEWy5xVg0W6hlScEebqEn+jwgqvsuKaO+IwioDREplmnZPbJ7Rad96+5/0jiS+qWhdJcvSk0ApAmKp87+1CPXmY8Xe5EzmQyh+9MPgiVHvD+M7rn494tWR044oXtoI8/kBKh7HQQcKJAn3S6PeOSJsVkyYjoyhHYsCsh060tsH8+EMboj9jLiMw8xfTRrL+Rd/6+U2bIPo0jk/f1DwZ/4H8bYu1P4TCscX2c36FuMmYunnLAUk7QaUknuDOhnx1kVykxqOBFFtDQyWQuESxJoDF07I201+lcIaOjGrku+ORvtrp3I+BKWKlKPwiaeA6QESNsns9Honv616aohA==; 5:QibA2L3NQCpDnMen8uHG54QJYYbmIpj2pbhBa4PFfKJbyS5wdehcOt80qGaIFyqVEWoKi7XP2mXupAVcQrr5wC0QDuVaXb/X6kHRJ1q4cpZHflE9/9r2q40aig1zDyinKYYExE/fct1+Ut8p8Ep8bkDJIR3MymwPa9cnLXwILXI=; 7:COew1h75vq9ZCTg4j2K+yjr7JL4YeI6P71cWS6YNgNygjCaIHfZiWvF8N4TfHsZggrtlvnkmh0Y6KgWYP5/iFfnIZWFoDrV2630/0xnLsGn4aKIezEr5Z4LWXIhJOPpaIs63yk047Uyv+TNH9p3vmcASAQwp5x5q5HWunMgH1ytUVhKjYIVR9qTbD4UpQuZrsPZsUEMK5IEDDsCIQxkgUbWB4QSsfCCTb94XekfJdpJTErgIhSrfpKg3hdCK2WsP SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Oct 2018 09:08:59.6317 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 11a56ae2-fae9-4751-acd8-08d62dc6db87 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR07MB4897 Subject: [dpdk-dev] [PATCH v4 06/23] crypto/octeontx: add global resource init X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Oct 2018 09:09:05 -0000 Adding initialization of global resources. This will be saved as metadata in cptvf and would be used by common code. Exit path for failure case is also added along with the new routines. Signed-off-by: Ankur Dwivedi Signed-off-by: Anoob Joseph Signed-off-by: Murthy NSSR Signed-off-by: Nithin Dabilpuram Signed-off-by: Ragothaman Jayaraman Signed-off-by: Srisivasubramanian S Signed-off-by: Tejasree Kondoj --- drivers/crypto/octeontx/Makefile | 1 + drivers/crypto/octeontx/meson.build | 3 +- drivers/crypto/octeontx/otx_cryptodev.c | 3 + drivers/crypto/octeontx/otx_cryptodev_hw_access.c | 11 +++ drivers/crypto/octeontx/otx_cryptodev_hw_access.h | 3 + drivers/crypto/octeontx/otx_cryptodev_ops.c | 90 +++++++++++++++++++++++ drivers/crypto/octeontx/otx_cryptodev_ops.h | 3 + 7 files changed, 113 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/octeontx/Makefile b/drivers/crypto/octeontx/Makefile index d755441..1808244 100644 --- a/drivers/crypto/octeontx/Makefile +++ b/drivers/crypto/octeontx/Makefile @@ -16,6 +16,7 @@ CFLAGS += $(WERROR_FLAGS) LDLIBS += -lrte_eal -lrte_mbuf -lrte_mempool -lrte_ring LDLIBS += -lrte_cryptodev LDLIBS += -lrte_pci -lrte_bus_pci +LDLIBS += -lrte_common_cpt VPATH += $(RTE_SDK)/drivers/crypto/octeontx diff --git a/drivers/crypto/octeontx/meson.build b/drivers/crypto/octeontx/meson.build index 4c5a40c..7f65476 100644 --- a/drivers/crypto/octeontx/meson.build +++ b/drivers/crypto/octeontx/meson.build @@ -5,6 +5,7 @@ if host_machine.system() != 'linux' endif deps += ['bus_pci'] +deps += ['common_cpt'] name = 'octeontx_crypto' sources = files('otx_cryptodev.c', @@ -12,5 +13,5 @@ sources = files('otx_cryptodev.c', 'otx_cryptodev_hw_access.c', 'otx_cryptodev_ops.c') -cflags += '-DCPT_MODEL=CRYPTO_OCTEONTX' includes += include_directories('../../common/cpt') +cflags += '-DCPT_MODEL=CRYPTO_OCTEONTX' diff --git a/drivers/crypto/octeontx/otx_cryptodev.c b/drivers/crypto/octeontx/otx_cryptodev.c index 43933dd..269f045 100644 --- a/drivers/crypto/octeontx/otx_cryptodev.c +++ b/drivers/crypto/octeontx/otx_cryptodev.c @@ -104,6 +104,9 @@ otx_cpt_pci_remove(struct rte_pci_device *pci_dev) cryptodev->device->driver = NULL; cryptodev->data = NULL; + /* free metapool memory */ + cleanup_global_resources(); + return 0; } diff --git a/drivers/crypto/octeontx/otx_cryptodev_hw_access.c b/drivers/crypto/octeontx/otx_cryptodev_hw_access.c index 369d62b..e8a2b0b 100644 --- a/drivers/crypto/octeontx/otx_cryptodev_hw_access.c +++ b/drivers/crypto/octeontx/otx_cryptodev_hw_access.c @@ -236,3 +236,14 @@ otx_cpt_hw_init(struct cpt_vf *cptvf, void *pdev, void *reg_base, char *name) return 0; } + +int +otx_cpt_deinit_device(void *dev) +{ + struct cpt_vf *cptvf = (struct cpt_vf *)dev; + + /* Do misc work one last time */ + otx_cpt_poll_misc(cptvf); + + return 0; +} diff --git a/drivers/crypto/octeontx/otx_cryptodev_hw_access.h b/drivers/crypto/octeontx/otx_cryptodev_hw_access.h index 73473ed..6e5731a 100644 --- a/drivers/crypto/octeontx/otx_cryptodev_hw_access.h +++ b/drivers/crypto/octeontx/otx_cryptodev_hw_access.h @@ -142,4 +142,7 @@ otx_cpt_poll_misc(struct cpt_vf *cptvf); int otx_cpt_hw_init(struct cpt_vf *cptvf, void *pdev, void *reg_base, char *name); +int +otx_cpt_deinit_device(void *dev); + #endif /* _OTX_CRYPTODEV_HW_ACCESS_H_ */ diff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.c b/drivers/crypto/octeontx/otx_cryptodev_ops.c index 3bf6cd2..68c6b92 100644 --- a/drivers/crypto/octeontx/otx_cryptodev_ops.c +++ b/drivers/crypto/octeontx/otx_cryptodev_ops.c @@ -8,11 +8,69 @@ #include #include "cpt_pmd_logs.h" +#include "cpt_pmd_ops_helper.h" #include "otx_cryptodev.h" #include "otx_cryptodev_hw_access.h" #include "otx_cryptodev_ops.h" +static int otx_cryptodev_probe_count; +static rte_spinlock_t otx_probe_count_lock = RTE_SPINLOCK_INITIALIZER; + +static struct rte_mempool *otx_cpt_meta_pool; +static int otx_cpt_op_mlen; +static int otx_cpt_op_sb_mlen; + +/* + * Initializes global variables used by fast-path code + * + * @return + * - 0 on success, errcode on error + */ +static int +init_global_resources(void) +{ + /* Get meta len for scatter gather mode */ + otx_cpt_op_mlen = cpt_pmd_ops_helper_get_mlen_sg_mode(); + + /* Extra 4B saved for future considerations */ + otx_cpt_op_mlen += 4 * sizeof(uint64_t); + + otx_cpt_meta_pool = rte_mempool_create("cpt_metabuf-pool", 4096 * 16, + otx_cpt_op_mlen, 512, 0, + NULL, NULL, NULL, NULL, + SOCKET_ID_ANY, 0); + if (!otx_cpt_meta_pool) { + CPT_LOG_ERR("cpt metabuf pool not created"); + return -ENOMEM; + } + + /* Get meta len for direct mode */ + otx_cpt_op_sb_mlen = cpt_pmd_ops_helper_get_mlen_direct_mode(); + + /* Extra 4B saved for future considerations */ + otx_cpt_op_sb_mlen += 4 * sizeof(uint64_t); + + return 0; +} + +void +cleanup_global_resources(void) +{ + /* Take lock */ + rte_spinlock_lock(&otx_probe_count_lock); + + /* Decrement the cryptodev count */ + otx_cryptodev_probe_count--; + + /* Free buffers */ + if (otx_cpt_meta_pool && otx_cryptodev_probe_count == 0) + rte_mempool_free(otx_cpt_meta_pool); + + /* Free lock */ + rte_spinlock_unlock(&otx_probe_count_lock); +} + /* Alarm routines */ static void @@ -31,6 +89,20 @@ otx_cpt_periodic_alarm_start(void *arg) otx_cpt_alarm_cb, arg); } +static int +otx_cpt_periodic_alarm_stop(void *arg) +{ + return rte_eal_alarm_cancel(otx_cpt_alarm_cb, arg); +} + +static void +otx_cpt_common_vars_init(struct cpt_vf *cptvf) +{ + cptvf->meta_info.cptvf_meta_pool = otx_cpt_meta_pool; + cptvf->meta_info.cptvf_op_mlen = otx_cpt_op_mlen; + cptvf->meta_info.cptvf_op_sb_mlen = otx_cpt_op_sb_mlen; +} + int otx_cpt_dev_create(struct rte_cryptodev *c_dev) { @@ -78,6 +150,20 @@ otx_cpt_dev_create(struct rte_cryptodev *c_dev) /* Start off timer for mailbox interrupts */ otx_cpt_periodic_alarm_start(cptvf); + rte_spinlock_lock(&otx_probe_count_lock); + if (!otx_cryptodev_probe_count) { + ret = init_global_resources(); + if (ret) { + rte_spinlock_unlock(&otx_probe_count_lock); + goto init_fail; + } + } + otx_cryptodev_probe_count++; + rte_spinlock_unlock(&otx_probe_count_lock); + + /* Initialize data path variables used by common code */ + otx_cpt_common_vars_init(cptvf); + c_dev->dev_ops = NULL; c_dev->enqueue_burst = NULL; @@ -95,6 +181,10 @@ otx_cpt_dev_create(struct rte_cryptodev *c_dev) return 0; +init_fail: + otx_cpt_periodic_alarm_stop(cptvf); + otx_cpt_deinit_device(cptvf); + fail: if (cptvf) { /* Free private data allocated */ diff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.h b/drivers/crypto/octeontx/otx_cryptodev_ops.h index 3f2d829..ac88fa5 100644 --- a/drivers/crypto/octeontx/otx_cryptodev_ops.h +++ b/drivers/crypto/octeontx/otx_cryptodev_ops.h @@ -5,6 +5,9 @@ #ifndef _OTX_CRYPTODEV_OPS_H_ #define _OTX_CRYPTODEV_OPS_H_ +void +cleanup_global_resources(void); + int otx_cpt_dev_create(struct rte_cryptodev *c_dev); -- 2.7.4