From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0051.outbound.protection.outlook.com [104.47.33.51]) by dpdk.org (Postfix) with ESMTP id 4CFDCA48C for ; Wed, 21 Feb 2018 07:54:41 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=L83QzScP25VbHVjdI5M/tMVXsqOBGLh7FkrzoCw3pDU=; b=AfjAXGBUQBLB16nvq2l4Pu+/K7FRnTXtVZgP4Ax4Pzk30DQ+GI45fGCJBXGr8MLuUSBR8X7zNvAjKrAJ2ByInsa6QdXF1WWwXgSCpVz71XaOaTt9XgEHU3pMrGfwcQKftCldNrH50AWGIspMIn0vfWTKctsPJcFP65gyqpfvUio= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Jerin.JacobKollanukkaran@cavium.com; Received: from jerin (171.76.78.194) by CO2PR07MB2519.namprd07.prod.outlook.com (10.166.201.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.506.18; Wed, 21 Feb 2018 06:54:34 +0000 Date: Wed, 21 Feb 2018 12:24:18 +0530 From: Jerin Jacob To: "Vangati, Narender" Cc: "Gujjar, Abhinandan S" , "dev@dpdk.org" , "Rao, Nikhil" , "Eads, Gage" , "hemant.agrawal@nxp.com" , "akhil.goyal@nxp.com" , "narayanaprasad.athreya@cavium.com" , "nidadavolu.murthy@cavium.com" , "nithin.dabilpuram@cavium.com" Message-ID: <20180221065416.GA4155@jerin> References: <1516013630-146114-1-git-send-email-abhinandan.gujjar@intel.com> <20180216193348.GA8882@jerin> <5612CB344B05EE4F95FC5B729939F7807069B737@PGSMSX102.gar.corp.intel.com> <20180220135920.GA23970@jerin> <3B5C8B5D2B969C4CBE78502867F1AD9A3E2FFDA1@FMSMSX108.amr.corp.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3B5C8B5D2B969C4CBE78502867F1AD9A3E2FFDA1@FMSMSX108.amr.corp.intel.com> User-Agent: Mutt/1.9.3 (2018-01-21) X-Originating-IP: [171.76.78.194] X-ClientProxiedBy: BM1PR01CA0086.INDPRD01.PROD.OUTLOOK.COM (10.174.208.154) To CO2PR07MB2519.namprd07.prod.outlook.com (10.166.201.6) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 900ed1f8-b597-434b-e4c6-08d578f7f91c X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(2017052603307)(7153060)(7193020); SRVR:CO2PR07MB2519; X-Microsoft-Exchange-Diagnostics: 1; CO2PR07MB2519; 3:3FjimI9LRh6+feVh4X8R2V5lc5+EMWBDoaRliAHvJMmOgp/ePgBDx8M2Sa0Ay4kfSVyn4cDM5EMhC3bl1PnQpGRF+WZvIh+UvdtUKSOgfRVippPv0VRPh1M5nNz1UAMhS3Iv8rO/K+MrZ0GyTj2xpwD2JchHVX5Omr8uEFCb7O2hBLt3qsF1iQzrpmu8VenH4OJbgSNHG/7i4Qf/sV36AB2/KajPMMK/75Zz9HvkgEYEW07eM6kKZrUDJDQvpjIa; 25:YcTxN5tkPJzTvmb8s0t6kUh1kLbu1Umk6SnX74udkzoekhMsVa/ELkB14J1jykV9/KCgrtIa8kHApZT6CfG/JuxXyNMV7dyzG6Y7GHUwGZYPSPJQBKxGoHlCqf644S9IecsHnxTDo8vNdsDiHDJRUXejEmrR4ct+j26gY088yznnxwHybmdeAQCFtDnK5hxxc2+6UtYBKCxtQzcA0WX8AUKDHC+rB3QQBkLMB9PL8RttnPPN/ykslyZExVccjWqCb08RybLoinh8qsxYBxteVkh+oZRGqJ/HSLaF2cdyTroQ1t5TvPN2KPJ+uIyh8EEODhEx7npyEL7SHtpqUnKkug==; 31:KJrTYKZXBIcrhvl+i7BRM3jB6SkPdBzyVG5HzBLTHIunp4WHdcH1+vL3SjMFTm7ytQHSUtQ5fSlzvdiS1UlrlzeXm3BmhThq3kub98gt5IHBzHnYNlBAWiwUVkPKuu9RdPBzYEzvR/Cz/xgmZQjHQXuUykeYShEeUK9Ps8nkHhaOEUO2l4ohdn+Wjy2cIPwSKNWY17G72aUdFGrDB+E1dCrwYkvm+xPcrtI2HaBSrmU= X-MS-TrafficTypeDiagnostic: CO2PR07MB2519: X-Microsoft-Exchange-Diagnostics: 1; CO2PR07MB2519; 20:9CvmepVRoO3diGq93XLOskS9vteydMIMyTyxFYWOnoBiy3Qpqp2eGwACjwsMYMFiICymQEY9+YLUC2fE1sOchF/HpxvBQP81FxVgumj/ZYbRxHu51hw0oleKylrN7udu2+B1Oqmdu/JW+O1o4R0Qqr7tHBvCu1CHibxRm+9p0mx1JeJMsCQW3FygM+5IcRm9Y5vHHZufk+M2XmbvDzLdW7j/1jfN/14v/mHcu+q7ozOYxJwc4XTmFPTud3gp/AvsfnxVIoilRHD8qQ/TQGURpf7EE66Ay99JxEDnAfL1HBm/sk2SbuwPbrs9lLaZMWuFeT88UcbE15sjdcvpdiBNc7kApP7D0Im0yiMAg3SoogDjLFc6shsfky7UbM0HlDI0iqRC59SkZjR+z9mMw9GGcVih9mbGBPOH3ylBhsEh9xSF8gc3b3PBEcactWWt90B4ivdbZoRfeH0kAXxjKRMQcwZ2ClUgZpkSbQ2a/BXrkZzKLaBjA2bx0Jbv9VnvnyFktHLHhXZHqqKYQijfKVJX2QlE+VHzuV3w6caIL+c4L04dT/R2JwAKe68SwZunVv0EBNDl9/Oamew8IiAm8zq/H/TJluDwTmpbMY0ZsjUFagU= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197)(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(93006095)(3002001)(3231101)(944501161)(10201501046)(6041288)(20161123562045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:CO2PR07MB2519; BCL:0; PCL:0; RULEID:; SRVR:CO2PR07MB2519; X-Microsoft-Exchange-Diagnostics: 1; CO2PR07MB2519; 4:bg5ljd7KMkxqLD+Fs7zvKiMrIMNNo/hMpSrVvja0FbfpaSrV4QJte9/DRBUr4p6yM1aWa6GcRGB8I7mnPAROanF6jcdLU/qUEkK1cpAbEJAMhnHfHY3/sbENhzH0b79PGVp+DuN/I/RRIecX4K9H3QTUPwuBfxsR/qvIpg0e5wcC6r7Ywt7jVHb4Chqwqdan3cBwmuLpDPHFUey3LP6eiloSeH2zK3+nU/YQXzPfK9SkJ93q/2YRSHTZHUAp0yIQ3+auSviGtUa6wQlC37uveQ2w0M5CnAcLOSzm3Q1jCsHzraq1x7k1OHS6SMUOX8iTc53amqeAwKv0R5LF3WnUcxZg39EO2BUczSNKC942a/8= X-Forefront-PRVS: 0590BBCCBC X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(396003)(346002)(366004)(39380400002)(39860400002)(189003)(199004)(51914003)(13464003)(57704003)(16526019)(97736004)(7736002)(47776003)(66066001)(33716001)(305945005)(6246003)(106356001)(107886003)(186003)(8676002)(6116002)(81166006)(3846002)(81156014)(23726003)(2906002)(1076002)(8936002)(59450400001)(25786009)(93886005)(105586002)(4326008)(229853002)(8656006)(42882006)(2950100002)(6916009)(9686003)(55016002)(33896004)(76176011)(478600001)(5660300001)(72206003)(52116002)(6496006)(316002)(53936002)(53546011)(6666003)(50466002)(386003)(16586007)(68736007)(58126008)(33656002)(26005)(54906003)(18370500001); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR07MB2519; H:jerin; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR07MB2519; 23:10YnV2gwBwfbZ/PR9fiO0dpnKbgangQFMJwhG9lMR?= =?us-ascii?Q?bb19qGIpRevMrIN6dSktzB3l7iKj96JDWMWBciISqpv7YW+sBCCqL1A3B1ky?= =?us-ascii?Q?T9wc5nhohHtmzBsbxnJJUtqvXDKHVYTEMhwPBWW61HfGT9wHKjRg3gMuiiYe?= =?us-ascii?Q?i782DgIotchAUd86e+T+NWGUfnK5jRFYmtXsKh5S0c9go/kts/BM25OV1hag?= =?us-ascii?Q?A0AduSc1aSo4g9phyXTLf+92QoAPVQZ5s5/C64l6xfbDw/V0WGmQMI/gvSgY?= =?us-ascii?Q?PJEk1pmUNyTFXOvjiWCLfQuOZe9PP6v+Ne6+veZDI594a+knHb9/YSVj7fcO?= =?us-ascii?Q?nZeGoSP0gJkkVm3BY64tACMRy1wMfFi5ap8zlw+eOxILeAics9hRnsxvJOBb?= =?us-ascii?Q?joQ8IgpP2bzT13cxYxhOIFVkBDLD/LLPPkidPDmbO7eUjtSsvlcJN/XaIZv7?= =?us-ascii?Q?lyMvLVhriCsr5RCjN6JKOK9wlvFKTj+JQqvmuNFHv2zx2sXazD+1ssZArw2z?= =?us-ascii?Q?02rW1OjzuUE5xPpeuSoHeL91W9Y4DBR9zaqqDBGOlQyhYY+dVtcv+oV3Uo+k?= =?us-ascii?Q?XeG5j8BpMzrEAM938gmYFgE9AynaGGVOcgM+3vTFc3MWoEnlv1/nfZNZwiop?= =?us-ascii?Q?SJaOVi0VDvNcqVcQnTptgZCNJO76OdvXnpzUX6r+8u1Mo7kGPHsGzJup5ZBG?= =?us-ascii?Q?4C7eUbCgXWmjMSId3hddYcw/AWta7gCtTGs0cTgLLS6bsS5EqbagBR5LV3W8?= =?us-ascii?Q?I9dUHoV2Kr2vRrYcMSrcQZDB2Wz3KVDpCtcPB59VsazV+h4vDGALgqJJwNzm?= =?us-ascii?Q?nSzo5fxrwGFXLu1TYET9yg5BGl7pOhplFq+QZI9AnvkapWHppl8+zcdpLHhe?= =?us-ascii?Q?e2vy+glOTM/sw7d2F6OmtgOfOI47s7MSZESK/BqC4NA8Usyx3lGBhLLCcdar?= =?us-ascii?Q?hoM93K77CQN9BP4owOFkTWSqcqrmUPLWlynlixpnXoGSfOzPd+ZbtIhPCIze?= =?us-ascii?Q?3mICAcBItq9rjW05LyRJnJUE8KSJUGSI0cK88QNs7wVLKYGrxRKu3Rvk/U/c?= =?us-ascii?Q?sN5jAIl9kononmtszTIBycJMr9Z01mAScjsC9rKgic7hGp/YwAap2N5xlk1n?= =?us-ascii?Q?WAvXLvqrDtqWQyut5sgXdr+SvqumfGHSprdDeeSbeWvg30VSiYymk63RUnLo?= =?us-ascii?Q?IRJNZfIy2RAY4fgxQAQDLeRiW+v+cSZmFL0NTlbGhIB+ziJ/S6FnJyDOSNto?= =?us-ascii?Q?qDyPEP1U+jDnXrBfoFMafbAiuSmZs85wwLhJg71d3TpwKsomSYV/GOjMKlF1?= =?us-ascii?Q?hmgHwfRT1z5903NIL0ifJ/nVw/ViU+XxmDv+EAusxiieLWtZYqZyXf6iugq4?= =?us-ascii?Q?VEEA0+oKUAPOCHeMsFyZGLME4Plc8/P5wlIucbDoKGAkcmFcPLERiLcI6mcr?= =?us-ascii?Q?espPo52pQ=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; CO2PR07MB2519; 6:uEC7FkisGOz0jgwrGGLd56uPEPp2NtDukZs4fOS1QQRGEcRlxHUIQ6y5ZLUNxaFbqlxpp22pFI08Kvdm3AxfFT3g743yqu4eIdvc4c5yWlOK6PVQA8bIlQBMC5Oy8CNy6BFEGX0j9Ov/wa1YVg3edsmFiz1qnjG85HWcLSGkxhM+PQl26h7UUhUiapoI/yyVd9z1qb1q1UFp9uH/36JmaFYb335AN5/6cSAXwLzKUFqKx6TrgTwo7qQpo2dq+TIEtMtgUzzcXCA3HL1Ms+Y86jtzUupAUYuk/GBIWZg8j1k/nadIhWiMN2vFEraQ2/v1xgzMTuwLlUPhljRwi6G8opns+E2gn+seeYrcFIFsASc=; 5:rlHTLiaVlgBOSZ1y+/jPTRzwnoFGtXNJscRcVs8OUr6oUB0Zhyh6aRGghPyw4kX9PFbFZbFeYoSXUlWQomldXFHKS6gYrz9aWN2+Go+gk0m7n2LZ+rWytIROE6zWBo7YtnM3GcdcUtxkKUmhZkguSWmOkbH3O7Hv7wWKC9PT5qI=; 24:7q5UdQdQi93newCg4UbbtfmTbYgqTItqjcTriNLZqqbUDxhd0IeRbBlFlNcEeSrZsZyEJOVK/vklMQIkPMIvMaW0iN/XNM8Qh/SuNXbFK7w=; 7:4HMxSJMaDbo6xwNvtDSUbaT4A2YgCPMnHUTDj4bP4oK+zuKrVdk1OwYVrGYgOyyIiwN6WWq8oLvaHbNN3AwEyxrkPgpqRulPNBi+fYs7ssEFeZ7tQ/BpILGPjjsfbCfcTzpCqdqKaGJPwLJxbVypfNGFPi3Z3NSnu71EqUPSvDpwAQlMfLwID9h7948fIx8n8obLMhp662lL1ZqRpLwHjCclQlX3WnSBFq32mdfJOHIJ8LmFS/jspqkmshBM//1E SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Feb 2018 06:54:34.3062 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 900ed1f8-b597-434b-e4c6-08d578f7f91c X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR07MB2519 Subject: Re: [dpdk-dev] [RFC v2, 2/2] eventdev: add crypto adapter API header X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Feb 2018 06:54:41 -0000 -----Original Message----- > Date: Tue, 20 Feb 2018 18:55:09 +0000 > From: "Vangati, Narender" > To: Jerin Jacob , "Gujjar, Abhinandan S" > > CC: "dev@dpdk.org" , "Rao, Nikhil" , > "Eads, Gage" , "hemant.agrawal@nxp.com" > , "akhil.goyal@nxp.com" , > "narayanaprasad.athreya@cavium.com" , > "nidadavolu.murthy@cavium.com" , > "nithin.dabilpuram@cavium.com" > Subject: RE: [RFC v2, 2/2] eventdev: add crypto adapter API header > Hi Narender, > Jerin, > I see the "ENQ" part of the adapter a little differently. I think there is value to offloading cryptodev_enqueue to an adapter service, even when the h/w natively supports DEQ. But there is no element of _offload_ here. Right? meaning, We can express the ENQ-DEQ mode with existing cryptodev+eventdev normative API. I think, Pushing to adapter will result in running ENQ-DEQ only on "service lcore" instead of "worker lcore". How about making "ENQ-DEQ" scheme as set of helper C functions. This will enable, 1) To run the ENQ-DEQ logic in "service" or "worker" lcores 2) Remove the capability in adapter code. ie. If application wants to use ENQ-DEQ scheme as a helper function it will work for both cases(HW and SW) > When the same queue pair is being used by the workers to enqueue requests (this could be where the pre crypto stage was ordered scheduled and the cryptodev enqueues need to be ordered), you would need some synchronization. Going thru eventdev to an adapter which enqueues on worker behalf provides that synchronization and ordering. Makes sense. Only question is that, do we need to expose as service function or generic helper C function?. IMO, service functions makes sense when SW does something when there is no HW support and to get the job done like schedule() function. > > In that sense, the ENQ-DEQ mode is an application choice and defines its programming model. Based on that, a service would be created that does ENQ. For the DEQ part, perhaps the adapter can tell whether the h/w supports DEQ natively or needs to be done in s/w - that way you can have a single adapter. > > Application model for DEQ mode - call cryptodev_enqueue directly. DEQ is h/w or s/w based on capability > Application model for ENQ-DEQ mode - use event_enqueue to offload cryptodev_enqueue to adapter. DEQ is h/w or s/w based on capability > > > vnr > --- > > -----Original Message----- > From: Jerin Jacob [mailto:jerin.jacob@caviumnetworks.com] > Sent: Tuesday, February 20, 2018 7:59 AM > To: Gujjar, Abhinandan S > Cc: dev@dpdk.org; Vangati, Narender ; Rao, Nikhil ; Eads, Gage ; hemant.agrawal@nxp.com; akhil.goyal@nxp.com; narayanaprasad.athreya@cavium.com; nidadavolu.murthy@cavium.com; nithin.dabilpuram@cavium.com > Subject: Re: [RFC v2, 2/2] eventdev: add crypto adapter API header > > -----Original Message----- > > Date: Mon, 19 Feb 2018 10:55:58 +0000 > > From: "Gujjar, Abhinandan S" > > To: Jerin Jacob > > CC: "dev@dpdk.org" , "Vangati, Narender" > > , "Rao, Nikhil" , > > "Eads, Gage" , "hemant.agrawal@nxp.com" > > , "akhil.goyal@nxp.com" > > , "narayanaprasad.athreya@cavium.com" > > , > > "nidadavolu.murthy@cavium.com" , > > "nithin.dabilpuram@cavium.com" > > Subject: RE: [RFC v2, 2/2] eventdev: add crypto adapter API header > > > > Hi Jerin, > > Hi Abhinandan, > > > > > Thanks for the review. Please find few comments inline. > > > > > -----Original Message----- > > > From: Jerin Jacob [mailto:jerin.jacob@caviumnetworks.com] > > > Sent: Saturday, February 17, 2018 1:04 AM > > > To: Gujjar, Abhinandan S > > > Cc: dev@dpdk.org; Vangati, Narender ; > > > Rao, Nikhil ; Eads, Gage > > > ; hemant.agrawal@nxp.com; akhil.goyal@nxp.com; > > > narayanaprasad.athreya@cavium.com; nidadavolu.murthy@cavium.com; > > > nithin.dabilpuram@cavium.com > > > Subject: Re: [RFC v2, 2/2] eventdev: add crypto adapter API header > > > > > > -----Original Message----- > > > > Date: Mon, 15 Jan 2018 16:23:50 +0530 > > > > From: Abhinandan Gujjar > > > > To: jerin.jacob@caviumnetworks.com > > > > CC: dev@dpdk.org, narender.vangati@intel.com, Abhinandan Gujjar > > > > , Nikhil Rao , > > > > Gage Eads > > > > Subject: [RFC v2, 2/2] eventdev: add crypto adapter API header > > > > X-Mailer: git-send-email 1.9.1 > > > > > > > > + > > > > +/** > > > > + * This adapter adds support to enqueue crypto completions to event device. > > > > + * The packet flow from cryptodev to the event device can be > > > > +accomplished > > > > + * using both SW and HW based transfer mechanisms. > > > > + * The adapter uses a EAL service core function for SW based > > > > +packet transfer > > > > + * and uses the eventdev PMD functions to configure HW based > > > > +packet transfer > > > > + * between the cryptodev and the event device. > > > > + * > > > > + * In the case of SW based transfers, application can choose to > > > > +submit a > > > > > > I think, we can remove "In the case of SW based transfers" as it > > > should be applicable for HW case too > > Ok. In that case, adapter will detect the presence of HW connection > > between cryptodev & eventdev and will not dequeue crypto completions. > > I would say presence of "specific capability" instead of HW. > > > > > > > > > > + * crypto operation directly to cryptodev or send it to the > > > > + cryptodev > > > > + * adapter via eventdev, the cryptodev adapter then submits the > > > > + crypto > > > > + * operation to the crypto device. The first mode is known as the > > > > > > The first mode (DEQ) is very clear. In the second mode(ENQ_DEQ), > > > - How does "worker" submits the crypto work through crypto-adapter? > > > If I understand it correctly, "workers" always deals with only > > > cryptodev's > > > rte_cryptodev_enqueue_burst() API and "service" function in crypto > > > adapter would be responsible for dequeue() from cryptodev and enqueue to eventdev? > > > > > > I understand the need for OP_NEW vs OP_FWD mode difference in both modes. > > > Other than that, What makes ENQ_DEQ different? Could you share the > > > flow for ENQ_DEQ mode with APIs. > > > > /* > > Application changes for ENQ_DEQ mode: > > ------------------------------------------------- > > /* In ENQ_DEQ mode, to enqueue to adapter app > > * has to fill out following details. > > */ > > struct rte_event_crypto_request *req; > > struct rte_crypto_op *op = rte_crypto_op_alloc(); > > > > /* fill request info */ > > req = (void *)((char *)op + op.private_data_offset); > > req->cdev_id = 1; > > req->queue_pair_id = 1; > > > > /* fill response info */ > > ... > > > > /* send event to crypto adapter */ > > ev->event_ptr = op; > > ev->queue_id = dst_event_qid; > > ev->priority = dst_priority; > > ev->sched_type = dst_sched_type; > > ev->event_type = RTE_EVENT_TYPE_CRYPTODEV; > > ev->sub_event_type = sub_event_type; > > ev->flow_id = dst_flow_id; > > ret = rte_event_enqueue_burst(event_dev_id, event_port_id, ev, 1); > > > > > > Adapter in ENQ_DEQ mode, submitting crypto ops to cryptodev: > > ----------------------------------------------------------------------------- > > n = rte_event_dequeue_burst(event_dev_id, event_port_id, ev, BATCH_SIZE, time_out); > > struct rte_crypto_op *op = ev->event_ptr; > > struct rte_event_crypto_request *req = (void *)op + op.private_data_offset; > > cdev_id = req->cdev_id; > > qp_id = req->queue_pair_id > > > > ret = rte_cryptodev_enqueue_burst(cdev_id, qp_id, op, 1); > > This mode wont work for the HW implementations that I know. As in HW implementations, The Adapter is embedded in HW. > The DEQ mode works. But, This would call for to have two separate application logic for DEQ and ENQ_DEQ mode. > I think, it is unavoidable as SW scheme has better performance with ENQ_DEQ MODE. > > If you think, there is no option other than introducing a capability in adapter then please create capability in Rx adapter to inform the adapter capability to the application. > > Do we think, it possible to have scheme with ENQ_DEQ mode, Where application still enqueue to cryptodev like DEQ mode but using cryptodev. ie. Adapter patches the cryptodev dev->enqueue_burst() to "eventdev enqueue burst" followed by "exiting dev->enqueue_burst". > Something like exiting ethdev rx_burst callback scheme. > This will enable application to have unified flow IMO. > > Any thoughts from NXP folks? > > > */ > > > > > > > + * dequeue only (DEQ) mode and the second as the enqueue - > > > > + dequeue > > > > > > extra space between "mode" and "and" > > Ok > > > > > > > + * (ENQ_DEQ) mode. The choice of mode can be specified when > > > > + creating > > > > + * the adapter. > > > > + * In the latter choice, the cryptodev adapter is able to use > > > > + * RTE_OP_FORWARD as the event dev enqueue type, this has a > > > > + performance > > > > + * advantage in "closed system" eventdevs like the eventdev SW > > > > + PMD and > > >